SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Running with Scissors
Security Hurts No Matter What
• Certified CISO
• Sold First Software Package in 1971
• Debugged UBASIC for FAU/FIU in 1973
• Member of FreeBSD Development Team
• Finalist EE Times Innovator of the Year
• Holder, US Patent Number 7603711
• Founded Florida Datamation in 1982
– Largest QNX Distributor in the World
– Clients: NSA, VISA, Nortel, SAIC, NOAA, DOD, IBM, 3Com, HP
• Founded SECNAP Network Security in 2001
– Designed IT Risk and Compliance Audit Practice
– Developed and Patented SECNAP’s ID/PS Appliance, core of MSSP Practice
– Clients: SAP, Bank United, City National Bank
• Founded Security Privateers in 2012
Michael Scheidell, CISO
Security Privateers
Agenda
Running with Scissors
Massive Security Breaches
Failed Policies
Good Security Enhances Privacy
Change the way you think
Core Problems
Support Industry Initiatives
Take responsibility
Security and Privacy Success ?
Running With Scissors
Where else except in Security and Weather can you be
wrong so many times and still keep your job?
Running with Scissors
Running with Scissors: Down
Budget cuts reduce security
Systems hacked
Customer data lost
Unauthorized bank transfers
Identify theft
Industrial espionage
Focused on the wrong objectives
Sony: #1 Again 77 million play station network users
Sega: Striving to be #2: 1.3 Million online gaming subscribers
Epsilon: 60 Million customer’s data breached
South Carolina Department of Revenue: 6.8 Million tax payers
Running With Scissors
Massive Security Breaches
1
2
3
4
5
RSA: Everyone who used RSA key fobs
Running With Scissors
•Most talked about security and privacy failures
•Simple security mistakes, programming, carelessness
•When too much security caused failures?
•You can’t have privacy without security
•But, you CAN have security without privacy
Failed Policies
South Carolina Department of Revenue, 6.8 Million Tax payers
 Looking for a CISO for over a year
 Could not find qualified candidate for $100K job
 Programmers didn’t follow best practices
 Network Administrator violated policies
 No one tested the application
 Dog ate my homework
Running with Scissors
Running with Scissors: UP
Spending Too much on Security
Money is wasted
No measurable effect
Ineffective
Focused on the wrong objectives
Running With Scissors
What major systemic failure can you think of
in Security and Privacy?
Where has too much Security eliminated
Privacy and did nothing for Security?
Have you experienced too much security?
Good Security Enhances Privacy
EU Data Privacy laws vs. US Data Protection
Security Without Privacy
$8 Billion Dollar Budget in 2012
$88 Billion Dollars since 2001
• Mission: The TSA protects the nation’s
transportation systems to ensure freedom
of movement for people and commerce
• Vision: Continuously set the standard for
excellence in transportation security
through its people, processes, and
technology
Failed Policies?
TSA: Mission, Vision, Core Values
Security Without Privacy
$80 Million, and now $245 Million
Enhanced Security
What did the TSA Find?
Enhanced Security
What did the TSA Find?
Enhanced Security
What did the TSA Find?
Show of hands: Who feels more Secure?PART
TWO – YES/NO
Less Secure ?
Running with Scissors
Core Problems
• More Hardware?
• More People?
• Better Processes?
• Hire a CISO for $100K a year?
• Change Mission Statement?
• Training?
How do you fix it?
3D SLIDE MAN – EMOTIONS PART TWO – YES/NO
Block The Hackers
What do we Really Need?
Full Speed Ahead!
Don’t Touch Anything
Anything
Lets just Wait and See
Educate the Board
APT, SQL Injection, Cross Site Scripting,
Split Tunnel, VPN, WPA2, SSL v2, TLS v1,
SDN, SaaS, PaaS, IaaS
What do we Really Need?
CEO
What do we Really Need?
CISO
CISO Responsibilities
• Policies
• Guidelines
• Directives
• Procedures
• Standards
Balance Sheet, CAPX, Derivatives, GAAP, IFRS,
FASB, FIN, EBIDA
What do we Really Need?
CISO
What the CISO needs to know
What do we Really Need?
CEO
• Vision
• Mission
• Objectives
• Goals
• Strategies
• Results
Isolated and conflicting responsibilities
Executive Management Team
Financial Management Team
CEO
Network Engineers
Security Engineers
SEEMINLY CONFLICTING
CEO vs CISO
Budget vs Privacy
Spend vs Invest
Expand vs Secure
CISO
Decision Time: Who is Responsible?
Who has Authority ?TWO – YES/NO
3D SLIDE MAN – EMOTIONS PART TWO – YES/NO
Not My Job
CEO is responsible for final decision
What do we really need?
CEO, CFO, CIO, CSO must agree
It is the
CIO/CFO/CTO/CSO’s
fault
What if we don’t agree?
Ultimately responsible
Example text
Go ahead and replace it with your own text. This is an
example text. Go ahead and replace it with your own text.
Go ahead and replace it with your own text
Network Engineer
Just trying to pay the
mortgage and visa bill
CISO
Reports to CIO
400K budget
CIO/CTO
Reports to CEO
3MM budget
CEO/President
Reports to Board &
Shareholders
13MM budget
What do we really need?
Running with Scissors
Keep the Main Thing The Main Thing
A successful organization understands the risks of
not only implementing security and privacy measures,
but the risks of NOT implementing them. Running
with Scissors: “Its what we do”
Keep Plenty of
Bandaids.
Put Running
Shoes on.
Keep Scissors
Sharp.
• Cloud Security Alliance (CSA)
• Information Systems Audit and Control
Association (ISACA)
• Information Systems Security Association
(ISSA)
• FBI’s InfraGard
• Host users groups meetings
Support Industry Initiatives
Users Groups, Trade Groups, Share Information
Involve Everyone:
•Business case & Budget
•Contractual agreement
•Vision
•Initial product backlog
•Initial release plan
•Stakeholderbuy-in
•Assemble team
PREPARATION
SCRUM PROCESS
CTO
CEO/President
Stakeholders
Sprint planning
meeting Daily Cycle
Sprint review
Sprint
retrospective
Update
product
backlog
RELEASE
Product
increment
CIO and
CSO
Users
CEO/CFO:
Lets move everything to the cloud.
We save on Capex, its more secure
and gives us reduncancy. We don’t
care if its Amazon, Oracle or HP
Everyone is
Happy
Company is secure, privacy maintained
CEO CFO
CTOCSO Programmers Users
CIO
CEO Happy: Board of Directors
Happy, got his 2MM bonus
1
CFO Happy: Reduced Operating Expense
No CAP Ex, Reduced Overhead
2
CIO Happy: CEO give him his bonus
3
Users Happy: More services, faster
user interface, reduced costs.
4
If it works: Name your bonus
THANK YOU!
Michael Scheidell, Managing Director, CISO
Security Privateers
www.securityprivateers.com
+1.561.948.1305 / michael@securityprivateers.com
Copyright 2013, Security Privateers
Portions Copyright Ron Leishman

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesAlex Rudie
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityPECB
 
Corporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and RewardsCorporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and RewardsPECB
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty VisualizationDoug Cogswell
 
Business Outsourcing to Asia
Business Outsourcing to AsiaBusiness Outsourcing to Asia
Business Outsourcing to AsiaConferencias FIST
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleKevin Duffey
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedIBM Security
 
Iid infoshare exec_summary final
Iid infoshare exec_summary finalIid infoshare exec_summary final
Iid infoshare exec_summary finalAndrew_Goss
 
How to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyHow to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyTripwire
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyShawn Tuma
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
Red vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 yearsRed vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 yearsEC-Council
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackKevin Duffey
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...PECB
 
The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...PECB
 
Witt O Briens: A route through the Panama Panal
Witt O Briens: A route through the Panama PanalWitt O Briens: A route through the Panama Panal
Witt O Briens: A route through the Panama Panalbcilondonforum
 

Was ist angesagt? (20)

Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
Corporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and RewardsCorporate Social Responsibility: Balancing the Risks and Rewards
Corporate Social Responsibility: Balancing the Risks and Rewards
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty Visualization
 
Business Outsourcing to Asia
Business Outsourcing to AsiaBusiness Outsourcing to Asia
Business Outsourcing to Asia
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a Role
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
 
Iid infoshare exec_summary final
Iid infoshare exec_summary finalIid infoshare exec_summary final
Iid infoshare exec_summary final
 
How to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyHow to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security Literacy
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Helping SME’S to face cybersecurity threats
Helping SME’S to face cybersecurity threatsHelping SME’S to face cybersecurity threats
Helping SME’S to face cybersecurity threats
 
Red vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 yearsRed vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 years
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
 
The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...The missing parts of the governance puzzle : The 2000 tide and what to expect...
The missing parts of the governance puzzle : The 2000 tide and what to expect...
 
Witt O Briens: A route through the Panama Panal
Witt O Briens: A route through the Panama PanalWitt O Briens: A route through the Panama Panal
Witt O Briens: A route through the Panama Panal
 

Ähnlich wie CISO Michael Scheidell Discusses Security and Privacy Success

BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)ClubHack
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton ChuvakinWhat PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton ChuvakinAnton Chuvakin
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPNick Selby
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderBen Johnson
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
PCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesPCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesAnton Chuvakin
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEOMicheal Axelsen
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyFLUZO
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 

Ähnlich wie CISO Michael Scheidell Discusses Security and Privacy Success (20)

BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton ChuvakinWhat PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
PCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesPCI 2010: Trends and Technologies
PCI 2010: Trends and Technologies
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 

Mehr von Michael Scheidell

Spy vs Spy: Protecting Secrets
Spy vs Spy: Protecting SecretsSpy vs Spy: Protecting Secrets
Spy vs Spy: Protecting SecretsMichael Scheidell
 
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...Michael Scheidell
 
Bring Your Own Policy: Internet Use/BYOD Policy by consensus
Bring Your Own Policy:  Internet Use/BYOD Policy by consensus Bring Your Own Policy:  Internet Use/BYOD Policy by consensus
Bring Your Own Policy: Internet Use/BYOD Policy by consensus Michael Scheidell
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsMichael Scheidell
 

Mehr von Michael Scheidell (6)

Not IF, but WHEN
Not IF, but WHENNot IF, but WHEN
Not IF, but WHEN
 
Spy vs Spy: Protecting Secrets
Spy vs Spy: Protecting SecretsSpy vs Spy: Protecting Secrets
Spy vs Spy: Protecting Secrets
 
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Bring Your Own Policy: Internet Use/BYOD Policy by consensus
Bring Your Own Policy:  Internet Use/BYOD Policy by consensus Bring Your Own Policy:  Internet Use/BYOD Policy by consensus
Bring Your Own Policy: Internet Use/BYOD Policy by consensus
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile Apps
 

Kürzlich hochgeladen

Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 

Kürzlich hochgeladen (20)

Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 

CISO Michael Scheidell Discusses Security and Privacy Success

  • 1. Running with Scissors Security Hurts No Matter What
  • 2. • Certified CISO • Sold First Software Package in 1971 • Debugged UBASIC for FAU/FIU in 1973 • Member of FreeBSD Development Team • Finalist EE Times Innovator of the Year • Holder, US Patent Number 7603711 • Founded Florida Datamation in 1982 – Largest QNX Distributor in the World – Clients: NSA, VISA, Nortel, SAIC, NOAA, DOD, IBM, 3Com, HP • Founded SECNAP Network Security in 2001 – Designed IT Risk and Compliance Audit Practice – Developed and Patented SECNAP’s ID/PS Appliance, core of MSSP Practice – Clients: SAP, Bank United, City National Bank • Founded Security Privateers in 2012 Michael Scheidell, CISO Security Privateers
  • 3. Agenda Running with Scissors Massive Security Breaches Failed Policies Good Security Enhances Privacy Change the way you think Core Problems Support Industry Initiatives Take responsibility
  • 4. Security and Privacy Success ? Running With Scissors Where else except in Security and Weather can you be wrong so many times and still keep your job?
  • 5. Running with Scissors Running with Scissors: Down Budget cuts reduce security Systems hacked Customer data lost Unauthorized bank transfers Identify theft Industrial espionage Focused on the wrong objectives
  • 6. Sony: #1 Again 77 million play station network users Sega: Striving to be #2: 1.3 Million online gaming subscribers Epsilon: 60 Million customer’s data breached South Carolina Department of Revenue: 6.8 Million tax payers Running With Scissors Massive Security Breaches 1 2 3 4 5 RSA: Everyone who used RSA key fobs
  • 7. Running With Scissors •Most talked about security and privacy failures •Simple security mistakes, programming, carelessness •When too much security caused failures? •You can’t have privacy without security •But, you CAN have security without privacy Failed Policies
  • 8. South Carolina Department of Revenue, 6.8 Million Tax payers  Looking for a CISO for over a year  Could not find qualified candidate for $100K job  Programmers didn’t follow best practices  Network Administrator violated policies  No one tested the application  Dog ate my homework
  • 9. Running with Scissors Running with Scissors: UP Spending Too much on Security Money is wasted No measurable effect Ineffective Focused on the wrong objectives
  • 10. Running With Scissors What major systemic failure can you think of in Security and Privacy? Where has too much Security eliminated Privacy and did nothing for Security? Have you experienced too much security? Good Security Enhances Privacy EU Data Privacy laws vs. US Data Protection
  • 11. Security Without Privacy $8 Billion Dollar Budget in 2012 $88 Billion Dollars since 2001
  • 12. • Mission: The TSA protects the nation’s transportation systems to ensure freedom of movement for people and commerce • Vision: Continuously set the standard for excellence in transportation security through its people, processes, and technology Failed Policies? TSA: Mission, Vision, Core Values
  • 13. Security Without Privacy $80 Million, and now $245 Million
  • 14. Enhanced Security What did the TSA Find?
  • 15. Enhanced Security What did the TSA Find?
  • 16. Enhanced Security What did the TSA Find?
  • 17. Show of hands: Who feels more Secure?PART TWO – YES/NO
  • 19. Running with Scissors Core Problems • More Hardware? • More People? • Better Processes? • Hire a CISO for $100K a year? • Change Mission Statement? • Training? How do you fix it?
  • 20. 3D SLIDE MAN – EMOTIONS PART TWO – YES/NO Block The Hackers What do we Really Need? Full Speed Ahead! Don’t Touch Anything Anything Lets just Wait and See
  • 21. Educate the Board APT, SQL Injection, Cross Site Scripting, Split Tunnel, VPN, WPA2, SSL v2, TLS v1, SDN, SaaS, PaaS, IaaS What do we Really Need? CEO
  • 22. What do we Really Need? CISO CISO Responsibilities • Policies • Guidelines • Directives • Procedures • Standards
  • 23. Balance Sheet, CAPX, Derivatives, GAAP, IFRS, FASB, FIN, EBIDA What do we Really Need? CISO What the CISO needs to know
  • 24. What do we Really Need? CEO • Vision • Mission • Objectives • Goals • Strategies • Results
  • 25. Isolated and conflicting responsibilities Executive Management Team Financial Management Team CEO Network Engineers Security Engineers SEEMINLY CONFLICTING CEO vs CISO Budget vs Privacy Spend vs Invest Expand vs Secure CISO
  • 26. Decision Time: Who is Responsible? Who has Authority ?TWO – YES/NO
  • 27. 3D SLIDE MAN – EMOTIONS PART TWO – YES/NO Not My Job
  • 28. CEO is responsible for final decision What do we really need? CEO, CFO, CIO, CSO must agree
  • 30. Ultimately responsible Example text Go ahead and replace it with your own text. This is an example text. Go ahead and replace it with your own text. Go ahead and replace it with your own text Network Engineer Just trying to pay the mortgage and visa bill CISO Reports to CIO 400K budget CIO/CTO Reports to CEO 3MM budget CEO/President Reports to Board & Shareholders 13MM budget
  • 31. What do we really need?
  • 32. Running with Scissors Keep the Main Thing The Main Thing A successful organization understands the risks of not only implementing security and privacy measures, but the risks of NOT implementing them. Running with Scissors: “Its what we do” Keep Plenty of Bandaids. Put Running Shoes on. Keep Scissors Sharp.
  • 33. • Cloud Security Alliance (CSA) • Information Systems Audit and Control Association (ISACA) • Information Systems Security Association (ISSA) • FBI’s InfraGard • Host users groups meetings Support Industry Initiatives Users Groups, Trade Groups, Share Information
  • 34. Involve Everyone: •Business case & Budget •Contractual agreement •Vision •Initial product backlog •Initial release plan •Stakeholderbuy-in •Assemble team PREPARATION SCRUM PROCESS CTO CEO/President Stakeholders Sprint planning meeting Daily Cycle Sprint review Sprint retrospective Update product backlog RELEASE Product increment CIO and CSO Users CEO/CFO: Lets move everything to the cloud. We save on Capex, its more secure and gives us reduncancy. We don’t care if its Amazon, Oracle or HP
  • 35. Everyone is Happy Company is secure, privacy maintained CEO CFO CTOCSO Programmers Users CIO
  • 36. CEO Happy: Board of Directors Happy, got his 2MM bonus 1 CFO Happy: Reduced Operating Expense No CAP Ex, Reduced Overhead 2 CIO Happy: CEO give him his bonus 3 Users Happy: More services, faster user interface, reduced costs. 4 If it works: Name your bonus
  • 37. THANK YOU! Michael Scheidell, Managing Director, CISO Security Privateers www.securityprivateers.com +1.561.948.1305 / michael@securityprivateers.com Copyright 2013, Security Privateers Portions Copyright Ron Leishman