SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
1
Management 512 – © 2010 SANS
Everything I know is wrong!
How to lead a security team in a time of
unprecedented change and challenge
Management 512 – © 2010 SANS
This is NOT a New Problem
2
Management 512 – © 2010 SANS
1943: A world market for
maybe five computers
Management 512 – © 2010 SANS
1981: No one will ever need
more than 640k
3
Management 512 – © 2010 SANS
1995: Internet will never take
off
Management 512 – © 2010 SANS
Some Specific Examples
“A man doesn't know what he
knows until he knows what he
doesn't know.” Dr. Laurence Peters
4
Management 512 – © 2010 SANS
.pdfs are the safe attachment
• Don’t send .docs that might transmit a
virus, send a .pdf, it is “just” a print file
• Today, about 1/2 of malware infections
originate from Flash and Reader
http://www.itpro.co.uk/622522/adobe-reader-and-ie-feel-brunt-of-web-based-malware
• Doesn’t solve everything but I am
loving Gpdf for Firefox and Chrome
Management 512 – © 2010 SANS
Computers are made from
CPU, MMU and possibly GPU
• Computers are made from a number of
subsystems, many of which have own
processor and memory that are not
under direct control of OS
• June 2010 Bigfoot released an NIC with
its own GPU
• And then, there is the baseboard
management controller
5
Management 512 – © 2010 SANS
Hot site is the Cadillac of
Disaster Recovery
• Hot site means equipment/network
is available and configured
• However, today’s environments are
so complex, that doesn’t work well;
too many changes too fast. VMWare
Site Recovery Manager has a much
better chance of actually working.
Management 512 – © 2010 SANS
Or maybe alternate sites
• Paul Volcker as the Fed, argued for
redundant sites, database
replication, geographic diversity
• How geographically diverse? Think
EMP
http://www.newsmax.com/RonaldKessler/emp-electromagneticpulse-William-Graham/2010/04/05/id/354742
6
Management 512 – © 2010 SANS
If you encrypt it with AES it
will be safe for 1000 years
• 2009, Alex Biryukov, Orr Dunkelman,
Nathan Keller, Dmitry Khovratovich, and Adi
Shamir, describe an attack against 10 round
AES 256 that is fully practical
• 14 rounds is NIST standard so don’t panic
yet
• Historical note, DES was still in common use
when it could be cracked in near real time
Management 512 – © 2010 SANS
You have to have anti-virus
• Is the prevailing wisdom and it has
made its way to the auditor’s checklists
• 30k new malware per day from
automated systems, AV is 90%
effective at best and usually far lower
• What we have to have is endpoint white
list technology, and it is a pain
7
Management 512 – © 2010 SANS
Incident Response isn’t that
hard
• In the past this was the domain of
the Help desk and primary tool was a
“cleaning kit”
• Today, you find you need an outside
specialist in response/forensics/
investigation/malware who bills at
$330.00 hour door-to-door
Management 512 – © 2010 SANS
When you register a domain
get the .net and .org as well
• Yeah, and every country code and
domain suffix?
8
Management 512 – © 2010 SANS
When you code, do all your
housekeeping at one time
• Get your file handles to input files,
scratch files, output files all in the
same function, so if you can’t do your
I/O you exit with a nice error message
• But, this allows a difference between
TCO/TOU which opens the door for
race conditions
Management 512 – © 2010 SANS
Online banking is safe
because of security questions
• It is likely that you mentioned the
name of your pet on Facebook
• They usually only ask the security
questions if you do not have a bank
cookie
9
Management 512 – © 2010 SANS
Online Banking Tips
• eTrade uses an RSA dongle, therefore it
is my primary account
• Get your paycheck deposited into one
bank account and do not use that
account for ANYTHING other than
paying bills
• Have a max of one bank where you
have a debit card
Management 512 – © 2010 SANS
As long as they don’t go to porn
sites web surfing is harmless
• Surfing the web is probably the
most dangerous thing you do using
a computer
• NoScript Firefox, with Internet
Explorer I have Flash disabled, try
that and see how many web sites
fail
10
Management 512 – © 2010 SANS
I run Microsoft Update so I
am pretty good, yeah?
• Actually, the odds are we have
expired, end of life and out of date
needing patches 3rd party
applications
• I run Secunia PSI 2.0+ to try to
manage this
Management 512 – © 2010 SANS
You should never put more
than one service on a server
• This was one of the lessons of the
Morris Worm – 1988, if the server goes
down, you lose multiple services
• Today, we have blades hosting
hundreds of servers, however tools like
VMotion may be able minimize the risk
• State of Virginia went down for IT
August 2010 for about a week
11
Management 512 – © 2010 SANS
OK, so what?
Stephen, you have shared some facts,
some I knew, some I didn’t, some I
need to research further, but what is
the point?
Management 512 – © 2010 SANS
Future Shock Revisited
• 1970 – we are headed for a time of
increasing change, people who can
adapt will prosper, others . . .
• Coined the term “information overload”
which no one uses anymore even
though they are overloaded
• Concept of knowledge worker, who can
work from anywhere (Aloha y’all)
12
Management 512 – © 2010 SANS
So, everything we know isn’t
wrong, it is just changing
Let’s talk about proven
strategy to stay effective
during times of change
Management 512 – © 2010 SANS
Business “clue” during times
of extreme change
• Situational awareness, get in the
information stream, be alert for what you
can measure
• Know what is “evergreen”, adapting to
continue to deliver revenue as times
change and protect that above all
• Don’t change anything that is working,
save your energy for things that are not
working well
13
Management 512 – © 2010 SANS
Security “clue” during times of
extreme change
• Threatpost
• ISC.SANS.ORG – hey, it looks a lot
more like English than it used to
• SANS NewsBites
• Scan Searchsecurity.techtarget.com
• At least once a month, really dig
into to a vulnerability or attack
Management 512 – © 2010 SANS
Don’t force yourself or your smart
techie to try to figure it all out
• Use templates for system
configuration www.cisecurity.org
• Leverage the 20 Critical Controls,
especially the quick wins and
automated controls
14
Management 512 – © 2010 SANS
Managing “across”, managing
peers
• Keep in mind that extreme change is and
has been a fact of life in security for a long
time, your peers in other areas of the
business may not be as used to it as you
are, give them some grace and time to adapt
• Also, not everyone needs to be a
technologist; a good business operator
brings in more money than a technologist 99
times out of 100
Management 512 – © 2010 SANS
Managing the Boss
• Senior managers tend to be a little older
and less flexible
• Make sure to add value to the organization
and then hold your ground *in private*
• A compliment every once in a while
doesn’t hurt
• Practice giving accurate, but simple and
short explanations about technology
• Avoid FUD, that is so 1970s
15
Management 512 – © 2010 SANS
Managing Direct Reports
• The two keys are capability and consistency,
make sure the same boss shows up every
day, push to improve capability
• Communication – if something does not get
done, first check to see if your direction was
clear
• Follow up, when you give direction set a
calendar tickler
Management 512 – © 2010 SANS
Challenge Yourself
• Meetings, whitepapers, policy are
all important
• But don’t get so busy that you
don’t actually play with a tool every
once in a while
16
Management 512 – © 2010 SANS
12 Laws of IT Power
• They can’t easily fire you if you are
the best
• Never speak to management in
hex
• At any given time know what the
best selling security books are
• If you help people learn what you
know, they will help you get the
work done
• Bet on people and bet large
• Be flexible - as long as you have
oxygen, power, water and
propellant, you have options
• No sensible organization
wants to mess with a
rainmaker
• Avoid unplanned requests for
money
• Be positive
• Teaming, the person next to
you knows something you
don’t
• Push back
• When opportunity knocks, be
prepared to take advantage of
the moment
Management 512 – © 2010 SANS
Parting Thoughts
• Nobody becomes effective or irrelevant in a
day, either is the result of thousands of choices
• We all have the same amount of time: avoid
timewasters, seek timesavers, consider giving
up a low value task to pursue a high value task
• Decide what you want to accomplish, the steps
to get there, share it with a friend who will hold
you accountable, use written reminders until
the steps become habits and then disciplines

Weitere ähnliche Inhalte

Mehr von Rochester Security Summit

Mehr von Rochester Security Summit (13)

IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
 
Radio Reconnaissance in Penetration Testing
Radio Reconnaissance in Penetration TestingRadio Reconnaissance in Penetration Testing
Radio Reconnaissance in Penetration Testing
 
Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)Maximizing ROI through Security Training (for Developers)
Maximizing ROI through Security Training (for Developers)
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Finding Patterns in Data Breaches
Finding Patterns in Data BreachesFinding Patterns in Data Breaches
Finding Patterns in Data Breaches
 
It's All About the Data!
It's All About the Data!It's All About the Data!
It's All About the Data!
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…
 
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Firewall Defense against Covert Channels
Firewall Defense against Covert Channels Firewall Defense against Covert Channels
Firewall Defense against Covert Channels
 

Kürzlich hochgeladen

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Kürzlich hochgeladen (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Emerging Threats

  • 1. 1 Management 512 – © 2010 SANS Everything I know is wrong! How to lead a security team in a time of unprecedented change and challenge Management 512 – © 2010 SANS This is NOT a New Problem
  • 2. 2 Management 512 – © 2010 SANS 1943: A world market for maybe five computers Management 512 – © 2010 SANS 1981: No one will ever need more than 640k
  • 3. 3 Management 512 – © 2010 SANS 1995: Internet will never take off Management 512 – © 2010 SANS Some Specific Examples “A man doesn't know what he knows until he knows what he doesn't know.” Dr. Laurence Peters
  • 4. 4 Management 512 – © 2010 SANS .pdfs are the safe attachment • Don’t send .docs that might transmit a virus, send a .pdf, it is “just” a print file • Today, about 1/2 of malware infections originate from Flash and Reader http://www.itpro.co.uk/622522/adobe-reader-and-ie-feel-brunt-of-web-based-malware • Doesn’t solve everything but I am loving Gpdf for Firefox and Chrome Management 512 – © 2010 SANS Computers are made from CPU, MMU and possibly GPU • Computers are made from a number of subsystems, many of which have own processor and memory that are not under direct control of OS • June 2010 Bigfoot released an NIC with its own GPU • And then, there is the baseboard management controller
  • 5. 5 Management 512 – © 2010 SANS Hot site is the Cadillac of Disaster Recovery • Hot site means equipment/network is available and configured • However, today’s environments are so complex, that doesn’t work well; too many changes too fast. VMWare Site Recovery Manager has a much better chance of actually working. Management 512 – © 2010 SANS Or maybe alternate sites • Paul Volcker as the Fed, argued for redundant sites, database replication, geographic diversity • How geographically diverse? Think EMP http://www.newsmax.com/RonaldKessler/emp-electromagneticpulse-William-Graham/2010/04/05/id/354742
  • 6. 6 Management 512 – © 2010 SANS If you encrypt it with AES it will be safe for 1000 years • 2009, Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, and Adi Shamir, describe an attack against 10 round AES 256 that is fully practical • 14 rounds is NIST standard so don’t panic yet • Historical note, DES was still in common use when it could be cracked in near real time Management 512 – © 2010 SANS You have to have anti-virus • Is the prevailing wisdom and it has made its way to the auditor’s checklists • 30k new malware per day from automated systems, AV is 90% effective at best and usually far lower • What we have to have is endpoint white list technology, and it is a pain
  • 7. 7 Management 512 – © 2010 SANS Incident Response isn’t that hard • In the past this was the domain of the Help desk and primary tool was a “cleaning kit” • Today, you find you need an outside specialist in response/forensics/ investigation/malware who bills at $330.00 hour door-to-door Management 512 – © 2010 SANS When you register a domain get the .net and .org as well • Yeah, and every country code and domain suffix?
  • 8. 8 Management 512 – © 2010 SANS When you code, do all your housekeeping at one time • Get your file handles to input files, scratch files, output files all in the same function, so if you can’t do your I/O you exit with a nice error message • But, this allows a difference between TCO/TOU which opens the door for race conditions Management 512 – © 2010 SANS Online banking is safe because of security questions • It is likely that you mentioned the name of your pet on Facebook • They usually only ask the security questions if you do not have a bank cookie
  • 9. 9 Management 512 – © 2010 SANS Online Banking Tips • eTrade uses an RSA dongle, therefore it is my primary account • Get your paycheck deposited into one bank account and do not use that account for ANYTHING other than paying bills • Have a max of one bank where you have a debit card Management 512 – © 2010 SANS As long as they don’t go to porn sites web surfing is harmless • Surfing the web is probably the most dangerous thing you do using a computer • NoScript Firefox, with Internet Explorer I have Flash disabled, try that and see how many web sites fail
  • 10. 10 Management 512 – © 2010 SANS I run Microsoft Update so I am pretty good, yeah? • Actually, the odds are we have expired, end of life and out of date needing patches 3rd party applications • I run Secunia PSI 2.0+ to try to manage this Management 512 – © 2010 SANS You should never put more than one service on a server • This was one of the lessons of the Morris Worm – 1988, if the server goes down, you lose multiple services • Today, we have blades hosting hundreds of servers, however tools like VMotion may be able minimize the risk • State of Virginia went down for IT August 2010 for about a week
  • 11. 11 Management 512 – © 2010 SANS OK, so what? Stephen, you have shared some facts, some I knew, some I didn’t, some I need to research further, but what is the point? Management 512 – © 2010 SANS Future Shock Revisited • 1970 – we are headed for a time of increasing change, people who can adapt will prosper, others . . . • Coined the term “information overload” which no one uses anymore even though they are overloaded • Concept of knowledge worker, who can work from anywhere (Aloha y’all)
  • 12. 12 Management 512 – © 2010 SANS So, everything we know isn’t wrong, it is just changing Let’s talk about proven strategy to stay effective during times of change Management 512 – © 2010 SANS Business “clue” during times of extreme change • Situational awareness, get in the information stream, be alert for what you can measure • Know what is “evergreen”, adapting to continue to deliver revenue as times change and protect that above all • Don’t change anything that is working, save your energy for things that are not working well
  • 13. 13 Management 512 – © 2010 SANS Security “clue” during times of extreme change • Threatpost • ISC.SANS.ORG – hey, it looks a lot more like English than it used to • SANS NewsBites • Scan Searchsecurity.techtarget.com • At least once a month, really dig into to a vulnerability or attack Management 512 – © 2010 SANS Don’t force yourself or your smart techie to try to figure it all out • Use templates for system configuration www.cisecurity.org • Leverage the 20 Critical Controls, especially the quick wins and automated controls
  • 14. 14 Management 512 – © 2010 SANS Managing “across”, managing peers • Keep in mind that extreme change is and has been a fact of life in security for a long time, your peers in other areas of the business may not be as used to it as you are, give them some grace and time to adapt • Also, not everyone needs to be a technologist; a good business operator brings in more money than a technologist 99 times out of 100 Management 512 – © 2010 SANS Managing the Boss • Senior managers tend to be a little older and less flexible • Make sure to add value to the organization and then hold your ground *in private* • A compliment every once in a while doesn’t hurt • Practice giving accurate, but simple and short explanations about technology • Avoid FUD, that is so 1970s
  • 15. 15 Management 512 – © 2010 SANS Managing Direct Reports • The two keys are capability and consistency, make sure the same boss shows up every day, push to improve capability • Communication – if something does not get done, first check to see if your direction was clear • Follow up, when you give direction set a calendar tickler Management 512 – © 2010 SANS Challenge Yourself • Meetings, whitepapers, policy are all important • But don’t get so busy that you don’t actually play with a tool every once in a while
  • 16. 16 Management 512 – © 2010 SANS 12 Laws of IT Power • They can’t easily fire you if you are the best • Never speak to management in hex • At any given time know what the best selling security books are • If you help people learn what you know, they will help you get the work done • Bet on people and bet large • Be flexible - as long as you have oxygen, power, water and propellant, you have options • No sensible organization wants to mess with a rainmaker • Avoid unplanned requests for money • Be positive • Teaming, the person next to you knows something you don’t • Push back • When opportunity knocks, be prepared to take advantage of the moment Management 512 – © 2010 SANS Parting Thoughts • Nobody becomes effective or irrelevant in a day, either is the result of thousands of choices • We all have the same amount of time: avoid timewasters, seek timesavers, consider giving up a low value task to pursue a high value task • Decide what you want to accomplish, the steps to get there, share it with a friend who will hold you accountable, use written reminders until the steps become habits and then disciplines