SlideShare ist ein Scribd-Unternehmen logo
1 von 80
Downloaden Sie, um offline zu lesen
1
The 7 Things I Know About
Cyber Security After 25 Years
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
2
RA F A L L O S
Head of Services Strategy & GTM at ExtraHop
~25 years in cyber security
Broad expertise in product and services
development, security strategy, and problem-solving
Podcaster
Down the Security Rabbithole Podcast
Writer and public speaker
Biography
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
3
“What makes you qualified to give this talk?”
These are all lessons I’ve learned, first-hand, the hard way
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
4
My 3 guiding principles
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
5
Change is relentless
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
6
crime pays
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
7
Security vs “human nature”
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
8
1. You Don’t Want ZERO Risk
Check your math, and try again
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
9
business relies on taking risks
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
10
“Enigo Montoya” problem
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
11
security is a 1/x curve
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
12
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
13
you’re never getting to ZERO
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
14
at some point,
cost exceeds benefit
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
15
risk = probability x impact
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
16
don’t get fooled by chance
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
17
reducing risk, creates risk
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
18
either extreme is bad
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
19
2. Change the things you can
The magic quadrant of bad ideas
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
20
effort vs impact
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
21
low effort, high impact
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
22
low effort, low impact
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
23
high effort, high impact
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
24
high effort, low impact
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
25
law of diminishing returns
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
26
inverted hockey stick curve
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
27
“good ‘nuff”
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
28
3. Today’s Feature, Tomorrow’s 0-Day
How did this even happen?!
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
29
security ← → innovation
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
30
today’s innovative idea…
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
31
..tomorrow’s critical flaw
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
32
so what happened?!
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
33
what is the right response?
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
34
triage vs prevent
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
35
“seemed like a good idea”
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
36
plan for rapid triage
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
37
this will happen again
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
38
4. The “Great Awakening” Isn’t Coming
The “big one” happened, no one cared
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
39
“It’ll take a big incident…”
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
40
nope
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
41
catastrophes are recoverable
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
42
business is resilient
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
43
we screwed up, big time
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
44
the sky fell, we still lived on
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
45
some become disillusioned
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
46
too many “don’t get it”
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
47
now what?!
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
48
the hamster wheel is your
reality
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
49
5. Alt + Tab is a Hunter Killer
Smart does not scale
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
50
inverse proportionality
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
51
more screens
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
52
less security
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
53
your brain cannot correlate
(at scale)
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
54
platforms & integrations
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
55
ask the right questions
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
56
get better answers
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
57
tech isn’t magic
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
58
question
answer
analyze
act
analyze
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
59
6. DIY is Best Left on TV Shows
A fancy hammer does not a master carpenter make
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
60
re-inventing the same wheel
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
61
uniqueness is a weakness
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
62
patterns exist
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
63
expertise exists
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
64
what makes us do it
ourselves?
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
65
talent shortage (duh)
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
66
budget constraints
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
67
time/effort constraints
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
68
Most applicable in operations
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
69
accept limitations, and help
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
70
7. Stop Trying to Build Castles
We all basically live in the suburbs now anyway
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
71
castle as a metaphor
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
72
this metaphor aged poorly
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
73
we left the office
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
74
data went with us
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
75
clouds destroyed our models
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
76
sensitive data is everywhere
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
77
by use-case, or accident
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
78
security models must adapt
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
79
make data risk-resilient
© 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential
80
Thank You
Thank You

Weitere ähnliche Inhalte

Ähnlich wie The 7 Things I Know About Cyber Security After 25 Years | April 2024

Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportCyren, Inc
 
Adding Predictive Marketing To Your Mix In 2015
Adding Predictive Marketing To Your Mix In 2015Adding Predictive Marketing To Your Mix In 2015
Adding Predictive Marketing To Your Mix In 2015G3 Communications
 
Prototyping Your Way to Better and Faster Outcomes
Prototyping Your Way to Better and Faster Outcomes Prototyping Your Way to Better and Faster Outcomes
Prototyping Your Way to Better and Faster Outcomes 3Pillar Global
 
How to Use Buffer to Broadcast a Single Message to Multiple Social Networks
How to Use Buffer to Broadcast a Single Message to Multiple Social NetworksHow to Use Buffer to Broadcast a Single Message to Multiple Social Networks
How to Use Buffer to Broadcast a Single Message to Multiple Social NetworksKevin Chavez
 
How to Use Canva to Create Quick Facebook Photos
How to Use Canva to Create Quick Facebook PhotosHow to Use Canva to Create Quick Facebook Photos
How to Use Canva to Create Quick Facebook PhotosKevin Chavez
 
How to Create a Beautiful Website and Start Converting Visitors into Customer...
How to Create a Beautiful Website and Start Converting Visitors into Customer...How to Create a Beautiful Website and Start Converting Visitors into Customer...
How to Create a Beautiful Website and Start Converting Visitors into Customer...Kevin Chavez
 
The Story of the Internet of Things: WebVisions Barcelona, a talk by Sce Pike...
The Story of the Internet of Things: WebVisions Barcelona, a talk by Sce Pike...The Story of the Internet of Things: WebVisions Barcelona, a talk by Sce Pike...
The Story of the Internet of Things: WebVisions Barcelona, a talk by Sce Pike...Citizen, Inc.
 
The Story of Internet of Things ( IoT ) at WebVisions 2014 Barcelona
The Story of Internet of Things ( IoT ) at WebVisions 2014 BarcelonaThe Story of Internet of Things ( IoT ) at WebVisions 2014 Barcelona
The Story of Internet of Things ( IoT ) at WebVisions 2014 BarcelonaSce Pike
 
WorldLine Brand Experience - Experiential Marketing Agency 2020
WorldLine Brand Experience - Experiential Marketing Agency 2020WorldLine Brand Experience - Experiential Marketing Agency 2020
WorldLine Brand Experience - Experiential Marketing Agency 2020minh đức
 
[Webinar] Demystifying Predictive Lead Scoring
[Webinar] Demystifying Predictive Lead Scoring [Webinar] Demystifying Predictive Lead Scoring
[Webinar] Demystifying Predictive Lead Scoring Mintigo1
 
How to Set up Marketing Automation Tool to Trigger Email Campaigns Targeting ...
How to Set up Marketing Automation Tool to Trigger Email Campaigns Targeting ...How to Set up Marketing Automation Tool to Trigger Email Campaigns Targeting ...
How to Set up Marketing Automation Tool to Trigger Email Campaigns Targeting ...Kevin Chavez
 
Check(mate) Your Bias: A game-driven approach to educating your team about ...
 Check(mate) Your Bias:  A game-driven approach to educating your team about ... Check(mate) Your Bias:  A game-driven approach to educating your team about ...
Check(mate) Your Bias: A game-driven approach to educating your team about ...UXPA International
 
How to Keep Important Notes Synchronized between Phone, Tablet and multiple C...
How to Keep Important Notes Synchronized between Phone, Tablet and multiple C...How to Keep Important Notes Synchronized between Phone, Tablet and multiple C...
How to Keep Important Notes Synchronized between Phone, Tablet and multiple C...Kevin Chavez
 
Behavox on Reaching Enterprise Companies
Behavox on Reaching Enterprise CompaniesBehavox on Reaching Enterprise Companies
Behavox on Reaching Enterprise CompaniesAmazon Web Services
 
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
0Day to HeroDay: Surviving an Attack and Establishing a Security OrganizationRyan Wisniewski
 
Role of HR in COVID-19 Pandemic (Revision 1: 200411
Role of HR in COVID-19 Pandemic (Revision 1: 200411Role of HR in COVID-19 Pandemic (Revision 1: 200411
Role of HR in COVID-19 Pandemic (Revision 1: 200411Tas Chantree
 
Grassroots Fundraising | Rich Mintz
Grassroots Fundraising | Rich MintzGrassroots Fundraising | Rich Mintz
Grassroots Fundraising | Rich MintzOPERA America
 
How to Automatically Create and Share Content across Different Social Platfor...
How to Automatically Create and Share Content across Different Social Platfor...How to Automatically Create and Share Content across Different Social Platfor...
How to Automatically Create and Share Content across Different Social Platfor...Kevin Chavez
 
[Webinar] Data, Predictive Analytics & Marketing Clouds: The Platform For The...
[Webinar] Data, Predictive Analytics & Marketing Clouds: The Platform For The...[Webinar] Data, Predictive Analytics & Marketing Clouds: The Platform For The...
[Webinar] Data, Predictive Analytics & Marketing Clouds: The Platform For The...Mintigo1
 

Ähnlich wie The 7 Things I Know About Cyber Security After 25 Years | April 2024 (19)

Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend ReportWebinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
 
Adding Predictive Marketing To Your Mix In 2015
Adding Predictive Marketing To Your Mix In 2015Adding Predictive Marketing To Your Mix In 2015
Adding Predictive Marketing To Your Mix In 2015
 
Prototyping Your Way to Better and Faster Outcomes
Prototyping Your Way to Better and Faster Outcomes Prototyping Your Way to Better and Faster Outcomes
Prototyping Your Way to Better and Faster Outcomes
 
How to Use Buffer to Broadcast a Single Message to Multiple Social Networks
How to Use Buffer to Broadcast a Single Message to Multiple Social NetworksHow to Use Buffer to Broadcast a Single Message to Multiple Social Networks
How to Use Buffer to Broadcast a Single Message to Multiple Social Networks
 
How to Use Canva to Create Quick Facebook Photos
How to Use Canva to Create Quick Facebook PhotosHow to Use Canva to Create Quick Facebook Photos
How to Use Canva to Create Quick Facebook Photos
 
How to Create a Beautiful Website and Start Converting Visitors into Customer...
How to Create a Beautiful Website and Start Converting Visitors into Customer...How to Create a Beautiful Website and Start Converting Visitors into Customer...
How to Create a Beautiful Website and Start Converting Visitors into Customer...
 
The Story of the Internet of Things: WebVisions Barcelona, a talk by Sce Pike...
The Story of the Internet of Things: WebVisions Barcelona, a talk by Sce Pike...The Story of the Internet of Things: WebVisions Barcelona, a talk by Sce Pike...
The Story of the Internet of Things: WebVisions Barcelona, a talk by Sce Pike...
 
The Story of Internet of Things ( IoT ) at WebVisions 2014 Barcelona
The Story of Internet of Things ( IoT ) at WebVisions 2014 BarcelonaThe Story of Internet of Things ( IoT ) at WebVisions 2014 Barcelona
The Story of Internet of Things ( IoT ) at WebVisions 2014 Barcelona
 
WorldLine Brand Experience - Experiential Marketing Agency 2020
WorldLine Brand Experience - Experiential Marketing Agency 2020WorldLine Brand Experience - Experiential Marketing Agency 2020
WorldLine Brand Experience - Experiential Marketing Agency 2020
 
[Webinar] Demystifying Predictive Lead Scoring
[Webinar] Demystifying Predictive Lead Scoring [Webinar] Demystifying Predictive Lead Scoring
[Webinar] Demystifying Predictive Lead Scoring
 
How to Set up Marketing Automation Tool to Trigger Email Campaigns Targeting ...
How to Set up Marketing Automation Tool to Trigger Email Campaigns Targeting ...How to Set up Marketing Automation Tool to Trigger Email Campaigns Targeting ...
How to Set up Marketing Automation Tool to Trigger Email Campaigns Targeting ...
 
Check(mate) Your Bias: A game-driven approach to educating your team about ...
 Check(mate) Your Bias:  A game-driven approach to educating your team about ... Check(mate) Your Bias:  A game-driven approach to educating your team about ...
Check(mate) Your Bias: A game-driven approach to educating your team about ...
 
How to Keep Important Notes Synchronized between Phone, Tablet and multiple C...
How to Keep Important Notes Synchronized between Phone, Tablet and multiple C...How to Keep Important Notes Synchronized between Phone, Tablet and multiple C...
How to Keep Important Notes Synchronized between Phone, Tablet and multiple C...
 
Behavox on Reaching Enterprise Companies
Behavox on Reaching Enterprise CompaniesBehavox on Reaching Enterprise Companies
Behavox on Reaching Enterprise Companies
 
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
0Day to HeroDay: Surviving an Attack and Establishing a Security Organization
 
Role of HR in COVID-19 Pandemic (Revision 1: 200411
Role of HR in COVID-19 Pandemic (Revision 1: 200411Role of HR in COVID-19 Pandemic (Revision 1: 200411
Role of HR in COVID-19 Pandemic (Revision 1: 200411
 
Grassroots Fundraising | Rich Mintz
Grassroots Fundraising | Rich MintzGrassroots Fundraising | Rich Mintz
Grassroots Fundraising | Rich Mintz
 
How to Automatically Create and Share Content across Different Social Platfor...
How to Automatically Create and Share Content across Different Social Platfor...How to Automatically Create and Share Content across Different Social Platfor...
How to Automatically Create and Share Content across Different Social Platfor...
 
[Webinar] Data, Predictive Analytics & Marketing Clouds: The Platform For The...
[Webinar] Data, Predictive Analytics & Marketing Clouds: The Platform For The...[Webinar] Data, Predictive Analytics & Marketing Clouds: The Platform For The...
[Webinar] Data, Predictive Analytics & Marketing Clouds: The Platform For The...
 

Mehr von Rafal Los

The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfThe 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfRafal Los
 
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityIrrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityRafal Los
 
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)Rafal Los
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Rafal Los
 
Lies, Fables and Security Metrics
Lies, Fables and Security MetricsLies, Fables and Security Metrics
Lies, Fables and Security MetricsRafal Los
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013Rafal Los
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Rafal Los
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Rafal Los
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rafal Los
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Rafal Los
 
Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterpriseRafal Los
 
Making Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessMaking Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessRafal Los
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Rafal Los
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Rafal Los
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security AssuranceRafal Los
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationRafal Los
 
Ultimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelUltimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelRafal Los
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Rafal Los
 
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Rafal Los
 
The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0Rafal Los
 

Mehr von Rafal Los (20)

The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfThe 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
 
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityIrrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
 
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
 
Lies, Fables and Security Metrics
Lies, Fables and Security MetricsLies, Fables and Security Metrics
Lies, Fables and Security Metrics
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
 
Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterprise
 
Making Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessMaking Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in Business
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with Automation
 
Ultimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelUltimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI Model
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
 
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)
 
The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0
 

Kürzlich hochgeladen

Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 

Kürzlich hochgeladen (20)

Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 

The 7 Things I Know About Cyber Security After 25 Years | April 2024

  • 1. 1 The 7 Things I Know About Cyber Security After 25 Years
  • 2. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 2 RA F A L L O S Head of Services Strategy & GTM at ExtraHop ~25 years in cyber security Broad expertise in product and services development, security strategy, and problem-solving Podcaster Down the Security Rabbithole Podcast Writer and public speaker Biography
  • 3. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 3 “What makes you qualified to give this talk?” These are all lessons I’ve learned, first-hand, the hard way
  • 4. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 4 My 3 guiding principles
  • 5. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 5 Change is relentless
  • 6. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 6 crime pays
  • 7. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 7 Security vs “human nature”
  • 8. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 8 1. You Don’t Want ZERO Risk Check your math, and try again
  • 9. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 9 business relies on taking risks
  • 10. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 10 “Enigo Montoya” problem
  • 11. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 11 security is a 1/x curve
  • 12. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 12
  • 13. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 13 you’re never getting to ZERO
  • 14. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 14 at some point, cost exceeds benefit
  • 15. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 15 risk = probability x impact
  • 16. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 16 don’t get fooled by chance
  • 17. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 17 reducing risk, creates risk
  • 18. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 18 either extreme is bad
  • 19. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 19 2. Change the things you can The magic quadrant of bad ideas
  • 20. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 20 effort vs impact
  • 21. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 21 low effort, high impact
  • 22. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 22 low effort, low impact
  • 23. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 23 high effort, high impact
  • 24. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 24 high effort, low impact
  • 25. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 25 law of diminishing returns
  • 26. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 26 inverted hockey stick curve
  • 27. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 27 “good ‘nuff”
  • 28. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 28 3. Today’s Feature, Tomorrow’s 0-Day How did this even happen?!
  • 29. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 29 security ← → innovation
  • 30. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 30 today’s innovative idea…
  • 31. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 31 ..tomorrow’s critical flaw
  • 32. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 32 so what happened?!
  • 33. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 33 what is the right response?
  • 34. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 34 triage vs prevent
  • 35. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 35 “seemed like a good idea”
  • 36. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 36 plan for rapid triage
  • 37. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 37 this will happen again
  • 38. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 38 4. The “Great Awakening” Isn’t Coming The “big one” happened, no one cared
  • 39. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 39 “It’ll take a big incident…”
  • 40. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 40 nope
  • 41. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 41 catastrophes are recoverable
  • 42. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 42 business is resilient
  • 43. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 43 we screwed up, big time
  • 44. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 44 the sky fell, we still lived on
  • 45. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 45 some become disillusioned
  • 46. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 46 too many “don’t get it”
  • 47. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 47 now what?!
  • 48. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 48 the hamster wheel is your reality
  • 49. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 49 5. Alt + Tab is a Hunter Killer Smart does not scale
  • 50. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 50 inverse proportionality
  • 51. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 51 more screens
  • 52. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 52 less security
  • 53. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 53 your brain cannot correlate (at scale)
  • 54. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 54 platforms & integrations
  • 55. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 55 ask the right questions
  • 56. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 56 get better answers
  • 57. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 57 tech isn’t magic
  • 58. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 58 question answer analyze act analyze
  • 59. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 59 6. DIY is Best Left on TV Shows A fancy hammer does not a master carpenter make
  • 60. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 60 re-inventing the same wheel
  • 61. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 61 uniqueness is a weakness
  • 62. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 62 patterns exist
  • 63. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 63 expertise exists
  • 64. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 64 what makes us do it ourselves?
  • 65. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 65 talent shortage (duh)
  • 66. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 66 budget constraints
  • 67. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 67 time/effort constraints
  • 68. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 68 Most applicable in operations
  • 69. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 69 accept limitations, and help
  • 70. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 70 7. Stop Trying to Build Castles We all basically live in the suburbs now anyway
  • 71. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 71 castle as a metaphor
  • 72. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 72 this metaphor aged poorly
  • 73. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 73 we left the office
  • 74. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 74 data went with us
  • 75. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 75 clouds destroyed our models
  • 76. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 76 sensitive data is everywhere
  • 77. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 77 by use-case, or accident
  • 78. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 78 security models must adapt
  • 79. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 79 make data risk-resilient
  • 80. © 2024 ExtraHop® | All Rights Reserved | Proprietary and Confidential 80 Thank You Thank You