SlideShare ist ein Scribd-Unternehmen logo
1 von 28
1
What Affects Confidence In
Security Programs?
Rocky Mountain Information Security Conference 2014
Bill Burns | Executive-In-Residence | Scale Venture Partners | Bill@ScaleVP.com | @x509v3
2
My Background
 Production hybrid cloud security at scale
– Deployed distributed, hybrid cloud WAF
– Co-developed CloudHSM for IaaS hardware root of trust
 Corporate IT “all-cloud” security strategy
– Cloud-first, mobile-first infrastructure model
– Mix of public cloud, best-of-breed SaaS
 RSAC Program Committee, Startup Technical Advisory Boards,
ISSA CISO Forum & Career Lifecycle
 Previously:
3
Agenda
 Trends and Forcing Functions on Information Security
 InfoSec’s Role in Managing Business Risk
 Security Innovations, Market Needs
 Early Research Results: Improving Confidence
4
CISOs: “What Kept You Up Last Night?”
Source: Scale Venture Partners
5
Agile/DevOps
BYOD
Shadow IT /
Consumerization
Increased
Regs/Compliance
Internet Of Things
IT Automation
Mobile computing
SaaS
Ubiquitous Internet
Access
Virtualization / IaaS
Weaponization of Internet
/ espionage
Work/Life Integration
Concern
Unconcern
Top Trends & Forcing Functions on InfoSec
Source: Scale Venture Partners
6
Security Forcing Function – Mobility, BYOD
Source: Mary Meeker, KPCB
7
Security Forcing Function – Mobility, BYOD
(1) Pew Research, Jan 2014 | (2) Gartner, May 2013
Smartphone - 58%
Tablet - 42%
By 2017, 50% of employers will
require you to BYOD[2] for
work.
8
Security Forcing Function – Work Anywhere
 Blurring work/life integration
– Aruba’s “#GenMobile”initiative
– Starbucks wants to be your life’s “3rd Place”
 Ubiquitous network access & seamless roaming
– 802.11ac, n – wireless networking “just works”
• Faster than typical wired ports, easier to provision
– Mobile 4G LTE is also “fast enough”
• Faster than my home’s DSL
– By 2018: 25% of corporate data will flow directly mobile-cloud[3]
(3) Gartner, Nov 2013
9
Security Forcing Function – IaaS / Virtualization
 Clouds are
compelling to
businesses, hard
for old security
controls to match
pace
 AWS Example:
– ~Quadrupled
offered services in 4
years
– Reduced pricing 42
times in 8 years as
equipment ages out
Source: AWS
10
Old: Perimeter Firewalls
11
Old: Perimeter Firewalls
 Castle and Moat (layered) defense
 Place people, data behind datacenter firewalls
 Provisioning workflows were serialized, expensive, slow
 “Behind the firewall” = Trusted
12
New Perimeters : Follow the Data
13
Security controls evolving to be more:
o Proximal – Move closer to the application and data
o Mobile – Follow the infrastructure, application
o Resilient - Emphasize recovery and response
o Holistic – Include technical, legal, and business-level input
o Coordinated - Reliant on communications, automation
New Perimeters : Follow the Data
14
InfoSec’s Role
 Be a trusted advisor to the business
– InfoSec doesn’t own the risk
– Anticipates security risk/controls changes and needs
– Communicates technical risks in business terms
 Implement guardrails and gates based on risk, sensitivity
– Like breaks on a car: Enables the business to take smart risks
– Architect, design, implement controls
– Measure & report risk with data
– Manage remediation, response
 Success: Customers proactively request your guidance!
15
So…What’s Your Cloud Comfort Level?
 Cloud Adoption / Maturity:
– Naysayers: you can’t do that (but can’t articulate why)
– Pathfinders: here’s how to do it, early lessons learned
– Optimizers: here’s how to do it well, what not to do
16
So…What’s Your Cloud Comfort Level?
 Cloud Adoption/Maturity
– Naysayers
– Pathfinders
– Optimizers
 Cloud is inevitable – Get comfortable managing it
– Example: “We have 10 years of legacy work to deal with, we don’t have
time to look at our cloud usage!”
– Benefits to agility, automation, consistency
 It’s about the business
– Board-level discussion on results, competition, risk
– “Risk is our business” – Philosopher James T. Kirk
17
Security Delivered Via Cloud Services
18
Anticipating Risks: Partners’ Controls
 Service Providers: must consider security as a basic requirement
– They have a smoother attack surface than enterprises
– Laser-focused goals, homogeneous environment, etc.
– All customers pentesting their provider: Doesn’t scale
• Which standard would we all trust? CCM? Other? Discuss.
 Which controls are most relevant, important for your business?
– Prioritize those during negotiations, evaluations, assessments
– Bring Your Own Security: Encryption, incident response, audit, SoD, …
19
Anticipating Risks: Partners’ Controls
 Integrate Security Controls with Legal
– Risk-based Questionnaires: Level of scrutiny based on data sensitivity
– Contractual: Add boilerplate language in your contracts, MSAs, etc.
• Ask your partners for the security fundamentals
• Operational security basics, secure development, security incident
notification, etc.
 Assess Third-Parties Partners
– Trust but verify their controls. It’s your data!
– Do one-time and ongoing assessments
– Make sure you’re testing what you anticipated
– Partner with your partners on any findings
20
SaaS Applications: Growth and Risk Perspective
21
InfoSec Advisor: New controls and capabilities
 Track movement, access to assets
– Behavioral analytics become embedded, table stakes
– DRM/DLP-like controls, applied closer to the data
– More focus on detection, monitoring
– Blocking done more through orchestration, automation
– Inventories and network paths always up to date
 Restrict access to assets
– Cloud-to-Cloud chokepoints
– SSO and risk-based authentication, authorization
– On-the-fly controls: DLP, encryption, watermarking
– Firewall controls based on tags, data and host classification/sensitivity
22
Adopting Cloud: Getting Started in IaaS
 Plan: Pick 1-3 security metrics to improve & compare
– Examples: Days to patch vulns, avg host uptime, fw ACLs used
 Do: Start simple, fail fast on “uninteresting” workflows
 Improve: Codify policies, patches, asset management, provisioning.
 Iterate: Review lessons learned often, make small course
corrections
– Good security starts with solid operational hygiene
23
Summary: Evolving Controls, Maturity
 Get Baseline visibility into your Cloud Services
– Facts critical to business-level conversations
– You’re using more SaaS than you realize
– Share data with IT, legal, other stakeholders
 Monitor and Protect your Data
– Start collecting/mining SaaS access, audit logs
– Integrate with your SIEM, monitoring systems
– Deploy additional controls via chokepoints, automation
 Increase program maturity
– Cloud is an opportunity to codify, automate security
– Operational hygiene is the basis for solid security program
24
Wisegate: Maturity Proportional to Confidence
Source: Wisegate IT Security Benchmark, Sept 2013
25
Areas of Security Interest: Early Results
 Advanced authentication and
identification schemes
 App-centric firewalls and containers
to protect data
 Behavioral analytics to improve
security, fraud
 Continuous endpoint monitoring,
orchestration, remediation
 Continuous risk & compliance
monitoring, reporting
 Dashboards and analytics to
communicate and share metrics
 DevOps / security integrations to
codify security
 Holistic DLP, data encryption and
key management
 Malware protection without
signatures
 Mobile security to protect data
anywhere
 PKI and digital certificate
management for authentication,
encryption
 Proactive / predictive attack
detection, real-time response
 Threat intelligence feeds, sharing
Source: Scale Venture Partners
26
Guidance to Security Vendors: Early Feedback
 Be 10x better - provide superior customer value
– Look for disruptive technologies, approaches
– Interoperate with what I already have
– What can I turn off if I buy your thing?
 Think API, integration first
– Defenders & DevOps: The future is automation, interoperability
– InfoSec staffing is hard, automation is a force multiplier
– No cheating: Build your GUI on your API
 Model, measure, provide insights
– Security A/B testing, modeling allows safe experimentation
– Provide insights of current, continuous risk state
– Want to manage cloud risk better than legacy
– Good deployment strategies start with great migration strategies
Source: Scale Venture Partners
27
Increasing Confidence: Early Research Results
 Security programs with higher maturity have more confidence
– Regulations help, but also
– Operational consistency,
– Incorporating standardized frameworks (ISO, NIST)
 Build what works for your company’s culture
– Culture trumps strategy
– There is no one, true “map”: Every program is different
– ? Endpoint-centric vs. network-centric // Block vs. monitor + respond
 Create, market, share metrics with your peers
– Empowers teams that own responsibility for controls
– Encourages fact-based decision-making
– Communicates your program’s Business Impact
Source: Scale Venture Partners
28
Thank you!
Security-Research@ScaleVP.com
Bill Burns | Executive-In-Residence | Scale Venture Partners | Bill@ScaleVP.com | @x509v3

Weitere ähnliche Inhalte

Was ist angesagt?

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
ConSanFrancisco123
 

Was ist angesagt? (20)

To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
Cyber security
Cyber securityCyber security
Cyber security
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 

Ähnlich wie What affects security program confidence? - may2014 - bill burns

2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
promediakw
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
Sergio Loureiro
 

Ähnlich wie What affects security program confidence? - may2014 - bill burns (20)

Cloud Security Summit - InfoSec World 2014
Cloud Security Summit - InfoSec World 2014Cloud Security Summit - InfoSec World 2014
Cloud Security Summit - InfoSec World 2014
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Lecture31.ppt
Lecture31.pptLecture31.ppt
Lecture31.ppt
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...Guardium Suite_seguridad de los datos...
Guardium Suite_seguridad de los datos...
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Predicting The Future: Security and Compliance in the Cloud Age
Predicting The Future: Security and Compliance in the Cloud AgePredicting The Future: Security and Compliance in the Cloud Age
Predicting The Future: Security and Compliance in the Cloud Age
 
Lecture5
Lecture5Lecture5
Lecture5
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

What affects security program confidence? - may2014 - bill burns

  • 1. 1 What Affects Confidence In Security Programs? Rocky Mountain Information Security Conference 2014 Bill Burns | Executive-In-Residence | Scale Venture Partners | Bill@ScaleVP.com | @x509v3
  • 2. 2 My Background  Production hybrid cloud security at scale – Deployed distributed, hybrid cloud WAF – Co-developed CloudHSM for IaaS hardware root of trust  Corporate IT “all-cloud” security strategy – Cloud-first, mobile-first infrastructure model – Mix of public cloud, best-of-breed SaaS  RSAC Program Committee, Startup Technical Advisory Boards, ISSA CISO Forum & Career Lifecycle  Previously:
  • 3. 3 Agenda  Trends and Forcing Functions on Information Security  InfoSec’s Role in Managing Business Risk  Security Innovations, Market Needs  Early Research Results: Improving Confidence
  • 4. 4 CISOs: “What Kept You Up Last Night?” Source: Scale Venture Partners
  • 5. 5 Agile/DevOps BYOD Shadow IT / Consumerization Increased Regs/Compliance Internet Of Things IT Automation Mobile computing SaaS Ubiquitous Internet Access Virtualization / IaaS Weaponization of Internet / espionage Work/Life Integration Concern Unconcern Top Trends & Forcing Functions on InfoSec Source: Scale Venture Partners
  • 6. 6 Security Forcing Function – Mobility, BYOD Source: Mary Meeker, KPCB
  • 7. 7 Security Forcing Function – Mobility, BYOD (1) Pew Research, Jan 2014 | (2) Gartner, May 2013 Smartphone - 58% Tablet - 42% By 2017, 50% of employers will require you to BYOD[2] for work.
  • 8. 8 Security Forcing Function – Work Anywhere  Blurring work/life integration – Aruba’s “#GenMobile”initiative – Starbucks wants to be your life’s “3rd Place”  Ubiquitous network access & seamless roaming – 802.11ac, n – wireless networking “just works” • Faster than typical wired ports, easier to provision – Mobile 4G LTE is also “fast enough” • Faster than my home’s DSL – By 2018: 25% of corporate data will flow directly mobile-cloud[3] (3) Gartner, Nov 2013
  • 9. 9 Security Forcing Function – IaaS / Virtualization  Clouds are compelling to businesses, hard for old security controls to match pace  AWS Example: – ~Quadrupled offered services in 4 years – Reduced pricing 42 times in 8 years as equipment ages out Source: AWS
  • 11. 11 Old: Perimeter Firewalls  Castle and Moat (layered) defense  Place people, data behind datacenter firewalls  Provisioning workflows were serialized, expensive, slow  “Behind the firewall” = Trusted
  • 12. 12 New Perimeters : Follow the Data
  • 13. 13 Security controls evolving to be more: o Proximal – Move closer to the application and data o Mobile – Follow the infrastructure, application o Resilient - Emphasize recovery and response o Holistic – Include technical, legal, and business-level input o Coordinated - Reliant on communications, automation New Perimeters : Follow the Data
  • 14. 14 InfoSec’s Role  Be a trusted advisor to the business – InfoSec doesn’t own the risk – Anticipates security risk/controls changes and needs – Communicates technical risks in business terms  Implement guardrails and gates based on risk, sensitivity – Like breaks on a car: Enables the business to take smart risks – Architect, design, implement controls – Measure & report risk with data – Manage remediation, response  Success: Customers proactively request your guidance!
  • 15. 15 So…What’s Your Cloud Comfort Level?  Cloud Adoption / Maturity: – Naysayers: you can’t do that (but can’t articulate why) – Pathfinders: here’s how to do it, early lessons learned – Optimizers: here’s how to do it well, what not to do
  • 16. 16 So…What’s Your Cloud Comfort Level?  Cloud Adoption/Maturity – Naysayers – Pathfinders – Optimizers  Cloud is inevitable – Get comfortable managing it – Example: “We have 10 years of legacy work to deal with, we don’t have time to look at our cloud usage!” – Benefits to agility, automation, consistency  It’s about the business – Board-level discussion on results, competition, risk – “Risk is our business” – Philosopher James T. Kirk
  • 17. 17 Security Delivered Via Cloud Services
  • 18. 18 Anticipating Risks: Partners’ Controls  Service Providers: must consider security as a basic requirement – They have a smoother attack surface than enterprises – Laser-focused goals, homogeneous environment, etc. – All customers pentesting their provider: Doesn’t scale • Which standard would we all trust? CCM? Other? Discuss.  Which controls are most relevant, important for your business? – Prioritize those during negotiations, evaluations, assessments – Bring Your Own Security: Encryption, incident response, audit, SoD, …
  • 19. 19 Anticipating Risks: Partners’ Controls  Integrate Security Controls with Legal – Risk-based Questionnaires: Level of scrutiny based on data sensitivity – Contractual: Add boilerplate language in your contracts, MSAs, etc. • Ask your partners for the security fundamentals • Operational security basics, secure development, security incident notification, etc.  Assess Third-Parties Partners – Trust but verify their controls. It’s your data! – Do one-time and ongoing assessments – Make sure you’re testing what you anticipated – Partner with your partners on any findings
  • 20. 20 SaaS Applications: Growth and Risk Perspective
  • 21. 21 InfoSec Advisor: New controls and capabilities  Track movement, access to assets – Behavioral analytics become embedded, table stakes – DRM/DLP-like controls, applied closer to the data – More focus on detection, monitoring – Blocking done more through orchestration, automation – Inventories and network paths always up to date  Restrict access to assets – Cloud-to-Cloud chokepoints – SSO and risk-based authentication, authorization – On-the-fly controls: DLP, encryption, watermarking – Firewall controls based on tags, data and host classification/sensitivity
  • 22. 22 Adopting Cloud: Getting Started in IaaS  Plan: Pick 1-3 security metrics to improve & compare – Examples: Days to patch vulns, avg host uptime, fw ACLs used  Do: Start simple, fail fast on “uninteresting” workflows  Improve: Codify policies, patches, asset management, provisioning.  Iterate: Review lessons learned often, make small course corrections – Good security starts with solid operational hygiene
  • 23. 23 Summary: Evolving Controls, Maturity  Get Baseline visibility into your Cloud Services – Facts critical to business-level conversations – You’re using more SaaS than you realize – Share data with IT, legal, other stakeholders  Monitor and Protect your Data – Start collecting/mining SaaS access, audit logs – Integrate with your SIEM, monitoring systems – Deploy additional controls via chokepoints, automation  Increase program maturity – Cloud is an opportunity to codify, automate security – Operational hygiene is the basis for solid security program
  • 24. 24 Wisegate: Maturity Proportional to Confidence Source: Wisegate IT Security Benchmark, Sept 2013
  • 25. 25 Areas of Security Interest: Early Results  Advanced authentication and identification schemes  App-centric firewalls and containers to protect data  Behavioral analytics to improve security, fraud  Continuous endpoint monitoring, orchestration, remediation  Continuous risk & compliance monitoring, reporting  Dashboards and analytics to communicate and share metrics  DevOps / security integrations to codify security  Holistic DLP, data encryption and key management  Malware protection without signatures  Mobile security to protect data anywhere  PKI and digital certificate management for authentication, encryption  Proactive / predictive attack detection, real-time response  Threat intelligence feeds, sharing Source: Scale Venture Partners
  • 26. 26 Guidance to Security Vendors: Early Feedback  Be 10x better - provide superior customer value – Look for disruptive technologies, approaches – Interoperate with what I already have – What can I turn off if I buy your thing?  Think API, integration first – Defenders & DevOps: The future is automation, interoperability – InfoSec staffing is hard, automation is a force multiplier – No cheating: Build your GUI on your API  Model, measure, provide insights – Security A/B testing, modeling allows safe experimentation – Provide insights of current, continuous risk state – Want to manage cloud risk better than legacy – Good deployment strategies start with great migration strategies Source: Scale Venture Partners
  • 27. 27 Increasing Confidence: Early Research Results  Security programs with higher maturity have more confidence – Regulations help, but also – Operational consistency, – Incorporating standardized frameworks (ISO, NIST)  Build what works for your company’s culture – Culture trumps strategy – There is no one, true “map”: Every program is different – ? Endpoint-centric vs. network-centric // Block vs. monitor + respond  Create, market, share metrics with your peers – Empowers teams that own responsibility for controls – Encourages fact-based decision-making – Communicates your program’s Business Impact Source: Scale Venture Partners
  • 28. 28 Thank you! Security-Research@ScaleVP.com Bill Burns | Executive-In-Residence | Scale Venture Partners | Bill@ScaleVP.com | @x509v3

Hinweis der Redaktion

  1. Internet Access – not a concern, a foregone conclusion IoT – too unclear what it means Agile/DevOps – polarizing Consumerization - polarizing
  2. By 2017: 50% of employers will require employees to BYOD for work purposes(2)
  3. 58% / 42% of Americans now own a smartphone / tablet(1)
  4. New: Identity and Authentication Authenticated checkpoints/chokepoints Everything and everyone is “outside the firewall” Controls moving closer to the data, finer-grained Provisioning and security policies are automated Trust no one implicitly; authorize everything
  5. New: Identity and Authentication Authenticated checkpoints/chokepoints Everything and everyone is “outside the firewall” Controls moving closer to the data, finer-grained Provisioning and security policies are automated Trust no one implicitly; authorize everything