SlideShare une entreprise Scribd logo
1  sur  39
Télécharger pour lire hors ligne
Copyright © 2015, Cigital
Cyber War, Cyber Peace, Stones,
and Glass Houses
…those who live in glass houses should not throw stones
@cigitalgem
Gary McGraw, Ph.D.
Chief Technology Officer
Copyright © 2015, Cigital
Cigital
• Providing software security professional services since
1992
• World’s premiere software security consulting firm
o 500 professional consultants
o Washington DC, New York, Santa Clara, Bloomington, Boston,
Chicago, Atlanta, Austin, Amsterdam, and London
• Recognized experts in software security
o Widely published in books, white papers, and articles
o Industry thought leaders
Copyright © 2015, CigitalCopyright © 2015, Cigital
Real Cyber Defense as Deterrence
• Defining “cyber”
whatever
• The offense problem
• “Active defense”
• Attribution
• Many vulnerabilities
• Payloads are easy
• Economics
• The NASCAR effect
• The defense solution
• Proactive defense vs.
cardboard defense
• Deterrence through
defense
• Build security in
Copyright © 2015, Cigital
CYBER CLARITY IS ELUSIVE
Separating the Threat from the Hype: What Washington Needs to Know
About Cyber Security, Nate Fick & Gary McGraw
http://www.cigital.com/papers/download/mcgraw-fick-CNAS.pdf
Copyright © 2015, CigitalCopyright © 2015, Cigital
Cyber Security
• How much of the cyber war talk is hype?
• What is real and what is cyber chimera?
Help policymakers find their
way through the fog and set
guidelines to protect the best of
the Internet and cyberspace,
both from those who seek to
harm it, and from those who
seek to protect it but risk doing
more harm than good.
Copyright © 2015, CigitalCopyright © 2015, Cigital
Disentangling War, Espionage, and Crime
• Cyber espionage
• Much more common than
war
• Wikileaks
• Anonymous
• Operation Aurora
• NY Times hack
• Bad compartmentalization
makes easy targets
• Cyber crime
• Even more common
• 1 trillion dollars per year?!
(just ask Ross Anderson)
Building systems properly
from a security
perspective will address
the cyber crime problem
just as well as it will
address cyber espionage
and cyber war. We can kill
all three birds with one
stone.
Copyright © 2015, CigitalCopyright © 2015, Cigital
Kinetic Impact as Decisive Criteria to be War
REALITY
• To qualify as cyber war, the
means may be virtual, but
the impact should be real.
• 1982 Soviet gas pipeline
explosion
• 2007 Israeli attack on Syrian
reactor
• 2008 Russia attacks Georgia two
ways
• 2008 USB drive infection in Iraq
(meh)
• 2010 Stuxnet attack on Iranian
centrifuges
HYPE
• Estonia dDoS attacks
• 2007 statue removal kerfuffle
• What would Google do?
• Brazilian blackout
• 2009 60 minutes story
• 100% hype
• China “hijacks” the Internet
• BGP mistake
• Bad design
Copyright © 2015, CigitalCopyright © 2015, Cigital
US: National Security Dominates
The real and perceived
dominance of the U.S.
national security
establishment in setting
cyber security policy is
problematic
• Cyber security is not only a
military problem
• Cyber security recognizes no
geographic boundaries
• Snowden revelations did not
help this situation
Copyright © 2015, CigitalCopyright © 2015, Cigital
Offense and Defense
defense means building
secure software, designing
and engineering systems to
be secure in the first place
and creating incentives and
rewards for systems that are
built to be secure
offense involves exploiting
systems, penetrating
systems with cyber attacks
and generally leveraging
broken software to
compromise entire systems
and systems of systems
Copyright © 2015, Cigital
THE OFFENSE PROBLEM
Copyright © 2015, CigitalCopyright © 2015, Cigital
“Active Defense”
Having a good offense is NOT
the same as a good defense.
Panetta on cyber security, “We
need to have the option to take
action against those who would
attack us.”
Grandma on security, “People
who live in glass houses should
not throw rocks.”
Copyright © 2015, CigitalCopyright © 2015, Cigital
Attribution Remains Unsolved (Ask Gandalf)
Copyright © 2015, CigitalCopyright © 2015, Cigital
Olympic Games & Stuxnet
• The PAYLOAD is what
matters
• Inject code into a running
control system
• Siemens SIMATIC PLC (step
7)
• Cyberwar!!
• Natanz in Iran
• Sophisticated, targeted
collection of malware
• Delivery
• 1 0day (not 4)
• Stolen private keys
• USB injection
• Network C&C
How to p0wn a Control System with Stuxnet (9/23/10)
http://bit.ly/RmbrNG
Copyright © 2015, CigitalCopyright © 2015, Cigital
Thread Hijacking in Online Games
• Used in early online game botting programs (circa
2004) but no longer
• Used successfully in Stuxnet in 2009
WoW.EXE
MAIN
THREAD
INJECTED
DLL
Loops hundreds of times per second
RenderWorld(..)
DETOUR PATCH
Copyright © 2015, CigitalCopyright © 2015, Cigital
INJECTED
CODE PAGE
complete
MAIN
THREAD
MAIN
THREAD
HARDWARE BP
RenderWorld(..)
uncloak
MSG
super
branch
RenderWorld(..)
recloak
restore
CastSpellByID( .. )
ScriptExecute( .. )
ClearTarget( .. )
MAIN
THREAD
Copyright © 2015, CigitalCopyright © 2015, Cigital
Vulnerabilities Are Pervasive
Copyright © 2015, Cigital
Disguise
Process Control
Process Disruption
deterministic
non-deterministic
(hacking)
Capability
atypical
Attack Complexity (From Ralph Langner)
http://bit.ly/TvWnuG
Copyright © 2015, CigitalCopyright © 2015, Cigital
Economics (From Ralph Langner)
Nuclear sub fleet
Stealth fighter jet fleet
Eurofighter fleet, Leopard II tank fleet
Cyber weapons program / MIL targets
Cyber weapons program / CI targets
$90B
$40B
$10B
$1B
$100M
Non-state thresholdhttp://bit.ly/TvWnuG
Singular cyber attack against
national critical infrastructure
$5M
Copyright © 2015, CigitalCopyright © 2015, Cigital
Offense is Sexy: The NASCAR Effect
Bad news
• The world would rather
not focus on how to build
stuff that does not break
• It’s harder to build good
stuff than to break junky
stuff
Good news
• The world loves to talk
about how stuff breaks
• This kind of work sparks
lots of interest in computer
security
Copyright © 2015, Cigital
THE DEFENSE SOLUTION
Copyright © 2015, Cigital
Cardboard Shield Defense
Today’s computer and
network security
mechanisms are like the
walls, moats, and
drawbridges of medieval
times. At one point, effective
for defending against isolated
attacks, mounted on
horseback. Unfortunately,
today’s attackers have
access to predator drones
and laser-guided missiles!
Copyright © 2015, CigitalCopyright © 2015, Cigital
Poor Security Engineering
Copyright © 2015, CigitalCopyright © 2015, Cigital
Proactive Defense
Secretary Panetta is mistaken:
“Through the innovative efforts
of our cyber-operators, we are
enhancing the department's
cyber-defense programs.
These systems rely on
sensors and software to hunt
down malicious code before it
harms our systems. We
actively share our own
experience defending our
systems with those running
the nation's critical private-
sector networks.”
• Security Engineering
• Software Security
• Build Security In
Copyright © 2015, Cigital
HOW TO BUILD SECURITY IN
Copyright © 2015, CigitalCopyright © 2015, Cigital
Software Security Touchpoints
Copyright © 2015, CigitalCopyright © 2015, Cigital
BSIMM: Software Security Measurement
• 104 firms measured (data freshness)
• BSIMM6 = data from 78 real initiatives
• 202 distinct measurements
• 26 over time (one firm 5 times)
• McGraw, Migues, and West
Copyright © 2015, CigitalCopyright © 2015, Cigital
78 Firms in BSIMM6 Community
Copyright © 2015, CigitalCopyright © 2015, Cigital
A Software Security Framework
See informIT article on BSIMM website http://bsimm.com
4 Domains 12 Practices
Copyright © 2015, CigitalCopyright © 2015, Cigital
BSIMM6 as a Measuring Stick
Copyright © 2015, CigitalCopyright © 2015, Cigital
Copyright © 2015, CigitalCopyright © 2015, Cigital
BSIMM6
Results
Top 12
activities
• purple =
good?
• red = bad?
“Blue shift” =
practices to
emphasize
Copyright © 2015, CigitalCopyright © 2015, Cigital
BSIMM By the Numbers
Copyright © 2015, CigitalCopyright © 2015, Cigital
Defense as Deterrent
“the U.S. is in a good
position to outspend its
adversaries on proactive
defense. Proactive
defense can be our
differentiator and a
serious deterrent to war.”
Proactive Defense
Prudent Alternative to
Cyberwarfare
http://t.co/2901DHVh
• A first strike in a cyber
war is unlikely to be
decisive
• No matter how much is
spent on cyber-offense,
cyber-defense must be
addressed anyway
• Proactive defense is a
very good differentiator
Copyright © 2015, CigitalCopyright © 2015, Cigital
Guidance for Policy Makers
• Focus on defense by
building security in
• Re-orient public private
partnerships
• Focus on information
users instead of
plumbing
• Let civilian agencies
lead
FIX THE BROKEN STUFF
Copyright © 2015, Cigital
WHERE TO LEARN MORE
Copyright © 2015, CigitalCopyright © 2015, Cigital
SearchSecurity + Cigital’s Security Blog
• No-nonsense monthly security
column by Gary McGraw:
www.searchsecurity.com
• In-depth thought-leadership blog from
the Cigital Principals:
• Gary McGraw
• Sammy Migues
• John Steven
• Paco Hope
• Jim DelGrosso
https://www.cigital.com/blog/
• Gary McGraw’s writings:
www.cigital.com/~gem/writing
Copyright © 2015, CigitalCopyright © 2015, Cigital
Silver Bullet + IEEE Security & Privacy
• Monthly Silver Bullet podcast with
Gary McGraw:
www.cigital.com/silverbullet
• IEEE Security & Privacy magazine
(Building Security In)
www.computer.org/security/bsisub/
Copyright © 2015, CigitalCopyright © 2015, Cigital
The Book
• How to DO software security
• Best practices
• Tools
• Knowledge
• Cornerstone of the Addison-
Wesley Software Security Series:
www.swsec.com
Copyright © 2015, CigitalCopyright © 2015, Cigital
Build Security In
• Join the BSIMM Community
http://bsimm.com
• Send e-mail: gem@cigital.com
• @cigitalgem

Contenu connexe

Tendances

2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get InterestingIBM Security
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationStephen Cobb
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeDeepak Kumar (D3)
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - FlierSunit Belapure
 

Tendances (19)

Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - Flier
 

En vedette

Keeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementKeeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementPaige Rasid
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and SecurityPaige Rasid
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
NIST Security Awareness SP 800-50
NIST Security Awareness SP 800-50NIST Security Awareness SP 800-50
NIST Security Awareness SP 800-50David Sweigert
 
Win the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technologyWin the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technologyAnge Albertini
 
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...Paige Rasid
 
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology FirmsStudy Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology FirmsPaige Rasid
 
Tecna jobs and innovation ecosystems 6-1-2011
Tecna   jobs and innovation ecosystems 6-1-2011Tecna   jobs and innovation ecosystems 6-1-2011
Tecna jobs and innovation ecosystems 6-1-2011Paige Rasid
 
2014 Innovation Summit Program
2014 Innovation Summit Program2014 Innovation Summit Program
2014 Innovation Summit ProgramPaige Rasid
 
2015 Marcum TT40 Program
2015 Marcum TT40 Program2015 Marcum TT40 Program
2015 Marcum TT40 ProgramPaige Rasid
 
Impact of IT on the healthcare industry
Impact of IT on the healthcare industryImpact of IT on the healthcare industry
Impact of IT on the healthcare industryPaige Rasid
 
CVG - Medical Devices 2015
CVG - Medical Devices 2015CVG - Medical Devices 2015
CVG - Medical Devices 2015Paige Rasid
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber WarRadware
 
Women Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event ProgramWomen Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event ProgramPaige Rasid
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudPaige Rasid
 

En vedette (20)

Keeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementKeeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor Management
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and Security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Overview of NIST SCO Standards Training Activities
Overview of NIST SCO Standards Training ActivitiesOverview of NIST SCO Standards Training Activities
Overview of NIST SCO Standards Training Activities
 
NIST Security Awareness SP 800-50
NIST Security Awareness SP 800-50NIST Security Awareness SP 800-50
NIST Security Awareness SP 800-50
 
Win the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technologyWin the Cyber War! with Precognitive Heuristics technology
Win the Cyber War! with Precognitive Heuristics technology
 
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
Connecticut Technology Councils Calls for Support of High Growth Firms, Provi...
 
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology FirmsStudy Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
Study Reports Connecticut Risks Losing its Fastest Job Growth Technology Firms
 
Tecna jobs and innovation ecosystems 6-1-2011
Tecna   jobs and innovation ecosystems 6-1-2011Tecna   jobs and innovation ecosystems 6-1-2011
Tecna jobs and innovation ecosystems 6-1-2011
 
2014 Innovation Summit Program
2014 Innovation Summit Program2014 Innovation Summit Program
2014 Innovation Summit Program
 
Cyber Crime & Cyber War
Cyber Crime & Cyber WarCyber Crime & Cyber War
Cyber Crime & Cyber War
 
2015 Marcum TT40 Program
2015 Marcum TT40 Program2015 Marcum TT40 Program
2015 Marcum TT40 Program
 
Impact of IT on the healthcare industry
Impact of IT on the healthcare industryImpact of IT on the healthcare industry
Impact of IT on the healthcare industry
 
CVG - Medical Devices 2015
CVG - Medical Devices 2015CVG - Medical Devices 2015
CVG - Medical Devices 2015
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
Women Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event ProgramWomen Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event Program
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
Bab 3-ting-31
Bab 3-ting-31Bab 3-ting-31
Bab 3-ting-31
 

Similaire à Cyber War, Cyber Peace, Stones and Glass Houses

Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCigital
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourselfjkl0202
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1Clay Melugin
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015bmcmenemy
 
An Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsAn Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsDenim Group
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsJason Hong
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...Matthew Rosenquist
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game SecurityCigital
 
Cybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join NowCybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join Nowasmeerana605
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Innovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityInnovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityJean-Luc David
 

Similaire à Cyber War, Cyber Peace, Stones and Glass Houses (20)

Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass Houses
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
 
An Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT SystemsAn Updated Take: Threat Modeling for IoT Systems
An Updated Take: Threat Modeling for IoT Systems
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Privacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of ThingsPrivacy and Security for the Emerging Internet of Things
Privacy and Security for the Emerging Internet of Things
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game Security
 
Cybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join NowCybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join Now
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdf
 
Innovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityInnovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart Security
 

Plus de Paige Rasid

2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards 2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards Paige Rasid
 
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor EventSocial Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor EventPaige Rasid
 
Life Cycle of a Data Breach - Cybersecurity Seminar Series
Life Cycle of a Data Breach - Cybersecurity Seminar SeriesLife Cycle of a Data Breach - Cybersecurity Seminar Series
Life Cycle of a Data Breach - Cybersecurity Seminar SeriesPaige Rasid
 
Women of Innovation 2015 Program
Women of Innovation 2015 ProgramWomen of Innovation 2015 Program
Women of Innovation 2015 ProgramPaige Rasid
 
Cybersecurity Seminar Series - March 30
Cybersecurity Seminar Series - March 30Cybersecurity Seminar Series - March 30
Cybersecurity Seminar Series - March 30Paige Rasid
 
Public Policy Agenda
Public Policy AgendaPublic Policy Agenda
Public Policy AgendaPaige Rasid
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-programPaige Rasid
 
Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014Paige Rasid
 
Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014Paige Rasid
 
September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech Paige Rasid
 
Q2 2014 shaking the money tree
Q2 2014 shaking the money treeQ2 2014 shaking the money tree
Q2 2014 shaking the money treePaige Rasid
 
CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014 CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014 Paige Rasid
 
2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology CouncilPaige Rasid
 
Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13Paige Rasid
 
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13Paige Rasid
 
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13Paige Rasid
 
Grow with the Grove - A CVG Second Thursday Event, 7/11/13
 Grow with the Grove - A CVG Second Thursday Event, 7/11/13 Grow with the Grove - A CVG Second Thursday Event, 7/11/13
Grow with the Grove - A CVG Second Thursday Event, 7/11/13Paige Rasid
 
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13Paige Rasid
 
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...Paige Rasid
 

Plus de Paige Rasid (19)

2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards 2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards
 
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor EventSocial Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
 
Life Cycle of a Data Breach - Cybersecurity Seminar Series
Life Cycle of a Data Breach - Cybersecurity Seminar SeriesLife Cycle of a Data Breach - Cybersecurity Seminar Series
Life Cycle of a Data Breach - Cybersecurity Seminar Series
 
Women of Innovation 2015 Program
Women of Innovation 2015 ProgramWomen of Innovation 2015 Program
Women of Innovation 2015 Program
 
Cybersecurity Seminar Series - March 30
Cybersecurity Seminar Series - March 30Cybersecurity Seminar Series - March 30
Cybersecurity Seminar Series - March 30
 
Public Policy Agenda
Public Policy AgendaPublic Policy Agenda
Public Policy Agenda
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-program
 
Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014
 
Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014
 
September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech
 
Q2 2014 shaking the money tree
Q2 2014 shaking the money treeQ2 2014 shaking the money tree
Q2 2014 shaking the money tree
 
CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014 CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014
 
2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council
 
Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13
 
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
 
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
 
Grow with the Grove - A CVG Second Thursday Event, 7/11/13
 Grow with the Grove - A CVG Second Thursday Event, 7/11/13 Grow with the Grove - A CVG Second Thursday Event, 7/11/13
Grow with the Grove - A CVG Second Thursday Event, 7/11/13
 
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
Mark G. Heesen, President, NVCA - A CVG Second Thursday Event, 6/13/13
 
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
Electronic Health Records (EHR) - A Look at the Industry and Its Future, A CV...
 

Dernier

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Dernier (20)

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Cyber War, Cyber Peace, Stones and Glass Houses

  • 1. Copyright © 2015, Cigital Cyber War, Cyber Peace, Stones, and Glass Houses …those who live in glass houses should not throw stones @cigitalgem Gary McGraw, Ph.D. Chief Technology Officer
  • 2. Copyright © 2015, Cigital Cigital • Providing software security professional services since 1992 • World’s premiere software security consulting firm o 500 professional consultants o Washington DC, New York, Santa Clara, Bloomington, Boston, Chicago, Atlanta, Austin, Amsterdam, and London • Recognized experts in software security o Widely published in books, white papers, and articles o Industry thought leaders
  • 3. Copyright © 2015, CigitalCopyright © 2015, Cigital Real Cyber Defense as Deterrence • Defining “cyber” whatever • The offense problem • “Active defense” • Attribution • Many vulnerabilities • Payloads are easy • Economics • The NASCAR effect • The defense solution • Proactive defense vs. cardboard defense • Deterrence through defense • Build security in
  • 4. Copyright © 2015, Cigital CYBER CLARITY IS ELUSIVE Separating the Threat from the Hype: What Washington Needs to Know About Cyber Security, Nate Fick & Gary McGraw http://www.cigital.com/papers/download/mcgraw-fick-CNAS.pdf
  • 5. Copyright © 2015, CigitalCopyright © 2015, Cigital Cyber Security • How much of the cyber war talk is hype? • What is real and what is cyber chimera? Help policymakers find their way through the fog and set guidelines to protect the best of the Internet and cyberspace, both from those who seek to harm it, and from those who seek to protect it but risk doing more harm than good.
  • 6. Copyright © 2015, CigitalCopyright © 2015, Cigital Disentangling War, Espionage, and Crime • Cyber espionage • Much more common than war • Wikileaks • Anonymous • Operation Aurora • NY Times hack • Bad compartmentalization makes easy targets • Cyber crime • Even more common • 1 trillion dollars per year?! (just ask Ross Anderson) Building systems properly from a security perspective will address the cyber crime problem just as well as it will address cyber espionage and cyber war. We can kill all three birds with one stone.
  • 7. Copyright © 2015, CigitalCopyright © 2015, Cigital Kinetic Impact as Decisive Criteria to be War REALITY • To qualify as cyber war, the means may be virtual, but the impact should be real. • 1982 Soviet gas pipeline explosion • 2007 Israeli attack on Syrian reactor • 2008 Russia attacks Georgia two ways • 2008 USB drive infection in Iraq (meh) • 2010 Stuxnet attack on Iranian centrifuges HYPE • Estonia dDoS attacks • 2007 statue removal kerfuffle • What would Google do? • Brazilian blackout • 2009 60 minutes story • 100% hype • China “hijacks” the Internet • BGP mistake • Bad design
  • 8. Copyright © 2015, CigitalCopyright © 2015, Cigital US: National Security Dominates The real and perceived dominance of the U.S. national security establishment in setting cyber security policy is problematic • Cyber security is not only a military problem • Cyber security recognizes no geographic boundaries • Snowden revelations did not help this situation
  • 9. Copyright © 2015, CigitalCopyright © 2015, Cigital Offense and Defense defense means building secure software, designing and engineering systems to be secure in the first place and creating incentives and rewards for systems that are built to be secure offense involves exploiting systems, penetrating systems with cyber attacks and generally leveraging broken software to compromise entire systems and systems of systems
  • 10. Copyright © 2015, Cigital THE OFFENSE PROBLEM
  • 11. Copyright © 2015, CigitalCopyright © 2015, Cigital “Active Defense” Having a good offense is NOT the same as a good defense. Panetta on cyber security, “We need to have the option to take action against those who would attack us.” Grandma on security, “People who live in glass houses should not throw rocks.”
  • 12. Copyright © 2015, CigitalCopyright © 2015, Cigital Attribution Remains Unsolved (Ask Gandalf)
  • 13. Copyright © 2015, CigitalCopyright © 2015, Cigital Olympic Games & Stuxnet • The PAYLOAD is what matters • Inject code into a running control system • Siemens SIMATIC PLC (step 7) • Cyberwar!! • Natanz in Iran • Sophisticated, targeted collection of malware • Delivery • 1 0day (not 4) • Stolen private keys • USB injection • Network C&C How to p0wn a Control System with Stuxnet (9/23/10) http://bit.ly/RmbrNG
  • 14. Copyright © 2015, CigitalCopyright © 2015, Cigital Thread Hijacking in Online Games • Used in early online game botting programs (circa 2004) but no longer • Used successfully in Stuxnet in 2009 WoW.EXE MAIN THREAD INJECTED DLL Loops hundreds of times per second RenderWorld(..) DETOUR PATCH
  • 15. Copyright © 2015, CigitalCopyright © 2015, Cigital INJECTED CODE PAGE complete MAIN THREAD MAIN THREAD HARDWARE BP RenderWorld(..) uncloak MSG super branch RenderWorld(..) recloak restore CastSpellByID( .. ) ScriptExecute( .. ) ClearTarget( .. ) MAIN THREAD
  • 16. Copyright © 2015, CigitalCopyright © 2015, Cigital Vulnerabilities Are Pervasive
  • 17. Copyright © 2015, Cigital Disguise Process Control Process Disruption deterministic non-deterministic (hacking) Capability atypical Attack Complexity (From Ralph Langner) http://bit.ly/TvWnuG
  • 18. Copyright © 2015, CigitalCopyright © 2015, Cigital Economics (From Ralph Langner) Nuclear sub fleet Stealth fighter jet fleet Eurofighter fleet, Leopard II tank fleet Cyber weapons program / MIL targets Cyber weapons program / CI targets $90B $40B $10B $1B $100M Non-state thresholdhttp://bit.ly/TvWnuG Singular cyber attack against national critical infrastructure $5M
  • 19. Copyright © 2015, CigitalCopyright © 2015, Cigital Offense is Sexy: The NASCAR Effect Bad news • The world would rather not focus on how to build stuff that does not break • It’s harder to build good stuff than to break junky stuff Good news • The world loves to talk about how stuff breaks • This kind of work sparks lots of interest in computer security
  • 20. Copyright © 2015, Cigital THE DEFENSE SOLUTION
  • 21. Copyright © 2015, Cigital Cardboard Shield Defense Today’s computer and network security mechanisms are like the walls, moats, and drawbridges of medieval times. At one point, effective for defending against isolated attacks, mounted on horseback. Unfortunately, today’s attackers have access to predator drones and laser-guided missiles!
  • 22. Copyright © 2015, CigitalCopyright © 2015, Cigital Poor Security Engineering
  • 23. Copyright © 2015, CigitalCopyright © 2015, Cigital Proactive Defense Secretary Panetta is mistaken: “Through the innovative efforts of our cyber-operators, we are enhancing the department's cyber-defense programs. These systems rely on sensors and software to hunt down malicious code before it harms our systems. We actively share our own experience defending our systems with those running the nation's critical private- sector networks.” • Security Engineering • Software Security • Build Security In
  • 24. Copyright © 2015, Cigital HOW TO BUILD SECURITY IN
  • 25. Copyright © 2015, CigitalCopyright © 2015, Cigital Software Security Touchpoints
  • 26. Copyright © 2015, CigitalCopyright © 2015, Cigital BSIMM: Software Security Measurement • 104 firms measured (data freshness) • BSIMM6 = data from 78 real initiatives • 202 distinct measurements • 26 over time (one firm 5 times) • McGraw, Migues, and West
  • 27. Copyright © 2015, CigitalCopyright © 2015, Cigital 78 Firms in BSIMM6 Community
  • 28. Copyright © 2015, CigitalCopyright © 2015, Cigital A Software Security Framework See informIT article on BSIMM website http://bsimm.com 4 Domains 12 Practices
  • 29. Copyright © 2015, CigitalCopyright © 2015, Cigital BSIMM6 as a Measuring Stick
  • 30. Copyright © 2015, CigitalCopyright © 2015, Cigital
  • 31. Copyright © 2015, CigitalCopyright © 2015, Cigital BSIMM6 Results Top 12 activities • purple = good? • red = bad? “Blue shift” = practices to emphasize
  • 32. Copyright © 2015, CigitalCopyright © 2015, Cigital BSIMM By the Numbers
  • 33. Copyright © 2015, CigitalCopyright © 2015, Cigital Defense as Deterrent “the U.S. is in a good position to outspend its adversaries on proactive defense. Proactive defense can be our differentiator and a serious deterrent to war.” Proactive Defense Prudent Alternative to Cyberwarfare http://t.co/2901DHVh • A first strike in a cyber war is unlikely to be decisive • No matter how much is spent on cyber-offense, cyber-defense must be addressed anyway • Proactive defense is a very good differentiator
  • 34. Copyright © 2015, CigitalCopyright © 2015, Cigital Guidance for Policy Makers • Focus on defense by building security in • Re-orient public private partnerships • Focus on information users instead of plumbing • Let civilian agencies lead FIX THE BROKEN STUFF
  • 35. Copyright © 2015, Cigital WHERE TO LEARN MORE
  • 36. Copyright © 2015, CigitalCopyright © 2015, Cigital SearchSecurity + Cigital’s Security Blog • No-nonsense monthly security column by Gary McGraw: www.searchsecurity.com • In-depth thought-leadership blog from the Cigital Principals: • Gary McGraw • Sammy Migues • John Steven • Paco Hope • Jim DelGrosso https://www.cigital.com/blog/ • Gary McGraw’s writings: www.cigital.com/~gem/writing
  • 37. Copyright © 2015, CigitalCopyright © 2015, Cigital Silver Bullet + IEEE Security & Privacy • Monthly Silver Bullet podcast with Gary McGraw: www.cigital.com/silverbullet • IEEE Security & Privacy magazine (Building Security In) www.computer.org/security/bsisub/
  • 38. Copyright © 2015, CigitalCopyright © 2015, Cigital The Book • How to DO software security • Best practices • Tools • Knowledge • Cornerstone of the Addison- Wesley Software Security Series: www.swsec.com
  • 39. Copyright © 2015, CigitalCopyright © 2015, Cigital Build Security In • Join the BSIMM Community http://bsimm.com • Send e-mail: gem@cigital.com • @cigitalgem