SlideShare a Scribd company logo
1 of 20
Human Error
and Secure
Systems
Dustin Collins
@dustinmm80
dustinrcollins.com
● Boston DevOps meetup organizer
● Developer Advocate at Conjur
● reformed* software developer
ZDNet: 2015 biggest hacks, breaches
(some of the) breaches in 2015
...breaches caused by
insiders are often
unintentional. In fact,
over 95 percent of
these breaches are
caused by human
error.
IBM 2015 Cyber Security Intelligence Index
human error
‘Human error’ blamed for Rogers online security breach
Healthcare breaches need a cure for human errors
Human error causes most data breaches, Ponemon study
finds
Human Error Blamed for Most UK Data Breaches
Human error is the root cause of most data breaches
Human error causes alarming rise in data breaches
Human Error: The Largest Information Security Risk To Your
Organization
Huge rise in data breaches and it’s all your fault
Data breaches caused mostly by negligence and glitches
security through
obscurity
root cause
analysis
negative
reinforcement
the solution:
people
people
the problem:
experience = bias
Our ability to reason about the systems that
we’re working with (and are part of) diminishes
as their scale and interdependence increases.
We can no longer rely solely on past experience,
and instead have to continuously discover how
systems are functioning or failing, and adapt
accordingly.
Dave Zwieback - Every company is a learning
company
“human error”
we can do better
other industries
have already
learned this
lesson
http://amzn.com/B00Q8XCSFI
Old View
◦ Asks who is responsible
for the outcome
◦ Sees human error as the
cause of trouble
◦ Human error is random,
unreliable behaviour
◦ Human error is an
acceptable conclusion of
an investigation
two views of “human error”
New View
◦ Asks what is responsible
for the outcome
◦ Sees human error as a
symptom of deeper
trouble
◦ Human error is
systematically connected
to features of people’s
tools, tasks and operating
environment
◦ Human error is only the
starting point for further
investigation
“
Rather than being the main
instigators of an accident, operators
tend to be the inheritors of system
defects created by poor design,
incorrect installation, faulty
maintenance and bad management
decisions. Their part is usually that
of adding the final garnish to a
lethal brew whose ingredients have
already been long in the cooking.
http://amzn.com/0521314194
When we’re dealing
with complex systems,
the magnitude of a
cause is often not
proportionate to the
magnitude of its effect
accountability
implementing
reliable security
requires a solid
understanding its
operators
know your operators
operations
development security
compliance
warning signs
◦ security policy is not visible
◦ security is at odds with how work
gets done
◦ developers use a different workflow
than production
◦ documentation featuring warnings
(“don’t do this in production!”)
◦ SSH + sudo
◦ talking processes, not people
◦ audits are time-consuming
references
Sidney Dekker
◦ “Just Culture” Lecture (video)
◦ A Field Guide to Understanding ‘Human Error’
◦ Just Culture: Balancing Safety and
Accountability
◦ Human Error - James Reason
◦ The Design of Everyday Things - Dan Norman
◦ Universal Principles of Design - William Lidwell
Thanks!
ANY QUESTIONS?
You can find me at
@dustinmm80
dustinrcollins@gmail.com

More Related Content

What's hot

Automation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe HessmillerAutomation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe HessmillerJoe Hessmiller
 
Comprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organizationComprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organizationJoe Hessmiller
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityUltraUploader
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008John Gilligan
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygieneThiagu Haldurai
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber SecurityComodo SSL Store
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks International
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robertrobsworld
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerizationMichel de Goede
 
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...Dana Gardner
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...TechSoup
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud versionEoin Keary
 

What's hot (20)

Automation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe HessmillerAutomation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe Hessmiller
 
Comprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organizationComprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organization
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008
 
Pace IT - Troubleshooting Security
Pace IT - Troubleshooting SecurityPace IT - Troubleshooting Security
Pace IT - Troubleshooting Security
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygiene
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber Security
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robert
 
Hum w21
Hum w21Hum w21
Hum w21
 
AEPWP09292016
AEPWP09292016AEPWP09292016
AEPWP09292016
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerization
 
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
The Open Group San Diego Panel Explores Global Cybersecurity Issues for Impro...
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud version
 

Viewers also liked

Law 323 tax law (part i & ii) akhtar ali and asim zulfiqar ali
Law 323 tax law (part i & ii) akhtar ali and asim zulfiqar aliLaw 323 tax law (part i & ii) akhtar ali and asim zulfiqar ali
Law 323 tax law (part i & ii) akhtar ali and asim zulfiqar aliUniversity Of Central Punjab
 
Inside Attacker: An Overview
Inside Attacker: An OverviewInside Attacker: An Overview
Inside Attacker: An OverviewDustin Collins
 
Iso Internal Auditor
Iso Internal AuditorIso Internal Auditor
Iso Internal AuditorDanyah Hejaij
 
Causal Relationship between Macroeconomic Factors and Stock Prices in Pakistan
Causal Relationship between Macroeconomic Factors and Stock Prices in PakistanCausal Relationship between Macroeconomic Factors and Stock Prices in Pakistan
Causal Relationship between Macroeconomic Factors and Stock Prices in PakistanUniversity Of Central Punjab
 
Principles of accounting
Principles of accountingPrinciples of accounting
Principles of accountingSuraj Rana
 
Ratios and formulas in customer financial analysis
Ratios and formulas in customer financial analysisRatios and formulas in customer financial analysis
Ratios and formulas in customer financial analysisUniversity Of Central Punjab
 
[] Medical notes_clinical_medicine_pocket_guide
[] Medical notes_clinical_medicine_pocket_guide[] Medical notes_clinical_medicine_pocket_guide
[] Medical notes_clinical_medicine_pocket_guideAchmad Dainuri
 
Building your All-Star DevOps Team – "Planning, Process and Partners"
Building your All-Star DevOps Team – "Planning, Process and Partners"Building your All-Star DevOps Team – "Planning, Process and Partners"
Building your All-Star DevOps Team – "Planning, Process and Partners"Dustin Collins
 
US National standardization strategy
 US National standardization strategy US National standardization strategy
US National standardization strategyStella Tsank
 
Risk management in-60601-1
Risk management in-60601-1Risk management in-60601-1
Risk management in-60601-1Stella Tsank
 
Usability in healthcare, general overview on new standards and metrics (Inter...
Usability in healthcare, general overview on new standards and metrics (Inter...Usability in healthcare, general overview on new standards and metrics (Inter...
Usability in healthcare, general overview on new standards and metrics (Inter...Stella Tsank
 
Virtual teams - Learnings from Crisis Management Teams for Distributed Agile ...
Virtual teams - Learnings from Crisis Management Teams for Distributed Agile ...Virtual teams - Learnings from Crisis Management Teams for Distributed Agile ...
Virtual teams - Learnings from Crisis Management Teams for Distributed Agile ...Rolf Häsänen
 
Risk management seminar -en
Risk management   seminar -enRisk management   seminar -en
Risk management seminar -enRolf Häsänen
 
2017 power fundamentals (2)
2017 power fundamentals (2)2017 power fundamentals (2)
2017 power fundamentals (2)Kristin Allen
 
2011 final fixed-seprate block_tax_regimes_updated
2011 final fixed-seprate block_tax_regimes_updated2011 final fixed-seprate block_tax_regimes_updated
2011 final fixed-seprate block_tax_regimes_updatedUniversity Of Central Punjab
 

Viewers also liked (20)

Law 323 tax law (part i & ii) akhtar ali and asim zulfiqar ali
Law 323 tax law (part i & ii) akhtar ali and asim zulfiqar aliLaw 323 tax law (part i & ii) akhtar ali and asim zulfiqar ali
Law 323 tax law (part i & ii) akhtar ali and asim zulfiqar ali
 
Inside Attacker: An Overview
Inside Attacker: An OverviewInside Attacker: An Overview
Inside Attacker: An Overview
 
Iso Internal Auditor
Iso Internal AuditorIso Internal Auditor
Iso Internal Auditor
 
Prospectus University of lahore 2012-13
Prospectus University of lahore 2012-13Prospectus University of lahore 2012-13
Prospectus University of lahore 2012-13
 
Causal Relationship between Macroeconomic Factors and Stock Prices in Pakistan
Causal Relationship between Macroeconomic Factors and Stock Prices in PakistanCausal Relationship between Macroeconomic Factors and Stock Prices in Pakistan
Causal Relationship between Macroeconomic Factors and Stock Prices in Pakistan
 
Principles of accounting
Principles of accountingPrinciples of accounting
Principles of accounting
 
Ratios and formulas in customer financial analysis
Ratios and formulas in customer financial analysisRatios and formulas in customer financial analysis
Ratios and formulas in customer financial analysis
 
[] Medical notes_clinical_medicine_pocket_guide
[] Medical notes_clinical_medicine_pocket_guide[] Medical notes_clinical_medicine_pocket_guide
[] Medical notes_clinical_medicine_pocket_guide
 
Building your All-Star DevOps Team – "Planning, Process and Partners"
Building your All-Star DevOps Team – "Planning, Process and Partners"Building your All-Star DevOps Team – "Planning, Process and Partners"
Building your All-Star DevOps Team – "Planning, Process and Partners"
 
US National standardization strategy
 US National standardization strategy US National standardization strategy
US National standardization strategy
 
Risk management in-60601-1
Risk management in-60601-1Risk management in-60601-1
Risk management in-60601-1
 
Usability in healthcare, general overview on new standards and metrics (Inter...
Usability in healthcare, general overview on new standards and metrics (Inter...Usability in healthcare, general overview on new standards and metrics (Inter...
Usability in healthcare, general overview on new standards and metrics (Inter...
 
Labor policy in pakistan
Labor policy in pakistanLabor policy in pakistan
Labor policy in pakistan
 
Virtual teams - Learnings from Crisis Management Teams for Distributed Agile ...
Virtual teams - Learnings from Crisis Management Teams for Distributed Agile ...Virtual teams - Learnings from Crisis Management Teams for Distributed Agile ...
Virtual teams - Learnings from Crisis Management Teams for Distributed Agile ...
 
Risk management seminar -en
Risk management   seminar -enRisk management   seminar -en
Risk management seminar -en
 
Miracles in the_quran
Miracles in the_quranMiracles in the_quran
Miracles in the_quran
 
2017 power fundamentals (2)
2017 power fundamentals (2)2017 power fundamentals (2)
2017 power fundamentals (2)
 
2011 final fixed-seprate block_tax_regimes_updated
2011 final fixed-seprate block_tax_regimes_updated2011 final fixed-seprate block_tax_regimes_updated
2011 final fixed-seprate block_tax_regimes_updated
 
Exempt user guide ACCA
Exempt user guide ACCAExempt user guide ACCA
Exempt user guide ACCA
 
Evolutionary_forensic_psychology__darwinian_foundations_of_crime_and_law
  Evolutionary_forensic_psychology__darwinian_foundations_of_crime_and_law  Evolutionary_forensic_psychology__darwinian_foundations_of_crime_and_law
Evolutionary_forensic_psychology__darwinian_foundations_of_crime_and_law
 

Similar to Human error and secure systems - DevOpsDays Ohio 2015

Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Human Error in Cyber Security Breaches | Cyberroot Risk Advisory
Human Error in Cyber Security Breaches | Cyberroot Risk AdvisoryHuman Error in Cyber Security Breaches | Cyberroot Risk Advisory
Human Error in Cyber Security Breaches | Cyberroot Risk AdvisoryCR Group
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015Paul Ferrillo
 
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNERRunning Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNERMalikPinckney86
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeDavid Mai, MBA
 
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeDavid Mai, MBA
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security WebinarAVEVA
 
Security Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the HeadlinesSecurity Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the HeadlinesDuo Security
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15James Fisher
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfEnterprise Insider
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 

Similar to Human error and secure systems - DevOpsDays Ohio 2015 (20)

The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Human Error in Cyber Security Breaches | Cyberroot Risk Advisory
Human Error in Cyber Security Breaches | Cyberroot Risk AdvisoryHuman Error in Cyber Security Breaches | Cyberroot Risk Advisory
Human Error in Cyber Security Breaches | Cyberroot Risk Advisory
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015
 
SOFTWARE SYSTEMS CONTEXT
SOFTWARE SYSTEMS CONTEXTSOFTWARE SYSTEMS CONTEXT
SOFTWARE SYSTEMS CONTEXT
 
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNERRunning Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
Running Head VULNERABILITY ASSESSMENT SUMMARY REPORT 1VULNER
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
 
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
 
Security Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the HeadlinesSecurity Fact & Fiction: Three Lessons from the Headlines
Security Fact & Fiction: Three Lessons from the Headlines
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Human error and secure systems - DevOpsDays Ohio 2015

  • 2. Dustin Collins @dustinmm80 dustinrcollins.com ● Boston DevOps meetup organizer ● Developer Advocate at Conjur ● reformed* software developer
  • 3. ZDNet: 2015 biggest hacks, breaches (some of the) breaches in 2015
  • 4. ...breaches caused by insiders are often unintentional. In fact, over 95 percent of these breaches are caused by human error. IBM 2015 Cyber Security Intelligence Index
  • 5. human error ‘Human error’ blamed for Rogers online security breach Healthcare breaches need a cure for human errors Human error causes most data breaches, Ponemon study finds Human Error Blamed for Most UK Data Breaches Human error is the root cause of most data breaches Human error causes alarming rise in data breaches Human Error: The Largest Information Security Risk To Your Organization Huge rise in data breaches and it’s all your fault Data breaches caused mostly by negligence and glitches
  • 10. experience = bias Our ability to reason about the systems that we’re working with (and are part of) diminishes as their scale and interdependence increases. We can no longer rely solely on past experience, and instead have to continuously discover how systems are functioning or failing, and adapt accordingly. Dave Zwieback - Every company is a learning company
  • 11. “human error” we can do better other industries have already learned this lesson http://amzn.com/B00Q8XCSFI
  • 12. Old View ◦ Asks who is responsible for the outcome ◦ Sees human error as the cause of trouble ◦ Human error is random, unreliable behaviour ◦ Human error is an acceptable conclusion of an investigation two views of “human error” New View ◦ Asks what is responsible for the outcome ◦ Sees human error as a symptom of deeper trouble ◦ Human error is systematically connected to features of people’s tools, tasks and operating environment ◦ Human error is only the starting point for further investigation
  • 13. “ Rather than being the main instigators of an accident, operators tend to be the inheritors of system defects created by poor design, incorrect installation, faulty maintenance and bad management decisions. Their part is usually that of adding the final garnish to a lethal brew whose ingredients have already been long in the cooking. http://amzn.com/0521314194
  • 14. When we’re dealing with complex systems, the magnitude of a cause is often not proportionate to the magnitude of its effect
  • 16. implementing reliable security requires a solid understanding its operators
  • 18. warning signs ◦ security policy is not visible ◦ security is at odds with how work gets done ◦ developers use a different workflow than production ◦ documentation featuring warnings (“don’t do this in production!”) ◦ SSH + sudo ◦ talking processes, not people ◦ audits are time-consuming
  • 19. references Sidney Dekker ◦ “Just Culture” Lecture (video) ◦ A Field Guide to Understanding ‘Human Error’ ◦ Just Culture: Balancing Safety and Accountability ◦ Human Error - James Reason ◦ The Design of Everyday Things - Dan Norman ◦ Universal Principles of Design - William Lidwell
  • 20. Thanks! ANY QUESTIONS? You can find me at @dustinmm80 dustinrcollins@gmail.com

Editor's Notes

  1. What do I mean by reformed? It took me 5 years to understand that delivering software is about people, not just code. “Everyone but me is an idiot” - This was my problem, not everyone else’s - I just didn’t understand their needs and motives If you want to have more impact as an engineer, you have to learn how to deal with people The Oz principle - described in a business book (keep it above the line) Above the line: accountability and success Below the line: self-victimization and failure Recommended books - okay yeah tech books, but other good ones: How to make friends and influence people Thinking fast and slow Talk about mentors, tech and not-tech Talk about being an introvert a little bit
  2. A few of the more high-profile breaches this year - almost every company is being breached
  3. 55% of attacks are by insiders
  4. How media reports security breaches, this is the status quo Obviously what we’re doing is not working Let’s talk about some of the things we’re doing
  5. Obscuring security leads to a false sense of security, which is often more dangerous than not addressing security at all. If the security of a system is maintained by keeping the implementation of the system a secret, the entire system collapses when the first person discovers how the security mechanism works—and someone is always determined to discover these secrets. Visibility is usually the biggest blocker to adoption of security practices across an org. Shadow IT open vs closed source? you pick hybrid - talk about slosilo @ Conjur (Esperanto for ‘key to open a lock’)
  6. root cause analysis boils down a complex problem into one cause (usually who to blame) Rarely results in enough data to remediate a problem and stop if from happening in the future 5 whys has the same problem instead of “why did you screw up the backup?”, ask “how did you do the backup?” - we’re looking for details, what made sense at the time? instead, we should be asking “how?” to collect multiple narratives of what happened at the time
  7. Negative reinforcement leads to people hiding things they know to avoid punishment Known problems > unknown problems Someone admits they messed up, gets disciplinary action, do you think other people on the team will admit when they mess up? No
  8. We’re not going to code our way out of these problems
  9. Experience shapes how we do things in the future this can be a good thing! it saves us time, employers want it. but experience is a bias, so we need to constantly evaluate how useful our experience is in new and changing conditions Some problems only become apparent at scale or when combined with other systems
  10. Lots of great examples of how other industries have benefitted from shifting to the “new view” of human error (covered in next slide) Tell story of NZ surgeon jailed for negligence Moved from Britain Bunch of patients died, newspaper picked it up, he went to jail Root cause: he was negligent Further investigation: understaffed - assistants were med students; no re-licensing even though procedures were different in NZ
  11. Old View solution: people should do as they're told. Their attitude is the problem, fix with sanctions and shaming. This view, the Old View, is limited in its usefulness. In fact, it can be deeply counterproductive. It has been tried for decades, without noticeable effect. Safety improvement comes from abandoning the idea that errors are causes, and that people are the major threat to otherwise safe systems. The point of a New View ‘human error’ investigation is not to say where people went wrong (that much is easy). The point is to understand why they thought they were doing things right; why it made sense to them at the time. Think up and out, not down and in (reductionist).
  12. James Reason in “Human Error” Underneath every simple, obvious story about ‘human error,’ there is a deeper, more complex story about the organization.
  13. Complex systems are not cause == effect. We have the intuition that a large effect, a big screwup, must have a big cause and be punished accordingly. A small inconsistency can eventually bring down a whole system. We’re talking consistency and chaos theory. Notions of accountability become difficult. What we want to hear diverges from how we can affect change. Bad apples are the ghost story, the lullaby that we tell ourselves - we can feel better.
  14. We come to the problem here, we need to figure out what accountability means so that we can make it compatible with learning. What we’re talking about is creating a Just Culture. One where people can feel safe reporting problems. holding people accountable is fine; but you need to be able to show that people had the authority to live up to the responsibility that you are now asking of them; if you can’t do that, your calls for accountability have no merit, and you’d better start looking at yourself. At some point there is a discretionary space wherein we must hold individuals accountable. Be very clear about where this space begins and ends. Anything you are responsible for you should have full authority over. you cannot keep this gap small and open it when a problem happens - this is deeply unfair How do we motivate people to take conscientious decisions in this space? Fear or invitation to participate? Fear is going to cause issues to go unreported accountability = share your account The way we view failures has changed over time - now they are ‘failures of risk management’ they used to be random meaningless events in the early 1900s, in the mid-1900s acts of God, now it’s human error - only in the last 100 years has this changed this is a consequence of our engineering prowess - complex systems are not allowed to fail
  15. Airlines in the 80’s and 90’s were having problems with oil caps not being properly replaced on JT8D engines. Lots of good mechanics were temporarily suspended over this. Closer investigation revealed that the caps were so hot that mechanics could not properly get a hand on them to check whether they were actually sealed. A visual check was not sufficient, but supervisors did not believe mechanics telling them about the problem. They finally fixed the caps, problem solved. The bottom line: discipline without understanding the problem is ineffective.
  16. These groups will have different needs, you need to create a feedback mechanism for each and between them. Talk about UX here - these are really user personas - SecX?
  17. point 1 - check it in as code, mention Conjur DSL point 2 - a change that should be simple ends up being really hard - inflexible security system, technical debt point 3 - secrets, SSH management point 4 - too easy to screw up point 5 - what do we use SSH for? changing state shouldn’t be an answer point 6 - “I don’t care who it is, they have to follow the process!” - inflexible, shadow IT point 7 - If audits are custom one-off events, OUR visibility into our own system is probably subpar