SlideShare une entreprise Scribd logo
1  sur  46
Non-Sec
Jack Whitsitt
jack@energysec.org |
http://twitter.com/sintixerr
Presently:
 EnergySec Senior Strategist
 International Policy Discussions
Previously:
 Hacker Compound
 Open Source (Honeypots)
 Managed Commercial Security (Visualization! Correlation!)
 FBI SOC
 Enterprise Security Architect
 ICS-CERT/NCCIC/DHS/INL: National Control Systems IR
 Government : Public/Private Partnership Development as Transportation
SSA
Also:
 Artist & Backpacker
About Me
We have been focusing on improving information security and risk management
practices to reduce cybersecurity risk.
This focus has likely improved information security practices, but without
meaningfully or sustainably reducing cybersecurity risk
This has come at the cost of the resources we will require to displace potentially
dangerously entrenched behavior and misaligned markets created as an
outcome of this focus.
Our focus on information security solution spaces may be preventing us from
making necessary transformative (as opposed to incremental) improvements
because:
Information Security practices and solution spaces do not control or speak to
enough of the exposure environment to create sustained, strategic
improvements in position
We need to take a wider view.
(Warning: The view may contradict itself and this will be a linear presentation of a non-linear topic)
Why this talk? Thesis
Progress in economics consists almost entirely in a progressive
improvement in the choice of models….
[It] is a science of thinking in terms of models joined to the art of
choosing models which are relevant to the contemporary world…
[and] it is essentially a moral science and not a natural science…
That is to say, it employs introspection and judgments of value.
– J. M. Keynes to Harrod , 4 July 1938 (Sorta)
Models: How we think
Our Models May Be Our Vulnerability
State of the World
We’re Not Winning
We’re Not Sure Why
We Have Trouble Admitting It
But We’re Going To Fix IT
Anyway
State of Security
 The world already has a lot of cybersecurity “solutions” and
“products”
 The average information security budget according to
PricewaterhouseCoopers is a staggering $4.1 million
 According to Gartner, the worldwide Information Security market
is valued at more than $70 billion.
And, yet…
 The list to your right contains many, but not all, major Fortune 500
breaches 2011-2014
 These are not companies that cannot afford cybersecurity
 Most organizations are notified by external parties 100’s of days
after breach
 Cybersecurity is a hard problem that clearly – by any public
metric available - remains unsolved in any sustainable way
97% of networks have been breached (FireEye)
The Bear Has Eaten Us All…
 Of Solutions
 At the Wrong Level
 Without being Able to Articulate the Problem
 NISTCSF
– Common Practices
– List of things that aren’t sufficient
 Cybersec EU, Poland, 2015
– Talking Information Sharing at Highest International levels
– Conducting, not winning conflict
– Same solution spaces provided over and over again
– Specificity intersecting with applicability and repeatability extraordinarily
difficult
– This has to stop
…And yet we still rely on old
models
Scoping Cybersecurity
We don’t agree on much
We do not have a consensus definition
“Cybersecurity”
– Neither the problem space nor the discipline
– We can’t even decide if there is a <space> between
Cyber and Security
– Ask any 5 experts, get 5+ answers
Speaking of experts…..
Cybersecurity Experts
(Perspectives)
 System Administrators
 Malware Analysts`
 Incident Responders
 Lawyers
 CISOs
 Procurement Officials
 Chairmen of the Senate
Whatever Committee
 Heads of the NSA
 Senior Sales Engineers for
Security Companies
 Hackers
 Children
• CEO/Executive Board Members
• Criminals/Terrorists
• Journalists
• Developers
• Activists
• Evolutionary Ecology PhD’s
• Diplomats
• Control Systems Engineers
• Regulators and Auditors
• Emergency Managers
• Citizens
• Operations Staff
• Firewall Engineers
Cybersecurity Context
Cybersecurity is a huge domain that spans
entire cultures, industries, and nations while
remaining highly individualized
This means we have to always be cognizant
of context, models, and definitions.
To start with, we should ask a fundamental
question…
What is a secure system?
Secure system:
One that does no more or less than we
want it to for the amount of effort and
resources we’re willing to invest in it.
But what does that MEAN? 
Well, first, what is a
SYSTEM?
 Connected Technology that Processes Information and
Produces Output
 Technology just a proxy for human decision and action:
– Design
– Build
– Configure
– Operate
– Test
Our systems are our businesses, nations, and
cultures, we’ve just added technology.
Human Systems
Following this logic
– Systems are VERY BIG
– They have FUZZY BOUNDARIES
– They are HARD TO MODEL and EMERGENTLY COMPLEX
– Individuals have LIMITED SPHERES OF INFLUENCE on them
– But are subject to COMPLICATED IMPACTS FROM OUTSIDE THEIR
SPHERE
– And we ***STILL HAVE TO MANAGE THESE SYSTEMS***
Our Threat Models must apply to our entire
system definition.
So, where do we create boundaries?
How does this definition affect security?
Decisions:
“Atomic” elements of Cyber
Security
Cyber Security State is comprised entirely of a series of
authorized decisions made by people in authorized
capacities on a timeline
 To Model Systems and Security State, we have to Ask:
– Who is Making What Decisions, Why, and How?
 A useful filter for determining boundaries and scopes can be created by
determining your sphere of influence and asking:
– Where on a timeline is your sphere influenced
– By which decisions and by whom
– For what goals/values
– To what kind of effect
 How does your sphere of influence affect or not affect others?
Cybersecurity Experts
Revisited
 CEO/Executives
 Lawyers
 Procurement Officials
 Regulators and Auditors
 Emergency Managers
 Operations Staff
 Chairmen Senate Committees
 Heads of the NSA
 Diplomats
 Criminals/Terrorists
 Journalists
 Citizens
• Children
• Activists
• Evolutionary Ecology PhD’s
• CISOs
• Malware Analysts`
• Incident Responders
• Senior Security Sales Engineers
• White Hat Hackers
• Firewall Engineers
• Developers
• System Administrators
• Control Systems Engineers
How might these groups of Experts define Cybersecurity?
InfoSec vs CyberSec
 Use Previous Filter to Group People
– InfoSec
• Closer to “Security” Technology
• Focused on Mitigation
• Short Span of Influence on Exposure Creation
• Core competencies in technological exposure mitigation
– Others
• Further from “Security” technology
• But MORE influence over exposure creation
• Greater span of influence in general
• Low security technology competency
 “Others” have significantly more impact on system
security state than “InfoSec”, but are not directly
tasked with “Information Security”
Cyber Definitions Revisited
 Secure system: One that does no more or less than we
want it to for the amount of effort and resources we’re
willing to invest in it.
 Cybersecurity: The enablement of an environment in
which business objectives are sustainably
achievable by Information Security, Control
Systems Security, and Other Related Security
Activities in the face of continuous risk resulting from
the use of cyber systems.
 Cyber Risk: the possibility that actors will use our
systems as a means of repurposing our value chains to
alter the value produced, inhibit the value produced, or
produce new value in support of their own value chains.
Cybersecurity:
Managing a Parasitic Environment?
http://vignette1.wikia.nocookie.net/mutantsgeneticgladiators/images/7/7e/ParasiteQueen.png/revision/latest?cb=20140619191012
Parasites: Value Competition
Cyber Security isn’t a risk. 
Error Handling
“Others” create cyber security exposure
(mostly)
“Others” also limit/define InfoSec scope
InfoSec Programs are primarily “Error
Handlers” and relatively non-causal to cyber
security state (this doesn’t mean
unimportant)
 Island Internet
 Isolated Security Events
 Techies (me) without funding or buy-in develop practices
 Automated Worms Disrupt Business
 Market need identified and met by selling practices
 Connected Important Stuff
 Merging Realities, Conflict and All
 Entrenched Models and Practices failing to solve for New Reality and New Scope
We started out specialized and then specialized further despite context and problem
space expansion and we’ve failed to improve and update models or develop
appropriate, specific objectives accounting for our environment*
Now we’re missing important fundamentals in scope, metaphor, language, and
strategies and are battling existing investment to fix
(*or, at least, we’ve failed to create effective socialization mechanisms for them)
Tail Wagging the Dog:
How did we get here?
Problem Space Framework:
What does the Dog Look
Like?
Full Cyber Stack:
A Problem Space Framework
Connected, Related
Problem Spaces
that Affect Cyber
Security State:
Problem Space: Humans
 If Security State is Decisions on a Timeline,
we have to deal with:
– Average Ability
– Opaque Motivations and Habits
– Shaded Risk Perception
– Learning Capacity
– Conflicting Information Processing Mechanisms
– Personality Conflict
– Patterns Not Reality
Problem Space: Technology
 Cannot Express Security Directly
 Requires Core Competency replicated to all organizations
 General Purpose Expressly Allows Exposure
 Evolving Faster than Human Cultural Processes
 Complexity : Exposure rising directly and infinitely with
complexity
Problem Space: Culture
 Resistance to Change
 Blinded (often) in certain Topic Areas
 Socially, not factually, driven replication of talismanic memes
 Simplification of complicated topics
 Us vs Them: Perspective & Context Awareness
 Firefighting is Sexier than Exposure Management
 Language, Conceptual Clarity across Discipline Borders
Problem Space: Org
Behavior
 Conflict in Hierarchical Value Production
 Single “System”, but not engineered or designed
 Data to Knowledge to Action bandwidth limits
 Difficult or impossible risk aggregation
 Limited Resource Allocation (Speed, Accuracy)
 Insufficient resources hidden by poor risk perception
 Organizations don’t feel risk
 Little Full System (Human) Threat Modeling
Problem Space: Industries
 Competition vs Common Need
 Complex System Boundaries
 Entrenched Investment (InfoSec!)
 Indirect connection to Risk (Boiling Frogs)
 Competency Required by all: Cannot
maintain
Problem Space: Nations & Body
Politic
 Geography, Power Delegation, & Proximity
 Common Problem Space Consensus
 Multi-stakeholder Model/Regime
Management
 Perception Management of Body Politic
 Tragedy of the Commons
Problem Space: International
 Bad Conflict Metaphor: Defender vs Siege
– (Creates Compliance Misalignment)
 Stability Problems
 Norms of Behavior & Confidence Building Measures
 Information vs Kinetic Warfare
 Few Capacity Building Missions/Mandates
Problem Space: Global
Culture
 Predictably reliable infrastructure in order to
increase its health/wealth
 Freedom to develop practices and norms and
boundaries and technologies which exist outside of
nation state constructs – as the internet (does it?)
breaks without this. This is a matter of opinion?
 Tools and techniques and forums and media in
which to exist as an independent construct from
other sub-power brokers
But why does this matter?
Generally…
 We have problems to solve
 They are serious impediments to reducing
cyber security risk
 They have not been defined or socialized
 Without definition and socialization, people,
organizations, cultures, nations, etc. cannot
work together to solve them
 We can convert these gaps into concrete plans
of action for resolution – or at least socialize
good practice
Specifically…
NIST CSF, NERC CIP, C2M2, Top 20, 800-53, etc…..
 NONE of these address Exposure Introduction in a meaningful way within
organizations
 If Exposure is not managed outside of InfoSec, InfoSec costs will continue to go up while
effectiveness will go down (due to rising complexity)
 NONE of these addresses barriers to sustained implementation of their own advice
 Organizations are exploited most often because of the gap between “Perceived” and
“Actual” reality
Being able to manage exposure introduction in a sustained manner within the
constraints of the outside world requires concerted planning, work,
coordination resources across your businesses, cultures, industries, nations,
and the world…
And we have few mechanisms in place to do so.
 Expand
 Clarify
 Communicate
 Maintain
 Use
 Market
 Criticize
 Trash it and Start Over if Needed
– We still need one
– Let’s just stop repeating ourselves
Improve on
This Problem Space
Framework?
 Think Beyond InfoSec
– Broaden Scope Out As Far As You Can Go
 Re-Consider your Metaphors and Models from the Ground Up
– If Only as a Thought Exercise
 Ask how to manage risk without InfoSec
– Then build an error handler
 Wonder at why we are where we are
– And treat common practices as solving an insufficiently complete
list of problems
If nothing else…
Thank you!
Jack Whitsitt
jack@energysec.org |
http://twitter.com/sintixerr

Contenu connexe

Tendances

NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardEnergySec
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...centralohioissa
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationEnergySec
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNorth Texas Chapter of the ISSA
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayEnergySec
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...centralohioissa
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through SecurityEnergySec
 
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Enterprise Management Associates
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information securityMajor Hayden
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedEnergySec
 

Tendances (20)

NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator Display
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
 
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 

Similaire à Jack Whitsitt - Yours, Anecdotally

Yours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceYours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceJack Whitsitt
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...PECB
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityMatthew Rosenquist
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sectorCore Security
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldSafeNet
 
Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Dinis Cruz
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowCapgemini
 

Similaire à Jack Whitsitt - Yours, Anecdotally (20)

Yours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceYours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem Space
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)Inconvenient Truth(s) - On Application Security (from 2007)
Inconvenient Truth(s) - On Application Security (from 2007)
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
presCyberNISC2015
presCyberNISC2015presCyberNISC2015
presCyberNISC2015
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters Now
 

Plus de EnergySec

Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...EnergySec
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementEnergySec
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachEnergySec
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsEnergySec
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...EnergySec
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueEnergySec
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherEnergySec
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherEnergySec
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...EnergySec
 
Sea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesSea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesEnergySec
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityEnergySec
 
Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationEnergySec
 

Plus de EnergySec (20)

Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
 
Sea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesSea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber Perspectives
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid Security
 
Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and Education
 

Dernier

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 

Dernier (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Jack Whitsitt - Yours, Anecdotally

  • 2. Presently:  EnergySec Senior Strategist  International Policy Discussions Previously:  Hacker Compound  Open Source (Honeypots)  Managed Commercial Security (Visualization! Correlation!)  FBI SOC  Enterprise Security Architect  ICS-CERT/NCCIC/DHS/INL: National Control Systems IR  Government : Public/Private Partnership Development as Transportation SSA Also:  Artist & Backpacker About Me
  • 3. We have been focusing on improving information security and risk management practices to reduce cybersecurity risk. This focus has likely improved information security practices, but without meaningfully or sustainably reducing cybersecurity risk This has come at the cost of the resources we will require to displace potentially dangerously entrenched behavior and misaligned markets created as an outcome of this focus. Our focus on information security solution spaces may be preventing us from making necessary transformative (as opposed to incremental) improvements because: Information Security practices and solution spaces do not control or speak to enough of the exposure environment to create sustained, strategic improvements in position We need to take a wider view. (Warning: The view may contradict itself and this will be a linear presentation of a non-linear topic) Why this talk? Thesis
  • 4. Progress in economics consists almost entirely in a progressive improvement in the choice of models…. [It] is a science of thinking in terms of models joined to the art of choosing models which are relevant to the contemporary world… [and] it is essentially a moral science and not a natural science… That is to say, it employs introspection and judgments of value. – J. M. Keynes to Harrod , 4 July 1938 (Sorta) Models: How we think
  • 5. Our Models May Be Our Vulnerability
  • 6. State of the World
  • 9. We Have Trouble Admitting It
  • 10. But We’re Going To Fix IT Anyway
  • 11. State of Security  The world already has a lot of cybersecurity “solutions” and “products”  The average information security budget according to PricewaterhouseCoopers is a staggering $4.1 million  According to Gartner, the worldwide Information Security market is valued at more than $70 billion. And, yet…  The list to your right contains many, but not all, major Fortune 500 breaches 2011-2014  These are not companies that cannot afford cybersecurity  Most organizations are notified by external parties 100’s of days after breach  Cybersecurity is a hard problem that clearly – by any public metric available - remains unsolved in any sustainable way 97% of networks have been breached (FireEye)
  • 12. The Bear Has Eaten Us All…
  • 13.  Of Solutions  At the Wrong Level  Without being Able to Articulate the Problem  NISTCSF – Common Practices – List of things that aren’t sufficient  Cybersec EU, Poland, 2015 – Talking Information Sharing at Highest International levels – Conducting, not winning conflict – Same solution spaces provided over and over again – Specificity intersecting with applicability and repeatability extraordinarily difficult – This has to stop …And yet we still rely on old models
  • 14.
  • 16. We don’t agree on much We do not have a consensus definition “Cybersecurity” – Neither the problem space nor the discipline – We can’t even decide if there is a <space> between Cyber and Security – Ask any 5 experts, get 5+ answers Speaking of experts…..
  • 17. Cybersecurity Experts (Perspectives)  System Administrators  Malware Analysts`  Incident Responders  Lawyers  CISOs  Procurement Officials  Chairmen of the Senate Whatever Committee  Heads of the NSA  Senior Sales Engineers for Security Companies  Hackers  Children • CEO/Executive Board Members • Criminals/Terrorists • Journalists • Developers • Activists • Evolutionary Ecology PhD’s • Diplomats • Control Systems Engineers • Regulators and Auditors • Emergency Managers • Citizens • Operations Staff • Firewall Engineers
  • 18. Cybersecurity Context Cybersecurity is a huge domain that spans entire cultures, industries, and nations while remaining highly individualized This means we have to always be cognizant of context, models, and definitions. To start with, we should ask a fundamental question…
  • 19. What is a secure system? Secure system: One that does no more or less than we want it to for the amount of effort and resources we’re willing to invest in it. But what does that MEAN? 
  • 20. Well, first, what is a SYSTEM?  Connected Technology that Processes Information and Produces Output  Technology just a proxy for human decision and action: – Design – Build – Configure – Operate – Test Our systems are our businesses, nations, and cultures, we’ve just added technology.
  • 21. Human Systems Following this logic – Systems are VERY BIG – They have FUZZY BOUNDARIES – They are HARD TO MODEL and EMERGENTLY COMPLEX – Individuals have LIMITED SPHERES OF INFLUENCE on them – But are subject to COMPLICATED IMPACTS FROM OUTSIDE THEIR SPHERE – And we ***STILL HAVE TO MANAGE THESE SYSTEMS*** Our Threat Models must apply to our entire system definition. So, where do we create boundaries? How does this definition affect security?
  • 22. Decisions: “Atomic” elements of Cyber Security Cyber Security State is comprised entirely of a series of authorized decisions made by people in authorized capacities on a timeline  To Model Systems and Security State, we have to Ask: – Who is Making What Decisions, Why, and How?  A useful filter for determining boundaries and scopes can be created by determining your sphere of influence and asking: – Where on a timeline is your sphere influenced – By which decisions and by whom – For what goals/values – To what kind of effect  How does your sphere of influence affect or not affect others?
  • 23. Cybersecurity Experts Revisited  CEO/Executives  Lawyers  Procurement Officials  Regulators and Auditors  Emergency Managers  Operations Staff  Chairmen Senate Committees  Heads of the NSA  Diplomats  Criminals/Terrorists  Journalists  Citizens • Children • Activists • Evolutionary Ecology PhD’s • CISOs • Malware Analysts` • Incident Responders • Senior Security Sales Engineers • White Hat Hackers • Firewall Engineers • Developers • System Administrators • Control Systems Engineers How might these groups of Experts define Cybersecurity?
  • 24. InfoSec vs CyberSec  Use Previous Filter to Group People – InfoSec • Closer to “Security” Technology • Focused on Mitigation • Short Span of Influence on Exposure Creation • Core competencies in technological exposure mitigation – Others • Further from “Security” technology • But MORE influence over exposure creation • Greater span of influence in general • Low security technology competency  “Others” have significantly more impact on system security state than “InfoSec”, but are not directly tasked with “Information Security”
  • 25.
  • 26. Cyber Definitions Revisited  Secure system: One that does no more or less than we want it to for the amount of effort and resources we’re willing to invest in it.  Cybersecurity: The enablement of an environment in which business objectives are sustainably achievable by Information Security, Control Systems Security, and Other Related Security Activities in the face of continuous risk resulting from the use of cyber systems.  Cyber Risk: the possibility that actors will use our systems as a means of repurposing our value chains to alter the value produced, inhibit the value produced, or produce new value in support of their own value chains.
  • 27. Cybersecurity: Managing a Parasitic Environment? http://vignette1.wikia.nocookie.net/mutantsgeneticgladiators/images/7/7e/ParasiteQueen.png/revision/latest?cb=20140619191012
  • 28. Parasites: Value Competition Cyber Security isn’t a risk. 
  • 29. Error Handling “Others” create cyber security exposure (mostly) “Others” also limit/define InfoSec scope InfoSec Programs are primarily “Error Handlers” and relatively non-causal to cyber security state (this doesn’t mean unimportant)
  • 30.  Island Internet  Isolated Security Events  Techies (me) without funding or buy-in develop practices  Automated Worms Disrupt Business  Market need identified and met by selling practices  Connected Important Stuff  Merging Realities, Conflict and All  Entrenched Models and Practices failing to solve for New Reality and New Scope We started out specialized and then specialized further despite context and problem space expansion and we’ve failed to improve and update models or develop appropriate, specific objectives accounting for our environment* Now we’re missing important fundamentals in scope, metaphor, language, and strategies and are battling existing investment to fix (*or, at least, we’ve failed to create effective socialization mechanisms for them) Tail Wagging the Dog: How did we get here?
  • 31. Problem Space Framework: What does the Dog Look Like?
  • 32. Full Cyber Stack: A Problem Space Framework Connected, Related Problem Spaces that Affect Cyber Security State:
  • 33. Problem Space: Humans  If Security State is Decisions on a Timeline, we have to deal with: – Average Ability – Opaque Motivations and Habits – Shaded Risk Perception – Learning Capacity – Conflicting Information Processing Mechanisms – Personality Conflict – Patterns Not Reality
  • 34. Problem Space: Technology  Cannot Express Security Directly  Requires Core Competency replicated to all organizations  General Purpose Expressly Allows Exposure  Evolving Faster than Human Cultural Processes  Complexity : Exposure rising directly and infinitely with complexity
  • 35. Problem Space: Culture  Resistance to Change  Blinded (often) in certain Topic Areas  Socially, not factually, driven replication of talismanic memes  Simplification of complicated topics  Us vs Them: Perspective & Context Awareness  Firefighting is Sexier than Exposure Management  Language, Conceptual Clarity across Discipline Borders
  • 36. Problem Space: Org Behavior  Conflict in Hierarchical Value Production  Single “System”, but not engineered or designed  Data to Knowledge to Action bandwidth limits  Difficult or impossible risk aggregation  Limited Resource Allocation (Speed, Accuracy)  Insufficient resources hidden by poor risk perception  Organizations don’t feel risk  Little Full System (Human) Threat Modeling
  • 37. Problem Space: Industries  Competition vs Common Need  Complex System Boundaries  Entrenched Investment (InfoSec!)  Indirect connection to Risk (Boiling Frogs)  Competency Required by all: Cannot maintain
  • 38. Problem Space: Nations & Body Politic  Geography, Power Delegation, & Proximity  Common Problem Space Consensus  Multi-stakeholder Model/Regime Management  Perception Management of Body Politic  Tragedy of the Commons
  • 39. Problem Space: International  Bad Conflict Metaphor: Defender vs Siege – (Creates Compliance Misalignment)  Stability Problems  Norms of Behavior & Confidence Building Measures  Information vs Kinetic Warfare  Few Capacity Building Missions/Mandates
  • 40. Problem Space: Global Culture  Predictably reliable infrastructure in order to increase its health/wealth  Freedom to develop practices and norms and boundaries and technologies which exist outside of nation state constructs – as the internet (does it?) breaks without this. This is a matter of opinion?  Tools and techniques and forums and media in which to exist as an independent construct from other sub-power brokers
  • 41. But why does this matter?
  • 42. Generally…  We have problems to solve  They are serious impediments to reducing cyber security risk  They have not been defined or socialized  Without definition and socialization, people, organizations, cultures, nations, etc. cannot work together to solve them  We can convert these gaps into concrete plans of action for resolution – or at least socialize good practice
  • 43. Specifically… NIST CSF, NERC CIP, C2M2, Top 20, 800-53, etc…..  NONE of these address Exposure Introduction in a meaningful way within organizations  If Exposure is not managed outside of InfoSec, InfoSec costs will continue to go up while effectiveness will go down (due to rising complexity)  NONE of these addresses barriers to sustained implementation of their own advice  Organizations are exploited most often because of the gap between “Perceived” and “Actual” reality Being able to manage exposure introduction in a sustained manner within the constraints of the outside world requires concerted planning, work, coordination resources across your businesses, cultures, industries, nations, and the world… And we have few mechanisms in place to do so.
  • 44.  Expand  Clarify  Communicate  Maintain  Use  Market  Criticize  Trash it and Start Over if Needed – We still need one – Let’s just stop repeating ourselves Improve on This Problem Space Framework?
  • 45.  Think Beyond InfoSec – Broaden Scope Out As Far As You Can Go  Re-Consider your Metaphors and Models from the Ground Up – If Only as a Thought Exercise  Ask how to manage risk without InfoSec – Then build an error handler  Wonder at why we are where we are – And treat common practices as solving an insufficiently complete list of problems If nothing else…
  • 46. Thank you! Jack Whitsitt jack@energysec.org | http://twitter.com/sintixerr

Notes de l'éditeur

  1. Left to Escape Ebola Zombies Came back, turns out I made an effectively prioritized decision that had nothing to do with my perceived risk and executed a really well performed solution that improved my life, but not in a way I anticipated. Actually, no, I had goals, changed environmental factors, and suddenly my decision making capacity and effectiveness improved But out there, eventually you run out of things to say to yourself and you start challenging your fundamentals…and this is what this talk is really about; Do we really know what the forest looks like, or are we getting lost in the trees? How do we find a way out?
  2. Why is this? Why are we doing so poorly? What am I trying to get at with this talk….bad metaphors and targeted problem spaces
  3. When submission time came, for this, I hadnt spent a lot of time doing hard research, but sometimes that’s ok…because thinking about models can be a valuable precursor to getting data….especially in a new space like cybersecurity (and I use the word intentionally) here….and especially when you think that perhaps existing models are deeply off. Many times, though, we’re stuck in the grind, though, and cant really focus on deep, big picture, abstract thoughts. But this year, I did have that chance….to very literally think about the forest for the trees
  4. . A grab bag of solutions, not very related to each other, or maybe through bad metaphor, but we lose so many good ideas over time, turnover, repetition for lack of a common idea of what it is we’re solving for. Framework….