SlideShare une entreprise Scribd logo
1  sur  41
@ncooprider@threatstack
1
Eyes on the Ground:
Why You Need Security Agents
Nathan Cooprider
Software Team Lead
@ncooprider@threatstack
2
• often find yourself booting into safe mode?
• regularly look for programs in the taskbar to kill?
• look for reasons why your computer seems sluggish?
• wonder why you pay for that thing on your computer?
• get employee complaints about installed software?
• look for ways to meet compliance requirements?
• care about security?
Do you
AGENT FATIGUE
@ncooprider@threatstack
3
My day job: agent team lead
@ncooprider@threatstack
4
The path to agent acceptance!
Acceptance
Fatigue Cost Need
Choices Evaluation
@ncooprider@threatstack
5
Security fatigue
@ncooprider@threatstack
6
Normalization of deviance
Incremental and gradual erosion of normal procedures
@ncooprider@threatstack
Normalization of deviance
http://gunshowcomic.com/648
@ncooprider@threatstack
8
Agent fatigue
"The term agent fatigue is widely used to describe this
phenomenon on the desktop. Are viruses a problem? Here is
an antivirus solution. Is command and control
communication the problem? Here is a Host-based Intrusion
Detection System (HIDS). Need to keep track of all the
software and versions installed on a system? Here is a
compliance agent. The list of agents goes on and on. Each
agent serves a different purpose, communicates to a
different control server, and is managed by a different group
within the organization."
Building an Intelligence Led Security Program
by Allan Liska
@ncooprider@threatstack
9
Agent fatigue
@ncooprider@threatstack
10
Agent fatigue
“I was talking to a financial services executive and he
was asked ‘How does a startup approach you with
something?’ and he said ‘Let me just tell you one hint:
Don't sell me an end- If you need to put an agent on
an endpoint. It's done’”
Michael Figueroa
Advanced Cyber Security Center
Startup Security Weekly #31
@ncooprider@threatstack
11
The path to agent acceptance!
Acceptance
Fatigue Cost Need
Choices Evaluation
@ncooprider@threatstack
12
• Licensing
• Price per installation
• Compliance complications
• Workflow adaptation
• Introduced latency
• Full-on road blocks
• Management
• Additional attack surface
• Interfering with host behavior
Cost of running an agent
@ncooprider@threatstack
13
Cost of running an agent
Monthly
AWS
BILL
$10 $100 $1,000 $10,000 $100,000
1% $0.10 $1 $10 $100 $1,000
5% $0.50 $5 $50 $500 $5,000
10% $1 $10 $100 $1,000 $10,000
25% $2.50 $25 $250 $2,500 $25,000
• Resource utilization
• Personel
• CPU, network, memory, disk
@ncooprider@threatstack
14
Security maturity model
AUDIT
Baseline Your Environment and Meet Security Best Practices.
CONFIGURATION AUDITING • ALERTING • WORKFLOW INTEGRATIONS
MONITOR
Continuously Monitor & Alert to Detect Vulnerabilities, Intrusion, & Meet
Compliance Requirements.
VULNERABILITY ASSESSMENT • FILE INTEGRITY MONITORING • USER ACTIVITY
MONITORING
INVESTIGATE
Automatically Analyze Security Events to Determine Root
Cause.
USER SESSION PLAYBACK • DEEP PROCESS MONITORING • THREAT
INTELLIGENCE
PREVENT
Prevent Progression on the Cyber Kill Chain.
ISOLATE COMPROMISE • PREVENT LATERAL MOVEMENT
@ncooprider@threatstack
15
The path to agent acceptance!
Acceptance
Fatigue Cost Need
Choices Evaluation
@ncooprider@threatstack
16
• Necessary features not available any other way
• The network cannot give us the data
• The host can give us the data
• The hosts host our valuable assets
• Not all agents equal
• Past experience not
indication of future #fail
• Learn how to judge
• Find best fit
Need for an agent
@ncooprider@threatstack
17
• Increased SSL/TLS usage
• NIDS blind to 70-80% of the traffic post-Snowden
• Needs specialized Network Processor hardware
• Not an option in with cloud providers
• NSS Labs paper documents situation
https://www.nsslabs.com/linkservid/13C7BD87-5056-9046-93FB736663C0B07A/
• Vanished perimeter
• Maginot line - defense in depth
• Bring your own device and the like
• Cloud - don’t let provider be SPOF
NIDS not enough
@ncooprider@threatstack
18
Agent-only information
@ncooprider@threatstack
19
Protect the assets
https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/
@ncooprider@threatstack
20
The path to agent acceptance!
Acceptance
Fatigue Cost Need
Choices Evaluation
@ncooprider@threatstack
21
• Build vs buy
• Open-source vs proprietary
• Cloud, server, workstation, IoT
• Kernel vs user
• Visibility vs prevention
Agent choices
@ncooprider@threatstack
22
• Do you understand all
the issues that are
involved - all the
elements that go into
the TCO?
• Do you want to be a
security company or do
you want to be a
secure company?
Build vs buy
@ncooprider@threatstack
23
Open-source vs proprietary
Open-source Proprietary
Pros
• Free to try before you buy
• Free support
• Open standards
• Fewer bugs and faster fixes
• Better security
• Avoids vendor lock-in
• Usability
• Product stability
• Ownership
• Tailored support
Cons
• Reduced competitive advantage
• Minimal support leverage
• Usability
• Increased business risk
• Dependency
• Software opacity
http://www.optimusinfo.com/downloads/white-paper/open-source-vs-proprietary-software-pros-and-cons.pdf
@ncooprider@threatstack
24
• On the one hand:
they’re all computers
• On the other hand:
REALLY?
Cloud, server, workstation, IoT
@ncooprider@threatstack
25
Kernel vs user
@ncooprider@threatstack
26
Visibility vs prevention
@ncooprider@threatstack
27
The path to agent acceptance!
Acceptance
Fatigue Cost Need
Choices Evaluation
@ncooprider@threatstack
28
Criteria
• Cost
• Service
• Benchmarking
• Sensors
• Actuators
• Integration
Evaluating agents
@ncooprider@threatstack
29
• Total cost of ownership
• All the “ilities” - availability, scalability, reliability,
etc.
• Talent
• Care and feeding
• Use what you get
• Deploy the software
• Look at the results
• Tune performance
Price and cost
@ncooprider@threatstack
30
• Training
• Helpdesk
• Management
Service
@ncooprider@threatstack
31
• Easy to do wrong
• Environment specific
• Measure right thing
• CPU
• Memory
• Network
• Disk
• Weigh appropriately
Benchmarking
@ncooprider@threatstack
32
• Targets
• Processes
• Files
• Network
• Users
• Configuration
• Consider reliability
• Perspective
• Persistence
Sensors
@ncooprider@threatstack
33
• More than just logging
"Right now, logging in the cloud is an absolute complete
unmitigated train wreck, as far as finding out where your data
is"
John Strand
Enterprise Security Weekly #37
• Alerting
• Severity
• Context
• Modification
• Autonomous?
Actuators
@ncooprider@threatstack
34
Integration
@ncooprider@threatstack
35
The path to agent acceptance!
Acceptance
Fatigue Cost Need
Choices Evaluation
@ncooprider@threatstack
36
• Agent fatigue
• Real and valid
• Something we need to get over
• Agents provide critical value
• Vision on assets instead of around them
• Attackers want hosts, not your network
• Choose wisely
• Evaluate along all criteria:
Total cost, comfortable support, real benchmarks, useful
sensors, actions beyond logging, and integrations
Conclusion
@ncooprider@threatstack
37
Questions?
@ncooprider@threatstack
38
http://www.computerweekly.com/blog/David-Laceys-IT-Security-Blog/Countering-the-Threat-of-
Information-Security-Fatigue
http://www.washingtontimes.com/news/2014/aug/7/hayden-security-fatigue-on-the-rise-as-public-feel/
http://www.securitymagazine.com/articles/87014-dispelling-the-dangerous-myth-of-data-breach-fatigue
https://www.nist.gov/news-events/news/2016/10/security-fatigue-can-cause-computer-users-feel-
hopeless-and-act-recklessly
https://sma.nasa.gov/docs/default-source/safety-messages/safetymessage-normalizationofdeviance-
2014-11-03b.pdf
http://www.networkworld.com/article/2293335/infrastructure-management/fighting-back-against-software-
agent-overload.html
https://www.forescout.com/company/blog/death-taxes-endpoint-agents/
https://community.spiceworks.com/topic/1917877-poll-software-agents-take-them-or-leave-them
http://wiki.securityweekly.com/wiki/index.php/SSWEpisode3
https://www.elsevier.com/books/building-an-intelligence-led-security-program/liska/978-0-12-802145-3
https://www.nsslabs.com/linkservid/13C7BD87-5056-9046-93FB736663C0B07A/
https://blog.threatstack.com/calculating-tco-the-real-cost-of-cloud-security
Resources
@ncooprider@threatstack
39
Extra slides
@ncooprider@threatstack
40
Normalization of deviance
@ncooprider@threatstack
41
CAN I HELP YOU?

Contenu connexe

Tendances

OWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos EngineeringOWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos EngineeringAaron Rinehart
 
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are SecureSecurity & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are SecurePuppet
 
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014Amazon Web Services
 
RSA Conference APJ 2019 DevSecOps Days Security Chaos Engineering
RSA Conference APJ 2019 DevSecOps Days Security Chaos EngineeringRSA Conference APJ 2019 DevSecOps Days Security Chaos Engineering
RSA Conference APJ 2019 DevSecOps Days Security Chaos EngineeringAaron Rinehart
 
Pivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos EngineeringPivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos EngineeringAaron Rinehart
 
Craft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionCraft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionAaron Rinehart
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"Aaron Rinehart
 
AllDayDevOps 2020 Aaron Rinehart Security Differently
AllDayDevOps 2020 Aaron Rinehart Security DifferentlyAllDayDevOps 2020 Aaron Rinehart Security Differently
AllDayDevOps 2020 Aaron Rinehart Security DifferentlyAaron Rinehart
 
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)DJ Schleen
 
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world casesDevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world casesDevSecCon
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps OverviewAdrian Sanabria
 
Overcoming Security Challenges in DevOps
Overcoming Security Challenges in DevOpsOvercoming Security Challenges in DevOps
Overcoming Security Challenges in DevOpsAlert Logic
 
FUEL_USERS_GROUP
FUEL_USERS_GROUPFUEL_USERS_GROUP
FUEL_USERS_GROUPWill Pearce
 
GDS-Austin - DevSecOps & Security Chaos Engineering
GDS-Austin - DevSecOps & Security Chaos EngineeringGDS-Austin - DevSecOps & Security Chaos Engineering
GDS-Austin - DevSecOps & Security Chaos EngineeringAaron Rinehart
 
Chaos engineering for cloud native security
Chaos engineering for cloud native securityChaos engineering for cloud native security
Chaos engineering for cloud native securityKennedy
 
Increasing DevSecOps Maturity Level in 2021
Increasing DevSecOps Maturity Level in 2021Increasing DevSecOps Maturity Level in 2021
Increasing DevSecOps Maturity Level in 2021Alexandre Rebert
 
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon London 2017: when good containers go bad by Tim MackeyDevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon London 2017: when good containers go bad by Tim MackeyDevSecCon
 
Turning security into code by Jeff Williams
Turning security into code by Jeff WilliamsTurning security into code by Jeff Williams
Turning security into code by Jeff WilliamsDevSecCon
 

Tendances (20)

OWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos EngineeringOWASP AppSec Global 2019 Security & Chaos Engineering
OWASP AppSec Global 2019 Security & Chaos Engineering
 
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are SecureSecurity & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
 
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
(SEC312) Taking a DevOps Approach to Security | AWS re:Invent 2014
 
RSA Conference APJ 2019 DevSecOps Days Security Chaos Engineering
RSA Conference APJ 2019 DevSecOps Days Security Chaos EngineeringRSA Conference APJ 2019 DevSecOps Days Security Chaos Engineering
RSA Conference APJ 2019 DevSecOps Days Security Chaos Engineering
 
Pivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos EngineeringPivotal APJ Security Chaos Engineering
Pivotal APJ Security Chaos Engineering
 
Craft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionCraft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security Precognition
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
2016 virus bulletin
2016 virus bulletin2016 virus bulletin
2016 virus bulletin
 
AllDayDevOps 2020 Aaron Rinehart Security Differently
AllDayDevOps 2020 Aaron Rinehart Security DifferentlyAllDayDevOps 2020 Aaron Rinehart Security Differently
AllDayDevOps 2020 Aaron Rinehart Security Differently
 
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
Blameless Retrospectives in DevSecOps (at Global Healthcare Giants)
 
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world casesDevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps Overview
 
Overcoming Security Challenges in DevOps
Overcoming Security Challenges in DevOpsOvercoming Security Challenges in DevOps
Overcoming Security Challenges in DevOps
 
FUEL_USERS_GROUP
FUEL_USERS_GROUPFUEL_USERS_GROUP
FUEL_USERS_GROUP
 
GDS-Austin - DevSecOps & Security Chaos Engineering
GDS-Austin - DevSecOps & Security Chaos EngineeringGDS-Austin - DevSecOps & Security Chaos Engineering
GDS-Austin - DevSecOps & Security Chaos Engineering
 
Chaos engineering for cloud native security
Chaos engineering for cloud native securityChaos engineering for cloud native security
Chaos engineering for cloud native security
 
Increasing DevSecOps Maturity Level in 2021
Increasing DevSecOps Maturity Level in 2021Increasing DevSecOps Maturity Level in 2021
Increasing DevSecOps Maturity Level in 2021
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon London 2017: when good containers go bad by Tim MackeyDevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon London 2017: when good containers go bad by Tim Mackey
 
Turning security into code by Jeff Williams
Turning security into code by Jeff WilliamsTurning security into code by Jeff Williams
Turning security into code by Jeff Williams
 

Similaire à Eyes on the ground: why you need security agents

Threat modelling & apps testing
Threat modelling & apps testingThreat modelling & apps testing
Threat modelling & apps testingAdrian Munteanu
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesAtif Ghauri
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityAnne Oikarinen
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidSteve Branam
 
Application Security in an Agile World - Agile Singapore 2016
Application Security in an Agile World - Agile Singapore 2016Application Security in an Agile World - Agile Singapore 2016
Application Security in an Agile World - Agile Singapore 2016Stefan Streichsbier
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnSamuel Reed
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
How to Destroy a Database
How to Destroy a DatabaseHow to Destroy a Database
How to Destroy a DatabaseJohn Ashmead
 
Threat Modeling for Dummies - Cascadia PHP 2018
Threat Modeling for Dummies - Cascadia PHP 2018Threat Modeling for Dummies - Cascadia PHP 2018
Threat Modeling for Dummies - Cascadia PHP 2018Adam Englander
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKelly Robertson
 
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...Mike Spaulding
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm HereChristopher Grayson
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesBlack Duck by Synopsys
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsCprime
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesIvanti
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemRogue Wave Software
 
FireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slidesFireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slidesAmy Gerrie
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security TestingTEST Huddle
 

Similaire à Eyes on the ground: why you need security agents (20)

Threat modelling & apps testing
Threat modelling & apps testingThreat modelling & apps testing
Threat modelling & apps testing
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for Dummies
 
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja WarriorsRyan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking Stupid
 
Application Security in an Agile World - Agile Singapore 2016
Application Security in an Agile World - Agile Singapore 2016Application Security in an Agile World - Agile Singapore 2016
Application Security in an Agile World - Agile Singapore 2016
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
How to Destroy a Database
How to Destroy a DatabaseHow to Destroy a Database
How to Destroy a Database
 
Threat Modeling for Dummies - Cascadia PHP 2018
Threat Modeling for Dummies - Cascadia PHP 2018Threat Modeling for Dummies - Cascadia PHP 2018
Threat Modeling for Dummies - Cascadia PHP 2018
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
 
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best Practices
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
 
FireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slidesFireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slides
 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
 

Dernier

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Dernier (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Eyes on the ground: why you need security agents

Notes de l'éditeur

  1. I expect to have some time for questions at the end
  2. Do not worry! I’m here to help and we can work through this. First, a disclaimer:
  3. I am not an independent observer! I have a horse in this race, but I still think I will make some good points. After all, I use other people’s agents too! Now let’s talk about the path to acceptance!
  4. Let’s start by taking a step back and look at security fatigue in general
  5. Computer Weekly - 2007 - THAT’S SO OLD The Washington Times - 2014 - that’s better 2016 is even better. . . but I never trust anything on April 1st Oh, NIST from last fall. Seems legit.
  6. January 28, 1986 Challenger launch Leading up to that catastrophe Problem with putty used to seal the O-rings on the boosters Analysis to determine limits reinterpreted as within the bounds of acceptable risk Acceptance of that risk led to the explosion In other words
  7. So now let’s move from security fatigue in general to agent fatigue specifically
  8. 2007 - it’s gotten better since then, right? 2017 - NOPE More NOPE! Agent fatigue is alive and well (but you probably knew that)
  9. Here’s another anecdotal quote Moving along the path . . .
  10. Where does this fatigue come from? It comes from the cost of running an agent
  11. Not just talking about money here but let’s talk about the money
  12. Amazon makes it easy to visualize this Don’t over pay (with money or anything else) for agent features beyond your capability to utilize them
  13. What do I mean by that? Consider this An agent-based solution can help you progress in maturity
  14. There’s no getting around the cost of an agent, but there’s also no getting around the need for one either
  15. Lots of great stuff provided from Linux, Windows has similar. You have to be on the box to get it.
  16. Brian Krebs Individual workstation Bots, Bitcoin, credentials, ransomware, data
  17. There’s still lots of choices for agents
  18. Then there’s all the different types of agent-based solutions out there! None of these are “right” or “wrong” universally. It’s based on the situation!
  19. We all hire the best and the brightest
  20. I filled this out from a white paper. Does this actually make sense to anybody? My point is that lots of the conventions traditionally applied to this choice do not apply
  21. Would you really want the solution for your desktop on your router? Sometimes the answer is yes, but we should be cognizant of our actual needs and environment
  22. Living in user space, only limited amount of interference and damage can occur Kernel space gives great power, but also great responsibility Depends on environment
  23. All seeing eye, defense in depth. Not mutually exclusive, but tend to be different mindsets See and don’t touch vs get all up in your business
  24. How to navigate all these choices?
  25. How to decide? We’ll talk about a number of things. Let’s go over cost first.
  26. All the features and support beyond the actual agent solution Ask about it, evaluate it, if there are concerns then address them Get the right amount for you This can make a huge difference in successful deployment and utilization
  27. Now let’s talk about the actual agent Everybody will say it’s “lightweight.” Even me. They’re not lying, but that phrase is fairly meaningless. Figure out what matters to you and how to measure it. CPU utilization - contention, hiding in other systems or as other processes Memory usage - free memory, Virtual Memory = part in physical memory + part on disk, resident set size
  28. scanning vs monitoring methods for subverting or getting around
  29. What can we do with what the sensors see? Information passing Actions taken - blocking
  30. Real power comes from integration ChatOps, DevOps, SecOps, All of the Ops What do you already use and will it work with that?
  31. We’re here! Acceptance!
  32. There are times when accepting risk becomes like the proverbial frog in hot water Or, if you prefer
  33. Despite how you may feel about the service you receive, these are people on the other side and they want you to find success! Maybe it’s not a good match up, but try to find out before.