SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
November 15, 2016
What’s My Security Policy Doing to My Help Desk?
Chris Swan (@cpswan), CTO Global Infrastructure Services, CSC
2 November 15, 2016© 2016 Computer Sciences Corporation
Chris Swan – why me?
Combat Systems Engineer - Royal Navy
Security R&D – Credit Suisse
CTO Security - UBS
CTO – Cohesive Networks
CTO, Global Infrastructure
Services - CSC
@cpswan
3 November 15, 2016© 2016 Computer Sciences Corporation
Agenda
• Operational Data Mining and the 3rd DevOps Way
• The #1 issue
• A parable about 802.1X
• Finding a better way
© 2016 Computer Sciences Corporation
Setting the scene:
The 3 DevOps Ways and
Operational Data Mining
5 November 15, 2016© 2016 Computer Sciences Corporation
The 3 ways
1.Flow
2.Feedback
3.Continual Learning
& Experimentation
6 November 15, 2016© 2016 Computer Sciences Corporation
Operational Data Mining (ODM) takes ‘data exhaust’ from service
management and ancillary systems
‘Exhausting’ by Ben Salter https://flic.kr/p/8VTaMe
7 November 15, 2016© 2016 Computer Sciences Corporation
Operational Data Mining focusses on the 3rd Way
1.Flow
2.Feedback
3.Continual Learning
& Experimentation
8 November 15, 2016© 2016 Computer Sciences Corporation
Data helps us find the constraints, then tells us what to do with them
‘Narrow’ by gwire https://flic.kr/p/4d3N4
9 November 15, 2016© 2016 Computer Sciences Corporation
Constraint unblocking helps provide better flow and feedback
1.Flow
2.Feedback
3.Continual Learning
& Experimentation
10 November 15, 2016© 2016 Computer Sciences Corporation
Data provides a means of empowerment to front line staff
“I knew that,
I knew that we needed to do that”
© 2016 Computer Sciences Corporation
So let’s start with the #1 issue
12 November 15, 2016© 2016 Computer Sciences Corporation
#1 - Password reset related issues
Account Login
Tickets
31%
Escalated to
Other Queues
No Resolving
Action
Required1
Other,
Completed by
Service Desk
Service Desk Incident Tickets
August 2014 – August 2015
n = 67k tickets
AD Accounts
34%
Rater Portal
Accounts
Mainframe
Accounts
Other
Accounts
Account Reset Tickets
August 2014 – August 2015
n = 21k tickets
1. There are primarily calls chasing other previously opened tickets
For incidents were the Service Desk
is the resolver of the incident,
account issues represent the vast
majority of these tickets
The Service Desk typically spends 5-
10 min of effort on each of these
reset tickets, although occasionally
tickets are re-opened again later if the
user calls back a 2nd or 3rd time.
13 November 15, 2016© 2016 Computer Sciences Corporation
AD account lockout issues:
Multiple incidents in the past year by user
14 November 15, 2016© 2016 Computer Sciences Corporation
AD account lockout issues:
3+ incidents in the past year
15 November 15, 2016© 2016 Computer Sciences Corporation
Service desk volume for AD account locking tickets:
Users with the same problem 3+ times in last year
16 November 15, 2016© 2016 Computer Sciences Corporation
A deeper analysis reveals that users often experience these repeat issues
in quick succession
• Of those users that have the same issue multiple
times, these multiple occurrences often occur in quick
succession
• This, along with additional observations in the ticket
notes, indicates that the help desk is often not
resolving the underlying issue behind the incident
which thus subsequently generates more incidents
• Users are often connected to different support
personnel on each call, thus the Service Desk often
does not notice that they are just constantly unlocking
accounts for the same users and thus not actually
fixing the root cause of the issue
© 2016 Computer Sciences Corporation
A parable about WiFi authentication:
Why 802.1X for BYOD can be a really bad
idea
18 November 15, 2016© 2016 Computer Sciences Corporation
It all seems so simple
19 November 15, 2016© 2016 Computer Sciences Corporation
When ‘one password’ lets you down
I
have
the
old
password
Password
reset
© 2016 Computer Sciences Corporation
Finding a better way
21 November 15, 2016© 2016 Computer Sciences Corporation
First it was CESG in the UK
Source: http://www.theregister.co.uk/2016/05/05/stop_resetting_your_password_says_uk_spy_network/
22 November 15, 2016© 2016 Computer Sciences Corporation
Then NIST in the US
Source: https://nakedsecurity.sophos.com/2016/08/18/nists-new-password-rules-what-you-need-to-know/
23 November 15, 2016© 2016 Computer Sciences Corporation
This isn’t a withdrawal from password security
24 November 15, 2016© 2016 Computer Sciences Corporation
My colleagues produced a white paper on this topic
Source: http://assets1.csc.com/cybersecurity/downloads/THE_PROBLEM_WITH_P4__W0RDS_.pdf
25 November 15, 2016© 2016 Computer Sciences Corporation
Let’s not pretend that this is an easy fix
26 November 15, 2016© 2016 Computer Sciences Corporation
When systems and culture collide
© 2016 Computer Sciences Corporation
Wrapping up
28 November 15, 2016© 2016 Computer Sciences Corporation
Summary
• Operational Data Mining and the 3rd DevOps Way
• The #1 issue
• A parable about 802.1X
• Finding a better way
© 2016 Computer Sciences Corporation
Thanks to the sponsors and supporters
November 15, 2016
November 15, 2016
© 2016 Computer Sciences Corporation
Time for questions?
November 15, 2016

Contenu connexe

En vedette

Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckSoftware Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Black Duck by Synopsys
 
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are SecureSecurity & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Puppet
 

En vedette (19)

Meta Infrastructure as Code: How Capital One Automated Our Automation Tools w...
Meta Infrastructure as Code: How Capital One Automated Our Automation Tools w...Meta Infrastructure as Code: How Capital One Automated Our Automation Tools w...
Meta Infrastructure as Code: How Capital One Automated Our Automation Tools w...
 
Security and dev ops for high velocity organizations
Security and dev ops for high velocity organizationsSecurity and dev ops for high velocity organizations
Security and dev ops for high velocity organizations
 
Security, Identity, and DevOps, oh my - Print
Security, Identity, and DevOps, oh my - PrintSecurity, Identity, and DevOps, oh my - Print
Security, Identity, and DevOps, oh my - Print
 
DevOps and IT security
DevOps and IT securityDevOps and IT security
DevOps and IT security
 
Prepare to defend thyself with Blue/Green
Prepare to defend thyself with Blue/GreenPrepare to defend thyself with Blue/Green
Prepare to defend thyself with Blue/Green
 
DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)DevOps in a Regulated and Embedded Environment (AgileDC)
DevOps in a Regulated and Embedded Environment (AgileDC)
 
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckSoftware Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
 
Release Engineering & Rugged DevOps: An Intersection - J. Paul Reed
Release Engineering & Rugged DevOps: An Intersection - J. Paul ReedRelease Engineering & Rugged DevOps: An Intersection - J. Paul Reed
Release Engineering & Rugged DevOps: An Intersection - J. Paul Reed
 
Automated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSAutomated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSS
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
 
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
Scaling Rugged DevOps to Thousands of Applications - Panel DiscussionScaling Rugged DevOps to Thousands of Applications - Panel Discussion
Scaling Rugged DevOps to Thousands of Applications - Panel Discussion
 
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are SecureSecurity & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
Security & DevOps- Ways To Make Sure Your Apps & Infrastructure Are Secure
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devops
 
Making Security Agile - Oleg Gryb
Making Security Agile - Oleg GrybMaking Security Agile - Oleg Gryb
Making Security Agile - Oleg Gryb
 
Static Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin CollinsStatic Analysis For Security and DevOps Happiness w/ Justin Collins
Static Analysis For Security and DevOps Happiness w/ Justin Collins
 
DevOps and Application Security
DevOps and Application SecurityDevOps and Application Security
DevOps and Application Security
 
Building Security In - A Tale of Two Stories - Laksh Raghavan
Building Security In - A Tale of Two Stories - Laksh RaghavanBuilding Security In - A Tale of Two Stories - Laksh Raghavan
Building Security In - A Tale of Two Stories - Laksh Raghavan
 
Security and DevOps - Managing Security in a DevOps Enterprise
Security and DevOps - Managing Security in a DevOps EnterpriseSecurity and DevOps - Managing Security in a DevOps Enterprise
Security and DevOps - Managing Security in a DevOps Enterprise
 
Security DevOps: Wie Sie in agilen Projekten trotzdem sicher bleiben // JAX 2015
Security DevOps: Wie Sie in agilen Projekten trotzdem sicher bleiben // JAX 2015Security DevOps: Wie Sie in agilen Projekten trotzdem sicher bleiben // JAX 2015
Security DevOps: Wie Sie in agilen Projekten trotzdem sicher bleiben // JAX 2015
 

Similaire à What's My Security Policy Doing to My Help Desk w/ Chris Swan

InfoComm Charging Station Usage Study Secure Mag Swipe, Pin Code, QR Code
InfoComm Charging Station Usage Study Secure Mag Swipe, Pin Code, QR CodeInfoComm Charging Station Usage Study Secure Mag Swipe, Pin Code, QR Code
InfoComm Charging Station Usage Study Secure Mag Swipe, Pin Code, QR Code
Joel Martin
 
Understanding Business APIs through statistics
Understanding Business APIs through statisticsUnderstanding Business APIs through statistics
Understanding Business APIs through statistics
WSO2
 
Need for Systems Analysis & Design-19Jul2016
Need for Systems Analysis & Design-19Jul2016Need for Systems Analysis & Design-19Jul2016
Need for Systems Analysis & Design-19Jul2016
Conrad Sebego
 
Online Student Record (1)
Online Student Record (1)Online Student Record (1)
Online Student Record (1)
Nayeem Hasan
 

Similaire à What's My Security Policy Doing to My Help Desk w/ Chris Swan (20)

Operational Analytics at Credit Suisse from ThousandEyes Connect
Operational Analytics at Credit Suisse from ThousandEyes ConnectOperational Analytics at Credit Suisse from ThousandEyes Connect
Operational Analytics at Credit Suisse from ThousandEyes Connect
 
Observability at Spotify
Observability at SpotifyObservability at Spotify
Observability at Spotify
 
InfoComm Charging Station Usage Study Secure Mag Swipe, Pin Code, QR Code
InfoComm Charging Station Usage Study Secure Mag Swipe, Pin Code, QR CodeInfoComm Charging Station Usage Study Secure Mag Swipe, Pin Code, QR Code
InfoComm Charging Station Usage Study Secure Mag Swipe, Pin Code, QR Code
 
The art of implementing data lineage
The art of implementing data lineageThe art of implementing data lineage
The art of implementing data lineage
 
Managing Large Scale Financial Time-Series Data with Graphs
Managing Large Scale Financial Time-Series Data with Graphs Managing Large Scale Financial Time-Series Data with Graphs
Managing Large Scale Financial Time-Series Data with Graphs
 
Autonomous webinar final deck
Autonomous webinar final deckAutonomous webinar final deck
Autonomous webinar final deck
 
The present and future of serverless observability
The present and future of serverless observabilityThe present and future of serverless observability
The present and future of serverless observability
 
How do I do DevOps when all I have is Ops?
How do I do DevOps when all I have is Ops?How do I do DevOps when all I have is Ops?
How do I do DevOps when all I have is Ops?
 
Understanding Business APIs through statistics
Understanding Business APIs through statisticsUnderstanding Business APIs through statistics
Understanding Business APIs through statistics
 
Need for Systems Analysis & Design-19Jul2016
Need for Systems Analysis & Design-19Jul2016Need for Systems Analysis & Design-19Jul2016
Need for Systems Analysis & Design-19Jul2016
 
Online Student Record (1)
Online Student Record (1)Online Student Record (1)
Online Student Record (1)
 
Thavron: Service Costing for the Board Room to Finance
Thavron: Service Costing for the Board Room to FinanceThavron: Service Costing for the Board Room to Finance
Thavron: Service Costing for the Board Room to Finance
 
How to Apply Machine Learning with R, H20, Apache Spark MLlib or PMML to Real...
How to Apply Machine Learning with R, H20, Apache Spark MLlib or PMML to Real...How to Apply Machine Learning with R, H20, Apache Spark MLlib or PMML to Real...
How to Apply Machine Learning with R, H20, Apache Spark MLlib or PMML to Real...
 
Delivering Services Powered by Operational Data - Connected Services
Delivering Services Powered by Operational Data -  Connected ServicesDelivering Services Powered by Operational Data -  Connected Services
Delivering Services Powered by Operational Data - Connected Services
 
De Impactvolle Data Analist
De Impactvolle Data AnalistDe Impactvolle Data Analist
De Impactvolle Data Analist
 
Streetlife's real time analytics stack
Streetlife's real time analytics stackStreetlife's real time analytics stack
Streetlife's real time analytics stack
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
 
AppDynamics and ME Bank: Use Cases for a Modern Digital Bank - AppSphere16
AppDynamics and ME Bank: Use Cases for a Modern Digital Bank - AppSphere16AppDynamics and ME Bank: Use Cases for a Modern Digital Bank - AppSphere16
AppDynamics and ME Bank: Use Cases for a Modern Digital Bank - AppSphere16
 
Data Science Perspective, Manish Kurse, 2016
Data Science Perspective, Manish Kurse, 2016Data Science Perspective, Manish Kurse, 2016
Data Science Perspective, Manish Kurse, 2016
 
PCMA Usage Studies 2015 - 2017
PCMA Usage Studies 2015 - 2017PCMA Usage Studies 2015 - 2017
PCMA Usage Studies 2015 - 2017
 

Plus de Sonatype

The Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason HandThe Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
Sonatype
 

Plus de Sonatype (20)

DevOps Days Columbus - Derek Weeks - 2019
DevOps Days Columbus - Derek Weeks - 2019DevOps Days Columbus - Derek Weeks - 2019
DevOps Days Columbus - Derek Weeks - 2019
 
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
 
RSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all EquifaxRSAC DevSecOpsDays 2018 - We are all Equifax
RSAC DevSecOpsDays 2018 - We are all Equifax
 
DevSecOps reference architectures 2018
DevSecOps reference architectures 2018DevSecOps reference architectures 2018
DevSecOps reference architectures 2018
 
30+ Nexus Integrations to Accelerate DevOps
30+ Nexus Integrations to Accelerate DevOps30+ Nexus Integrations to Accelerate DevOps
30+ Nexus Integrations to Accelerate DevOps
 
2017 DevSecOps Survey
2017 DevSecOps Survey2017 DevSecOps Survey
2017 DevSecOps Survey
 
Starting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the EnterpriseStarting and Scaling DevOps In the Enterprise
Starting and Scaling DevOps In the Enterprise
 
DevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & MicroservicesDevOps Friendly Doc Publishing for APIs & Microservices
DevOps Friendly Doc Publishing for APIs & Microservices
 
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason HandThe Unrealized Role of Monitoring & Alerting w/ Jason Hand
The Unrealized Role of Monitoring & Alerting w/ Jason Hand
 
DevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen BealDevOps and All the Continuouses w/ Helen Beal
DevOps and All the Continuouses w/ Helen Beal
 
Serverless and the Way Forward
Serverless and the Way ForwardServerless and the Way Forward
Serverless and the Way Forward
 
A Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward RuizA Small Association's Journey to DevOps w/ Edward Ruiz
A Small Association's Journey to DevOps w/ Edward Ruiz
 
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-orsCharacterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
Characterizing and Contrasting Kuhn-tey-ner Awr-kuh-streyt-ors
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using Ansible
 
There is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless ArchitectureThere is No Server: Immutable Infrastructure and Serverless Architecture
There is No Server: Immutable Infrastructure and Serverless Architecture
 
Getting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with JenkinsGetting out of the Job Jungle with Jenkins
Getting out of the Job Jungle with Jenkins
 
Modern Infrastructure Automation
Modern Infrastructure AutomationModern Infrastructure Automation
Modern Infrastructure Automation
 
Continuous Everyone: Engaging People Across the Continuous Pipeline
Continuous Everyone: Engaging People Across the Continuous PipelineContinuous Everyone: Engaging People Across the Continuous Pipeline
Continuous Everyone: Engaging People Across the Continuous Pipeline
 
The Road to Continuous Deployment
The Road to Continuous Deployment The Road to Continuous Deployment
The Road to Continuous Deployment
 
Docker Inside/Out: The 'Real' Real- World World of Stacking Containers in pro...
Docker Inside/Out: The 'Real' Real- World World of Stacking Containers in pro...Docker Inside/Out: The 'Real' Real- World World of Stacking Containers in pro...
Docker Inside/Out: The 'Real' Real- World World of Stacking Containers in pro...
 

Dernier

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Dernier (20)

VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 

What's My Security Policy Doing to My Help Desk w/ Chris Swan

  • 1. November 15, 2016 What’s My Security Policy Doing to My Help Desk? Chris Swan (@cpswan), CTO Global Infrastructure Services, CSC
  • 2. 2 November 15, 2016© 2016 Computer Sciences Corporation Chris Swan – why me? Combat Systems Engineer - Royal Navy Security R&D – Credit Suisse CTO Security - UBS CTO – Cohesive Networks CTO, Global Infrastructure Services - CSC @cpswan
  • 3. 3 November 15, 2016© 2016 Computer Sciences Corporation Agenda • Operational Data Mining and the 3rd DevOps Way • The #1 issue • A parable about 802.1X • Finding a better way
  • 4. © 2016 Computer Sciences Corporation Setting the scene: The 3 DevOps Ways and Operational Data Mining
  • 5. 5 November 15, 2016© 2016 Computer Sciences Corporation The 3 ways 1.Flow 2.Feedback 3.Continual Learning & Experimentation
  • 6. 6 November 15, 2016© 2016 Computer Sciences Corporation Operational Data Mining (ODM) takes ‘data exhaust’ from service management and ancillary systems ‘Exhausting’ by Ben Salter https://flic.kr/p/8VTaMe
  • 7. 7 November 15, 2016© 2016 Computer Sciences Corporation Operational Data Mining focusses on the 3rd Way 1.Flow 2.Feedback 3.Continual Learning & Experimentation
  • 8. 8 November 15, 2016© 2016 Computer Sciences Corporation Data helps us find the constraints, then tells us what to do with them ‘Narrow’ by gwire https://flic.kr/p/4d3N4
  • 9. 9 November 15, 2016© 2016 Computer Sciences Corporation Constraint unblocking helps provide better flow and feedback 1.Flow 2.Feedback 3.Continual Learning & Experimentation
  • 10. 10 November 15, 2016© 2016 Computer Sciences Corporation Data provides a means of empowerment to front line staff “I knew that, I knew that we needed to do that”
  • 11. © 2016 Computer Sciences Corporation So let’s start with the #1 issue
  • 12. 12 November 15, 2016© 2016 Computer Sciences Corporation #1 - Password reset related issues Account Login Tickets 31% Escalated to Other Queues No Resolving Action Required1 Other, Completed by Service Desk Service Desk Incident Tickets August 2014 – August 2015 n = 67k tickets AD Accounts 34% Rater Portal Accounts Mainframe Accounts Other Accounts Account Reset Tickets August 2014 – August 2015 n = 21k tickets 1. There are primarily calls chasing other previously opened tickets For incidents were the Service Desk is the resolver of the incident, account issues represent the vast majority of these tickets The Service Desk typically spends 5- 10 min of effort on each of these reset tickets, although occasionally tickets are re-opened again later if the user calls back a 2nd or 3rd time.
  • 13. 13 November 15, 2016© 2016 Computer Sciences Corporation AD account lockout issues: Multiple incidents in the past year by user
  • 14. 14 November 15, 2016© 2016 Computer Sciences Corporation AD account lockout issues: 3+ incidents in the past year
  • 15. 15 November 15, 2016© 2016 Computer Sciences Corporation Service desk volume for AD account locking tickets: Users with the same problem 3+ times in last year
  • 16. 16 November 15, 2016© 2016 Computer Sciences Corporation A deeper analysis reveals that users often experience these repeat issues in quick succession • Of those users that have the same issue multiple times, these multiple occurrences often occur in quick succession • This, along with additional observations in the ticket notes, indicates that the help desk is often not resolving the underlying issue behind the incident which thus subsequently generates more incidents • Users are often connected to different support personnel on each call, thus the Service Desk often does not notice that they are just constantly unlocking accounts for the same users and thus not actually fixing the root cause of the issue
  • 17. © 2016 Computer Sciences Corporation A parable about WiFi authentication: Why 802.1X for BYOD can be a really bad idea
  • 18. 18 November 15, 2016© 2016 Computer Sciences Corporation It all seems so simple
  • 19. 19 November 15, 2016© 2016 Computer Sciences Corporation When ‘one password’ lets you down I have the old password Password reset
  • 20. © 2016 Computer Sciences Corporation Finding a better way
  • 21. 21 November 15, 2016© 2016 Computer Sciences Corporation First it was CESG in the UK Source: http://www.theregister.co.uk/2016/05/05/stop_resetting_your_password_says_uk_spy_network/
  • 22. 22 November 15, 2016© 2016 Computer Sciences Corporation Then NIST in the US Source: https://nakedsecurity.sophos.com/2016/08/18/nists-new-password-rules-what-you-need-to-know/
  • 23. 23 November 15, 2016© 2016 Computer Sciences Corporation This isn’t a withdrawal from password security
  • 24. 24 November 15, 2016© 2016 Computer Sciences Corporation My colleagues produced a white paper on this topic Source: http://assets1.csc.com/cybersecurity/downloads/THE_PROBLEM_WITH_P4__W0RDS_.pdf
  • 25. 25 November 15, 2016© 2016 Computer Sciences Corporation Let’s not pretend that this is an easy fix
  • 26. 26 November 15, 2016© 2016 Computer Sciences Corporation When systems and culture collide
  • 27. © 2016 Computer Sciences Corporation Wrapping up
  • 28. 28 November 15, 2016© 2016 Computer Sciences Corporation Summary • Operational Data Mining and the 3rd DevOps Way • The #1 issue • A parable about 802.1X • Finding a better way
  • 29. © 2016 Computer Sciences Corporation Thanks to the sponsors and supporters
  • 32. © 2016 Computer Sciences Corporation Time for questions?