SlideShare une entreprise Scribd logo
1  sur  38
Peak Prevention
Daniel Miessler
Director of Advisory Services, IOActive
AppSec Cali
January 24, 2017
Moving from prevention to resilience
Intro
Daniel Miessler (@danielmiessler)
18 years in infosec: mostly as a tester (net/web/app/iot)
Run the consulting practice for IOActive
Read / write / podcast / table tennis
Flow
Peaks and valleys
Risky bits
Impact reduction
Preparing for what’s coming
Peak Oil
Peak $THING
We used to have a lot of room to grow.
That growth has stopped.
We now have as much as we’ll ever have.
We need to find another source of what it was providing.
Peak $THING (oil)
We used to have a lot of room to grow. (finding more oil, producing it faster)
That growth has stopped. (we found most of the oil)
We now have as much as we’ll ever have. (it’s all downhill from here)
We need to find another source of what it was providing. (energy)
IMPACTPROBABILITY
= Prevention
Focused
Peak $THING (prevention)
We used to have a lot of room to grow. (add firewalls, AV)
That growth has stopped. (it can all be bypassed)
We now have as much as we’ll ever have. (kind of)
We need to find another source of what it was providing. (risk reduction)
Probability Impact
RISK
90
9
10
Probability Impact
RISK
64
8 8
Probability Impact
RISK
0
9
0
Acceptable
50Risk
Target
Desired
Prevention(chanceofsuccess)
Resilience (damage taken)
1
7
6
3
5
4
2
9
8
10
10 9 8 7 6 5 4 3 2 1
Acceptable
42
1
Probability Impact
RISK
505
10
Limit
Prevention(chanceofsuccess)
Resilience (damage taken)
1
7
6
3
5
4
2
9
8
10
10 9 8 7 6 5 4 3 2 1
Acceptable
Peak
5?
7?
30
42
1
Prevention(chanceofsuccess)
Resilience (damage taken)
1
7
6
3
5
4
2
9
8
10
10 9 8 7 6 5 4 3 2 1
Acceptable
Peak?
7
Impact can’t go above 6.
Probability Impact
RISK
70
7
10
Prevention(chanceofsuccess)
Resilience (damage taken)
1
7
6
3
5
4
2
9
8
10
10 9 8 7 6 5 4 3 2 1
Acceptable
Peak?
7
We need to be here…
Prevention(chanceofsuccess)
Resilience (damage taken)
1
7
6
3
5
4
2
9
8
10
10 9 8 7 6 5 4 3 2 1
Acceptable
We need to be here…We are here.
Need to go that way
Prevention(chanceofsuccess)
Resilience (damage taken)
1
7
6
3
5
4
2
9
8
10
10 9 8 7 6 5 4 3 2 1
Acceptable
We need to be here…We are here.
Need to go that way
1 Make your data unusable when it’s stolen?
2 Insure yourself against loss for when incidents do
occur?
3 Change the narrative so people don’t care as much.
(already happening naturally)
4 Have super clean backup and restore procedures.
(ransomware)
5 Have redundant sites for when yours is taken down.
6 less valuable to
attackers.
files
salaries
Make what you have records
PII
secrets
Prepare Yourself
Limits of Prevention
‣ InfoSec breaches
‣ Bad work days
‣ Toxic relationships
‣ Contagious diseases
‣ Terrorism
‣ Safety accidents
‣ Impact N
‣ Impact N+1
Look for Impact Reduction Everywhere
PREVENTION —> RESILIENCE
2017, 2018, 2019…
Thank You
Twitter: @danielmiessler
Email: daniel.miessler@ioactive.com
Github: https://github.com/danielmiessler
Podcast: https://danielmiessler.com/podcast/
OWASP Game Security Framework:
https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project
Resources
✴ OCTAVE: Cyber Risk and Resilience Management
http://www.cert.org/resilience/products-services/octave/
✴ US-CERT Cyber Risk Review (CRR)
https://www.us-cert.gov/ccubedvp/assessments
✴ US-CERT Cyber Resilience Management Model
http://www.cert.org/resilience/products-services/cert-rmm/

Contenu connexe

En vedette

Security as Code
Security as CodeSecurity as Code
Security as Code
Ed Bellis
 
Стратегический диалог
Стратегический диалогСтратегический диалог
Стратегический диалог
Cyril Savitsky
 

En vedette (16)

NMenar, MSc visual curriculum vitae
NMenar, MSc visual curriculum vitaeNMenar, MSc visual curriculum vitae
NMenar, MSc visual curriculum vitae
 
六ヶ所再処理工場と核拡散
六ヶ所再処理工場と核拡散六ヶ所再処理工場と核拡散
六ヶ所再処理工場と核拡散
 
Tecnologia educativa
Tecnologia educativaTecnologia educativa
Tecnologia educativa
 
Security as Code
Security as CodeSecurity as Code
Security as Code
 
Стратегический диалог
Стратегический диалогСтратегический диалог
Стратегический диалог
 
CLUSIR INFONORD OWASP iot 2014
CLUSIR INFONORD OWASP iot 2014CLUSIR INFONORD OWASP iot 2014
CLUSIR INFONORD OWASP iot 2014
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter
 
SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015SecLists @ BlackHat Arsenal 2015
SecLists @ BlackHat Arsenal 2015
 
The Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change EverythingThe Real Internet of Things: How Universal Daemonization Will Change Everything
The Real Internet of Things: How Universal Daemonization Will Change Everything
 
Unleash the Potential of Big Data on Salesforce
Unleash the Potential of Big Data on SalesforceUnleash the Potential of Big Data on Salesforce
Unleash the Potential of Big Data on Salesforce
 
Flash, 6to b
Flash, 6to bFlash, 6to b
Flash, 6to b
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
 
Break through2
Break through2Break through2
Break through2
 
Palestra: O case Braskem - José Carlos Grubishch
Palestra: O case Braskem - José Carlos GrubishchPalestra: O case Braskem - José Carlos Grubishch
Palestra: O case Braskem - José Carlos Grubishch
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]Adaptive Testing Methodology [ ATM ]
Adaptive Testing Methodology [ ATM ]
 

Plus de Daniel Miessler (6)

The OWASP Game Security Framework
The OWASP Game Security FrameworkThe OWASP Game Security Framework
The OWASP Game Security Framework
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
The IoT Attack Surface
The IoT Attack SurfaceThe IoT Attack Surface
The IoT Attack Surface
 
The Game Security Framework
The Game Security FrameworkThe Game Security Framework
The Game Security Framework
 
Implementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap TechniquesImplementing Inexpensive Honeytrap Techniques
Implementing Inexpensive Honeytrap Techniques
 
Securing Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing MethodologiesSecuring Medical Devices Using Adaptive Testing Methodologies
Securing Medical Devices Using Adaptive Testing Methodologies
 

Dernier

Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 

Dernier (20)

Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 

Peak Prevention: Moving from Prevention to Resilience

Notes de l'éditeur

  1. This is not about a tool. It’s not about a service. It’s about an idea. You should be able to apply this whether you’re in senior management, doing technical defense, and whether you’re a vendor or an internal resource.
  2. Who knows what peak oil is?
  3. You can abstract PEAK to anything.
  4. … So energy was the thing we wanted, oil was giving it to us, and now we need another source.
  5. So with infosec we have an equation for RISK, which is probability x impact. We’ve been getting our energy from oil, so where have we been getting our risk reduction?
  6. WE STOP THIS, WE PREVENT THIS How many booths have you seen where the focus was making it ok if you got hacked?
  7. So if we plug prevention in here we get something like this.
  8. So if we take a look at how the risk equation plays out, we can see something like this. It’s multiplication.
  9. So you change the ratings for probability and impact, and the risk score changes.
  10. Anything times zero is 0.
  11. So let’s say our acceptable risk is 40-60—say 50.
  12. So here’s where we’re tying to get.
  13. Well here’s the problem. Our impact is jacked up. And we are reaching our limit for prevention. So we can spend millions more on more prevention technologies, and still not get much reduction in probability.
  14. If we peak at 7 for prevention, we get locked in for impact. One more thing about the prevention peak. Are we REALLY peaked at 5? Who thinks we’re doing the best we can in prevention? Great. And who things it’s going to get better in the next 1-5 years?
  15. So if we’re locked in at 7 for prevention, impact can’t go above 6.
  16. But we’re not at 6. We’re at a 10. Or a 9. Everything bad that happens is catastrophic, because RSA (and the entire narrative) is bent around prevention.
  17. So if we want to move into the green box, and we’re spent on prevention, we need to get into THIS area for impact.
  18. But the problem is that we’re here. This is the problem. We’re way too focused on prevention.
  19. And this applies to SO MANY THINGS. Terrorism. 9/11 cost the country over 5 trillion dollars and hundreds of thousands of lives. Think about the damage that 10 people can do to the country with basic pipe bombs. How do you prevent 10 people with pipe bombs? You don’t. How do you prevent skilled attackers from getting into most networks? You don’t.
  20. Great. So what do we do? We need to find ways to reduce impact when bad things do happen.
  21. I’m not going to name tools because that’s not what this is about. There are solutions starting to come out now.
  22. Longer term.
  23. I take the takeaways seriously.
  24. We have more control over the impact side of the equation than the probability side. We need to use it.
  25. Look for impact reduction in all your threat scenarios.
  26. Expect to see this shift.
  27. Finally, think about what this shift is going to do to decision making in the C-Suite. What happens when CEOs and CISOs start asking questions?
  28. That’s what I wanted to share today. Hopefully I’ve given you something to think about. Thanks for having me.