+ All Categories
Home > Documents > Jeff Williams 2015. Intro Awesome Times Security Briefing Service with Security.

Jeff Williams 2015. Intro Awesome Times Security Briefing Service with Security.

Date post: 19-Dec-2015
Category:
Upload: percival-houston
View: 215 times
Download: 1 times
Share this document with a friend
Popular Tags:
25
SAC HDI – BIG EVENT “NOT ANOTHER BLEAK SECURITY TALK…” Jeff Williams 2015
Transcript
Page 1: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

SAC HDI – BIG EVENT“NOT ANOTHER BLEAK SECURITY TALK…”Jeff Williams

2015

Page 2: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

AGENDA

IntroAwesome Times Security BriefingService with Security

Page 3: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

INTRO Deloitte & Touché consultant during Y2K Santa Clara County Office of Education

Supported Payroll, financial and human resource systems in 44 district, in two counties

California State University 9 year in Information Security and resent appoint to Director of Customer

Service

Security experience from briefings (e.g. state, Infragard, Verizon), trainings (e.g. CISA, CISSP and Incident Handler), books (e.g. ) and most important from experience

Philosophy & MBA All views, misquotes and materials out of context are the solely my fault; I’m here to paint you a picture and encourage you to grow

Page 4: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

AWESOME TIMES

Meet the business goal

with Changing Technology

that is FragileThree stories

Big DataTed Talks on Machine Learning

Geekonomics

Page 5: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

BIG DATEEven Data Changes

3rd Millennium BC 12th-16th century 14th century

Page 6: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

BIG DATAWe solve our problems with the tools availableRigid exactitude CorrelationWhat, not why

Page 7: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

TED.COM“The wonderful and terrifying implication of computers that can learn”

Jeremy Howard

Page 8: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

AND THE WINNER IS…

Page 9: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

THE LINCOLN FALLACY (MY TITLE)

Psst, share the diagnoses story

Page 10: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.
Page 11: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.
Page 12: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

GEEKONOMICSPortland CementNo Virtual Crash Test Dummies

Page 13: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

SO IF WE ARE ALL ON THE SAME PAGE…Meet the business goal

WITHChanging Technology

THATIs Fragile

Page 14: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

SECURITY BRIEFING Infragard BriefingsVerizon Report and BriefingsDell SecureWorks BriefingsMicrosoft BriefingsSANS.org training and Briefings

Page 15: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

SECURITY BRIEFING

Page 16: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.
Page 17: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

THREAT – (NOT IN THE REPORT) Pre-2008 – The lone wolfs…wolves are pack animals

2008 - roll up high profile Hackers 2009 - China hires Russian Hackers

steals cyber attack IP

2010 - Move to single high value target - multi-verification 2011 – Russian Hackers become patriots 2012 - Iran (mother of all cyber attacks, DDoS US banks)

Iran provided $$$ to hackers to DDoS; ineffective but lots of $$$

2014 – Disruption: data theft; Anonymous, protest to disrupted and embarrass; - Recon in network that to them are USA - relations between RU, China, Iran, N.K.; same code

Page 18: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.
Page 19: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.
Page 20: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

WHY ENCRYPTION HAS NOT SAVED US…Malicious actors go after those who have access to the data

Poor key implementation and management

Page 21: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

YOU ARE FIGHTING OTHER PEOPLESpear phishingSocial EngineeringChanging direct depositsDownloading your emailsHumans can pivot and explore

Page 22: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

SERVICE TO SECURITYWhat is the business goal?What are the risks?What are the threats?What are the right security controls?

Page 23: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.
Page 24: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

SERVICE TO SECURITYNOT ALL CONTROLS ARE EQUALWhat they protect

Confidentiality IntegrityAvailability

How they protect

DeterPreventDetectRecoverReduce

Page 25: Jeff Williams 2015.  Intro  Awesome Times  Security Briefing  Service with Security.

CONCLUSION

We Live in Awesome Times

Thank You


Recommended