The Tactical Application Security Program: Getting Stuff Done. Cory Scott & David Cintz, LinkedIn
|
|
|
- Jeffrey Caldwell
- 10 years ago
- Views:
Transcription
1 The Tactical Application Security Program: Getting Stuff Done Cory Scott & David Cintz, LinkedIn
2 Who do you want to work with?
3 What security team do you want to work with?
4 Who Are We? Cory Scott David Cintz Director, House LinkedIn Senior Technical Program Manager, House LinkedIn Previously at Matasano Security, ABN Likes: Cat pictures Dislikes: Improperly chilled beer Previously at Black Hat, Zynga, Chevron Likes: Flying planes Dislikes: Automatic towel dispensers
5 Agenda Elements of a Tactical Security Program Application Assessment Application Incident Response Bug Bounty Programs
6 This is your security life, and you re ending it one strategy at a time Traditional security programs focus on strategic vision instead of tactical success
7 Application Security and the Bravery of Tactical Execution Application security programs do much better tactically. Perpetually deferred reward vs immediate value: Why would anyone choose the former? A primer on management psychology... Why your non-security peers love to hear the word strategy
8 You Can t Defeat Today s Attacks With A Gantt Chart
9 Elements of a Tactical Security Program
10 1. Lightweight and iterative Example: API Review Version 1: Catalog the request, ask three questions, with canned advice Version 2: Add conditionals to potentially introduce design review Version 3: Automated scan to find vulnerabilities Let people know that while the process will change, the entry point will not.
11 2. Can demonstrably reduce risk for each action taken Example: Staff performance and sprint plan gut checks 1. Does this prevent something bad from happening in the future? 2. Did it let us know about something bad happening that we didn t know about already? 3. Does it put us on a clear-line path to stopping an existing bad thing from happening anymore? Do this for your work plan every sprint. If you don t like the answers, change the plan. Do this for your team every quarter. Document the results and the deliverables. Distill the majority of your performance discussions down to these questions.
12 3. Focus on operational excellence, less on authority Example: Measure every meaningful aspect of your assessment and incident response programs. Share those results far and wide. Assessment Measurements (Quarterly) Completed assessments, broken down by: infrastructure member-facing production apps corporate systems microsites Number of bugs filed How many assessments completed before go-live Ecosystem Measurements (Quarterly) Production-impacting bugs filed by discovery source and current status (status weekly) Production-impacting bugs resolved Critical bugs impacting members, including response times External vulnerability report statistics
13 A Digression on Authority & Buy-In Tactical security teams should act as consultancies with a governance mission that they keep relatively well concealed. How much buy-in do you need? You ll encounter three camps of people: Supporters Followers Resistance
14 4. Makes others move instead of wait Example: First month on the job? I called a Code Yellow. Every team had a small amount of consistent work, tied to their sprints, monitored daily or weekly Prioritization discussions took place regularly, decisions on timing: This sprint This quarter This year Not sure
15 Agenda Elements of a Tactical Security Program Application Assessment Application Incident Response Bug Bounty Programs
16 A Year Of Assessments At LinkedIn Type Number Penetration Tests 251 Code Reviews 85 Design Reviews 48 Cloud Assessments 44 Risk Assessments 14
17 Assessments have a Flow
18 Tactical Assessment Principles 1. Be easy to find and quick to engage. 2. Be flexible on documentation & preparation. 3. Give clear guidance that has a reasonable likelihood of being executed. 4. Jointly engage with legal, customer support, and other groups in engineering for leverage. 5. Be passionate yet practical; don t pass judgment or punish.
19 An example office hours session Available twice a week, but can be scheduled on demand; signup sheet is the document of record House Security Team, Trust & Safety, and Product Legal, with a brief presentation by requestor We ll document requirements as we go Product requirements: security, anti-abuse, legal Assessment requirements: Next steps for deep dives, selections from the service catalog Each month, we do 30 product consultations, 25 general security sessions, and 4 corporate IT speed rounds
20 Assessment Tactics Build a service catalog. Here s ours: Threat model / risk assessment Design review Manual penetration test Code review Vendor review Document your methodology for consistency Scope each test and define game-overs Create test plans that include baseline methodology and specific test objectives
21 Navigating the wilderness of existential assessment questions What to do when you get what you think you wanted? Definitions can be hard. Don t avoid them. Own them instead. What does review mean? When are you done? How to deal with rapidly evolving products
22 Generating Assessment Demand: Stuff That Matters Be a part of product launch flow Look for the business decision points where projects are approved Insert yourself into the design process post-approval Look for opportunities to contribute security guidance outside of just pentesting or code review Whitepapers, communications & product marketing Third-party assessments Abuse detection and monitoring Watch for changes in staging and production Befriend the gatekeepers Domain registration DNS changes Traffic & front-end routes
23 Pitfalls Unwanted and uninteresting reviews Standards and self-certification Missing the big picture
24 Lead, Follow, or Get Out Of The Way In an external consultancy, your goal is exclusive: client satisfaction. In an internal security team, you must balance: Developer / Business Owner Satisfaction Overarching company governance and security Precedent-setting behavior Customer and member safety The case of LinkedIn Intro
25 LinkedIn Intro Significant design review Cryptographic implementation review Penetration testing, internal and external Clear privacy commitment published
26 Agenda Elements of a Tactical Security Program Application Assessment Application Incident Response Bug Bounty Programs
27 Critical Security Bugs 77 Critical bugs handled in the past year 21 externally discovered 13 from private bug bounty 8 from other sources 56 discovered internally We ve been told that our definition of critical is more aggressive than the industry baseline. The vast majority of these bugs were closed without any member impact.
28 Handling Outside Reports On call pentester to handle incoming reports SLA 4 hours to triage and respond 8 hours weekends and nights - only handle criticals Responsibilities of on call Triage Establish working POC File tickets Respond Basic human response Acknowledge report Investigating issue
29 Case Study - Changing Faces We received the report after hours Soon discovered the report was not the original Found the original as a YouTube video Responded and implemented stop-gap solution within the hour Demo...
30
31
32
33 ch ed! u M rov Imp
34
35 Case Study - Changing Faces Continued... Report came in after hours Triaged and responded in about an hour What makes this a critical? Bug Classification Table Contains specific examples Provides clear guidance Has established Service Level Agreements (SLAs) LinkedIn is an online service company We can push code quickly Sometimes not quick enough Forced to use stop-gap solutions
36 Cleanup After the Incident
37 Determining Scope of Impact Do NOT wait until the incident is over Start research in parallel Application response team needs access to log data. What we use at LinkedIn: Elasticsearch HDFS / Hadoop / Hive Dedicated data science team is great, though not a necessity Don t wait until you are in the midst of an incident to find out that you don t have proper logs or the IP address being captured of your attacker is that of your own CDN.
38 Case Study Externally reported through our bug bounty program Demonstrated that he could delete any embedded video from any SlideShare presentation On-call engineer discovered that he could add a video to any SlideShare presentation Not part of the original report Discovered during triaging bug Impact is clear, easy to explain why it s a critical Not all bugs are this straightforward
39 Bug Classifications and Why We Built It We/You are the face of security within your company We have to convince internal teams to fix things Resulting in being labeled when we stand our ground grumpy argumentative jerk Teams will game the system and argue Impact Complexity Accessibility Wormability It has existed like that for years
40 Sample Bug Classification Table
41 Importance of Communication During an Incident Incident success or failure is judged by others in your company Coordination and communication are key Many teams are involved typically Need to get updates to a centralized point Communication must flow in all directions - including up Management should never hear about an incident second hand Provide official updates from a dedicated person Summary of issue Potential impact Next steps Planned remediation (if available)
42 Communication Template s to the management should be sent on a regular basis. If you do not have a ecosystem team, thats ok too; just set the expectation for when the next update will happen.
43 Using Playbooks Developing a standard playbook is a must Will provide guidance and framework Living document Not 100 pages Must be easy to use No one will update No one will read No one will use Share playbook / be transparent with partner teams Publish playbook Tell them what is going to happen
44 Reducing the Threat Surface Be consultative: explore potential short-term and long-term fixes For application vulnerabilities Disable functionality through configuration or A/B test control Block - When only HTTP error codes will do Hint: encourage the development of new functionality and bug fixes behind A/B testing Reverse proxy for endpoints Specialized filters for request body filtering Monitor for abuse While you can allow the long term fix discussion to happen and is completely acceptable, focus has to maintain on mitigating the threat now.
45 Agenda Elements of a Tactical Security Program Application Assessment Application Incident Response Bug Bounty Programs
46 Public Bug Bounties Today Main motivations for companies to build programs Receive quality reports Establish good relationship with security community Stay out of negative light Good use of money & resources In contrary these programs have fostered an influx of false and bad reports Signal to noise ratio constantly degrading Companies forced to use dedicated resources Engage consultancies Use platform vendor to sift through the chaff
47 Case Study External researcher published a blog post about Intro product This is not and should not be an We opted to talk with the author Did NOT involve legal Reached out with a simple invite to chat Goal was to work collaboratively adversarial relationship - it s completely the contrary. This change in attitude on both sides means that both parties win. These actions resulted in positive outcome Focus on building relationships with researchers Communicate and be transparent (as much as possible) Understand the motivation of the researchers
48 How We Adopted Our Current Program Previously, a vast majority of reports to LinkedIn were not actionable or meaningful Smaller group of researchers emerged They wanted to work with us - we liked working with them Why not reward them? This was the spirit of the original programs Allows us to grow our relationships with researchers
49 LinkedIn Program Now Launched LinkedIn private program October 2014 Paid out over $65,000 bounties Received more than 65 actionable reports Signal to noise ratio 7:3 We have seen significant reduction in authorization-related issues Less gamesmanship of program - Public programs incentivize Junk reports
50 What Do These Ratios Really Mean to Me?! Industry average is approximately 1:20 What if every report took 1 hour on average to triage? Sifting through the chaff is costly
51 What Do These Ratios Really Mean to Me?! Bugcrowd - July 2015 The State of Bug Bounty HackerOne - July 2015 Improving Signal Over 10,000 Bugs
52 Wrapping Up Tactical approaches to application security should be embraced Treat your assessment program like a consultancy Application incident response may be the most important thing to get right Focus on treating external vulnerability researchers right first, then consider bounty programs Slides are at
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM
BUILDING AN OFFENSIVE SECURITY PROGRAM Common Gaps in Security Programs Outsourcing highly skilled security resources can be cost prohibitive. Annual assessments don t provide the coverage necessary. Software
Security Training Why It Benefits Your Organization and How to Make Your Case to Management
Security Training Why It Benefits Your Organization and How to Make Your Case to Management Author: Nick Murison Senior Security Consultant Foundstone Professional Services Introduction A major challenge
Taking Information Security Risk Management Beyond Smoke & Mirrors
Taking Information Security Risk Management Beyond Smoke & Mirrors Evan Wheeler Omgeo Session ID: GRC-107 Insert presenter logo here on slide master. See hidden slide 4 for directions Session Classification:
Concur Customer Experience 2015 REPORT. Concur // Customer Experience 2015 Report
Concur Customer Experience 2015 REPORT 1 Contents 3 Welcome Contents 4 Gathering feedback 5 The impact of your feedback 5 User experience evolution 5 Product reliability 7 Looking toward the future 7 Customer
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
What Directors need to know about Cybersecurity?
What Directors need to know about Cybersecurity? W HAT I S C YBERSECURITY? PRESENTED BY: UTAH BANKERS ASSOCIATION AND JON WALDMAN PARTNER, SENIOR IS CONSULTANT - SBS 1 Contact Information Jon Waldman Partner,
How To Protect Your Data From Attack
Integrating Vulnerability Scanning into the SDLC Eric Johnson JavaOne Conference 10/26/2015 1 Eric Johnson (@emjohn20) Senior Security Consultant Certified SANS Instructor Certifications CISSP, GWAPT,
Performing a Web Application Security Assessment
IBM Software Group Performing a Web Application Security Assessment 2007 IBM Corporation Coordinate the Time of the Audit Set up a time window with the application owner Inform your security team Inform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Vulnerability Management Nirvana: A Study in Predicting Exploitability
SESSION ID: TECH-F01 Vulnerability Management Nirvana: A Study in Predicting Exploitability Kymberlee Price Senior Director of Operations Bugcrowd @Kym_Possible Michael Roytman Senior Data Scientist Risk
Simply Sophisticated. Information Security and Compliance
Simply Sophisticated Information Security and Compliance Simple Sophistication Welcome to Your New Strategic Advantage As technology evolves at an accelerating rate, risk-based information security concerns
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business
Data Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Applied Security Metrics
Applied Security Metrics Planning, design and implementation of security metrics Doug Streit, ODU Dan Han, VCU Designing a Security Metrics Framework Doug Streit, ODU Metrics Program Getting Started 1.
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive One of a series of InfoSphere Guardium Technical Talks Ernie Mancill Executive IT Specialist Logistics This tech talk is being recorded. If you
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
Third Party Security: Are your vendors compromising the security of your Agency?
Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010 Agenda
HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training
HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training HP and HP Enterprise Security Products are committed to your success as an HP Partner. In the Fortify Proof of Concept Boot Camp Training,
Enterprise Application Security Program
Enterprise Application Security Program GE s approach to solving the root cause and establishing a Center of Excellence Darren Challey GE Application Security Leader Agenda Why is AppSec important? Why
Integrating MSS, SEP and NGFW to catch targeted APTs
#SymVisionEmea #SymVisionEmea Integrating MSS, SEP and NGFW to catch targeted APTs Tom Davison Information Security Practice Manager, UK&I Antonio Forzieri EMEA Solution Lead, Cyber Security 2 Information
How to select the right Marketing Cloud Edition
How to select the right Marketing Cloud Edition Email, Mobile & Web Studios ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire customer lifecycle
INinbox Start-up Pack
2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the
The Security Development Lifecycle
The Security Development Lifecycle Steven B. Lipner Director of Security Engineering Strategy Security Business and Technology Unit Microsoft Corporation Context and History 1960s penetrate and patch 1970s
Louis Gudema: Founder and President of Revenue + Associates
The Interview Series - Presented by SmartFunnel Interviews of Sales + Marketing Industry Leaders Louis Gudema: Founder and President of Revenue + Associates PETER: Hello folks this is Peter Fillmore speaking.
Introduction to Penetration Testing Graham Weston
Introduction to Penetration Testing Graham Weston March 2014 Agenda Introduction and background Why do penetration testing? Aims and objectives Approaches Types of penetration test What can be penetration
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
112 BSIMM Activities at a Glance
112 BSIMM Activities at a Glance (Red indicates most observed BSIMM activity in that practice) 6 Level 1 Activities Governance Strategy & Metrics (SM) Publish process (roles, responsibilities, plan), evolve
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
Zak Khan Director, Advanced Cyber Defence
Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts
PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com
PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure
Commercial Insurance Today. How Rising Adoption of Digital and Social Resources Impacts Decision-Making
Commercial Insurance Today How Rising Adoption of Digital and Social Resources Impacts Decision-Making Commercial Insurance in the 21st Century: The Growing Influence of Digital and Social Media Based
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
A conversation with Scott Chappell, CMO, Sessions Online Schools of Art and Design
A conversation with Scott Chappell, CMO, Sessions Online Schools of Interviewed by: Steven Groves, StevenGroves.com Guy R. Powell, DemandROMI Can you talk to us a little bit about Sessions and what Sessions
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Adopting a Continuous Integration / Continuous Delivery Model to Improve Software Delivery
Customer Success Stories TEKsystems Global Services Adopting a Continuous Integration / Continuous Delivery Model to Improve Software Delivery COMMUNICATIONS AGILE TRANSFORMATION SERVICES Executive Summary
How to Get from Scans to a Vulnerability Management Program
How to Get from Scans to a Vulnerability Management Program Gary McCully Any views or opinions presented are solely those of the author and do not necessarily represent those of SecureState LLC. Synopsis
Cyber Security for Start-ups: An Affordable 10-Step Plan
SESSION ID: ECO-W03 Cyber Security for Start-ups: An Affordable 10-Step Plan David Cowan Partner Bessemer Venture Partners @davidcowan Acknowledgements Startups don't like friction to get their job done.
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Application Security Manager ASM. David Perodin F5 Engineer
Application Security Manager ASM David Perodin F5 Engineer 3 Overview BIG-IP Application Security Manager (ASM) a type of Web application firewall ASM s advanced application visibility, reporting and analytics
The Beginner s Guide to Content Marketing
content marketing agency scribewise.com The Beginner s Guide to Content Marketing The Who, What, When, Where, Why (And How) of Content Marketing 1 Table of Contents 3 About This Whitepaper 4 Content Marketing:
Practical Advice for Small and Medium Environment DDoS Survival
Practical Advice for Small and Medium Environment DDoS Survival Chris "Mac" McEniry Sony Network Entertainment @macmceniry November 8 13, 2015 Washington, D.C. www.usenix.org/lisa15 #lisa15 1 Practical
Continuous Penetration Testing
Continuous Penetration Testing SyCom Technologies 1.0 Continuous Penetration Testing Imagine a service that continuously monitors and reports on any new threats that emerge real time and provides a tactical
Big Data and Security: At the Edge of Prediction
Big Data and Security: At the Edge of Prediction Mark Seward Splunk Inc. Fred Wilmot Splunk Inc. Session ID: Session Classification: SPO2-T17 Intermediate The Way Cyber Adversaries Think Where is the most
50 Simple Ways to Grow Your Email List
50 Simple Ways to Grow Your Email List 50 SIMPLE WAYS TO GROW YOUR EMAIL LIST EMAIL WORKS Often abused and overused, email has gotten a bad reputation. But if done well, email can still deliver extraordinary
Firewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
Security-as-a-Service (Sec-aaS) Framework. Service Introduction
Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
A 7-Step Analytics Reporting Framework
A 7-Step Analytics Reporting Framework By Feras Alhlou, Principal Marketing Consultant 2 Marketing Optimization Imagine that you just attended a conference on digital marketing and analytics. You re pumped
HOW TO GET. 1,000+ Followers ON TWITTER
HOW TO GET 1,000+ Followers ON TWITTER CONTENTS. 3. INTRODUCTION. 6. FIRST THINGS FIRST: CREATE AND OPTIMIZE YOUR PROFILE. 11. TWEET 24/7 (WITHOUT BEING ON TWITTER 24/7). 23.CURATE CONTENT LIKE A PRO.
Secure in 2010? Broken in 2011!
Secure in 2010? Broken in 2011! Matias Madou Principal Security Researcher Abstract In 2010, a security research firm stumbled on a couple of vulnerabilities in Apache OFBiz, a widely used open source
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Agile Development for Application Security Managers
Agile Development for Application Security Managers www.quotium.com When examining the agile development methodology many organizations are uncertain whether it is possible to introduce application security
About Us. 2 Managed Services E: [email protected] T: +310.823.2047 W: www.ironcovesolutions.com. Our Mission. What We Do
MANAGED SERVICES About Us Iron Cove Solutions is a cloud-computing deployment provider offering industry-leading cloud services to SMB sized businesses. We are cloud consultants assisting in the assessment,
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
WHITE PAPER Social Media in Government. 5 Key Considerations
WHITE PAPER Social Media in Government 5 Key Considerations Social Media in Government 5 Key Considerations Government agencies and public sector stakeholders are increasingly looking to leverage social
Organizational Structure What Works
Organizational Structure What Works Evan Wheeler Director, Omgeo Session ID: PROF-001 Session Classification: Professional Development Once you have gotten past the first few months, you will be presented
The Ultimate Guide to Content Marketing ROI. 2014 NewsCred / NewsCred.com / (212) 989-4100 / [email protected]
The Ultimate Guide to Content Marketing ROI 2014 NewsCred / NewsCred.com / (212) 989-4100 / [email protected] Uniting a Brand's Left and Right Brain Content marketing is a discipline where art meets science.
The Real State of WiFi Security in the Connected Home August 25, 2015
The Real State of WiFi Security in the Connected Home August 25, 2015 1 Abstract Analyzing real-world data can teach us about the state of security in the connected home. RouterCheck, a tool for testing
Technology Brief Demystifying Cloud Security
Demystifying Cloud Security xo.com Demystifying Cloud Security Contents Introduction 3 Definition of the cloud 3 Cloud security taxonomy 4 Cloud Infrastructure Security 5 Tenant- based Security 5 Security
Big Data Integration: A Buyer's Guide
SEPTEMBER 2013 Buyer s Guide to Big Data Integration Sponsored by Contents Introduction 1 Challenges of Big Data Integration: New and Old 1 What You Need for Big Data Integration 3 Preferred Technology
How Salesforce Delivers Exceptional Service Using Service Cloud. service cloud
How Salesforce Delivers Exceptional Service Using Service Cloud service cloud Contents Introduction The Challenges of Growth A World-Class Service Solution Innovation in Support Conclusion 3 6 8 14 17
GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE
GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE iscan Online 5600 Tennyson Parkway Suite 343 Plano, Tx 75024 Table of Contents Overview... 3 Data Breach Prevention... 4 Choosing
WHAT IS LOG CORRELATION? Understanding the most powerful feature of SIEM WWW.ALIENVAULT.COM
WHAT IS LOG CORRELATION? Understanding the most powerful feature of SIEM WWW.ALIENVAULT.COM IT S ALWAYS IN THE LOGS. 84% of Organizations that had their security breached in 2011, had evidence of the breach
15 Principles of Project Management Success
15 Principles of Project Management Success Project management knowledge, tools and processes are not enough to make your project succeed. You need to get away from your desk and get your hands dirty.
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 [email protected] www.coresecurity.com blog.coresecurity.com Preempting
Careers in Cyber Operations. Defence Signals Directorate
Careers in Cyber Operations Defence Signals Directorate 1 In a game where our adversaries operate with no rules and unknown boundary lines, you will be exploring the possibilities and inventing the seemingly
Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN, GCFA. Tristan Lawson CISSP, C EH, E CSA, GISP, GSEC, MCSA, A+, Net+, Server+, Security+
Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN, GCFA Tristan Lawson CISSP, C EH, E CSA, GISP, GSEC, MCSA, A+, Net+, Server+, Security+ Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN,
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
GUINNESS- THE DARK DROP
GUINNESS- THE DARK DROP Microsoft Advertising Story Awards Submission Jonny Lang THE PROBLEM Fundamentally, Guinness is a drink for the daylight. A lunchtime staple or the first round of the evening before
plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels
Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively Arrow ECS DLP workshop, Beograd September 2011 Marko Pust [email protected] 1 Agenda DLP in general What to expect from
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
PARTNER TRAINING AND CERTIFICATION
PARTNER TRAINING AND CERTIFICATION Partners who place a high degree of importance on proper technical education and training significantly outperform partners who don t. OVERVIEW The Workfront Partner
