SlideShare uma empresa Scribd logo
1 de 24
Books!
Google isn't the only
source of information
William Macleod, University of Strathclyde
Books! Google isn't the only source of information
Agenda
• Why
• A data-driven computer defence (Roger A Grimes)
• Securing DevOps (Julien Vehent)
• Social engineer (Iain Sutherland)
2 Books! Google isn't the only source of information
Why?
3 Books! Google isn't the only source of information
I review books! Shameless
Plug
A data-driven computer defence
Roger A. Grimes
• Author 10 books
• Worked at McAfee
• Worked at Microsoft
• CPA, CISSP, CISA, CISM, CEH,
MSCE, ETC, ETC
4 Books! Google isn't the only source of information
5
A data-driven computer defence
Books! Google isn't the only source of information
A data-driven computer defence
“What are our top successful threats.”
A data-driven computer defence
We need to:
• Understand our organisation
• Identify the question(s) to ask
• Identify the data we need
• Collect that data
• Investigate (ask more questions and maybe identify more data to collect)
• Analyse
• Communicate the findings
7 Books! Google isn't the only source of information
A data-driven computer defence
When I joined Strathclyde I did
• None of that
8 Books! Google isn't the only source of information
A data-driven computer defence
If you have no data, you can assume your biggest threat is from
• Patch management
• Social engineering
9 Books! Google isn't the only source of information
A data-driven computer defence
Learn to ask the right question
• Are we asking the right questions?
• Do we have the right data to answer the question?
• Be prepared to change both the questions and the answers
as the situation requires
10 Books! Google isn't the only source of information
A data-driven computer defence
What are our top successful threats?
• "Everyone from the CEO to the food service employees
should know the answer”
11 Books! Google isn't the only source of information
A data-driven computer defence
Take Away's
• Investigation and root cause analysis is
so important
• Ask the right questions
• Gather the required data
• Measure the correct indicators
• Be prepared to change
• Decisions based on data are defensible
12 Books! Google isn't the only source of information
Buy this
book!
Securing devOps
Julien Vehent
• Engineering Manager -
Firefox Operations Security
13 Books! Google isn't the only source of information
Securing devOps
The problem with Dev / Ops / Sec
14 Books! Google isn't the only source of information
• "When the company's focus is directed outwards to its customers,
security teams direct their focus inward"
• "One wants to increase the value of the organisation, the other wants
to protect its existing value"
• "Each side is pressured to ignore the others and focus on its own achievements"
• "I've never encountered dev or ops teams that didn’t care about security but I
have met many frustrated with the interaction and goal disconnects”
Securing devOps
Dev / Ops /Sec
15 Books! Google isn't the only source of information
• Continuous integration
• Continuous delivery
• Continuous security
Securing devOps
16 Books! Google isn't the only source of information
Securing devOps
Ops
17 Books! Google isn't the only source of information
• Automated
• Script based
• Ensure each deployment is standard
• Detect drift and reset
Securing devOps
Dev
18 Books! Google isn't the only source of information
• Develop small standalone snippets
• Check in to a repository
• Do some automated testing
• Peer code review prior to release
Securing devOps
Other great things about this book
19 Books! Google isn't the only source of information
• Has code examples
• Walks through the entire process
with some open source tools
• Suitable to give to your developers
Securing devOps
Other great things about this book
20 Books! Google isn't the only source of information
• Chapter 10 - a case study in incident response
• Chapter 11 - risk management
Securing devOps
Take away's
• This book:
- Gave me confidence to talk to the developers
- Gave me the right angle to get developer buy in
- Allowed me to find out they are doing some
checks already
- Allowed us to identify some security tests that
could be implemented right now
- Allowed us to write our "Development and
DevOps Security Standards"
21 Books! Google isn't the only source of information
Social engineer
Iain Sutherland
• Fiction
• Short story (86 pages)
22 Books! Google isn't the only source of information
Books! Google isn't the only source of information
Books
• A Data-Driven Computer Defence
- Help you with your strategy
• Securing DevOps
- Help you with engaging with developers
• Social Engineer
- Awareness for senior management
23 Books! Google isn't the only source of information
Thank you
customerservices@jisc.ac.uk
jisc.ac.uk
William Macleod
University of Strathclyde

Mais conteúdo relacionado

Semelhante a Books! Google isn't the only source of information

The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOpsShannon Lietz
 
10 Observations from 10+ years in the Corporate UX Trenches
10 Observations from 10+ years in the Corporate UX Trenches10 Observations from 10+ years in the Corporate UX Trenches
10 Observations from 10+ years in the Corporate UX TrenchesArio Jafarzadeh
 
Diseña juegos. Ilumina el camino. Las dos facetas del líder ágil
Diseña juegos. Ilumina el camino. Las dos facetas del líder ágilDiseña juegos. Ilumina el camino. Las dos facetas del líder ágil
Diseña juegos. Ilumina el camino. Las dos facetas del líder ágilGustavo Quiroz
 
Are We Secure? Answering the Unanswerable
Are We Secure? Answering the UnanswerableAre We Secure? Answering the Unanswerable
Are We Secure? Answering the UnanswerableJustin Berman
 
Privacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social WebPrivacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social WebMatthew Russell
 
Learn Learning + Prototype Testing
Learn Learning + Prototype TestingLearn Learning + Prototype Testing
Learn Learning + Prototype TestingDave Hora
 
Rolling Out An Enterprise Source Code Review Program
Rolling Out An Enterprise Source Code Review ProgramRolling Out An Enterprise Source Code Review Program
Rolling Out An Enterprise Source Code Review ProgramDenim Group
 
Unicorn or Rhino? Agility in the Data Realm?
Unicorn or Rhino? Agility in the Data Realm?Unicorn or Rhino? Agility in the Data Realm?
Unicorn or Rhino? Agility in the Data Realm?Daniel Davis
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsSecurity Innovation
 
Soft on People, Hard on Code: interpersonal approaches that promote high qual...
Soft on People, Hard on Code: interpersonal approaches that promote high qual...Soft on People, Hard on Code: interpersonal approaches that promote high qual...
Soft on People, Hard on Code: interpersonal approaches that promote high qual...Mark Brannan
 
Google Product Development Process
Google Product Development ProcessGoogle Product Development Process
Google Product Development ProcessAbhinav Goel
 
Bootstrapping an Open-Source Program Office at Blue Cross NC
Bootstrapping an Open-Source Program Office at Blue Cross NCBootstrapping an Open-Source Program Office at Blue Cross NC
Bootstrapping an Open-Source Program Office at Blue Cross NCAll Things Open
 
POWRR Tools: Lessons learned from an IMLS National Leadership Grant
POWRR Tools: Lessons learned from an IMLS National Leadership GrantPOWRR Tools: Lessons learned from an IMLS National Leadership Grant
POWRR Tools: Lessons learned from an IMLS National Leadership GrantLynne Thomas
 
Product owners how to get your development team to love you (product camp, 3...
Product owners  how to get your development team to love you (product camp, 3...Product owners  how to get your development team to love you (product camp, 3...
Product owners how to get your development team to love you (product camp, 3...Ron Lichty
 
Product Management in the Era of Data Science
Product Management in the Era of Data ScienceProduct Management in the Era of Data Science
Product Management in the Era of Data ScienceMandar Parikh
 

Semelhante a Books! Google isn't the only source of information (20)

The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
10 Observations from 10+ years in the Corporate UX Trenches
10 Observations from 10+ years in the Corporate UX Trenches10 Observations from 10+ years in the Corporate UX Trenches
10 Observations from 10+ years in the Corporate UX Trenches
 
Diseña juegos. Ilumina el camino. Las dos facetas del líder ágil
Diseña juegos. Ilumina el camino. Las dos facetas del líder ágilDiseña juegos. Ilumina el camino. Las dos facetas del líder ágil
Diseña juegos. Ilumina el camino. Las dos facetas del líder ágil
 
Are We Secure? Answering the Unanswerable
Are We Secure? Answering the UnanswerableAre We Secure? Answering the Unanswerable
Are We Secure? Answering the Unanswerable
 
Privacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social WebPrivacy, Ethics, and Future Uses of the Social Web
Privacy, Ethics, and Future Uses of the Social Web
 
Learn Learning + Prototype Testing
Learn Learning + Prototype TestingLearn Learning + Prototype Testing
Learn Learning + Prototype Testing
 
Rolling Out An Enterprise Source Code Review Program
Rolling Out An Enterprise Source Code Review ProgramRolling Out An Enterprise Source Code Review Program
Rolling Out An Enterprise Source Code Review Program
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
Unicorn or Rhino? Agility in the Data Realm?
Unicorn or Rhino? Agility in the Data Realm?Unicorn or Rhino? Agility in the Data Realm?
Unicorn or Rhino? Agility in the Data Realm?
 
How an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software SystemsHow an Attacker "Audits" Your Software Systems
How an Attacker "Audits" Your Software Systems
 
Soft on People, Hard on Code: interpersonal approaches that promote high qual...
Soft on People, Hard on Code: interpersonal approaches that promote high qual...Soft on People, Hard on Code: interpersonal approaches that promote high qual...
Soft on People, Hard on Code: interpersonal approaches that promote high qual...
 
Google Product Development Process
Google Product Development ProcessGoogle Product Development Process
Google Product Development Process
 
Bootstrapping an Open-Source Program Office at Blue Cross NC
Bootstrapping an Open-Source Program Office at Blue Cross NCBootstrapping an Open-Source Program Office at Blue Cross NC
Bootstrapping an Open-Source Program Office at Blue Cross NC
 
Lean thinking and the agile culture
Lean thinking and the agile cultureLean thinking and the agile culture
Lean thinking and the agile culture
 
What is devops
What is devopsWhat is devops
What is devops
 
POWRR Tools: Lessons learned from an IMLS National Leadership Grant
POWRR Tools: Lessons learned from an IMLS National Leadership GrantPOWRR Tools: Lessons learned from an IMLS National Leadership Grant
POWRR Tools: Lessons learned from an IMLS National Leadership Grant
 
Product owners how to get your development team to love you (product camp, 3...
Product owners  how to get your development team to love you (product camp, 3...Product owners  how to get your development team to love you (product camp, 3...
Product owners how to get your development team to love you (product camp, 3...
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Product Management in the Era of Data Science
Product Management in the Era of Data ScienceProduct Management in the Era of Data Science
Product Management in the Era of Data Science
 

Mais de Jisc

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 

Mais de Jisc (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Books! Google isn't the only source of information

  • 1. Books! Google isn't the only source of information William Macleod, University of Strathclyde
  • 2. Books! Google isn't the only source of information Agenda • Why • A data-driven computer defence (Roger A Grimes) • Securing DevOps (Julien Vehent) • Social engineer (Iain Sutherland) 2 Books! Google isn't the only source of information
  • 3. Why? 3 Books! Google isn't the only source of information I review books! Shameless Plug
  • 4. A data-driven computer defence Roger A. Grimes • Author 10 books • Worked at McAfee • Worked at Microsoft • CPA, CISSP, CISA, CISM, CEH, MSCE, ETC, ETC 4 Books! Google isn't the only source of information
  • 5. 5 A data-driven computer defence Books! Google isn't the only source of information
  • 6. A data-driven computer defence “What are our top successful threats.”
  • 7. A data-driven computer defence We need to: • Understand our organisation • Identify the question(s) to ask • Identify the data we need • Collect that data • Investigate (ask more questions and maybe identify more data to collect) • Analyse • Communicate the findings 7 Books! Google isn't the only source of information
  • 8. A data-driven computer defence When I joined Strathclyde I did • None of that 8 Books! Google isn't the only source of information
  • 9. A data-driven computer defence If you have no data, you can assume your biggest threat is from • Patch management • Social engineering 9 Books! Google isn't the only source of information
  • 10. A data-driven computer defence Learn to ask the right question • Are we asking the right questions? • Do we have the right data to answer the question? • Be prepared to change both the questions and the answers as the situation requires 10 Books! Google isn't the only source of information
  • 11. A data-driven computer defence What are our top successful threats? • "Everyone from the CEO to the food service employees should know the answer” 11 Books! Google isn't the only source of information
  • 12. A data-driven computer defence Take Away's • Investigation and root cause analysis is so important • Ask the right questions • Gather the required data • Measure the correct indicators • Be prepared to change • Decisions based on data are defensible 12 Books! Google isn't the only source of information Buy this book!
  • 13. Securing devOps Julien Vehent • Engineering Manager - Firefox Operations Security 13 Books! Google isn't the only source of information
  • 14. Securing devOps The problem with Dev / Ops / Sec 14 Books! Google isn't the only source of information • "When the company's focus is directed outwards to its customers, security teams direct their focus inward" • "One wants to increase the value of the organisation, the other wants to protect its existing value" • "Each side is pressured to ignore the others and focus on its own achievements" • "I've never encountered dev or ops teams that didn’t care about security but I have met many frustrated with the interaction and goal disconnects”
  • 15. Securing devOps Dev / Ops /Sec 15 Books! Google isn't the only source of information • Continuous integration • Continuous delivery • Continuous security
  • 16. Securing devOps 16 Books! Google isn't the only source of information
  • 17. Securing devOps Ops 17 Books! Google isn't the only source of information • Automated • Script based • Ensure each deployment is standard • Detect drift and reset
  • 18. Securing devOps Dev 18 Books! Google isn't the only source of information • Develop small standalone snippets • Check in to a repository • Do some automated testing • Peer code review prior to release
  • 19. Securing devOps Other great things about this book 19 Books! Google isn't the only source of information • Has code examples • Walks through the entire process with some open source tools • Suitable to give to your developers
  • 20. Securing devOps Other great things about this book 20 Books! Google isn't the only source of information • Chapter 10 - a case study in incident response • Chapter 11 - risk management
  • 21. Securing devOps Take away's • This book: - Gave me confidence to talk to the developers - Gave me the right angle to get developer buy in - Allowed me to find out they are doing some checks already - Allowed us to identify some security tests that could be implemented right now - Allowed us to write our "Development and DevOps Security Standards" 21 Books! Google isn't the only source of information
  • 22. Social engineer Iain Sutherland • Fiction • Short story (86 pages) 22 Books! Google isn't the only source of information
  • 23. Books! Google isn't the only source of information Books • A Data-Driven Computer Defence - Help you with your strategy • Securing DevOps - Help you with engaging with developers • Social Engineer - Awareness for senior management 23 Books! Google isn't the only source of information

Notas do Editor

  1. Senior Cybersecurity Specialist I'm from an age before Google
  2. And what I've learned
  3. I got a website where I do 90 sec video review of books So I thought we not combine my hobby with me job. CLICK Also my book “Lilly and the sea fortress! Is available on Amazon. It’s a book to encourage 10-14year olds into thinking about a future in STEM subjects”
  4. This is the book that I wish I had 3 years ago Roger actually includes his email address in the book and I emailed him a question and to my surprise he replied, within 24 hours, so top marks to Roger
  5. This is how I often start a meeting – for years, in multiple companies But I’ve never thought about going and getting the data – I’ve just used it to shut down other people and to rail road my view through because I’m the expert or I’m the boss and my hunch is worth more Well this book is about going and getting that data and not relying on the hunch of experts
  6. I guess this is the key phrase that sums up the book. It’s all about getting “bang for your buck” and Roger sights many companies that spend millions on cyber defences but still get breached – why? Because the are spending in the wrong area because they do not know specifically what is happening in their organisation. This book sets out to help the reader understand what questions they should be asking and how they can go about gathering the data to answer those questions
  7. Only then should we be putting controls in place. Instinctively we know that is right, we should investigate and know the facts before making a move. IDENTIFY THE QUESTIONS TO ASK How do we know if an account is compromised What data do we need to workout how it was compromised FINDINGS 20% of breaches, to this organisation, originated from staff emailing documents to the wrong people 70% of breaches, to this organisation, origninated from staff falling for a phishing email (95% of those phishing emails reported to be a colleague sharing a OneDrive file) The most costly breach, to this organisation, originated from a webserver that was not patched correctly  But it’s scary to do. Imagine coming into a new job and saying “yeah I’m not going to protect anything for 12 to 18 months – I’m going to spend that time trying to work out what is going on. “Dear Mr CEO – we shouldn’t go ahead and prevent the bad things, we need the bad things to happen so that we can learn how they are happening” – that sounds a bit perverse but when you think about it, it makes sense. A simple example though is lets say the company has had a spate of ransomware – so we go ahead and purchase new product to detect ransomware files in email but it’s been coming in via USB. Or we buy new endpoint antimalware software but ransomware is occurring on servers that don’t have a requirement for AV on them, due to historical performance issues. This book is full of similar real world examples from Rodgers work
  8. I was just popping and locking all over the place. We need security Here. Here and There. I even did some catalogue modelling "we need some security over there“ Just pointing out things that “every” company should have Identify Protect Detect Respond Recover I tended to think of Identify as Identify the Data and Asset to Protect Then Protect is before Detect, so you want to start Protecting things before Detecting things right? Really Identify should include Identifying what has happened and what is happening, which is arguably Detection. So we don’t just know what to Protect but what to Protect it from. I guess we need to remember the model is a circle, no particular start or end and each part reliant on the other. Detection for me was expensive SIEMs and Analytics and discovering APTs – but it can be really simple stuff like just asking people to fill in a few questions when account becomes compromised or malware is found
  9. Luckily. For me, Roger points out And the first things that I implemented where the likes of Vulnerability scanning / patch management / awareness training Phew! But even that isn’t simple without investigation and analysis. Lets say you have 99% of your estate patched to the latest level Everyone would pat themselves on the back, What a stat, what an effort. But what if our biggest successful historic breaches came on that 1% not patched? What if we find that 90% of our 99% is never attacked – so we’ve wasted a lot of effort and  we are practically no more secure By asking the correct questions and gathering and analysing the data – being driven by the data – we will be doing a better job
  10. EXAMPLE from the book In the early years of last decade, Microsoft made its focus security – due to Bill Gates “Trustworth Computing” memo in 2002 It had a push to decrease critical security bugs in its code and created the Security Development Lifecycle It had huge success. This is a quote from the book “Some Major pieces of Microsoft software, like SQL server or DNS, have gone years without a single security bug. Even Microsoft’s Internet browsers have fewer bugs than their competitor. These statements usually shocks people, but it’s the truth and it’s a direct result of the SDL initiative” After success with their key metric, the realised that customers were still compromised the same amount. It wasn’t Micrsosofts code. It was 3rd party code and social engineering but that still had a negative effect on Microsoft as it was happening on their platform, in their ecosystem. So they now changed their question and KPI from “whether their software contained more or fewer security bugs” to “whether their customers  were compromised to a greater or lesser extent over time and why” and invested in training the developer community in SDL.
  11. This is another interesting quote from the book. At Strathclyde we do awareness training – but we don’t spell out “these are our biggest issues”  Seems counter intuitive Seems like a security issue to say “this is the easiest way into our company” But you can see why it’s important. If our biggest threats are from USBs then we want users to be more aware and cautious while using them. Or if the data that gets targeted the most is Engineer Research data, we want people to be more vigilant when using that type of data. It talks a bit about the culture of the organisation as well. Security is embedded throughout I haven’t gone this far yet but it is something I will discuss with the training and awareness team – but I at least have started highlighting our top risks to colleagues and putting regularly in reports as opposed to keeping it hidden away
  12. I have re-focused our team – not on protecting things but on investigating things. Discovering what happened and why Root cause analysis And that doesn’t have to be timely or costly – it can be a chat with the user – with 4 or 5 key questions  - remember clicking on anything that gave you a strange feeling recently? Email? Webpage? - was it on your corporate device or a personal device? - had you just plugged in a USB stick?  - did it happen on the network or somewhere else like hotel wi-fi? Also to ask questions and work out what data they need to answer those questions That is what is needed to feedback to successful adjust our strategy and give us bang for buck And ultimately Decisions based on data ARE defensible. I keep a well thumbed and marked copy of this book with me, as my cybersecurity bible. I highly recommend it
  13. So on to our second book This comes with an electronic download of the book also Now I started off my professional career as a developer – back in the days when testing consisted of "did it compile?" My career then went down the infrastructure route, where I spent about 15 years – so when it comes to my current security role I know exactly what needs done to secure infastrucutre. I knew I should have been doing something with the developers but words such as github, jira, jenkins, puppet, chef seemed to shroud modern development in mystic ways and I stayed away. This book gave me the skills and motivation to engage with the developers in the organisation. Whether or not your organisation works in a DevOps environment this book will help you talk to the developers – and I bet you if  your organisation doesn't have DevOps, they are thinking about it and making sure security is thought about at this early stage is a win win.  
  14. The first thing this book did for me was shine a light on what the issue actually is: Not just Dev and Ops vs Security – often Dev vs Ops – dev is about providing new functions – Ops is about providing stability "Interaction" “goal disconnects” or "Communication" is the problem – nothing technical
  15. The book then went on to explain to me how DevOps works and explains Continuous Integration – the process of quickly integrating new features into software Continuous Delivery – the automation of deploying software into services available And coins the phrase  Continuous Security (in both the development and operational stages) We are already talking the same lexicon – so that helps with our communication issues
  16. Gave this diagram – sums up DevOps Even if not DevOps the Dev part will be getting done Mentioned ZAP – Zed Attack Proxy Baseline scan – can be done in minutes – perfect for a fast changing environment Armed with this info I could go and start a none frustrating conversation with the Dev and Ops teams (I wouldn’t call them DevOps yet)
  17. The Ops team where doing this or were moving towards this That’s a good goal from a security point of view – everything standard
  18. The dev team were doing this They were actually doing some testing already – just not necessarily security focused. So very easy for me to slip some tests into their process without massive overhead or change of procedures for them – in their instance they were using SonarCube – and we just added in the security testing
  19. How to spin up and deploy a sample application in AWS How to secure it's development and it's operation
  20. Chapter 10 – its really good. Scenrio is company conference in the Caribbean and someone sees some press coverage saying that all their medical devices are being recalled due to a failure. Transpires that this message is on the companies web pages. Unlike most incident table top exercises, which are high level, this is very techincal. Shows commands that an admin might use to check through logs and identify issues I think when it comes to incident response, a lot of focus is on the management of it – which is important, who is covering the press, who is putting out public messages, what they say etc Almost forget there is a lot of highly technical people running about doing their stuff. To me it’s highlighted that incident response thought exercises need to be used for techinical teams too Chapter 11 - So if you pass on to Devs or Ops teams – they will be learning some Risk Management also
  21. DevOps Security Standards I hasten to add this is high level, maybe more policy, and dev and ops teams are expected to write their procedure to comply but it’s a basic start It has highlevel statements like “The codification of infrastructure should be encouraged to ensure a consistent and efficient deployment of infrastructure” “Code must be stored in a secured central repository. ” “Code must be automatically security tested for common vulnerabilities, prior to check in to repository and recommendations acted upon.” “Security testing of code as early as possible and as often as possible should be encouraged.” If you have never tackled your developers, this book will give you the in
  22. Finally – and this is a quick one This is a prequal to Iain’s other book “Invasion of Privacy”, a large scale, technology based murder mystery (for a review visit www.macleod.guru) In this novel a young security consultant is hired to do a penetration test on a pharmaceutical company. The story introduces the techniques that social engineers have available to them and showcases how devious and devastating they can be. I think this is a good book to get into the hands of your senior management team. I gave a copy to our Principle last year. Its small enough and short enough that they can take it with them to read on a business trip and will confront them with some uneasy thoughts, forcing them to ask questions of your organisation – so be sure to have some answers up your sleeve.
  23. All books are available on Amazon although other booksellers do exist Any questions