SlideShare uma empresa Scribd logo
1 de 46
© 2017 The SANS™ Institute – www.sans.org
2017 Cybersecurity Trends:
Making Progress by Aiming
Ahead of the Target
John Pescatore, SANS
Director, Emerging Security Trends
Chris Carlson, Vice President,
Product Management, Qualys
© 2017 The SANS™ Institute – www.sans.org
May You Be Cursed/Blessed to Live In
Interesting Times
© 2017 The SANS™ Institute – www.sans.org
Obligatory Agenda Slide
Housekeeping info
Here’s what we will do
– 1:05 – 1:25 Overview – John Pescatore
– 1:25 – 1:45 Qualys –
– 1:45 – 2:00 – Q&A
Thanks to our sponsor:
© 2017 The SANS™ Institute – www.sans.org
Q & A
Please use GoToWebinar’s
Questions tool to submit
questions to our panel.
Send to “Organizers”
and tell us if it’s for
a specific speaker.
© 2017 The SANS™ Institute – www.sans.org 5
What Should We Learn From the Past Year?
© 2017 The SANS™ Institute – www.sans.org 6
Vulnerabilities Did Slow Down
Source: Microsoft Security
Intelligence Report
© 2017 The SANS™ Institute – www.sans.org 7
Damage from Attacks Did Not
Yahoo — Impacted value of sale to Verizon
IRS — Get Transcript breach
Premier Healthcare — Laptop still not encrypted
Wendy's — Ever-expanding point-of-sale breach
SF Muni — Ransomware
DynDNS — Mirai IoT DDoS
© 2017 The SANS™ Institute – www.sans.org 8
Evolution in Targeting and Evasion
Source: Fireeye iSight
© 2017 The SANS™ Institute – www.sans.org 9
Not Just Breaches - Ransomware
Source: Kaspersky
© 2017 The SANS™ Institute – www.sans.org 10
“New” Threat Mechanisms —
DNS Tunneling
Source: Infoblox
© 2017 The SANS™ Institute – www.sans.org 11
Critical Infrastructure Attacks
The Seven Most Dangerous New Attack Techniques, and What’s Coming Next
2015 Ukraine Attack Summary
© 2017 The SANS™ Institute – www.sans.org 12
New Forms of Infrastructure Vulnerabilities
© 2017 The SANS™ Institute – www.sans.org 13
Protecting Your Company From the
Company It Keeps
 Business is increasingly
interconnected and
interdependent
 The bad guys have
figured that out
 So have the regulators
 The cloud exacerbates
that trend, additional
levels of parties
© 2017 The SANS™ Institute – www.sans.org
Third Parties in the Breach Chain
Source: The Aerospace Corp.
© 2017 The SANS™ Institute – www.sans.org
Mobility and the Cloud
 A mobile, distributed
workforce is the norm
 The cloud exacerbates
that trend
 The bad guys have
figured this out
 Visibility and mitigation
need to be extended
Source: Citrix
© 2017 The SANS™ Institute – www.sans.org
SaaS Is a Given, PaaS Is Happening,
IaaS Is Growing
Nontraditional
Application Ecosystems
Good Old Data
Center
Data.gov
Wired/Wireless
Internet
© 2017 The SANS™ Institute – www.sans.org
The Internet of Vulnerable Things
© 2017 The SANS™ Institute – www.sans.org
“Obviously, some people here
do not appreciate the gravity
of our situation.”
Increasing Boards of Directors’ Focus
© 2017 The SANS™ Institute – www.sans.org
The Messages Back from Directors
“Security people don’t speak our language. In fact, at
each briefing they seem to speak a different language.”
“The CISO is great at talking about ‘blood in the streets’
but very weak on strategy to avoid disasters.”
“We know bad things will happen — the CEO and CFO
and VPs inform us of business problems frequently. We
want to have confidence that basic competence and
strategies are in place to reduce bottom line impact.”
“The board is not an ATM — we are not here to give you
resources.”
“A big part of being believable and building our trust is
showing us how we compare to competitors, other
industries, some kind of standards or benchmarks.”
© 2017 The SANS™ Institute – www.sans.org 20
Delivering Security Efficiency and
Effectiveness
Decrease the cost of dealing with
known threats
Decrease the impact of residual risks
Decrease the cost of demonstrating
compliance
Reduce business damage due to
security failures
Maintain level of protection with less
EBITDA impact
Increase the speed of dealing with a new
threat or technology
Decrease the time required to secure a
new business application, partner or
supplier
Reduce incident cost
Reduce downtime
Decrease customer defections
Position security as a competitive
business factor
Efficiency Effectiveness
© 2017 The SANS™ Institute – www.sans.org 21
Good News: Many Organizations
Avoided or Reduced Damage
980 breaches in 2016
– What did the other 9,020 of
the F10000 do differently?
– (781 in 2015)
On average, 36K records
exposed per breach
– What did those that limited
breach size do differently?
– (Average = 215K in 2015)
Almost invariably, the
organizations with the least
cyber incident impact have
the strongest CISOs and
security teams.
Source: Identity Theft Resource Center
© 2017 The SANS™ Institute – www.sans.org 22
Some Things Don’t Change
Sample Red/Yellow/Green Metric
1 2
3
4
5
6
7
8
9
101112
13
14
15
16
17
18
19
20
Center for Internet Security Critical Security Controls
Prevention
Detection & Response
Identity, Access, Governance & Architecture
© 2017 The SANS™ Institute – www.sans.org 23
CISO Hot Topic: Application Security
Problem: Healthcare company needs to reduce threat exposure and
bug fix costs across all corporate applications.
Solution: Focus on Secure (and Agile!) Software Development
Lifecycle
Results:
– Defect density decreased by 92% for high/moderate vulnerabilities
– Apps using secure library increased each month
– Threat modeling approach reduced resource time from 40 hours to 2
– Overall CDLC productivity increase of 15% estimated
© 2017 The SANS™ Institute – www.sans.org 24
When You Get Back to Work
Threats evolve but still need vulnerabilities to exploit
– Reduce people-attack aperture
– Decrease time to detect and mitigate software vulnerabilities
Make sure you are collecting the right security metrics so
you can demonstrate value, improvement, danger—and
connection to business goals.
Take advantage of any transitions coming:
– Moving to Windows 10, cloud services, mobile apps, agile dev, etc.
– M&A, re-org, new C-level management
– Audit results
Identify high-leverage, short-term basic-security-hygiene win to gain trust
Grab a few third rails!
DevSecOps
Building Continuous Security
into IT and Application Infrastructures
Chris Carlson
VP, Product Management
Qualys
Terminology
Waterfall vs. Agile Dev Methodologies
Waterfall vs. Agile Dev Methodologies
Agile (Dev) + Deploy (Ops)  Automation
Where do Security Assessments Fit?
Terminology: Shift Left
Apply Shift Left to Security?
Transparent Security or Process Blockers
DevOps + Security: Friend or Foe?
“Shift Left” Security
Integrate Security into the CI/CD Process
Shift Left Security – Continuous Security
DevSecOps – How to Accelerate Usage
DevSecOps: Docker Containers
Next Steps and What Works
Next Steps and What Works
Next Steps and What Works
Thank You
Chris Carlson
ccarlson@qualys.com
VP, Product Management, Qualys
www.qualys.com
© 2017 The SANS™ Institute – www.sans.org
© 2017 The SANS™ Institute – www.sans.org
Resources
SANS : https://www.sans.org/webcasts/archive/20167
What Works: https://www.sans.org/critical-security-
controls
SANS SOC – https://www.sans.org/event/security-
operations-center-summit-2017
Qualys: https://www.Qualys.com/
Questions: q@sans.org
@John_Pescatore
ccarlson@qualys.com
© 2017 The SANS™ Institute – www.sans.org
Acknowledgments
Thanks to our sponsor:
And also to our speaker and to our attendees:
Thank you for joining us today

Mais conteúdo relacionado

Mais de Qualys

Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Qualys
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Qualys
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationQualys
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceQualys
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyQualys
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate BrochureQualys
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOsQualys
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureQualys
 
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry RansomwareHow to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry RansomwareQualys
 
Web App Attacks - Stats & Remediation
Web App Attacks - Stats & RemediationWeb App Attacks - Stats & Remediation
Web App Attacks - Stats & RemediationQualys
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldQualys
 

Mais de Qualys (11)

Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOs
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry RansomwareHow to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
 
Web App Attacks - Stats & Remediation
Web App Attacks - Stats & RemediationWeb App Attacks - Stats & Remediation
Web App Attacks - Stats & Remediation
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

SANS Webcast | 2017 Cybersecurity Trends: Aiming Ahead of the Target to Increase Security

  • 1. © 2017 The SANS™ Institute – www.sans.org 2017 Cybersecurity Trends: Making Progress by Aiming Ahead of the Target John Pescatore, SANS Director, Emerging Security Trends Chris Carlson, Vice President, Product Management, Qualys
  • 2. © 2017 The SANS™ Institute – www.sans.org May You Be Cursed/Blessed to Live In Interesting Times
  • 3. © 2017 The SANS™ Institute – www.sans.org Obligatory Agenda Slide Housekeeping info Here’s what we will do – 1:05 – 1:25 Overview – John Pescatore – 1:25 – 1:45 Qualys – – 1:45 – 2:00 – Q&A Thanks to our sponsor:
  • 4. © 2017 The SANS™ Institute – www.sans.org Q & A Please use GoToWebinar’s Questions tool to submit questions to our panel. Send to “Organizers” and tell us if it’s for a specific speaker.
  • 5. © 2017 The SANS™ Institute – www.sans.org 5 What Should We Learn From the Past Year?
  • 6. © 2017 The SANS™ Institute – www.sans.org 6 Vulnerabilities Did Slow Down Source: Microsoft Security Intelligence Report
  • 7. © 2017 The SANS™ Institute – www.sans.org 7 Damage from Attacks Did Not Yahoo — Impacted value of sale to Verizon IRS — Get Transcript breach Premier Healthcare — Laptop still not encrypted Wendy's — Ever-expanding point-of-sale breach SF Muni — Ransomware DynDNS — Mirai IoT DDoS
  • 8. © 2017 The SANS™ Institute – www.sans.org 8 Evolution in Targeting and Evasion Source: Fireeye iSight
  • 9. © 2017 The SANS™ Institute – www.sans.org 9 Not Just Breaches - Ransomware Source: Kaspersky
  • 10. © 2017 The SANS™ Institute – www.sans.org 10 “New” Threat Mechanisms — DNS Tunneling Source: Infoblox
  • 11. © 2017 The SANS™ Institute – www.sans.org 11 Critical Infrastructure Attacks The Seven Most Dangerous New Attack Techniques, and What’s Coming Next 2015 Ukraine Attack Summary
  • 12. © 2017 The SANS™ Institute – www.sans.org 12 New Forms of Infrastructure Vulnerabilities
  • 13. © 2017 The SANS™ Institute – www.sans.org 13 Protecting Your Company From the Company It Keeps  Business is increasingly interconnected and interdependent  The bad guys have figured that out  So have the regulators  The cloud exacerbates that trend, additional levels of parties
  • 14. © 2017 The SANS™ Institute – www.sans.org Third Parties in the Breach Chain Source: The Aerospace Corp.
  • 15. © 2017 The SANS™ Institute – www.sans.org Mobility and the Cloud  A mobile, distributed workforce is the norm  The cloud exacerbates that trend  The bad guys have figured this out  Visibility and mitigation need to be extended Source: Citrix
  • 16. © 2017 The SANS™ Institute – www.sans.org SaaS Is a Given, PaaS Is Happening, IaaS Is Growing Nontraditional Application Ecosystems Good Old Data Center Data.gov Wired/Wireless Internet
  • 17. © 2017 The SANS™ Institute – www.sans.org The Internet of Vulnerable Things
  • 18. © 2017 The SANS™ Institute – www.sans.org “Obviously, some people here do not appreciate the gravity of our situation.” Increasing Boards of Directors’ Focus
  • 19. © 2017 The SANS™ Institute – www.sans.org The Messages Back from Directors “Security people don’t speak our language. In fact, at each briefing they seem to speak a different language.” “The CISO is great at talking about ‘blood in the streets’ but very weak on strategy to avoid disasters.” “We know bad things will happen — the CEO and CFO and VPs inform us of business problems frequently. We want to have confidence that basic competence and strategies are in place to reduce bottom line impact.” “The board is not an ATM — we are not here to give you resources.” “A big part of being believable and building our trust is showing us how we compare to competitors, other industries, some kind of standards or benchmarks.”
  • 20. © 2017 The SANS™ Institute – www.sans.org 20 Delivering Security Efficiency and Effectiveness Decrease the cost of dealing with known threats Decrease the impact of residual risks Decrease the cost of demonstrating compliance Reduce business damage due to security failures Maintain level of protection with less EBITDA impact Increase the speed of dealing with a new threat or technology Decrease the time required to secure a new business application, partner or supplier Reduce incident cost Reduce downtime Decrease customer defections Position security as a competitive business factor Efficiency Effectiveness
  • 21. © 2017 The SANS™ Institute – www.sans.org 21 Good News: Many Organizations Avoided or Reduced Damage 980 breaches in 2016 – What did the other 9,020 of the F10000 do differently? – (781 in 2015) On average, 36K records exposed per breach – What did those that limited breach size do differently? – (Average = 215K in 2015) Almost invariably, the organizations with the least cyber incident impact have the strongest CISOs and security teams. Source: Identity Theft Resource Center
  • 22. © 2017 The SANS™ Institute – www.sans.org 22 Some Things Don’t Change Sample Red/Yellow/Green Metric 1 2 3 4 5 6 7 8 9 101112 13 14 15 16 17 18 19 20 Center for Internet Security Critical Security Controls Prevention Detection & Response Identity, Access, Governance & Architecture
  • 23. © 2017 The SANS™ Institute – www.sans.org 23 CISO Hot Topic: Application Security Problem: Healthcare company needs to reduce threat exposure and bug fix costs across all corporate applications. Solution: Focus on Secure (and Agile!) Software Development Lifecycle Results: – Defect density decreased by 92% for high/moderate vulnerabilities – Apps using secure library increased each month – Threat modeling approach reduced resource time from 40 hours to 2 – Overall CDLC productivity increase of 15% estimated
  • 24. © 2017 The SANS™ Institute – www.sans.org 24 When You Get Back to Work Threats evolve but still need vulnerabilities to exploit – Reduce people-attack aperture – Decrease time to detect and mitigate software vulnerabilities Make sure you are collecting the right security metrics so you can demonstrate value, improvement, danger—and connection to business goals. Take advantage of any transitions coming: – Moving to Windows 10, cloud services, mobile apps, agile dev, etc. – M&A, re-org, new C-level management – Audit results Identify high-leverage, short-term basic-security-hygiene win to gain trust Grab a few third rails!
  • 25. DevSecOps Building Continuous Security into IT and Application Infrastructures Chris Carlson VP, Product Management Qualys
  • 27. Waterfall vs. Agile Dev Methodologies
  • 28. Waterfall vs. Agile Dev Methodologies
  • 29. Agile (Dev) + Deploy (Ops)  Automation
  • 30. Where do Security Assessments Fit?
  • 32. Apply Shift Left to Security?
  • 33. Transparent Security or Process Blockers
  • 34. DevOps + Security: Friend or Foe?
  • 36. Integrate Security into the CI/CD Process
  • 37. Shift Left Security – Continuous Security
  • 38. DevSecOps – How to Accelerate Usage
  • 40. Next Steps and What Works
  • 41. Next Steps and What Works
  • 42. Next Steps and What Works
  • 43. Thank You Chris Carlson ccarlson@qualys.com VP, Product Management, Qualys www.qualys.com
  • 44. © 2017 The SANS™ Institute – www.sans.org
  • 45. © 2017 The SANS™ Institute – www.sans.org Resources SANS : https://www.sans.org/webcasts/archive/20167 What Works: https://www.sans.org/critical-security- controls SANS SOC – https://www.sans.org/event/security- operations-center-summit-2017 Qualys: https://www.Qualys.com/ Questions: q@sans.org @John_Pescatore ccarlson@qualys.com
  • 46. © 2017 The SANS™ Institute – www.sans.org Acknowledgments Thanks to our sponsor: And also to our speaker and to our attendees: Thank you for joining us today