SlideShare uma empresa Scribd logo
1 de 43
Sleeping With The Enemy:  Better Living Through Hacking Compliance  (budgets) Or Navigating the Corridors of the  Compliance Industrial Complex January, 2010
In a nutshell Compliance != Security A selection of frothy rants about PCI in particular, then “But Nick? What can I, a mere infosec professional, do?”; A New and Improved Way to Articulate Risk; Scattered throughout: Propaganda, crypto-advertising for TRM (when you engage TRM as a consultant, you and your boss become measurably more attractive to the opposite sex.)
Compliance != Security Compliance == Compliance Are you  {compliant|secure}  like this guy is {compliant|secure} ?
Compliance & DLP What the hell does a rant about compliance have to do with DLP?  Well, if you’re like most infosec professionals,  You’re tasked with reducing data loss; and You’re tasked with increasing compliance tasks and reducing audit dings for, you know, everything I aver these goals are in conflict
DLP is not a Technology Issue  Ironically, this is being presented at a conference called, WhatWorks in DLP  Note, ladies and gentlemen, the Red Square of Death. Image: The 451 Group, Mind The Data Gap, June 2008, http://www.the451group.com
Why Rulesets Exist Ruleset writers aren’t evil, but they are reactive SOX, HIPAA, PCI – all were in response to a specific problem All attempt to raise the level of overall “security” How they do so is the problem Some rulesets are less cynical than others
PCI on PCI “The PCI Security Standards Council’s mission is to enhance payment account data security by driving education and awareness of the PCI Security Standards. The organization was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide, and Visa, Inc.”
“Not worthless.” “I do not believe the PCI Standards are worthless; in the absence of other requirements, they do serve some purpose. But I do want to dispel the myth once and for all that PCI compliance is enough to keep a company secure. It is not, and the credit card companies acknowledge that.” -Rep. Yvette D Clarke (D-N.Y.) chairwoman of the Subcommittee On Emerging Threats, Cybersecurity and Science and Technology,  Committee on Homeland Security
The PCI Dilemma PCI says it wants to, “Raise the bar” by setting forth some highly specific tasks and standards.  Unfortunately they were specific to a paradigm gone by, and those who don’t comply get fined and hassled For offloading risk from card brands, PCI has raised the bar. For data security, not only has PCI not, “raised the floor,” in fact it’s substantially lowered the ceiling Because it is expensive in terms of money and resources, PCI is not the minimum standard, it’s the maximum effort that many organizations make.
Why Compliance is InfoSec’s Problem As punishment for making everything so complicated, information security professionals have been saddled with compliance management.
OK, here’s really why…	 Enron. Yelling.  SOX. “Oh, crap – who’s going to deal with this? Hey! Information Security!”
The CEO should do better The CEO who lets the Security organization become the compliance department has abdicated to the government and Payment Card Industry his responsibility to understand and manage organizational risk.  That is a fiduciary breach of his responsibility to shareholders. In addition to firing his ass, this should also be a floggable offense.
Here’s why present-day implementations of PCI are not just not good for security, but why they’re antithetical to good security.
Setting The Bar … at 1984 We’re in an Orwellian IT universe, and criminals are Big Brother  They have better configuration management data on us than our own information security groups.  They know exactly what we’re doing because PCI tells them what we’re doing. They have rapidly evolving and advanced persistent threats, new generations of attack tools and a wildly changed attack paradigm We have anti-virus and IDS/IPS and firewalls
When Rules & Taxes Matter When government wishes to discourage behavior, they have options: They can shunt it off to someone else (“Faith Based Community Initiatives,” etc They can tax it They can legislate it Taxes and legislation clearly discourage behaviors…
Smoking in New York City March, 2003: Smoking banned at NYC restaurants, bars, nightclubs
Smoking deaths in NYC
Teen Smoking Rates in NYC * no data available for 2007
Now, let’s look at how well PCI has worked to prevent loss of PII
Records Lost…. 2006: PCI 1.1 PCI 1.0 2008: PCI 1.2
Records Lost…. SEPT 2006: PCI 1.1 DEC 2004: PCI 1.0 OCT 2008: PCI 1.2
Records Lost Per Breach
An opposing view
A retort “From all accounts it appears that many of the murders and drug-smuggling operations can be attributed to the Mafia. What would the world look like if we ignored their crimes when measuring the success of policing efforts?”
Statistics Manipulation Of course, I’m being intellectually dishonest with my statistics on PCI.  In the slides about smoking we deal with known and proved risks and threats.  The PCI council behaves as if it is too, but security is a dynamic, transactional environment comprising constantly evolving technology. PCI makes specific statements about security which are suspect at any point in time let alone in a continuum, and pretends it’s delivering consistent effect against a static equation.  Logicians call this behavior, “Stupid.”  Okay, they call it “Confounded thinking.”
The Trouble With PCI SOX, HIPAA, etc made their goals clear and the means vague. This caused confusion, but the market sorted it out.  PCI is a compilation of a hunches on how to prevent breaches: the specific means to the desired end (that is, to offload risk onto merchants).  How about not confusing the means and end? Just punish the failure to secure data, and let the free market figure out how best to prevent breaches.
PCI is a Protection Racket by a Cabal. Ponemon 2009 PCI DSS Compliance Study: 71% of companies don’t treat PCI as a strategic initiative  79% have experienced a data breach 56% don’t believe PCI compliance improves their data security posture 60 % say they can’t achieve PCI compliance Recent studies say 30% of the IT security budget is spent on PCI compliance Let’s call it 20%. TWENTY PERCENT. Plus, when you’re breached, you got your fines and your publicity hit. That’s a regressive, unofficial tax for which we get back nothing. And the card brands get to offload risk onto merchants.
If we’re gonna tax, let’s tax… D’OH!TAX Fun Fact: This tax will hit many banks! D’OH!TAX THE a. $1,000 per record breached; b. Raises $250,000,000,000 for deficit reduction – WHAT bailout?; c. Replaces all PCI requirements; d. All other fines & reporting requirements still apply
While I’m in Fantasy Land… I also want a pony.
What is to be done?
First of all… Join the rebel alliance. Don’t let a dismal failure be held up as a success: Loose lips sink ships - let’s sink one:  be vocal about PCI failures and how they affect your job, your happiness and your effectiveness as an info-security pro. Because if you don’t speak up, other rule-writers will hold up PCI as the model of how this stuff should be done.
Be Constructive Rather than berate something which isn’t going away, let’s work to change these arbitrarily objective compliance overviews like PCI into subjective risk analysis tools. Let’s be wiser about how we look at PCI and use it as a lever to free up budget funds for things that we, as security professionals, believe will positively impact the bottom line.
Then… Reduce the suck. Work the system as best you can. Question – loudly – things that seem like window-dressing. Ask, “What is the intent of this?”  Use compliance requirements to justify spending on sensible things, like greatly expanding pen testing, or setting up an incident response workbench.
Compensating Controls If you are not engaged deeply with your QSA in substantive conversations regarding compensating controls, you either don’t care, or:   You don’t understand your environment;  You don’t understand the requirements; and  You are wasting lots of money on PCI.  You pay those people.  Make them work for you.
Let’s Get Back To Basics
“If you can’t measure, you can’t improve.”  Well, yeah, but… Right now, we’re counting things that help the vendors sell us stuff. Not only do we count these things, we let vendors tell us how important one is relative to another! It’s fine to count things, but if you’re counting the things that matter to the vendors, not to your business, you’re not doing yourself any favors According to this, everything’s getting better! Awesome!
Every business is different	 A fashion house can’t tell a media firm what’s important; hell, one media firm can’t tell another what’s important. This is not just cross industry – it’s true in the same company three months later!  Each pen tester, each auditor will have different results even in the same company
This is so not news Andy Jaquith, Dan Geer, Betsy Nichols, et al have been talking about this for a wicked-long time. Yet in conversations around the country, the counting thing is still mainly based on : ,[object Object]
Vulns – and the relative terror thereof,[object Object]
Articulating Risk How do you articulate risk?  Doctors listen most to mom’s statements like, “Something’s just not right.” Say to your CIO, “This feels icky” How Icky? On a scale of 1 to eeew! Eeeeeeew A little
An Example PCI 12.2 talks about internal and external pen testing teams.  There is great bang-for-buck setting up internal pen-testing team: To talk to pen testers To test patches, controls To enumerate hosts, processes, workflows To understand your environment To understand and positively affect config management
Pick Your Battles Find out what you care about Attach your team to revenue producing projects Use PCI and compliance as a lever the budget Speak in terms of risk, not threat Count metrics that speak in dollars and time Yell when compliance makes you do something dumb or hate your job
Questions? Contact us: Nick Selby, Managing Director nick.selby [ at] tridentrm.com Paul Davis, Chief Security Officer paul.davis[at ]tridentrm.com Clint Bruce, Chairman c.Bruce (at ) trg-ltd.com

Mais conteúdo relacionado

Mais procurados

2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide
James Fisher
 
Snia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaSnia Eiw2007 Peter Mojica
Snia Eiw2007 Peter Mojica
Peter Mojica
 
Dr. jeanne ross interview health check
Dr. jeanne ross interview  health checkDr. jeanne ross interview  health check
Dr. jeanne ross interview health check
Computer Aid, Inc
 
Adding Value with Business Intelligence
Adding Value with Business IntelligenceAdding Value with Business Intelligence
Adding Value with Business Intelligence
Birlasoft India
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
Michael Solomon
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
Daniel Katz
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
Shawn Tuma
 

Mais procurados (20)

2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide
 
Ey Lets Talk Sustainability (August 2016)
Ey Lets Talk Sustainability (August 2016)Ey Lets Talk Sustainability (August 2016)
Ey Lets Talk Sustainability (August 2016)
 
Achieving Regulatory Compliance The Devil Is In The Data Governance V2
Achieving Regulatory Compliance   The Devil Is In The Data Governance V2Achieving Regulatory Compliance   The Devil Is In The Data Governance V2
Achieving Regulatory Compliance The Devil Is In The Data Governance V2
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
Netflix SIRT - Culture and Tech -Trainman
Netflix SIRT - Culture and Tech -TrainmanNetflix SIRT - Culture and Tech -Trainman
Netflix SIRT - Culture and Tech -Trainman
 
Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)Towards a Trustmark for IoT (May 2018)
Towards a Trustmark for IoT (May 2018)
 
Snia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaSnia Eiw2007 Peter Mojica
Snia Eiw2007 Peter Mojica
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
 
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)
 
Dr. jeanne ross interview health check
Dr. jeanne ross interview  health checkDr. jeanne ross interview  health check
Dr. jeanne ross interview health check
 
The other world of it
The other world of itThe other world of it
The other world of it
 
Defensible rim disposal leads to effective discovery responses - 2011.08.09
Defensible rim disposal leads to effective discovery responses - 2011.08.09Defensible rim disposal leads to effective discovery responses - 2011.08.09
Defensible rim disposal leads to effective discovery responses - 2011.08.09
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
 
Adding Value with Business Intelligence
Adding Value with Business IntelligenceAdding Value with Business Intelligence
Adding Value with Business Intelligence
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 

Destaque

Brendan Wenzel Design&Animation
Brendan Wenzel Design&AnimationBrendan Wenzel Design&Animation
Brendan Wenzel Design&Animation
Brendanwenzel
 
台灣熱血單車環島 2010
台灣熱血單車環島 2010台灣熱血單車環島 2010
台灣熱血單車環島 2010
Angus C
 
Deranged Script
Deranged ScriptDeranged Script
Deranged Script
Teesha29
 
materi pajak
materi pajakmateri pajak
materi pajak
shutrwin
 
'Deranged' Feedback
'Deranged' Feedback'Deranged' Feedback
'Deranged' Feedback
Teesha29
 
AS Media Questionnaire Evaluation
AS Media Questionnaire EvaluationAS Media Questionnaire Evaluation
AS Media Questionnaire Evaluation
Teesha29
 
Tutorial menyecan dengan ac dsee
Tutorial menyecan dengan ac dseeTutorial menyecan dengan ac dsee
Tutorial menyecan dengan ac dsee
shutrwin
 
Storyboard For Preliminary Excercise
Storyboard For Preliminary ExcerciseStoryboard For Preliminary Excercise
Storyboard For Preliminary Excercise
Teesha29
 
Weizmann Uk Annual Accounts Final
Weizmann Uk Annual Accounts FinalWeizmann Uk Annual Accounts Final
Weizmann Uk Annual Accounts Final
guest7c6a7fb
 

Destaque (14)

Brendan Wenzel Design&Animation
Brendan Wenzel Design&AnimationBrendan Wenzel Design&Animation
Brendan Wenzel Design&Animation
 
台灣熱血單車環島 2010
台灣熱血單車環島 2010台灣熱血單車環島 2010
台灣熱血單車環島 2010
 
Deranged Script
Deranged ScriptDeranged Script
Deranged Script
 
2012 Subaru Impreza WRX For Sale NY | Subaru Dealer Near Buffalo
2012 Subaru Impreza WRX For Sale NY | Subaru Dealer Near Buffalo2012 Subaru Impreza WRX For Sale NY | Subaru Dealer Near Buffalo
2012 Subaru Impreza WRX For Sale NY | Subaru Dealer Near Buffalo
 
materi pajak
materi pajakmateri pajak
materi pajak
 
'Deranged' Feedback
'Deranged' Feedback'Deranged' Feedback
'Deranged' Feedback
 
AS Media Questionnaire Evaluation
AS Media Questionnaire EvaluationAS Media Questionnaire Evaluation
AS Media Questionnaire Evaluation
 
Philof21centurylearning
Philof21centurylearningPhilof21centurylearning
Philof21centurylearning
 
Tutorial menyecan dengan ac dsee
Tutorial menyecan dengan ac dseeTutorial menyecan dengan ac dsee
Tutorial menyecan dengan ac dsee
 
Storyboard For Preliminary Excercise
Storyboard For Preliminary ExcerciseStoryboard For Preliminary Excercise
Storyboard For Preliminary Excercise
 
2010 Subaru Tribeca Buffalo
2010 Subaru Tribeca Buffalo2010 Subaru Tribeca Buffalo
2010 Subaru Tribeca Buffalo
 
S Ohlhoff Sport Mega Conference Stellenbosch Presentation Dec 2009
S Ohlhoff Sport Mega Conference Stellenbosch Presentation Dec 2009S Ohlhoff Sport Mega Conference Stellenbosch Presentation Dec 2009
S Ohlhoff Sport Mega Conference Stellenbosch Presentation Dec 2009
 
Psa science tech idol ii update 3
Psa science tech idol ii update 3Psa science tech idol ii update 3
Psa science tech idol ii update 3
 
Weizmann Uk Annual Accounts Final
Weizmann Uk Annual Accounts FinalWeizmann Uk Annual Accounts Final
Weizmann Uk Annual Accounts Final
 

Semelhante a SANS WhatWorks - Compliance & DLP

Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Sherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Sherry Jones
 
Building World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsBuilding World Class Cybersecurity Teams
Building World Class Cybersecurity Teams
Joyce Brocaglia
 
Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)
ClubHack
 

Semelhante a SANS WhatWorks - Compliance & DLP (20)

11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Myths of PCI DSS
Myths of PCI DSSMyths of PCI DSS
Myths of PCI DSS
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Building World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsBuilding World Class Cybersecurity Teams
Building World Class Cybersecurity Teams
 
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity component
 
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - Hackers
 
Table of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber SecurityTable of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber Security
 
PCI 2010: Trends and Technologies
PCI 2010: Trends and TechnologiesPCI 2010: Trends and Technologies
PCI 2010: Trends and Technologies
 
The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being Compliant
 
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
 
Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)Data theft in india (K K Mookhey)
Data theft in india (K K Mookhey)
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
 
PCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and RealityPCI DSS Myths 2009: Myths and Reality
PCI DSS Myths 2009: Myths and Reality
 
The High Price Of Faking Your Pci Compliance Status
The High Price Of Faking Your Pci Compliance StatusThe High Price Of Faking Your Pci Compliance Status
The High Price Of Faking Your Pci Compliance Status
 
PCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton Chuvakin
PCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton ChuvakinPCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton Chuvakin
PCI DSS Myths 2010: Why Are They STILL Alive by Dr. Anton Chuvakin
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

SANS WhatWorks - Compliance & DLP

  • 1. Sleeping With The Enemy: Better Living Through Hacking Compliance (budgets) Or Navigating the Corridors of the Compliance Industrial Complex January, 2010
  • 2. In a nutshell Compliance != Security A selection of frothy rants about PCI in particular, then “But Nick? What can I, a mere infosec professional, do?”; A New and Improved Way to Articulate Risk; Scattered throughout: Propaganda, crypto-advertising for TRM (when you engage TRM as a consultant, you and your boss become measurably more attractive to the opposite sex.)
  • 3. Compliance != Security Compliance == Compliance Are you {compliant|secure} like this guy is {compliant|secure} ?
  • 4. Compliance & DLP What the hell does a rant about compliance have to do with DLP? Well, if you’re like most infosec professionals, You’re tasked with reducing data loss; and You’re tasked with increasing compliance tasks and reducing audit dings for, you know, everything I aver these goals are in conflict
  • 5. DLP is not a Technology Issue Ironically, this is being presented at a conference called, WhatWorks in DLP Note, ladies and gentlemen, the Red Square of Death. Image: The 451 Group, Mind The Data Gap, June 2008, http://www.the451group.com
  • 6. Why Rulesets Exist Ruleset writers aren’t evil, but they are reactive SOX, HIPAA, PCI – all were in response to a specific problem All attempt to raise the level of overall “security” How they do so is the problem Some rulesets are less cynical than others
  • 7. PCI on PCI “The PCI Security Standards Council’s mission is to enhance payment account data security by driving education and awareness of the PCI Security Standards. The organization was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide, and Visa, Inc.”
  • 8. “Not worthless.” “I do not believe the PCI Standards are worthless; in the absence of other requirements, they do serve some purpose. But I do want to dispel the myth once and for all that PCI compliance is enough to keep a company secure. It is not, and the credit card companies acknowledge that.” -Rep. Yvette D Clarke (D-N.Y.) chairwoman of the Subcommittee On Emerging Threats, Cybersecurity and Science and Technology, Committee on Homeland Security
  • 9. The PCI Dilemma PCI says it wants to, “Raise the bar” by setting forth some highly specific tasks and standards. Unfortunately they were specific to a paradigm gone by, and those who don’t comply get fined and hassled For offloading risk from card brands, PCI has raised the bar. For data security, not only has PCI not, “raised the floor,” in fact it’s substantially lowered the ceiling Because it is expensive in terms of money and resources, PCI is not the minimum standard, it’s the maximum effort that many organizations make.
  • 10. Why Compliance is InfoSec’s Problem As punishment for making everything so complicated, information security professionals have been saddled with compliance management.
  • 11. OK, here’s really why… Enron. Yelling. SOX. “Oh, crap – who’s going to deal with this? Hey! Information Security!”
  • 12. The CEO should do better The CEO who lets the Security organization become the compliance department has abdicated to the government and Payment Card Industry his responsibility to understand and manage organizational risk. That is a fiduciary breach of his responsibility to shareholders. In addition to firing his ass, this should also be a floggable offense.
  • 13. Here’s why present-day implementations of PCI are not just not good for security, but why they’re antithetical to good security.
  • 14. Setting The Bar … at 1984 We’re in an Orwellian IT universe, and criminals are Big Brother They have better configuration management data on us than our own information security groups. They know exactly what we’re doing because PCI tells them what we’re doing. They have rapidly evolving and advanced persistent threats, new generations of attack tools and a wildly changed attack paradigm We have anti-virus and IDS/IPS and firewalls
  • 15. When Rules & Taxes Matter When government wishes to discourage behavior, they have options: They can shunt it off to someone else (“Faith Based Community Initiatives,” etc They can tax it They can legislate it Taxes and legislation clearly discourage behaviors…
  • 16. Smoking in New York City March, 2003: Smoking banned at NYC restaurants, bars, nightclubs
  • 18. Teen Smoking Rates in NYC * no data available for 2007
  • 19. Now, let’s look at how well PCI has worked to prevent loss of PII
  • 20. Records Lost…. 2006: PCI 1.1 PCI 1.0 2008: PCI 1.2
  • 21. Records Lost…. SEPT 2006: PCI 1.1 DEC 2004: PCI 1.0 OCT 2008: PCI 1.2
  • 24. A retort “From all accounts it appears that many of the murders and drug-smuggling operations can be attributed to the Mafia. What would the world look like if we ignored their crimes when measuring the success of policing efforts?”
  • 25. Statistics Manipulation Of course, I’m being intellectually dishonest with my statistics on PCI. In the slides about smoking we deal with known and proved risks and threats. The PCI council behaves as if it is too, but security is a dynamic, transactional environment comprising constantly evolving technology. PCI makes specific statements about security which are suspect at any point in time let alone in a continuum, and pretends it’s delivering consistent effect against a static equation. Logicians call this behavior, “Stupid.” Okay, they call it “Confounded thinking.”
  • 26. The Trouble With PCI SOX, HIPAA, etc made their goals clear and the means vague. This caused confusion, but the market sorted it out. PCI is a compilation of a hunches on how to prevent breaches: the specific means to the desired end (that is, to offload risk onto merchants). How about not confusing the means and end? Just punish the failure to secure data, and let the free market figure out how best to prevent breaches.
  • 27. PCI is a Protection Racket by a Cabal. Ponemon 2009 PCI DSS Compliance Study: 71% of companies don’t treat PCI as a strategic initiative 79% have experienced a data breach 56% don’t believe PCI compliance improves their data security posture 60 % say they can’t achieve PCI compliance Recent studies say 30% of the IT security budget is spent on PCI compliance Let’s call it 20%. TWENTY PERCENT. Plus, when you’re breached, you got your fines and your publicity hit. That’s a regressive, unofficial tax for which we get back nothing. And the card brands get to offload risk onto merchants.
  • 28. If we’re gonna tax, let’s tax… D’OH!TAX Fun Fact: This tax will hit many banks! D’OH!TAX THE a. $1,000 per record breached; b. Raises $250,000,000,000 for deficit reduction – WHAT bailout?; c. Replaces all PCI requirements; d. All other fines & reporting requirements still apply
  • 29. While I’m in Fantasy Land… I also want a pony.
  • 30. What is to be done?
  • 31. First of all… Join the rebel alliance. Don’t let a dismal failure be held up as a success: Loose lips sink ships - let’s sink one: be vocal about PCI failures and how they affect your job, your happiness and your effectiveness as an info-security pro. Because if you don’t speak up, other rule-writers will hold up PCI as the model of how this stuff should be done.
  • 32. Be Constructive Rather than berate something which isn’t going away, let’s work to change these arbitrarily objective compliance overviews like PCI into subjective risk analysis tools. Let’s be wiser about how we look at PCI and use it as a lever to free up budget funds for things that we, as security professionals, believe will positively impact the bottom line.
  • 33. Then… Reduce the suck. Work the system as best you can. Question – loudly – things that seem like window-dressing. Ask, “What is the intent of this?” Use compliance requirements to justify spending on sensible things, like greatly expanding pen testing, or setting up an incident response workbench.
  • 34. Compensating Controls If you are not engaged deeply with your QSA in substantive conversations regarding compensating controls, you either don’t care, or: You don’t understand your environment; You don’t understand the requirements; and You are wasting lots of money on PCI. You pay those people. Make them work for you.
  • 35. Let’s Get Back To Basics
  • 36. “If you can’t measure, you can’t improve.” Well, yeah, but… Right now, we’re counting things that help the vendors sell us stuff. Not only do we count these things, we let vendors tell us how important one is relative to another! It’s fine to count things, but if you’re counting the things that matter to the vendors, not to your business, you’re not doing yourself any favors According to this, everything’s getting better! Awesome!
  • 37. Every business is different A fashion house can’t tell a media firm what’s important; hell, one media firm can’t tell another what’s important. This is not just cross industry – it’s true in the same company three months later! Each pen tester, each auditor will have different results even in the same company
  • 38.
  • 39.
  • 40. Articulating Risk How do you articulate risk? Doctors listen most to mom’s statements like, “Something’s just not right.” Say to your CIO, “This feels icky” How Icky? On a scale of 1 to eeew! Eeeeeeew A little
  • 41. An Example PCI 12.2 talks about internal and external pen testing teams. There is great bang-for-buck setting up internal pen-testing team: To talk to pen testers To test patches, controls To enumerate hosts, processes, workflows To understand your environment To understand and positively affect config management
  • 42. Pick Your Battles Find out what you care about Attach your team to revenue producing projects Use PCI and compliance as a lever the budget Speak in terms of risk, not threat Count metrics that speak in dollars and time Yell when compliance makes you do something dumb or hate your job
  • 43. Questions? Contact us: Nick Selby, Managing Director nick.selby [ at] tridentrm.com Paul Davis, Chief Security Officer paul.davis[at ]tridentrm.com Clint Bruce, Chairman c.Bruce (at ) trg-ltd.com

Notas do Editor

  1. Brian Krebs on the increasing levels of data loss through paper.
  2. In July, 2002, Mayor Bloomberg raised the tax on cigarettes in New York City to ensure that they would have a minimum sales price of $7.50 a pack. This was done, he said, to spare the city the expense of thousands of smoking-related deaths and illnesses each year. The city backed this up with smoking cessation education, programs and support. Smoking has declines 27% in New York City since the tax was introduced; Smoking related deaths are down from more than 200 per 100,000 in 2002 to about 160 per 100,000 in 2007. Teen smoking fell from 18% of New York City teenagers in 2001 to 8.5% in 2007.