Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at...

24
BREACH FIXATION HOW BREACHES DISTORT REALITY AND HOW WE SHOULD RESPOND

Transcript of Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at...

Page 1: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

BREACH FIXATIONHOW BREACHES DISTORT REALITY AND HOW WE SHOULD RESPOND

Page 2: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

MY BACKGROUND

• 20+ Year Security Professional•Denim Group Principal•MBA Strategy Guy• ISSA Distinguished Fellow• Security Conference Speaker•Dark Reading Columnist• Twitter: @johnbdickson

Page 3: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

DENIM GROUP | COMPANY BACKGROUND• Trusted advisor on all matters of software risk

• External application & network assessments• Web, mobile, and cloud• Software development lifecycle development (SDLC) consulting• Network and infrastructure where applications reside

• Secure development services:• Secure application development & remediation

•Managed security services•Developed ThreadFix

Page 4: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

4

ANYBODY REMEMBER THIS GUY?

Page 5: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

5

HIS NEW HOME

Page 6: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

6

WHY IS THIS IMPORTANT?

The day security became important to business executives

Page 7: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

7

BREACH FIXATION OVERVIEW

•What is Breach Fixation?•How Does Breach Fixation Manifest Itself?•How you can Use Breach Fixation to Your Advantage

Page 8: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

8

BREACH FIXATION OVERVIEW

Page 9: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

9

BREACH FIXATION • A phenomena created by media fixation on breach stories• Breach Fixation distorts reality by putting most of the focus on external activities that we don’t control…• At the expense of internal security activities that we do• Affects strategy and resource allocation in a potentially negative way• Takes focus away from addressing the root cause while treating the symptom

Page 10: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

10

WHAT DRIVES MEDIA CONSUMPTION?

Page 11: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

11

BREACH FIXATION

•Does anyone know the top security stories consumed by readers of the major security publications?

Page 12: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

12

A RUBBERNECKING CULTURE?

Page 13: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

13

WHAT’S HOT IN SECURITY• Breaches• APT & Zero Days• External Threats• Cyberwar• Russians, Chinese, Iranians, oh my!• Finding Vulnerabilities

Page 14: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

14

WHAT’S NOT…• Internal Security Practices• Coding Standards• Patch Management•User Awareness• Actually Fixing Vulnerabilities

Page 15: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

15

WHAT DOES THAT CREATE?• A Situation Where Basic Security Blocking & Tackling Remains Problematic• Window of Exposure of Application Vulnerabilities Remains Egregious• Well-known Security Weaknesses Continue to be an Avenue of Approach for

Attackers• Outside the largest and most sophisticated organizations, security only

covers a subset of the enterprise

Page 16: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

16

WHAT DOES THAT CREATE?• A Situation Where External Threats Might Distract Security Focus• Whipsawed by #ToD (Threat of the Day) or #YABS (Yet Another Breach Story)• “Incumbent Spend” around FW, Endpoint, AV, dwarf other areas• Focus on latest outwardly-focuses security “shiny rock” technologies as

panaceas

Page 17: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

17

THE RISK?• Returning to a FUD Culture…

Page 18: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

18

EXAMPLES OF IMPACT• Press DDoS on speaker by the entire media•Gartner: By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, up from less than 20% in 2015.• EY: A Shift to “Active Defense” and its implications• A cautionary tale: State of Texas Public Utilities Commission war story

Page 19: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

19

HOW CAN YOU ADDRESS BREACH FIXATION• Recognize Breach Fixation When a Layperson (e.g., “Executive”) References it.• The First Step to Recovery is Admitting you have a Problem!

Page 20: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

20

HOW CAN YOU ADDRESS BREACH FIXATION• Constantly Quantify Internal Security Posture

• Measure, measure, measure

Page 21: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

21

HOW TO USE BREACH FIXATION TO YOUR ADVANTAGE

•Use the Positive Force from the Attack Side & Map to Your Strategy

Page 22: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

22

OTHER STRATEGIES USE BREACH FIXATION…

Page 23: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

23

WRAP UP• Breach Fixation distorts reality by putting most of the focus on external security activities that we don’t control at the expense of internal security that we do.• Sophisticated security practitioners understand how Breach Fixation can help or hurt them, if not managed•Once recognized, there are several basic strategies that one can use to take advantage of Breach Fixation

Page 24: Breach Fixation: How Breaches Distort Reality And How We Should Respond- John Dickson, Principal at Denim Group, Ltd

QUESTIONS AND ANSWERS

John B. Dickson, CISSP@johnbdickson