how to effectively secure your assets

21
a globaledit bite-sized webinar Matt Glueckert Product Manager Enterprise Application Security @globaledit Ted Harrington Independent Security Evaluators

Upload: globaledit

Post on 17-Jul-2015

45 views

Category:

Business


2 download

TRANSCRIPT

Page 1: How to Effectively Secure your Assets

a globaledit bite-sized webinar

Matt GlueckertProduct Manager

Enterprise Application Security

@globaledit

Ted HarringtonIndependent Security Evaluators

Page 2: How to Effectively Secure your Assets

ISE Proprietary

About ISE

- Perspective - White Box

- Analysts - Hackers; Cryptographers; RE

- Exploits - iPhone; Android; Ford; Exxon; Diebold

- Research - Routers; NAS; Healthcare

- Customers - Companies w/valuable assets to protect

Page 3: How to Effectively Secure your Assets

ISE Proprietary

Secure Design Principles

Page 4: How to Effectively Secure your Assets

ISE Proprietary

Least Privilege

Page 5: How to Effectively Secure your Assets

ISE Proprietary

Least Privilege

Page 6: How to Effectively Secure your Assets

ISE Proprietary

Least Privilege

Page 7: How to Effectively Secure your Assets

ISE Proprietary

Defense in Depth

Page 8: How to Effectively Secure your Assets

ISE Proprietary

Defense in Depth

Traditional DefensesTraditional Attacks

Page 9: How to Effectively Secure your Assets

ISE Proprietary

Defense in Depth

Page 10: How to Effectively Secure your Assets

ISE Proprietary

Psychological Acceptability

Page 11: How to Effectively Secure your Assets

ISE Proprietary

Psychological Acceptability

CONFLICT IS GOOD!

Page 12: How to Effectively Secure your Assets

ISE Proprietary

Psychological Acceptability

Page 13: How to Effectively Secure your Assets

ISE Proprietary

Psychological Acceptability

Page 14: How to Effectively Secure your Assets

ISE Proprietary

Psychological Acceptability

Page 15: How to Effectively Secure your Assets

ISE Proprietary

Mitigating Risk

Page 16: How to Effectively Secure your Assets

ISE Proprietary

Threat Model

Assets

Adversaries

Architecture

Page 17: How to Effectively Secure your Assets

ISE Proprietary

Threat Model

Asset Value: Asset Value:

Page 18: How to Effectively Secure your Assets

ISE Proprietary

Adversary Motivation

Page 19: How to Effectively Secure your Assets

ISE Proprietary

Assessment Methodology

Page 20: How to Effectively Secure your Assets

ISE Proprietary

Assessment Methodology

Page 21: How to Effectively Secure your Assets

[email protected]

facebook.com/globaledit

@globaleditRetouching Workflow February 10th

2pm ET

Next Snackinar