information security course for executives

25
Information Security for Executives Free webinar Iftach Ian Amit

Upload: jody-keyser

Post on 14-Jan-2015

811 views

Category:

Business


1 download

DESCRIPTION

Information Security Latest TrendsConvergence onto Security Platforms: Endpoint, Email security gateway, Web security gateway, and Next-generation firewallVirtualization: Virtualization of security controls will alter the information security landscape.Cloudification: How to enforce an enterprise security policy in the cloud age?Externalization: How to be open, social and encourage secure collaboration with external entities?Consumerization: Increasingly, employees want to use their consumer technology (systems and software) for business use.Operationalization: Need a strategy / R&D and an operational component to security. The strategy / R&D team needs to have time and resources to tackle the new and emerging threats.Application SecurityMethodology Threats, Attacks, Vulnerabilities, and CountermeasuresApplication Threats / AttacksMobile Application SecuritySecurity testing for applicationsSecurity standards and regulationsInformation Risk ManagementUnderstanding your riskMeasuring and quantifying your riskManaging your riskOptimizing expensesPresented by: Security Art Security Art is an information security and risk management consulting and advisory boutique. They use a multi-disciplinary approach with years of hands-on experience giving businesses the strategic path to address all their information security and risk management needs.

TRANSCRIPT

Page 1: Information Security Course for Executives

Information Securityfor Executives

Free webinar

Iftach Ian Amit

Page 2: Information Security Course for Executives

Agenda• Latest Trends• Application Security• Risk Management

Page 3: Information Security Course for Executives

Latest Trends in Information Security

• Convergence• Virtualization• Cloudification• Externalization• Consumerization• Operationalization

Page 4: Information Security Course for Executives

Convergence• Endpoint (forget desktops...)• e-mail• Web• “next-gen” firewalls

Page 5: Information Security Course for Executives

Virtualization and Cloudification

Page 6: Information Security Course for Executives

Externalization• Are you on LinkedIn?• Facebook?• Are your customers?• Partners?• Competitors?

Page 7: Information Security Course for Executives

Consumerization

Page 8: Information Security Course for Executives

Operationalization

Page 9: Information Security Course for Executives

Agenda• Latest Trends• Application Security• Risk Management

Page 10: Information Security Course for Executives

Application Security• Methodology• Threats, attacks, exposure surface• Application threats• Mobile• Testing• Regulation/Compliance?

Page 11: Information Security Course for Executives

Methodology

“If you have an application with more than a single purpose interface, you are most likely to have a vulnerability in it”

[wise-old-sage]

This is why we have such a high success rate in pen-

tests...

Page 12: Information Security Course for Executives

Threats, Attacks and Exposure Surface

• Extreme coverage over the past 10 years• Not a lot of solutions– That you can “buy and forget”

• Back to the human factor–Which is harder to fix...

Page 13: Information Security Course for Executives

Application Threats• XSS• CSRF• SQL Injection• Parameter tampering• Session hijacking

Page 14: Information Security Course for Executives

Mobile“And now, make everything work on my

iPhone...” [management]

“And now, I have a chance to repeat every mistake again for this new platform”

[development]

Page 15: Information Security Course for Executives

Testing• Security never really fit into your QA

schedule didn’t it?

• Can you really think like the bad guys? Do you want to?

Page 16: Information Security Course for Executives

Regulation• That’s an easy one:

– Pay to get certified, right?

• It doesn’t really feel that much better now...

–Maybe we should get things fixed for real

– ...and still get certified

Page 17: Information Security Course for Executives

Agenda• Latest Trends• Application Security• Risk Management

Page 18: Information Security Course for Executives

Risk Management• What is your risk?• Measure, Quantify!• Manage• Optimize expenses

Page 19: Information Security Course for Executives

Identifying your Risks• What are the bad guys after?

• Simple...

Page 20: Information Security Course for Executives

Measuring Risk

From:“So, we pinpointed the one line of code

that caused this thing to fail...”

To:“This issue will cost us $1500 for every

time someone exploits it”

Page 21: Information Security Course for Executives

How to Measure?• Identify your (information) assets• Identify the threats for each asset– And their capability– And the controls that are in place to protect the

vulnerabilities– And their frequency

• Derive a loss event frequency• Estimate the loss magnitude

Page 22: Information Security Course for Executives

Managing Risk

Guesswhichone

is it???

Page 23: Information Security Course for Executives

Optimize• When done right, this can save you money:

– More focused measures to protect assets at risk

– Less vendor bloat

– Less external services required

– Improved development cycles

Page 24: Information Security Course for Executives

Don’t re-invent the wheel…

Use tried and tested methodologies and practices

All rights reserved to Security Art Ltd 2002 - 2009

FAIR (Factor Analysis of Information Risk)

Page 25: Information Security Course for Executives

And... we’re done!

Questions ?!

We are always at:• [email protected]• Hosted by: www.aliadocorp.com