what affects security program confidence? - may2014 - bill burns

28
1 What Affects Confidence In Security Programs? Rocky Mountain Information Security Conference 2014 Bill Burns | Executive-In-Residence | Scale Venture Partners | [email protected] | @x509v3

Upload: bill-burns

Post on 09-May-2015

393 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: What affects security program confidence? - may2014 - bill burns

1

What Affects Confidence In Security Programs?

Rocky Mountain Information Security Conference 2014

Bill Burns | Executive-In-Residence | Scale Venture Partners | [email protected] | @x509v3

Page 2: What affects security program confidence? - may2014 - bill burns

2

My Background

Production hybrid cloud security at scale–Deployed distributed, hybrid cloud WAF–Co-developed CloudHSM for IaaS hardware root of trust

Corporate IT “all-cloud” security strategy–Cloud-first, mobile-first infrastructure model–Mix of public cloud, best-of-breed SaaS

RSAC Program Committee, Startup Technical Advisory Boards, ISSA CISO Forum & Career Lifecycle

Previously:

Page 3: What affects security program confidence? - may2014 - bill burns

3

Agenda

Trends and Forcing Functions on Information Security

InfoSec’s Role in Managing Business Risk

Security Innovations, Market Needs

Early Research Results: Improving Confidence

Page 4: What affects security program confidence? - may2014 - bill burns

4

CISOs: “What Kept You Up Last Night?”

Source: Scale Venture Partners

Page 5: What affects security program confidence? - may2014 - bill burns

5

Agile/DevOpsBYOD

Shadow IT / Consumerization

Increased Regs/Compliance

Internet Of Things

IT AutomationMobile computing

SaaS

Ubiquitous Internet Access

Virtualization / IaaS

Weaponization of Internet / espionage

Work/Life Integration

Concern

Unconcern

Top Trends & Forcing Functions on InfoSec

Source: Scale Venture Partners

Page 6: What affects security program confidence? - may2014 - bill burns

6

Security Forcing Function – Mobility, BYOD

Source: Mary Meeker, KPCB

Page 7: What affects security program confidence? - may2014 - bill burns

7

Security Forcing Function – Mobility, BYOD

(1) Pew Research, Jan 2014 | (2) Gartner, May 2013

Smartphone - 58%

Tablet - 42%

By 2017, 50% of employers will require you to BYOD[2] for work.

Page 8: What affects security program confidence? - may2014 - bill burns

8

Security Forcing Function – Work Anywhere

Blurring work/life integration–Aruba’s “#GenMobile”initiative–Starbucks wants to be your life’s “3rd Place”

Ubiquitous network access & seamless roaming–802.11ac, n – wireless networking “just works”

•Faster than typical wired ports, easier to provision–Mobile 4G LTE is also “fast enough”

•Faster than my home’s DSL–By 2018: 25% of corporate data will flow directly mobile-cloud[3]

(3) Gartner, Nov 2013

Page 9: What affects security program confidence? - may2014 - bill burns

9

Security Forcing Function – IaaS / Virtualization

Clouds are compelling to businesses, hard for old security controls to match pace

AWS Example:–~Quadrupled

offered services in 4 years

–Reduced pricing 42 times in 8 years as equipment ages out

Source: AWS

Page 10: What affects security program confidence? - may2014 - bill burns

10

Old: Perimeter Firewalls

Page 11: What affects security program confidence? - may2014 - bill burns

11

Old: Perimeter Firewalls

Castle and Moat (layered) defense

Place people, data behind datacenter firewalls

Provisioning workflows were serialized, expensive, slow

“Behind the firewall” = Trusted

Page 12: What affects security program confidence? - may2014 - bill burns

12

New Perimeters : Follow the Data

Page 13: What affects security program confidence? - may2014 - bill burns

13

Security controls evolving to be more:o Proximal – Move closer to the application and datao Mobile – Follow the infrastructure, applicationo Resilient - Emphasize recovery and responseo Holistic – Include technical, legal, and business-level inputo Coordinated - Reliant on communications, automation

New Perimeters : Follow the Data

Page 14: What affects security program confidence? - may2014 - bill burns

14

InfoSec’s Role

Be a trusted advisor to the business–InfoSec doesn’t own the risk–Anticipates security risk/controls changes and needs–Communicates technical risks in business terms

Implement guardrails and gates based on risk, sensitivity–Like breaks on a car: Enables the business to take smart risks–Architect, design, implement controls–Measure & report risk with data–Manage remediation, response

Success: Customers proactively request your guidance!

Page 15: What affects security program confidence? - may2014 - bill burns

15

So…What’s Your Cloud Comfort Level?

Cloud Adoption / Maturity:–Naysayers: you can’t do that (but can’t articulate why)–Pathfinders: here’s how to do it, early lessons learned–Optimizers: here’s how to do it well, what not to do

Page 16: What affects security program confidence? - may2014 - bill burns

16

So…What’s Your Cloud Comfort Level?

Cloud Adoption/Maturity–Naysayers–Pathfinders–Optimizers

Cloud is inevitable – Get comfortable managing it–Example: “We have 10 years of legacy work to deal with, we

don’t have time to look at our cloud usage!”–Benefits to agility, automation, consistency

It’s about the business–Board-level discussion on results, competition, risk–“Risk is our business” – Philosopher James T. Kirk

Page 17: What affects security program confidence? - may2014 - bill burns

17

Security Delivered Via Cloud Services

Page 18: What affects security program confidence? - may2014 - bill burns

18

Anticipating Risks: Partners’ Controls

Service Providers: must consider security as a basic requirement

–They have a smoother attack surface than enterprises–Laser-focused goals, homogeneous environment, etc.–All customers pentesting their provider: Doesn’t scale

•Which standard would we all trust? CCM? Other? Discuss.

Which controls are most relevant, important for your business?

–Prioritize those during negotiations, evaluations, assessments–Bring Your Own Security: Encryption, incident response, audit, SoD,

Page 19: What affects security program confidence? - may2014 - bill burns

19

Anticipating Risks: Partners’ Controls

Integrate Security Controls with Legal–Risk-based Questionnaires: Level of scrutiny based on data

sensitivity–Contractual: Add boilerplate language in your contracts, MSAs,

etc.•Ask your partners for the security fundamentals•Operational security basics, secure development, security

incident notification, etc.

Assess Third-Parties Partners–Trust but verify their controls. It’s your data!–Do one-time and ongoing assessments–Make sure you’re testing what you anticipated–Partner with your partners on any findings

Page 20: What affects security program confidence? - may2014 - bill burns

20

SaaS Applications: Growth and Risk Perspective

Page 21: What affects security program confidence? - may2014 - bill burns

21

InfoSec Advisor: New controls and capabilities

Track movement, access to assets–Behavioral analytics become embedded, table stakes–DRM/DLP-like controls, applied closer to the data–More focus on detection, monitoring–Blocking done more through orchestration, automation–Inventories and network paths always up to date

Restrict access to assets–Cloud-to-Cloud chokepoints–SSO and risk-based authentication, authorization–On-the-fly controls: DLP, encryption, watermarking–Firewall controls based on tags, data and host

classification/sensitivity

Page 22: What affects security program confidence? - may2014 - bill burns

22

Adopting Cloud: Getting Started in IaaS

Plan: Pick 1-3 security metrics to improve & compare–Examples: Days to patch vulns, avg host uptime, fw ACLs used

Do: Start simple, fail fast on “uninteresting” workflows

Improve: Codify policies, patches, asset management, provisioning.

Iterate: Review lessons learned often, make small course corrections

–Good security starts with solid operational hygiene

Page 23: What affects security program confidence? - may2014 - bill burns

23

Summary: Evolving Controls, Maturity

Get Baseline visibility into your Cloud Services–Facts critical to business-level conversations–You’re using more SaaS than you realize–Share data with IT, legal, other stakeholders

Monitor and Protect your Data–Start collecting/mining SaaS access, audit logs–Integrate with your SIEM, monitoring systems–Deploy additional controls via chokepoints, automation

Increase program maturity–Cloud is an opportunity to codify, automate security–Operational hygiene is the basis for solid security program

Page 24: What affects security program confidence? - may2014 - bill burns

24

Wisegate: Maturity Proportional to Confidence

Source: Wisegate IT Security Benchmark, Sept 2013

Page 25: What affects security program confidence? - may2014 - bill burns

25

Areas of Security Interest: Early Results

Advanced authentication and identification schemes

App-centric firewalls and containers to protect data

Behavioral analytics to improve security, fraud

Continuous endpoint monitoring, orchestration, remediation

Continuous risk & compliance monitoring, reporting

Dashboards and analytics to communicate and share metrics

DevOps / security integrations to

codify security

Holistic DLP, data encryption and key management

Malware protection without signatures

Mobile security to protect data anywhere

PKI and digital certificate management for authentication, encryption

Proactive / predictive attack detection, real-time response

Threat intelligence feeds, sharing

Source: Scale Venture Partners

Page 26: What affects security program confidence? - may2014 - bill burns

26

Guidance to Security Vendors: Early Feedback

Be 10x better - provide superior customer value–Look for disruptive technologies, approaches–Interoperate with what I already have–What can I turn off if I buy your thing?

Think API, integration first–Defenders & DevOps: The future is automation, interoperability–InfoSec staffing is hard, automation is a force multiplier–No cheating: Build your GUI on your API

Model, measure, provide insights–Security A/B testing, modeling allows safe experimentation–Provide insights of current, continuous risk state–Want to manage cloud risk better than legacy–Good deployment strategies start with great migration strategiesSource: Scale Venture Partners

Page 27: What affects security program confidence? - may2014 - bill burns

27

Increasing Confidence: Early Research Results

Security programs with higher maturity have more confidence–Regulations help, but also–Operational consistency,–Incorporating standardized frameworks (ISO, NIST)

Build what works for your company’s culture–Culture trumps strategy–There is no one, true “map”: Every program is different–? Endpoint-centric vs. network-centric // Block vs. monitor + respond

Create, market, share metrics with your peers–Empowers teams that own responsibility for controls–Encourages fact-based decision-making–Communicates your program’s Business Impact

Source: Scale Venture Partners

Page 28: What affects security program confidence? - may2014 - bill burns

28

Thank you!

[email protected]

Bill Burns | Executive-In-Residence | Scale Venture Partners | [email protected] | @x509v3