"thinking diffrent" about your information security strategy

21
Jason Clark, VP Chief Strategy & Security Officer “THINK DIFFERENT” ABOUT SECURITY STRATEGY

Upload: jason-clark

Post on 28-Nov-2014

533 views

Category:

Technology


0 download

DESCRIPTION

A presentation I gave to a thousands of CXOs

TRANSCRIPT

Page 1: "Thinking diffrent" about your information security strategy

Jason Clark, VP Chief Strategy & Security Officer

“THINK DIFFERENT” ABOUT SECURITY STRATEGY

Page 2: "Thinking diffrent" about your information security strategy

We need a New Strategy

2

Page 3: "Thinking diffrent" about your information security strategy

The targets…past, present and future

Page 4: "Thinking diffrent" about your information security strategy

© 2012 Websense, Inc. © 2012 Websense, Inc.

Evolution of the bad guys modus operandi

HARD TO PROTECT EASY TO PROTECT

Page 5: "Thinking diffrent" about your information security strategy

The Attackers…past, present and future

5

Page 6: "Thinking diffrent" about your information security strategy

Information Security Budget

6

Your Companies Revenue IT Budget Infosec Budget

Page 7: "Thinking diffrent" about your information security strategy

Spend & security effectiveness mismatch

7

Firewalls, IDS,

Endpoint Security

Other 20%

80%

80% OF THE SPEND IS 30% EFFECTIVE AT SECURING THE BUSINESS.

Redirect our investments to be: Data Centric & Risk Based

Page 8: "Thinking diffrent" about your information security strategy

© 2012 Websense, Inc. © 2012 Websense, Inc. 8

PLEASE STOP SPEAR PHISING

Have you tested your employees to Spear Phishing? Average results will show 71% of your users will click the link

Page 9: "Thinking diffrent" about your information security strategy

Step 1: Evaluation

9

How do we increase “Security Personnel” with Zero Investment?

Do you know your breakdown? Do you know your return on investment?

Evaluate commodity spending

Page 10: "Thinking diffrent" about your information security strategy

Step 2: Buy in

Communicate evaluation results with Everyone outside of IT • Get involved with Legal • Chief Privacy Officer/Head of HR • Audit, Engineering, Marketing, etc.

REMEMBER

As Tom August, author of the CISO Handbook, puts it…

WE SELL IDEAS!

© 2013 Websense, Inc.

Page 11: "Thinking diffrent" about your information security strategy

Step 3: Execute

People, Process, Technology applied to Security

+ = + + = + + = + + = + + = +

People Process Technology Outcome

+ = + + = + + = +

Success Poor Adoption Inconsistent Operation Burden to Scale

Shelf-ware

Wasted Effort

No ability to execute

No Defenses

Most of the time current Technology's lead back to infrastructure centric models.

Page 12: "Thinking diffrent" about your information security strategy

Step 4: Moving to Intelligence

From Security Operations To Security Intelligence

Value Wisdom

Knowledge

Information

Data

The Relative Value of Information

=

Page 13: "Thinking diffrent" about your information security strategy

Step 5: Who is your enemy?

© 2013 Websense, Inc.

Page 14: "Thinking diffrent" about your information security strategy

The Enemy is in your Blind Spots

• SSL • Spear Phishing • AD, SAM, Password extraction • Custom Encryption • Malware • Application • Complex Technical Stack (limited visibility) • Insider Threat • Obfuscation

Page 15: "Thinking diffrent" about your information security strategy

© 2012 Websense, Inc. © 2012 Websense, Inc.

Who Can We Trust?

15

50% of malware redirects to the United States

60% of phishing attacks are hosted in the United States

36% of malware is hosted in the United States

Page 16: "Thinking diffrent" about your information security strategy

© 2012 Websense, Inc. © 2012 Websense, Inc.

Next Generation Approach To Security Policy and Protection: Context Aware, Data Centric, Security

16

Who

Human Resources

Customer Service

Finance

Accounting

Legal

Sales

Marketing

Technical Support

Engineering

What

Source Code

Business Plans

M&A Plans

Employee Salary

Patient Information

Financial Statements

Customer Records

Technical Documentation

Competitive Information

Where

Benefits Provider

Personal Web Storage

Blog

Customer

USB

Malware Site

Business Partner

Competitor

Analyst

How

File Transfer

Instant Messaging

Peer-to-Peer

Print

Email

Web

Audit

Notify

Remove

Quarantine

Encrypt

Block

Removable Media

Copy/Paste

Print Screen

Action

Confirm

Page 17: "Thinking diffrent" about your information security strategy

Threat Modeling & Attack Trees

17

Page 18: "Thinking diffrent" about your information security strategy

Lure Redirect Exploit Kit

Dropper File

Call Home

Data Theft

Seven Stages of Advanced Threats

Recon

AWARENESS REAL-TIME ANALYSIS INLINE DEFENSES CONTAIN-MENT

Page 19: "Thinking diffrent" about your information security strategy

© 2012 Websense, Inc. © 2012 Websense, Inc. 19

Page 20: "Thinking diffrent" about your information security strategy

© 2012 Websense, Inc. © 2012 Websense, Inc. 20

Page 21: "Thinking diffrent" about your information security strategy

IT Insider Behavior Model

21