ciso executive forum 2013

24
CISO Survival In The Real World Bill Burns Director, Information Security ISSA CISO Executive Forum Feb 24, 2013

Upload: bill-burns

Post on 03-Jul-2015

527 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Ciso executive forum 2013

CISO Survival In The Real World

Bill BurnsDirector, Information Security

ISSA CISO Executive ForumFeb 24, 2013

Page 2: Ciso executive forum 2013

“Thrive”, not Survive

•Context

•A few contributions

•Future Bets & Areas of Focus

Page 3: Ciso executive forum 2013

Future Bets 2015: Forcing Functions

•Social + Mobility + Cloud

•Traditional Controls Are Lacking

•Analytics

Page 4: Ciso executive forum 2013

NetflixBusiness

• World’s largest TV network

• 33 million members in 40 countries

• Over a billion hours streamed per month

• Supported on 1000+ device types

• 1/3 of evening Internet traffic

(c) 2011 Sandvine

Page 5: Ciso executive forum 2013

Our Culture

•High Performance, Engineering-Focused

•Fail Fast, Learn Fast ... Get Results

•Data- and Metrics-Driven

•Take Smart Risks

•Some core values:

•“Freedom & Responsibility”

•“Loosely-Coupled, Highly-Aligned”

•“Context not control”

Page 6: Ciso executive forum 2013

Today: DataCenters & Cloud

• Tooling

• Risk Assessments, Treatments

• Business Processes

• ~99% Cloud-based today

• Goal: Pure-Cloud Streaming

Page 7: Ciso executive forum 2013

Cloud:On-Demand Capacity

1. Demand: Typical pattern of customer requests rise & fall over time

2. Reaction: System automatically adds, removes servers to the application pool

3. Result: Overall utilization stays constant

1

Demand

2

# Servers

3

Utilization

Page 8: Ciso executive forum 2013

The Netflix Simian Army

• Striving for continuous testing, monitoring

• Identify and test common failure modes

• Automation everywhere to manage risk

• Chaos Monkey - Kills randomly instances

• Chaos Gorilla - Evacuates entire data centers

• Chaos Kong - Evacuates entire regions

• Janitor Monkey – Ensures a clean inventory

• Security Monkey – Various security checks

Page 9: Ciso executive forum 2013

InfoSec Challenge in an IaaS Cloud :: Confidentiality/Possession

Page 10: Ciso executive forum 2013

Key Management :: HSMs

• Motivation:

• Decouple DC and Cloud

• Trust our Cloud more fully

• Others probably want this too

• Challenges:

• Need crypto keys near the Cloud

• HSMs are in the data center

• Can’t entirely trust our CSP

• Solution:

• A real HSM: FIPS 140-2 certified hardware

• Keys stay in hardware

• “HSM as a Service”

Page 11: Ciso executive forum 2013

Security: Thrivingin an

Agile Enterprise

Page 12: Ciso executive forum 2013

Future Bets 2015: Org Demands

• Fluid, Virtual Teams of specialists / specialties

• Dynamically form & dissolve to address opportunities, challenges

• Emphasis on collaboration, roaming

• Analytic, data-driven

Page 13: Ciso executive forum 2013

Future Bets 2015: Team Dynamics, Skills

•Teams will•Be Risk/Security Advisors, coaches, business analysts

•Speak their language•Skill sets will become•Less: people clicking on GUIs•More: analytics, automation, gluing systems together (APIs)

Page 14: Ciso executive forum 2013

SaaS: In use Today? next Year?

1. Email/chat/calendar

2. File Storage/backups

3. Service Ticketing4. On-call paging5. Log management6. Authentication/

IAM7. App vulnerability

scanning

8. Risk management9. HRIS, ERM 10. Source code

repository11. Blogs, websites12. Doc collaboration13. Risk assessments14. Encryption / key

management

15. Data analytics/BI/DSE

16. Project Management

17. SIEM18. VPN19. MDM20. Anti-Virus/Anti-

malware

Page 15: Ciso executive forum 2013

Future Bets 2015: Data, Application Security

•Business Forcing Function: Third-party cloud apps will innovate faster than your IT department can

•Cloud/SaaS will be IT tools, not competitors

•Data will be encrypted automatically off-network, off-device

•Automated, continuous assessments of your controls

Page 16: Ciso executive forum 2013

Future Bets 2015: Device Security

•All-wireless office, Gigabit Wireless•Smartphone building badges•MDM layers: managed VPN, device- and app-wrapping

Page 17: Ciso executive forum 2013

Future Bets 2015: Network Security

•You will be breached – Not “if” but “when”?

•How fast can you respond, contain?

•Mix of trust: corporate, vendor, employee owned devices

•Verify every device, user

Page 18: Ciso executive forum 2013

Future Bets 2015: Automated protection

•We will no longer talk about BYO[everything]

•Zero-Trust / NAC will be common

•Networks will dynamically quarantines, inspects, tests

•Large-scale event correlation, analytics => reaction

Page 19: Ciso executive forum 2013

Future Bets 2015: What about the users?

• Awareness Training will• Be automated• Be context-relevant, bite-

sized• Phish your employees

before they do!• Actively test for

vulnerabilities, quarantine• Gamifiy, (“peer pressure”) on

compliance, activity• Be developed collaboratively

Page 21: Ciso executive forum 2013

Future Bets 2015: Targeted Training

Page 22: Ciso executive forum 2013

Future Bets 2015: Security Analytics

SAMPLE DATA

Page 23: Ciso executive forum 2013

Future Bets 2015: Security Analytics

Security Control A/B Testing

SAMPLE DATA