palmer symposium

21
A Moneyball Approach to Security Intelligence http://www.risk.io [email protected]

Upload: ed-bellis

Post on 02-Jul-2015

3.570 views

Category:

Technology


0 download

TRANSCRIPT

Page 2: Palmer Symposium

• CoFounder Risk I/O

About Me

About Risk I/O

• Former CISO Orbitz

• Contributing Author: Beautiful Security• CSO Magazine/Online Writer

• Data-Driven Vulnerability Intelligence Platform

• DataWeek 2012 Top Security Innovator

• 3 Startups to Watch - Information Week

• InfoSec Island Blogger

• 16 Hot Startups - eWeek

Nice to Meet You

Page 3: Palmer Symposium

Stage 1: Ignorance is Bliss

Page 4: Palmer Symposium

Stage 2: Where are all of my vulnerabilities?

“Back in my Yahoo days I performed hundreds of web application vulnerability assessments. To streamline the workload, I created an assessment methodology consisting of a few thousand security tests averaging 40 hours to complete per website. Yahoo had over 600 websites enterprise-wide. To assess the security of every website would have taken over 11 years to complete and the other challenge was these websites would change all the time which decayed the value of my reports.”

Jeremiah GrossmanFounder, WhiteHat Security

Page 5: Palmer Symposium

Stage 3: Scan & Dump

Enter the Age of the Automated Scanner...

Page 6: Palmer Symposium

Why This Occurs

Lack of Visibility

Lack of Communication

Lack of Coordination

Silos, Silos, Everywhere

Page 7: Palmer Symposium

company name

“vulnerability prioritization for remediation presents THE critical problem” -Anton Chuvakin, Gartner Research Director

“Finding the flaws is only half of the battle. Fixing them -- sometimes called

vulnerability remediation -- is often the hardest part” -Diana Kelley, Dark Reading

“Businesses may be able to measure their performance through objective metrics such as sales

growth, production efficiency or customer preference, but information security management too often boils down to a reaction to recent events or the well-known trio of fear, uncertainty and doubt.” -Scott Crawford, EMA Associates

“Unless you work in a company that has unlimited resources and you have absolute support at all

levels for remediating the vulnerabilities in your environment, you MUST prioritize the issues that cause the most risk to your IT environment.” -Clay Keller, Wal-Mart InfoSec

“With the enormous amounts of data available, mining it — regardless of its

source — and turning it into actionable information is really a strategic

necessity, especially in the world of security.” -Chris Hoff, Juniper Networks

IT Security Is Buried in Noise

Page 8: Palmer Symposium

SaberMetrics for InfoSec?

Page 9: Palmer Symposium

HD Moore’s Law - Josh Corman

Example Use Case 1

aka Security Mendoza Line

“Compute power grows at the rate of doubling about every 2 years”

“Casual attacker power grows at the rate of Metasploit”

Page 10: Palmer Symposium

Predicting Vulnerability (or even breach)

Example Use Case 2

Key Attributes

Trending

Outcomes

Page 11: Palmer Symposium

CVE Trending Analysis

Example Use Case 3

Gunnar’s Debt Clock

Page 12: Palmer Symposium

My(vuln posture X threat activity) / (other vuln posture

X other threat activity)

Example Use Case 4

Targets of Opportunity?

Page 13: Palmer Symposium

company name

Data aggregation is necessary for everything we do

Table Stakes

Correlation, Normalization, De-Duplication

Full risk views down the entire technology stack

That’s So Meta

Page 14: Palmer Symposium

company name

Assembly Line Workflow

Putting The Robots To Work

Bulk Ticketing & Bug Tracking Integration

Automated ReTesting

API “All The Things”

Page 15: Palmer Symposium

company name

How do I know where to deploy my resources?

Web Scale Visibility

What matters when prioritizing remediation?

What does the threat landscape look like outside of my 4 walls?

How do I compare to peers?

Page 16: Palmer Symposium

VA Products

• Dynamic Application

• Network & Host

• Static AnalysisManual AssessmentsRemediation

• Trouble Ticketing

• Bug Tracking

• Configuration Management

• Patch Management

Integrating Disparate Solutions

Page 17: Palmer Symposium

Network Vulnerability

Scanners

Database Vulnerability

Scanners

Network Vulnerability

Scanners

Internal Remediation

Systems

Static Analysis

Tools

Application Vulnerability

Scanners

Pentesters/ Professional

Services

RiskDB

Centralizing the Data

Page 18: Palmer Symposium

Predefined and Custom Security Metrics Filter by Hundreds of Attributes and Metadata Real-World Vulnerability Trending Custom Fields Full Featured RESTful API

AutoFlagging based on “in the wild” Attack Traffic

Benchmarking Across Industries

Predictive Analytics & Machine Learning

Security && Ops NOT || Ops

Your Data, Your Way

Page 19: Palmer Symposium

Three Distinct Values

Page 20: Palmer Symposium

Vulnerability Scanners RiskDB

Static & Binary Analysis

Ticketing /Bug Tracking IPS / WAF

SIEM External Data

Faceted Search KnowledgeBaseCustom DashboardsAlerting Analyze & Prioritize

Network Mapping

Vulnerability Intelligence Platform