SlideShare una empresa de Scribd logo
1 de 52
Descargar para leer sin conexión
Ben Johnson, Co-Founder & CTO
EISC 2019 | IOWA
Lean Security
ben@obsidiansecurity.com
@chicagoben | @obsidiansec
Abstract
We have a lot to do on the cybersecurity side, and we are
almost always lacking people, or budget, or both. Can we
take lessons and approaches from entrepreneurship to
apply to our cybersecurity programs? Can we do more
with what we have, or for each addition can we make sure
it has a large impact?
We’ll explore some entrepreneurship principles and then
dive into some ways to improve security without large
increases in headcount or budget.
Lean Security
Agenda
Introduction
State of Cyber
Entrepreneurship
Applied Lean Security
Wrap-Up
Ben Johnson
Co-Founder and CTO, Obsidian Security
Co-founder and former CTO of Carbon Black, built the first EDR product.
Previously, NSA CNO and AI Lab.
1st Technical Advisor to US FISA Court (Department of Justice)
2000 20172010
Career
Board Seats
Background Check
Entrepreneurship Professor
Today’s Goal?
TO SPARK CONTEMPLATION
(and hopefully provide a few tips)
@chicagoben | @obsidiansec
State of Cyber
@chicagoben | @obsidiansec
Recent headlines
@chicagoben | @obsidiansec
Data breaches
2015
2016
2017
2014
2015
2016
2017
2014
2013
2012
2011
2010
2009
2008
@chicagoben | @obsidiansec
Even the Cloud is Leaky
Booz Allen
OneLogin
The RNC
Verizon
Accenture
Dow Jones
Viacom
Deloitte
Sweden
California
@chicagoben | @obsidiansec
Variety of adversaries
Cybercriminals
• Broad-based and
targeted
• Financially
motivated
• Getting more
sophisticated
Hactivists
• Targeted and
destructive
• Unpredictable
motivations
• Generally less
sophisticated
Nation-States
• Targeted and 

multi-stage
• Motivated by data
collection 
• Highly
sophisticated with
endless resources
Insiders
• Targeted and
destructive
• Unpredictable
motivations
• Sophistication
varies
@chicagoben | @obsidiansec
Skills Gap +
Deploy-and-Decay +
= LACK OF CYBER SELF-ESTEEM
Huge Data (more than big)
Attacker Successes +
Many challenges
@chicagoben | @obsidiansec
Can security be formulaic?
What’s the formula for being secure?
X FTE * Y tooling + Z buy-in ?= Secure
@chicagoben | @obsidiansec
Security Ops: Ideal vs. Reality
Ideal Reality
@chicagoben | @obsidiansec
Entrepreneurship
@chicagoben | @obsidiansec
Start-Up Formula?
What’s the formula for start-ups?
Idea(quality) + work(quantity) + raise money ?= profit
@chicagoben | @obsidiansec
Lean Manufacturing
• Developed by Toyota 70s/80s, perhaps 30s!
• Systematic, holistic identification of waste
• Improves the flow / smoothness of work
• Just-In-Time and Autonomation (smart automation)
• Identify features, process, inputs that create
customer value, everything else is waste
@chicagoben | @obsidiansec
Lean Manufacturing
Eight types of waste require monitoring:
1. Overproduction – Is supply way higher than demand?
2. Waiting – Lag time between production steps
3. Inventory (work in progress) – Are supply levels and work in progress inventories
too high?
4. Transportation – Do you move materials efficiently?
5. Over-processing – Do you work on the product too many times?
6. Motion – Do people and things move between tasks efficiently?
7. Defects – How much time do you spend finding, fixing mistakes?
8. Workforce – Do you use workers efficiently?
Waste: 

anything that
doesn't add value
to the end product
@chicagoben | @obsidiansec
Essentialism?
“It is about making the wisest possible
investment of your time and energy in order to
operate at our highest point of contribution by
doing only what is essential.” 
– Greg McKeown, Author of Essentialism
@chicagoben | @obsidiansec
Lean Startup Methodology
“The Lean Startup method
teaches you how to drive a
startup - how to steer, when to
turn, and when to persevere -
and grow a business with
maximum acceleration.” 

- Eric Ries
Lean methodology:
•Gets products and services
in the hands of customers
faster.
•Reduces uncertainty (and
waste)!
@chicagoben | @obsidiansec
Entrepreneurs are Everywhere
Think Big.
Start Small.
Scale Fast.
"The day before
something is a
breakthrough, it's a crazy
idea."
- Peter Diamandis
@chicagoben | @obsidiansec
Validated Learning
Create hypothesis.
Run Experiment.
Analyze Results.
Repeat.
How quickly can you learn?
“Are you learning in gulps or sips?”
- Apollo Astronauts
It’s all about product-market fit!
@chicagoben | @obsidiansec
Build. Measure. Learn
Learn Faster
Measure Faster
Build Faster
The Lean Startup
LEARN BUILD
IDEAS
CODEDATA
Unit Tests
Customer interviews
Customer development
Five whys root cause analysis
Customer advisory board
Justifiable hypothesis
Product owner accountability
Custom archetypes
Cross-functional team
Smoke tests
Split tests
Clear product owner
Continuous development
Usability Tests
Real-time monitoring
Customer Liaison
MEASURE
Funnel analysis
Cohort analysis
Net promoter score
Search engine marketing
Real-time alerting
Predictive monitoring
Unit tests
Usability tests
Continuous integration
Incremental deployment
Free & open-source components
Cloud computing
Cluster immune system
Just-in-time scalability
Refactoring
Developer sandbox
@chicagoben | @obsidiansec
Wait … OODA LOOPS!
“Time is the dominant parameter. 

The pilot who goes through the OODA
cycle in the shortest time prevails
because his opponent is caught
responding to situations that have
already changed.”
- Colonel John Boyd, 1966
Observe.
Orient.
Decide.
Act.
@chicagoben | @obsidiansec
Minimum Viable Product.
What’s the
MVP you think
is necessary?
Minimum viable product: The skinniest
version of a product that still functions.
• sufficient functionality to attract initial users/customers
• promises enough future benefit to keep early adopters
• designed with a feedback loop to guide new features
@chicagoben | @obsidiansec
Applied Lean Security
@chicagoben | @obsidiansec
Is the Environment Healthy?
The absence of disease does not mean health.
@chicagoben | @obsidiansec
Reduce Entropy, Reduce Risk
@chicagoben | @obsidiansec
Start with People, Not Technology
“Culture eats strategy for breakfast” - P. Drucker
Develop Your National Guard
1000 vs 10 (100:1)
If 1000 employees are adding risk, why are only 10
security members mitigating it?
• Enable employees to provide granular feedback and take responsibility
• Show users their impact and ask questions of those who have context
• How can the 99% help?
@chicagoben | @obsidiansec
Right-Size the Surface Area
DORMANT ACCOUNTS
COMPLEX POLICIES?
238 days
181 days
87 days
79 days
22 days
17 days
9 days
8 days
20758 lines
@chicagoben | @obsidiansec
Understand Your Problems
Who is this for?
What is this for?
Painkillers vs Vitamins
(vs Candy)
What is your pain point?
“If I had an hour to solve a
problem I'd spend 55 minutes
thinking about the problem and 5
minutes thinking about solutions.”
- Albert Einstein
@chicagoben | @obsidiansec
Turn the Lights On (Visibility)
Scanning
Continuous Recording
Continuous Recording + Intelligence
Continuous Recording + Intelligence + Prevalence
Continuous Recording + Intelligence + Prevalence + Relationships
@chicagoben | @obsidiansec
Utilize Open Source & APIs
@chicagoben | @obsidiansec
The Detection-Response Spectrum
Hunting /
Detection
Hunting
Triage Investigation Cleanup
Discovery
Incident Response
Re-Purpose Tooling
@chicagoben | @obsidiansec
Accelerating Processes
Move quickly with feedback
loops and validated learning.
Start
Triage
or
Hunting
Successful
discovery
Fail fast
@chicagoben | @obsidiansec
Filling Automation Gaps
Hunting: because there’s
always a gap between
automated threat
detection and the
universe of threats.
Universe of threats
Automated threat
detection processes
@chicagoben | @obsidiansec
You Have to Sell!
Can you sell your organization on new spending?
Can you sell your organization on freeing up time to hunt?
Can you sell the culture on spending time to help with hunting?
What are you
selling?
You’re always
selling!
We aren’t
selling
anything.
Ben People
@chicagoben | @obsidiansec
Push on Your Vendors
Can you make vendors better?
@chicagoben | @obsidiansec
Dormant Accounts?
Aside from risk, cost
savings could be huge!
At left, a relatively small
company (600 employees)
could save over $300k /
year by right-sizing 3
services!
@chicagoben | @obsidiansec
Beware of the Cloud
“IT is going from 0 to 100 in the
cloud and leaving us in the dust”
- CISO, Financial Tech Company
“We’re blind to all these new
SaaS accounts”
- Director, Cyber Intelligence, 

Top Athletics Brand
“We have 300 AWS accounts
and no governance”
- Public Tech Company
“Hackers don’t break in, they login.” - CISO, Cisco
“50% of our IR Engagements
are Office 365.”
- Principal IR, Rapid7
@chicagoben | @obsidiansec
Wrap-Up
@chicagoben | @obsidiansec
Approach
• Mitigate weaknesses of user population
• Amplify strengths of Security and IT
• Leverage elastic and surge capacity
• Stitch together tools, datasets, and capabilities
• Reduce waste and entropy
@chicagoben | @obsidiansec
Playbook 1 of 3
1. Start with a password manager (i.e. Dashlane)
2. Enable MFA everywhere (bad guys find the gaps)
3. Encourage updated smart devices (iPhones)
4. Standardize on Chrome & Firefox
5. Disable Flash & Java; enable Ad-Blockers
6. DNS Sinkhole (Pi-Hole) or Domain whitelisting (top 10,000)
7. Built-in OS encryption (FileVault, etc) ; Remote-wipe?
8. Provide free security training (Cybrary, Youtube, etc…)
@chicagoben | @obsidiansec
Playbook 2 of 3
1. Train developers (Hacksplaining)
2. Static and Dynamic analysis on code commit (Gitlab)
3. Give DevOps engineers a multi-week rotation in security
4. Enable built-in cloud monitoring and controls
5. Automate provisioning or deprovisioning (use-it-or-lose-it)
6. Play the numbers: Macbook Pros & iPads
7. Separate Admin accounts (or just-in-time privileges)
8. Send alerts to Slack
@chicagoben | @obsidiansec
Playbook 3 of 3
1. Use LetsEncrypt for certificates
2. Utilize ELK for storage and search
3. Utilize osquery, BroIDS, Cuckoo open source tools
4. Disable Mail Forwarding, utilize built-in email inspection & tools
5. Wrap common utilities (net.exe, cmd.exe) with a logging function
6. Only a short weekly window for enabling Powershell
7. Partner with early vendors who want feedback — free tech!
8. Learn python then BUILD and AUTOMATE
@chicagoben | @obsidiansec
Reduce Waste
Where’s the IT waste? (Dormant Accounts, Config Drift, etc)
Where can you get the biggest ROI of your Security time?
Identify features, process, inputs that add cyber defense value…
everything else is waste (or could be)!
@chicagoben | @obsidiansec
Essentialism?
“It is about making the wisest possible
investment of your time and energy in order to
operate at our highest point of contribution by
doing only what is essential.” 
– Greg McKeown, Author of Essentialism
@chicagoben | @obsidiansec
Build. Measure. Learn.
Think Big.
Start Small.
Scale Fast.
@chicagoben | @obsidiansec
Be the Builder Your Environment Needs!
“Being an entrepreneur is a state of mind, not a job title.”
- Guy Kawasaki
@chicagoben | @obsidiansec
Because Who Doesn’t Love a Book Recommendation
Today’s Goal: TO SPARK CONTEMPLATION
“If you’re not embarrassed by your first product
you’ve shipped too late.” - Reid Hoffman
What can you do TODAY to upgrade security?
Ben Johnson, CTO
ben@obsidiansecurity.com
@chicagoben | @obsidiansec
THANK YOU!

Más contenido relacionado

La actualidad más candente

Attacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous DeliveryAttacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous DeliveryJames Wickett
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...Gene Kim
 
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...Gene Kim
 
RecSysOps: Best Practices for Operating a Large-Scale Recommender System
RecSysOps: Best Practices for Operating a Large-Scale Recommender SystemRecSysOps: Best Practices for Operating a Large-Scale Recommender System
RecSysOps: Best Practices for Operating a Large-Scale Recommender SystemEhsan38
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOGene Kim
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience ReportGene Kim
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsGene Kim
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)Gene Kim
 
Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...Alex Cachia
 
The Data on DevOps: Making the Case for Awesome
The Data on DevOps: Making the Case for AwesomeThe Data on DevOps: Making the Case for Awesome
The Data on DevOps: Making the Case for AwesomeNicole Forsgren
 
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6aKim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6aGene Kim
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...Gene Kim
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Gene Kim
 
Ops Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WayOps Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WaySeniorStoryteller
 
2012 05 corp fin 1c
2012 05 corp fin 1c2012 05 corp fin 1c
2012 05 corp fin 1cGene Kim
 
What We Learned from Three Years of Sciencing the Crap Out of DevOps
What We Learned from Three Years of Sciencing the Crap Out of DevOpsWhat We Learned from Three Years of Sciencing the Crap Out of DevOps
What We Learned from Three Years of Sciencing the Crap Out of DevOpsSeniorStoryteller
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?Gene Kim
 
2015 10 dev ops n-fi - why it's a good idea to deploy 10 times per day v1.0 -...
2015 10 dev ops n-fi - why it's a good idea to deploy 10 times per day v1.0 -...2015 10 dev ops n-fi - why it's a good idea to deploy 10 times per day v1.0 -...
2015 10 dev ops n-fi - why it's a good idea to deploy 10 times per day v1.0 -...Joakim Lindbom
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!Gene Kim
 

La actualidad más candente (20)

Attacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous DeliveryAttacking Pipelines--Security meets Continuous Delivery
Attacking Pipelines--Security meets Continuous Delivery
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
 
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
DOES SFO 2016 - Kaimar Karu - ITIL. You keep using that word. I don't think i...
 
RecSysOps: Best Practices for Operating a Large-Scale Recommender System
RecSysOps: Best Practices for Operating a Large-Scale Recommender SystemRecSysOps: Best Practices for Operating a Large-Scale Recommender System
RecSysOps: Best Practices for Operating a Large-Scale Recommender System
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFO
 
Technical excellence - practices matter
Technical excellence - practices matterTechnical excellence - practices matter
Technical excellence - practices matter
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)
 
Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...Chaos Engineering – why we should all practice breaking things on purpose by ...
Chaos Engineering – why we should all practice breaking things on purpose by ...
 
The Data on DevOps: Making the Case for Awesome
The Data on DevOps: Making the Case for AwesomeThe Data on DevOps: Making the Case for Awesome
The Data on DevOps: Making the Case for Awesome
 
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6aKim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
Kim itSMF New England: ITIL at Ludicrous Speeds - Rugged DevOps 6a
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps
 
Ops Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WayOps Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the Way
 
2012 05 corp fin 1c
2012 05 corp fin 1c2012 05 corp fin 1c
2012 05 corp fin 1c
 
What We Learned from Three Years of Sciencing the Crap Out of DevOps
What We Learned from Three Years of Sciencing the Crap Out of DevOpsWhat We Learned from Three Years of Sciencing the Crap Out of DevOps
What We Learned from Three Years of Sciencing the Crap Out of DevOps
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
 
2015 10 dev ops n-fi - why it's a good idea to deploy 10 times per day v1.0 -...
2015 10 dev ops n-fi - why it's a good idea to deploy 10 times per day v1.0 -...2015 10 dev ops n-fi - why it's a good idea to deploy 10 times per day v1.0 -...
2015 10 dev ops n-fi - why it's a good idea to deploy 10 times per day v1.0 -...
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
 

Similar a Lean Security

Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security EvangelismPractical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security EvangelismBen Johnson
 
Owasp summit debrief v1.0 (jun 2017)
Owasp summit debrief v1.0 (jun 2017)Owasp summit debrief v1.0 (jun 2017)
Owasp summit debrief v1.0 (jun 2017)owaspsummit
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015Shannon Lietz
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015Shannon Lietz
 
The Lost Tales of Platform Design (February 2017)
The Lost Tales of Platform Design (February 2017)The Lost Tales of Platform Design (February 2017)
The Lost Tales of Platform Design (February 2017)Julien SIMON
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!Steven Carlson
 
Ericriesleanstartuppresentationforweb2
Ericriesleanstartuppresentationforweb2Ericriesleanstartuppresentationforweb2
Ericriesleanstartuppresentationforweb2Edmund FOng
 
Continuous Deployment
Continuous DeploymentContinuous Deployment
Continuous DeploymentBrian Henerey
 
Connecting the Dots: Agile, DevOps, Lean IT - Mike Orzen - AgileNZ 2017
Connecting the Dots: Agile, DevOps, Lean IT - Mike Orzen - AgileNZ 2017Connecting the Dots: Agile, DevOps, Lean IT - Mike Orzen - AgileNZ 2017
Connecting the Dots: Agile, DevOps, Lean IT - Mike Orzen - AgileNZ 2017AgileNZ Conference
 
AGILE2017 Top 10 Takeaways by Synerzip
AGILE2017 Top 10 Takeaways by SynerzipAGILE2017 Top 10 Takeaways by Synerzip
AGILE2017 Top 10 Takeaways by SynerzipSynerzip
 
Final synerzip-agile2017-top10-v1
Final synerzip-agile2017-top10-v1Final synerzip-agile2017-top10-v1
Final synerzip-agile2017-top10-v1Hemant Elhence
 
Seeing through the Fog: Navigating the Security Landscape of a Cloud-First World
Seeing through the Fog: Navigating the Security Landscape of a Cloud-First WorldSeeing through the Fog: Navigating the Security Landscape of a Cloud-First World
Seeing through the Fog: Navigating the Security Landscape of a Cloud-First WorldBen Johnson
 
NYC Open Data Meetup-- Thoughtworks chief data scientist talk
NYC Open Data Meetup-- Thoughtworks chief data scientist talkNYC Open Data Meetup-- Thoughtworks chief data scientist talk
NYC Open Data Meetup-- Thoughtworks chief data scientist talkVivian S. Zhang
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOpsShannon Lietz
 
DevOps-driving-blind
DevOps-driving-blindDevOps-driving-blind
DevOps-driving-blindPaul Peissner
 
Dashlane Mission Teams
Dashlane Mission TeamsDashlane Mission Teams
Dashlane Mission TeamsDashlane
 

Similar a Lean Security (20)

Lean Hunting
Lean HuntingLean Hunting
Lean Hunting
 
Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security EvangelismPractical Cyber: Lessons from 500,000 Miles of Security Evangelism
Practical Cyber: Lessons from 500,000 Miles of Security Evangelism
 
Owasp summit debrief v1.0 (jun 2017)
Owasp summit debrief v1.0 (jun 2017)Owasp summit debrief v1.0 (jun 2017)
Owasp summit debrief v1.0 (jun 2017)
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
The Lost Tales of Platform Design (February 2017)
The Lost Tales of Platform Design (February 2017)The Lost Tales of Platform Design (February 2017)
The Lost Tales of Platform Design (February 2017)
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!
 
Ericriesleanstartuppresentationforweb2
Ericriesleanstartuppresentationforweb2Ericriesleanstartuppresentationforweb2
Ericriesleanstartuppresentationforweb2
 
Continuous Deployment
Continuous DeploymentContinuous Deployment
Continuous Deployment
 
Connecting the Dots: Agile, DevOps, Lean IT - Mike Orzen - AgileNZ 2017
Connecting the Dots: Agile, DevOps, Lean IT - Mike Orzen - AgileNZ 2017Connecting the Dots: Agile, DevOps, Lean IT - Mike Orzen - AgileNZ 2017
Connecting the Dots: Agile, DevOps, Lean IT - Mike Orzen - AgileNZ 2017
 
AGILE2017 Top 10 Takeaways by Synerzip
AGILE2017 Top 10 Takeaways by SynerzipAGILE2017 Top 10 Takeaways by Synerzip
AGILE2017 Top 10 Takeaways by Synerzip
 
Final synerzip-agile2017-top10-v1
Final synerzip-agile2017-top10-v1Final synerzip-agile2017-top10-v1
Final synerzip-agile2017-top10-v1
 
Seeing through the Fog: Navigating the Security Landscape of a Cloud-First World
Seeing through the Fog: Navigating the Security Landscape of a Cloud-First WorldSeeing through the Fog: Navigating the Security Landscape of a Cloud-First World
Seeing through the Fog: Navigating the Security Landscape of a Cloud-First World
 
NYC Open Data Meetup-- Thoughtworks chief data scientist talk
NYC Open Data Meetup-- Thoughtworks chief data scientist talkNYC Open Data Meetup-- Thoughtworks chief data scientist talk
NYC Open Data Meetup-- Thoughtworks chief data scientist talk
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
DevOps-driving-blind
DevOps-driving-blindDevOps-driving-blind
DevOps-driving-blind
 
Is IIOT Right for You?
Is IIOT Right for You?Is IIOT Right for You?
Is IIOT Right for You?
 
Dashlane Mission Teams
Dashlane Mission TeamsDashlane Mission Teams
Dashlane Mission Teams
 

Último

Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.soniya singh
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 

Último (20)

Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 

Lean Security

  • 1. Ben Johnson, Co-Founder & CTO EISC 2019 | IOWA Lean Security ben@obsidiansecurity.com
  • 2. @chicagoben | @obsidiansec Abstract We have a lot to do on the cybersecurity side, and we are almost always lacking people, or budget, or both. Can we take lessons and approaches from entrepreneurship to apply to our cybersecurity programs? Can we do more with what we have, or for each addition can we make sure it has a large impact? We’ll explore some entrepreneurship principles and then dive into some ways to improve security without large increases in headcount or budget. Lean Security
  • 4. Ben Johnson Co-Founder and CTO, Obsidian Security Co-founder and former CTO of Carbon Black, built the first EDR product. Previously, NSA CNO and AI Lab. 1st Technical Advisor to US FISA Court (Department of Justice) 2000 20172010 Career Board Seats Background Check Entrepreneurship Professor
  • 5. Today’s Goal? TO SPARK CONTEMPLATION (and hopefully provide a few tips)
  • 8. @chicagoben | @obsidiansec Data breaches 2015 2016 2017 2014 2015 2016 2017 2014 2013 2012 2011 2010 2009 2008
  • 9. @chicagoben | @obsidiansec Even the Cloud is Leaky Booz Allen OneLogin The RNC Verizon Accenture Dow Jones Viacom Deloitte Sweden California
  • 10. @chicagoben | @obsidiansec Variety of adversaries Cybercriminals • Broad-based and targeted • Financially motivated • Getting more sophisticated Hactivists • Targeted and destructive • Unpredictable motivations • Generally less sophisticated Nation-States • Targeted and 
 multi-stage • Motivated by data collection  • Highly sophisticated with endless resources Insiders • Targeted and destructive • Unpredictable motivations • Sophistication varies
  • 11. @chicagoben | @obsidiansec Skills Gap + Deploy-and-Decay + = LACK OF CYBER SELF-ESTEEM Huge Data (more than big) Attacker Successes + Many challenges
  • 12. @chicagoben | @obsidiansec Can security be formulaic? What’s the formula for being secure? X FTE * Y tooling + Z buy-in ?= Secure
  • 13. @chicagoben | @obsidiansec Security Ops: Ideal vs. Reality Ideal Reality
  • 15. @chicagoben | @obsidiansec Start-Up Formula? What’s the formula for start-ups? Idea(quality) + work(quantity) + raise money ?= profit
  • 16. @chicagoben | @obsidiansec Lean Manufacturing • Developed by Toyota 70s/80s, perhaps 30s! • Systematic, holistic identification of waste • Improves the flow / smoothness of work • Just-In-Time and Autonomation (smart automation) • Identify features, process, inputs that create customer value, everything else is waste
  • 17. @chicagoben | @obsidiansec Lean Manufacturing Eight types of waste require monitoring: 1. Overproduction – Is supply way higher than demand? 2. Waiting – Lag time between production steps 3. Inventory (work in progress) – Are supply levels and work in progress inventories too high? 4. Transportation – Do you move materials efficiently? 5. Over-processing – Do you work on the product too many times? 6. Motion – Do people and things move between tasks efficiently? 7. Defects – How much time do you spend finding, fixing mistakes? 8. Workforce – Do you use workers efficiently? Waste: 
 anything that doesn't add value to the end product
  • 18. @chicagoben | @obsidiansec Essentialism? “It is about making the wisest possible investment of your time and energy in order to operate at our highest point of contribution by doing only what is essential.”  – Greg McKeown, Author of Essentialism
  • 19. @chicagoben | @obsidiansec Lean Startup Methodology “The Lean Startup method teaches you how to drive a startup - how to steer, when to turn, and when to persevere - and grow a business with maximum acceleration.” 
 - Eric Ries Lean methodology: •Gets products and services in the hands of customers faster. •Reduces uncertainty (and waste)!
  • 20. @chicagoben | @obsidiansec Entrepreneurs are Everywhere Think Big. Start Small. Scale Fast. "The day before something is a breakthrough, it's a crazy idea." - Peter Diamandis
  • 21. @chicagoben | @obsidiansec Validated Learning Create hypothesis. Run Experiment. Analyze Results. Repeat. How quickly can you learn? “Are you learning in gulps or sips?” - Apollo Astronauts It’s all about product-market fit!
  • 22. @chicagoben | @obsidiansec Build. Measure. Learn Learn Faster Measure Faster Build Faster The Lean Startup LEARN BUILD IDEAS CODEDATA Unit Tests Customer interviews Customer development Five whys root cause analysis Customer advisory board Justifiable hypothesis Product owner accountability Custom archetypes Cross-functional team Smoke tests Split tests Clear product owner Continuous development Usability Tests Real-time monitoring Customer Liaison MEASURE Funnel analysis Cohort analysis Net promoter score Search engine marketing Real-time alerting Predictive monitoring Unit tests Usability tests Continuous integration Incremental deployment Free & open-source components Cloud computing Cluster immune system Just-in-time scalability Refactoring Developer sandbox
  • 23. @chicagoben | @obsidiansec Wait … OODA LOOPS! “Time is the dominant parameter. 
 The pilot who goes through the OODA cycle in the shortest time prevails because his opponent is caught responding to situations that have already changed.” - Colonel John Boyd, 1966 Observe. Orient. Decide. Act.
  • 24. @chicagoben | @obsidiansec Minimum Viable Product. What’s the MVP you think is necessary? Minimum viable product: The skinniest version of a product that still functions. • sufficient functionality to attract initial users/customers • promises enough future benefit to keep early adopters • designed with a feedback loop to guide new features
  • 26. @chicagoben | @obsidiansec Is the Environment Healthy? The absence of disease does not mean health.
  • 27. @chicagoben | @obsidiansec Reduce Entropy, Reduce Risk
  • 28. @chicagoben | @obsidiansec Start with People, Not Technology “Culture eats strategy for breakfast” - P. Drucker
  • 29. Develop Your National Guard 1000 vs 10 (100:1) If 1000 employees are adding risk, why are only 10 security members mitigating it? • Enable employees to provide granular feedback and take responsibility • Show users their impact and ask questions of those who have context • How can the 99% help?
  • 30. @chicagoben | @obsidiansec Right-Size the Surface Area DORMANT ACCOUNTS COMPLEX POLICIES? 238 days 181 days 87 days 79 days 22 days 17 days 9 days 8 days 20758 lines
  • 31. @chicagoben | @obsidiansec Understand Your Problems Who is this for? What is this for? Painkillers vs Vitamins (vs Candy) What is your pain point? “If I had an hour to solve a problem I'd spend 55 minutes thinking about the problem and 5 minutes thinking about solutions.” - Albert Einstein
  • 32. @chicagoben | @obsidiansec Turn the Lights On (Visibility) Scanning Continuous Recording Continuous Recording + Intelligence Continuous Recording + Intelligence + Prevalence Continuous Recording + Intelligence + Prevalence + Relationships
  • 34. @chicagoben | @obsidiansec The Detection-Response Spectrum Hunting / Detection Hunting Triage Investigation Cleanup Discovery Incident Response Re-Purpose Tooling
  • 35. @chicagoben | @obsidiansec Accelerating Processes Move quickly with feedback loops and validated learning. Start Triage or Hunting Successful discovery Fail fast
  • 36. @chicagoben | @obsidiansec Filling Automation Gaps Hunting: because there’s always a gap between automated threat detection and the universe of threats. Universe of threats Automated threat detection processes
  • 37. @chicagoben | @obsidiansec You Have to Sell! Can you sell your organization on new spending? Can you sell your organization on freeing up time to hunt? Can you sell the culture on spending time to help with hunting? What are you selling? You’re always selling! We aren’t selling anything. Ben People
  • 38. @chicagoben | @obsidiansec Push on Your Vendors Can you make vendors better?
  • 39. @chicagoben | @obsidiansec Dormant Accounts? Aside from risk, cost savings could be huge! At left, a relatively small company (600 employees) could save over $300k / year by right-sizing 3 services!
  • 40. @chicagoben | @obsidiansec Beware of the Cloud “IT is going from 0 to 100 in the cloud and leaving us in the dust” - CISO, Financial Tech Company “We’re blind to all these new SaaS accounts” - Director, Cyber Intelligence, 
 Top Athletics Brand “We have 300 AWS accounts and no governance” - Public Tech Company “Hackers don’t break in, they login.” - CISO, Cisco “50% of our IR Engagements are Office 365.” - Principal IR, Rapid7
  • 42. @chicagoben | @obsidiansec Approach • Mitigate weaknesses of user population • Amplify strengths of Security and IT • Leverage elastic and surge capacity • Stitch together tools, datasets, and capabilities • Reduce waste and entropy
  • 43. @chicagoben | @obsidiansec Playbook 1 of 3 1. Start with a password manager (i.e. Dashlane) 2. Enable MFA everywhere (bad guys find the gaps) 3. Encourage updated smart devices (iPhones) 4. Standardize on Chrome & Firefox 5. Disable Flash & Java; enable Ad-Blockers 6. DNS Sinkhole (Pi-Hole) or Domain whitelisting (top 10,000) 7. Built-in OS encryption (FileVault, etc) ; Remote-wipe? 8. Provide free security training (Cybrary, Youtube, etc…)
  • 44. @chicagoben | @obsidiansec Playbook 2 of 3 1. Train developers (Hacksplaining) 2. Static and Dynamic analysis on code commit (Gitlab) 3. Give DevOps engineers a multi-week rotation in security 4. Enable built-in cloud monitoring and controls 5. Automate provisioning or deprovisioning (use-it-or-lose-it) 6. Play the numbers: Macbook Pros & iPads 7. Separate Admin accounts (or just-in-time privileges) 8. Send alerts to Slack
  • 45. @chicagoben | @obsidiansec Playbook 3 of 3 1. Use LetsEncrypt for certificates 2. Utilize ELK for storage and search 3. Utilize osquery, BroIDS, Cuckoo open source tools 4. Disable Mail Forwarding, utilize built-in email inspection & tools 5. Wrap common utilities (net.exe, cmd.exe) with a logging function 6. Only a short weekly window for enabling Powershell 7. Partner with early vendors who want feedback — free tech! 8. Learn python then BUILD and AUTOMATE
  • 46. @chicagoben | @obsidiansec Reduce Waste Where’s the IT waste? (Dormant Accounts, Config Drift, etc) Where can you get the biggest ROI of your Security time? Identify features, process, inputs that add cyber defense value… everything else is waste (or could be)!
  • 47. @chicagoben | @obsidiansec Essentialism? “It is about making the wisest possible investment of your time and energy in order to operate at our highest point of contribution by doing only what is essential.”  – Greg McKeown, Author of Essentialism
  • 48. @chicagoben | @obsidiansec Build. Measure. Learn. Think Big. Start Small. Scale Fast.
  • 49. @chicagoben | @obsidiansec Be the Builder Your Environment Needs! “Being an entrepreneur is a state of mind, not a job title.” - Guy Kawasaki
  • 50. @chicagoben | @obsidiansec Because Who Doesn’t Love a Book Recommendation
  • 51. Today’s Goal: TO SPARK CONTEMPLATION “If you’re not embarrassed by your first product you’ve shipped too late.” - Reid Hoffman What can you do TODAY to upgrade security?