SlideShare a Scribd company logo
1 of 14
Download to read offline
The Open Group San Diego Panel Explores Global
Cybersecurity Issues for Improved Enterprise Integrity and
Risk Mitigation
Transcript of a live panel discussion at February's The Open Group San Diego 2015.
Welcome to a special BriefingsDirect panel discussion overview from The Open Group San
Diego 2105 on Feb. 2 through 5, 2015.
The following panel, which examines issues and improvements for global enterprise
cybersecurity, consists of moderator Dave Lounsbury, Chief Technology
Officer, The Open Group; Edna Conway, Chief Security Officer for
Global Supply Chain, Cisco; Mary Ann Mezzapelle, Americas CTO for
Enterprise Security Services, HP; Jim Hietala, Vice President of Security
for The Open Group, and Rance DeLong, Researcher into Security and High Assurance Systems,
Santa Clara University. [Disclosure: The Open Group is a sponsor of BriefingsDirect podcasts.]
Here are some excerpts:
Dave Lounsbury: Following on from the tone that they have set about where the standards have
to go and what constitutes a good standard, we have a very exciting Cybersecurity Panel on what
is cybersecurity in 2015.
We've heard all morning about the security, cybersecurity landscape, and, of course, everyone
knows about all the many recent breaches that have been mentioned this morning. Obviously, the
challenge is growing in cybersecurity. So, I want to start asking a few questions, and what I will
do is start off directing one to Edna Conway, if I may.
Attend The Open Group Baltimore 2015
July 20-23, 2015
Early bird registration ends June 19
We've heard about the Verizon Data Breach Investigation of DBIR report that catalogs the
various attacks that have been made over the past year. One of the interesting findings was that in
some of these breaches, the attackers were on the networks for months before being discovered.
What do we need to start doing differently to secure our enterprises?
Edna Conway: There are a couple of things. From my perspective, continuous monitoring is
absolutely essential. People don't like it because it requires rigor, consistency, and process. The
real question is, what do you continuously monitor?
It’s what you monitor that makes a difference. Access control and authentication, should
absolutely be on our radar screen, but I think the real ticket is behavior. What kind
of behavior do you see authorized personnel engaging in that should send up as an
alert? That’s a trend that we need to embrace more.
The second thing that we need to do differently is drive detection and
containment. I think we try to do that, but we need to become more rigorous in it.
Some of that rigor is around things like, are we actually doing advanced malware
protection, rather than just detection?
What are we doing specifically around threat analytics and the feeds that come to us: how we
absorb them, how we mine them, and how we consolidate them?
The third thing for me is how we get it right. I call that team the puzzle solvers. How do we get
them together swiftly?
How do you put the right group of experts together when you see a behavior aberration or you
get a threat feed that says that you need to address this now? When we see a threat injection, are
we actually acting on the anomaly before it makes its way further along in the cycle?
Executive support
Mary Ann Mezzapelle: Another thing that I'd like to add is making sure you have the
executive support and processes in place. If you think how many plans and tests
and other things that organizations have gone through for business continuity and
recovery, you have to think about that incident response. We talked earlier about
how to get the C suite involved. We need to have that executive sponsorship and
understanding, and that means it's connected to all the other parts of the
enterprise.
So it might be the communications, it might be legal, it might be other things, but
knowing how to do that and being able to respond to it quickly is also very important.
Rance DeLong: I agree on the monitoring being very important as well as the question of what
to monitor. There are advances being made through research in this area, both
modeling behavior -- what are the nominal behaviors -- and how we can allow for
certain variations in the behavior and still not have too many false positives or too
many false negatives.
Also on a technical level, we can analyze systems for certain invariants, and these
can be very subtle and complicated invariance formulas that may be pages long
and hold on the system during its normal operation. A monitor can be monitoring
both for invariance, these static things, but they can also be monitoring for changes that are
supposed to occur and whether those are occurring the way they're supposed to.
Lounsbury
Mezzapelle
DeLong
Jim Hietala: The only thing I would add is that I think it’s about understanding where you really
have risk and being able to measure how much risk is present in your given situation.
In the security industry, there has been a shift in mindset away from figuring that we can actually
prevent every bad thing from happening towards really understanding where people may have
gotten into the system. What are those markers that something is gone awry and reacting to that
in a more timely way -- so detective controls, as opposed to purely preventative type controls.
Lounsbury: We heard from Dawn Meyerriecks earlier about the convergence of virtual and
physical and how that changes the risk management game. And we heard from Mary Ann
Davidson about how she is definitely not going to connect her house to the Internet.
So this brings new potential risks and security management concerns. What do you see as the big
Internet of Things (IoT) security concerns and how does the technology industry assess and
respond to those?
Hietala: In terms of IoT, the thing that concern me is that many of the things that we've solved at
some level in IT hardware, software, and systems seemed to have been forgotten
by many of the IoT device manufacturers.
We have pretty well thought out processes for how we identify assets, we patch
things, and we deal with security events and vulnerabilities that happen. The idea
that, particularly on the consumer class of IoT type devices, we have devices out
there with IP interfaces on them, and many of the manufacturers just haven’t had
a thought of how they are going to patch something in the field, I think should
scare us all to some degree.
Maybe it is, as Mary Ann mentioned, the idea that there are certain systemic risks that are out
there that we just have to sort of nod our head and say that that’s the way it is. But certainly
around really critical kinds of IoT applications, we need to take what we've learned in the last ten
years and apply it to this new class of devices.
New architectural approach
DeLong: I'd like to add to that. We need a new architectural approach for IoT that will help to
mitigate the systemic risks. And echoing the concerns expressed by Mary Ann a few minutes
ago, in 2014, Europol, which is an organization that tracks criminal  risks of various kinds,
predicted by the end of 2014, murder by Internet, in the context of Internet of Things. It didn't
happen, but they predicted it, and I think it's not farfetched that we may see it over time.
Lounsbury: What do we really know actually? Edna, do you have any reaction on that one?
Hietala
Conway: Murder by Internet. That’s the question you gave me, thanks. Welcome to being a
former prosecutor. The answer is on their derrieres. The reality is do we have any
evidentiary reality to be able to prove that?
I think the challenge is one that's really well-taken, which is we are probably all
in agreement on, the convergence of these devices. We saw the convergence of
IT and OT and we haven't fixed that yet.
We are now moving with IoT into a scalability of the nature and volume of
devices. To me, the real challenge will be to come up with new ways of deploying
telemetry to allow us to see all the little crevices and corners of the Internet of
Things, so that we can identify risks in the same way that we have. We haven't mastered 100
percent, but we've certainly tackled predominately across the computer networks and the
network itself and IT. We're just not there with IoT.
Mezzapelle: Edna, it also brings to mind another thing -- we need to take advantage of the
technology itself. So as the data gets democratized, meaning it's going to be everywhere -- the
velocity, volume, and so forth -- we need to make sure that those devices can maybe be self-
defendable, or maybe they can join together and defend themselves against other things.
So we can't just apply the old-world thinking of being able to know everything and control
everything, but to embed some of those kinds of characteristics in the systems, devices, and
sensors themselves.
Lounsbury: We've heard about the need. In fact, Ron Ross mentioned the need for increased
public-private cooperation to address the cybersecurity threat. Ron, I would urge you to think
about including voluntary consensus standards organizations in that essential partnership you
mentioned to make sure that you get that high level of engagement, but of course, this is a broad
concern to everybody.
President Obama has made a call for legislation on enabling cybersecurity and information
sharing, and one of the points within that was shaping a cyber savvy workforce and many other
parts of public-private information sharing.
So what more can be done to enable effective public-private cooperation on this and what steps
can we, as a consensus organization, take to actually help make that happen? Mary Ann, do you
want to tackle that one and see where it goes?
Collaboration is important
Mezzapelle: To your point, collaboration is important and it's not just about the public and the
private partnership. It also means within an industry sector or in your supply chain and third-
party. It's not just about the technology; it's also about the processes, and being able to
communicate effectively, almost at machine speed, in those areas.
Conway
So you think about the people, the processes, and the technology, I don't think it's going to be
solved by government. I think I agree with the previous speakers when they were talking about
how it needs to be more hand-in-hand.
There are some ways that industry can actually lead that. We have some examples, for instance
what we are doing with the Healthcare Forum and with the Mining and Minerals Forum. That
might seem like a little bit, but it's that little bit that helps, that brings it together to make it easier
for that connection.
It's also important to think about, especially with the class of services and products that are
available as a service, another measure of collaboration. Maybe you, as a security organization,
determine that your capabilities can't keep up with the bad guys, because  they have more money,
more time, more opportunity to take advantage, either from a financial perspective or maybe
even from a competitive perspective, for your intellectual property.
You really can't do it yourself. You need those product vendors or you might need a services
vendor to really be able to fill in the gaps, so that you can have that kind of thing on demand. So
I would encourage you to think about that kind of collaboration through partnerships in your
whole ecosystem.
DeLong: I know that people in the commercial world don't like a lot of regulation, but I think
government can provide certain minimal standards that must be met to raise the floor. Not that
companies won't exceed these and use that as a competitive basis, but if minimum is set in
regulations, then this will raise the whole level of discourse.
Conway: We could probably debate over a really big bottle of wine whether it's regulation or
whether it's collaboration. I agree with Mary Ann. I think we need to sit down and ask what are
the biggest challenges that we have and take bold, hairy steps to pull together as an industry?
And that includes government and academia as partners.
But I will give you just one example: ECIDs. They are out there and some are on semiconductor
devices. There are some semiconductor companies that already use them, and there are some that
don't.
A simple concept would be if we could make sure that those were actually published on an
access control base, so that we could go and see whether the ECID was actually utilized, number
one.
Speeding up standards
Lounsbury: Okay, thanks. Jim, I think this next question is about standards evolution. So we're
going to send it to someone from a standards organization.
The cyber security threat evolves quickly, and protection mechanisms evolve along with them.
It's the old attacker-defender arms race. Standards take time to develop, particularly if you use a
consensus process. How do we change the dynamic? How do we make sure that the standards
are keeping up with the evolving threat picture? And what more can be done to speed that up and
keep it fresh?
Hietala: I'll go back to a series of workshops that we did in the fall around the topic of security
automation. In terms of The Open Group's perspective, standards development works best when
you have a strong customer voice expressed around the pain points, requirements, and issues.
We did a series of workshops on the topic of security automation with customer organizations.
We had maybe a couple of hundred inputs over the course of four workshops, three physical
events, and one that we did on the web. We collected that data, and then are bringing it to the
vendors and putting some context around a really critical area, which is how do you automate
some of the security capabilities so that you are responding faster to attacks and threats.
Generally, with just the idea that we bring customers into the discussion early, we make sure that
their issues are well-understood. That helps motivate the vendor community to get serious about
doing things more quickly.
One of the things we heard pretty clearly in terms of requirements was that multi-vendor
interoperability between security components is pretty critical in that world. It's a multi-vendor
world that most of the customers are living with. So building interfaces that are open, where you
have got interoperability between vendors, is a really key thing.
DeLong: It's a really challenging problem, because in emerging technologies, where you want to
encourage and you depend upon innovation, it's hard to establish a standard. It's still emerging.
You don't know what's going to be a good standard. So you hold off and you wait and then you
start to get innovation, you get divergence, and then bringing it back together ultimately takes
more energy.
Lounsbury: Rance, since you have got the microphone, how much of the current cybersecurity
situation is attributed to poor blocking and tackling in terms of the basics, like doing security
architecture or even having a method to do security architecture, things like risk management,
which of course Jim and the Security Forum have been looking into? And not only that, what
about translating that theory into operational practice and making sure that people are doing it on
a regular basis?
DeLong: A report I read on SANs, a US Government issued report on January 28 of this year,
said that that many, or most, or all of our critical weapons systems contain flaws and
vulnerabilities. One of the main conclusions was that, in many cases, it was due to not taking
care of the basics -- the proper administration of systems, the proper application of repairs,
patches, vulnerability fixes, and so on. So we need to be able to do it in critical systems as well
as on desktops.
Open-source crisis
Mezzapelle: You might consider the open-source code crisis that happened over the past year
with Heartbleed, where the benefits of having open-source code is somewhat offset by the
disadvantages.
That may be one of the areas where the basics need to be looked at. It’s also because those
systems were created in an environment when the threats were at an entirely different level.
That’s a reminder that we need to look to that in our own organization.
Another thing is in mobile applications, where we have such a rush to get out features, revs, and
everything like that, that it’s not entirety embedded in the system’s lifecycle or in a new startup
company. Those are the some of the other basic areas where we find that the basics, the
foundation, needs to be solidified to really help enhance the security in those areas.
Hietala: So in the world of security, it can be a little bit opaque, when you look at a given
breach, as to what really happened, what failed, and so on. But enough information has come out
about some of the breaches that you get some visibility into what went wrong.
Attend The Open Group Baltimore 2015
July 20-23, 2015
Early bird registration ends June 19
Of the two big insider breaches -- WikiLeaks and then Snowden -- in both cases, there were
fairly fundamental security controls that should have been in place, or maybe were in place, but
were poorly performed, that contributed to those -- access control type things, authorization, and
so on.
Even in some of the large retailer credit card breaches, you can point to the fact that they didn’t
do certain things right in terms of the basic blocking and tackling.
There's a whole lot of security technology out there, a whole lot of security controls that you can
look to, but implementing the right ones for your situation, given the risk that you have and then
operating them effectively, is an ongoing challenge for most companies.
Mezzapelle: Can I pose a question? It’s one of my premises that sometimes compliance and
regulation makes companies do things in the wrong areas to the point where they have a less
secure system. What do you think about that and how that impacts the blocking and tackling?
Hietala: That has probably been true for, say, the four years preceding this, but there was a study
just recently -- I couldn’t tell you who it was from -- but it basically flipped that. For the last five
years or so, compliance has always been at the top of the list of drivers for information security
spend in projects and so forth, but it has dropped down considerably, because of all these high
profile breaches. Senior executive teams are saying, "Okay, enough. I don’t care what the
compliance regulations say, we're going to do the things we need to do to secure our
environment." Nobody wants to be the next Sony.
Mezzapelle: Or the Target CEO who had to step down. Even though they were compliant, they
still had a breach, which unfortunately, is probably an opportunity at almost every enterprise and
agency that’s out there.
The right eyeballs
DeLong: And on the subject of open source, it’s frequently given as a justification or a benefit
of open source that it will be more secure because there are millions of eyeballs looking at it. It's
not millions of eyeballs, but the right eyeballs looking at it, the ones who can discern that there
are security problems.
It's not necessarily the case that open source is going to be more secure, because it can be viewed
by millions of eyeballs. You can have proprietary software that has just as much, or more,
attention from the right eyeballs as open source.
Mezzapelle: There are also those million eyeballs out there trying to make money on exploiting
it before it does get patched -- the new market economy.
Lounsbury: I was just going to mention that we're now seeing that some large companies are
paying those millions of eyeballs to go look for vulnerabilities, strangely enough, which they
always find in other people’s code, not their own.
Mezzapelle: Our Zero Day Initiative, that was part of the business model, is to pay people to
find things that we can implement into our own products first, but it also made it available to
other companies and vendors so that they could fix it before it became public knowledge.
Some of the economics are changing too. They're trying to get the white hatter, so to speak, to
look at other parts that are maybe more critical, like what came up with Heartbleed.
Lounsbury: On that point, and I'm going to inject a question of my own if I may, on balance, is
the open sharing of information of things like vulnerability analysis helping move us forward,
and can we do more of it, or do we need to channel it in other ways?
Mezzapelle: We need to do more of it. It's beneficial. We still have conclaves of secretness
saying that you can give this information to this group of people, but not this group of people,
and it's very hard.
In my organization, which is global, I had to look at every last little detail to say, "Can I share it
with someone who is a foreigner, or someone who is in my organization, but not in my
organization?" It was really hard to try to figure out how we could use that information more
effectively. If we can get it more automated to where it doesn't have to be the good old network
talking to someone else, or an email, or something like that, it's more beneficial.
And it's not just the vulnerabilities. It's also looking more towards threat intelligence. You see a
lot of investment, if you look at the details behind some of the investments in In-Q-Tel, for
instance, about looking at data in a whole different way.
So we're emphasizing data, both in analytics as well as threat prediction, being able to know
where some thing is going to come over the hill and you can secure your enterprise or your
applications or systems more effectively against it.
Open sharing
Lounsbury: Let’s go down the row. Edna, what are your thoughts on more open sharing?
Conway: We need to do more of it, but we need to do it in a controlled environment.
We can get ahead of the curve with not just predictive analysis, but telemetry, to feed the
predictive analysis, and that’s not going to happen because a government regulation mandates
that we report somewhere.
So if you look, for example, DFARS, that came out last year with regard to concerns about
counterfeit mitigation and detection in COTS ICT, the reality is not everybody is a member of
GIDEP, and many of us actually share our information faster than it gets into GIDEP and more
comprehensively.
I will go back to it’s rigor in the industry and sharing in a controlled environment.
Lounsbury: Jim, thoughts on open sharing?
Hietala: Good idea. It gets a little murky when you're looking at zero-day vulnerabilities. There
is a whole black market that has developed around those things, where nations are to some
degree hoarding them, paying a lot of money to get them, to use them in cyberwar type activities.
There's a great book out now called ‘Zero Day’ by Kim Zetter, a writer from Wired. It gets into
the history of Stuxnet and how it was discovered, and Symantec, and I forget the other security
researcher firm that found it. There were a number of zero-day vulnerabilities there that were
used in an offensive cyberwar a capacity. So it’s definitely a gray area at this point.
DeLong: I agree with what Edna said about the parameters of the controlled environment, the
controlled way in which it's done. Without naming any names, recently there were some feathers
flying over a security research organization establishing some practices concerning a 60- or 90-
day timeframe, in which they would notify a vendor of vulnerabilities, giving them an
opportunity to issue a patch. In one instance recently, when that time expired and they released it,
the vendor was rather upset because the patch had not been issued yet. So what are reasonable
parameters of this controlled environment?
Supply chains
Lounsbury: Let’s move on here. Edna, one of the great quotes that came out of the early days
of OTTF was that only God creates something from nothing and everybody else is on
somebody’s supply chain. I love that quote.
But given that all IT components, or all IT products, are built from hardware and software
components, which are sourced globally, what do we do to mitigate the specific risks resulting
from malware and counterfeit parts being inserted in the supply chain? How do you make sure
that the work to do that is reflected in creating preference for vendors who put that effort into it?
Conway: It's probably three-dimensional. The first part is understanding what your problem is. If
you go back to what we heard Mary Ann Davidson talk about earlier today, the reality is what is
the problem you're trying to solve?
I'll just use the Trusted Technology Provider Standard as an example of that. Narrowing down
what the problem is, where the problem is located, helps you, number one.
Then, you have to attack it from all dimensions. We have a tendency to think about cyber in
isolation from the physical, and the physical in isolation from the cyber, and then the logical. For
those of us who live in OT or supply chain, we have to have processes that drive this. If those
three don't converge and map together, we'll fail, because there will be gaps, inevitable gaps.
For me, it's identifying what your true problem is and then taking a three-dimensional approach
to make sure that you always have security technology, the combination of the physical security,
and then the logical processes to interlock and try to drive a mitigation scheme that will never
reduce you to zero, but will identify things.
Particularly think about IoT in a manufacturing environment with the right sensor at the right
time and telemetry around human behavior. All of a sudden, you're going to know things before
they get to a stage in that supply chain or product lifecycle where they can become devastating in
their scope of problem.
DeLong: As one data point, there was a lot of concern over chips fabricated in various parts of
the world being used in national security systems. And in 2008, DARPA initiated a program
called TRUST, which had a very challenging objective for coming up with methods by which
these chips could be validated after manufacture.
Just as one example of the outcome of that, under the IRIS Program in 2010, SRI unveiled an
infrared laser microscope that could examine the chips at the nanometer level, both for
construction, functionality, and their likely lifetime -- how long they would last before they
failed.
Lounsbury: Jim, Mary Ann, reactions?
Finding the real problem
Mezzapelle: The only other thing I wanted to add to Edna’s comment was reiteration about the
economics of it and finding where the real problem is. Especially in the security area,
information technology security, we tend to get so focused on trying to make it technically pure,
avoiding the most 100 percent, ultimate risk. Sometimes, we forget to put our business ears on
and think about what that really means for the business? Is it keeping them from innovating
quickly, adapting to new markets, perhaps getting into a new global environment?
We have to make sure we look back at the business imperatives and make sure that we have
metrics all along the road that help us make sure we are putting the investments in the right area,
because security is really a risk balance, which I know Jim has a whole lot more to talk about.
Hietala: The one thing I would add to this conversation is that we have sort of been on a journey
to where doing a better job of security is a good thing. The question is when is it going to
become a differentiator for your product and service in the market. For me personally, a bank
that really gets online banking and security right is a differentiator to me as a consumer.
I saw a study that was quoted this week at the World Economic Forum that said that, by 2:1
margin, consumers -- and they surveyed consumers in 27 countries -- think that governments and
businesses are not paying enough attention to digital security.
So maybe that’s a mindset shift that’s occurring as a result of how bad cybersecurity has been.
Maybe we'll get to the point soon where it can be a differentiator for companies in the business-
to-business context and a business-to-consumer context and so forth. So we can hope.
Conway: Great point. And just to pivot on that and point out how important it is. I know that
what we are seeing now, and it’s a trend, and there are some cutting-edge folks who have been
doing it for a while, but most boards of directors are looking at creating a digital advisory board
for their company. They're recognizing the pervasiveness of digital risk as its own risk that
sometimes it reports up to the audit committee.
I've seen at least 20 or 30 in the last three months come around, asking, did you advise every
board members to focus on this from multiple disciplines? If we get that right, it might allow us
that opportunity to share the information more broadly.
Lounsbury: That’s a really interesting point, the point about multiple disciplines. The next
question is unfortunately the final question -- or fortunately, since it will get you to lunch. I am
going to start off with Rance.
At some point, the difference between a security vulnerability failure or other kind of failures all
flow into that big risk analysis that a digital-risk management regime would find out. One of the
things that’s going on across the Real-Time and Embedded Systems Forum is to look at how we
architect systems for higher levels of assurance, not just security vulnerabilities, but other kinds
of failures as well.
The question I will ask here is, if a system fails its service-level agreement (SLA) for whatever
reason, whether it’s security or some other kind of vulnerability, is that a result of our ability to
do system architecture or software created without provably secure or provably assured
components or the ability of the system to react to those kind of failures? If you believe that, how
do we change it? How do we accelerate the adoption of better practices in order to mitigate the
whole spectrum of risk of failure of the digital enterprise?
Emphasis on protection
DeLong: Well, in high assurance systems, obviously we still treat them as very important
detection of problems when they occur, recovery from problems, but we put a greater emphasis
on prevention, and we try to put greater effort into prevention.
You mentioned provably secure components, but provable security is only part of the picture.
When you do prove, you prove a theorem, and in a reasonable system, a system of reasonable
complexity, there isn’t just one theorem. There are tens, hundreds, or even thousands of theorems
that are proved to establish certain properties in the system.
It has to do with proofs of the various parts, proofs of how the parts combine, what are the claims
we want to make for the system, how do the proofs provide evidence that the claims are justified,
and what kind of argumentation do we use based on that set of evidence.
So we're looking at not just the proofs as little gems, if you will. A proof of a theorem  think of it
as a gemstone, but how are they all combined into creating a system?
If a movie star walked out on the red carpet with a little burlap sack around her neck full of a
handful of gemstones, we wouldn’t be as impressed as we are when we see a beautiful necklace
that’s been done by a real master, who has taken tens or hundreds of stones and combined them
in a very pleasing and beautiful way.
And so we have to put as much attention, not just on the individual gemstones, which admittedly
are created with very pure materials and under great pressure, but also how they are combined
into a work that meets the purpose.
And so we have assurance cases, we have compositional reasoning, and other things that have to
come into play. It’s not just about the provable components and it’s a mistake that is sometimes
made to just focus on the proof.
Attend The Open Group Baltimore 2015
July 20-23, 2015
Early bird registration ends June 19
Remember, proof is really just a degree of demonstration, and we always want some
demonstration to have confidence in the system, and proof is just an extreme degree of
demonstration.
Mezzapelle: I think I would summarize it by embedding security early and often, and don’t
depend on it 100 percent. That means you have to make your systems, your processes and your
people resilient.
This has been a BriefingsDirect panel discussion overview from The Open Group Conference in
San Diego on Feb. 2 through 5, 2015.
The panel, which examined issues and improvements for global enterprise cybersecurity,
consisted of moderator Dave Lounsbury, Chief Technology Officer, The Open Group; Edna
Conway, Chief Security Officer for Global Supply Chain, Cisco; Mary Ann Mezzapelle,
Americas CTO for Enterprise Security Services, HP; Jim Hietala, Vice President of Security for
The Open Group, and Rance DeLong, Researcher into Security and High Assurance Systems,
Santa Clara University.
This has been a special BriefingsDirect presentation and panel discussion from The Open Group
San Diego 2015. This follows an earlier discussion on cybersecurity standards for safer supply
chains. Another earlier discussion from the event focused on synergies among major Enterprise
Architecture frameworks. And a presentation by John Zachman, founder of the Zachman
Framework.
Transcript of a live panel discussion at February's The Open Group San Diego 2015. Copyright 
The Open Group and Interarbor Solutions, LLC, 2005-2015. All rights reserved.
You may also be interested in:
	

 •	

 Enterprise Architecture Leader John Zachman on Understanding and Leveraging
Synergies Among the Major EA Frameworks
	

 •	

 Cybersecurity standards: The Open Group explores security and safer supply chains
	

 •	

 Explore synergies among major Enterprise Architecture frameworks with The Open
Group
	

 •	

 Health Data Deluge Requires Secure Information Flow Via Standards, Says the Open
Group's New Healthcare Director
	

 •	

 The Open Group Amsterdam Conference Panel Delves into How to Best Gain Business
Value from Open Platform 3.0
	

 •	

 Healthcare Among Thorniest and Yet Most Opportunistic Use Cases for Boundaryless
Information Flow Improvement
•	

 Gaining Dependability Across All Business Activities Requires Standard of Standards to
Tame Dynamic Complexity, Says The Open Group CEO
	

 •	

 Big Data success depends on better risk management practices like FAIR, say conference
panelists
	

 •	

 Improving signal-to-noise in risk management
	

 •	

 CSC and HP team up to define the new state needed for comprehensive enterprise
cybersecurity

More Related Content

What's hot

The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 
Malware & Data Breaches: Combatting the Biggest Threat
Malware & Data Breaches:  Combatting the Biggest ThreatMalware & Data Breaches:  Combatting the Biggest Threat
Malware & Data Breaches: Combatting the Biggest ThreatChris Ross
 
Episode 3: Andrew Hay of OpenDNS
Episode 3: Andrew Hay of OpenDNSEpisode 3: Andrew Hay of OpenDNS
Episode 3: Andrew Hay of OpenDNSContrast Security
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorSandra (Sandy) Dunn
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-usersThomas Hughes
 
Expert Panel Explores Heightened Role of Security for Cloud and Mobile Apps D...
Expert Panel Explores Heightened Role of Security for Cloud and Mobile Apps D...Expert Panel Explores Heightened Role of Security for Cloud and Mobile Apps D...
Expert Panel Explores Heightened Role of Security for Cloud and Mobile Apps D...Dana Gardner
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesIJNSA Journal
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information securityMajor Hayden
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015Major Hayden
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseSilvioPappalardo
 
Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Erik Ginalick
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Devendra kashyap
 
Episode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.comEpisode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.comContrast Security
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyHamisi Kibonde
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotTech Mahindra
 

What's hot (20)

The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
Malware & Data Breaches: Combatting the Biggest Threat
Malware & Data Breaches:  Combatting the Biggest ThreatMalware & Data Breaches:  Combatting the Biggest Threat
Malware & Data Breaches: Combatting the Biggest Threat
 
Episode 3: Andrew Hay of OpenDNS
Episode 3: Andrew Hay of OpenDNSEpisode 3: Andrew Hay of OpenDNS
Episode 3: Andrew Hay of OpenDNS
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-users
 
Expert Panel Explores Heightened Role of Security for Cloud and Mobile Apps D...
Expert Panel Explores Heightened Role of Security for Cloud and Mobile Apps D...Expert Panel Explores Heightened Role of Security for Cloud and Mobile Apps D...
Expert Panel Explores Heightened Role of Security for Cloud and Mobile Apps D...
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident Response
 
Challenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber ConfidenceChallenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber Confidence
 
Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 
Episode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.comEpisode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.com
 
16231
1623116231
16231
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot Spot
 

Viewers also liked

Virtualization Spurs ERP Operations and Disaster Recovery for Sportswear Gian...
Virtualization Spurs ERP Operations and Disaster Recovery for Sportswear Gian...Virtualization Spurs ERP Operations and Disaster Recovery for Sportswear Gian...
Virtualization Spurs ERP Operations and Disaster Recovery for Sportswear Gian...Dana Gardner
 
Hadoop and Vertica at Snagajob: How Big Data Technologies Drive Business Results
Hadoop and Vertica at Snagajob: How Big Data Technologies Drive Business ResultsHadoop and Vertica at Snagajob: How Big Data Technologies Drive Business Results
Hadoop and Vertica at Snagajob: How Big Data Technologies Drive Business ResultsDana Gardner
 
Learn More About Advances in Identity Management and It's Role in Reducing Cy...
Learn More About Advances in Identity Management and It's Role in Reducing Cy...Learn More About Advances in Identity Management and It's Role in Reducing Cy...
Learn More About Advances in Identity Management and It's Role in Reducing Cy...Dana Gardner
 
Cloud and Big Data Come Together in the Ocean Observatories Initiative to Giv...
Cloud and Big Data Come Together in the Ocean Observatories Initiative to Giv...Cloud and Big Data Come Together in the Ocean Observatories Initiative to Giv...
Cloud and Big Data Come Together in the Ocean Observatories Initiative to Giv...Dana Gardner
 
Service Virtualization Solves Quality and Performance Bottlenecks Amid Comple...
Service Virtualization Solves Quality and Performance Bottlenecks Amid Comple...Service Virtualization Solves Quality and Performance Bottlenecks Amid Comple...
Service Virtualization Solves Quality and Performance Bottlenecks Amid Comple...Dana Gardner
 
SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...
SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...
SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...Dana Gardner
 
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...Dana Gardner
 
The State of Mobile Security and How Identity Advancement Plays an Essential ...
The State of Mobile Security and How Identity Advancement Plays an Essential ...The State of Mobile Security and How Identity Advancement Plays an Essential ...
The State of Mobile Security and How Identity Advancement Plays an Essential ...Dana Gardner
 
Legal Services Leader Foley & Lardner LLP Achieves Cost Savings and Increased...
Legal Services Leader Foley & Lardner LLP Achieves Cost Savings and Increased...Legal Services Leader Foley & Lardner LLP Achieves Cost Savings and Increased...
Legal Services Leader Foley & Lardner LLP Achieves Cost Savings and Increased...Dana Gardner
 
Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...
Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...
Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...Dana Gardner
 
New Health Data Deluges Require Secure Information Flow Enablement Via Standa...
New Health Data Deluges Require Secure Information Flow Enablement Via Standa...New Health Data Deluges Require Secure Information Flow Enablement Via Standa...
New Health Data Deluges Require Secure Information Flow Enablement Via Standa...Dana Gardner
 

Viewers also liked (11)

Virtualization Spurs ERP Operations and Disaster Recovery for Sportswear Gian...
Virtualization Spurs ERP Operations and Disaster Recovery for Sportswear Gian...Virtualization Spurs ERP Operations and Disaster Recovery for Sportswear Gian...
Virtualization Spurs ERP Operations and Disaster Recovery for Sportswear Gian...
 
Hadoop and Vertica at Snagajob: How Big Data Technologies Drive Business Results
Hadoop and Vertica at Snagajob: How Big Data Technologies Drive Business ResultsHadoop and Vertica at Snagajob: How Big Data Technologies Drive Business Results
Hadoop and Vertica at Snagajob: How Big Data Technologies Drive Business Results
 
Learn More About Advances in Identity Management and It's Role in Reducing Cy...
Learn More About Advances in Identity Management and It's Role in Reducing Cy...Learn More About Advances in Identity Management and It's Role in Reducing Cy...
Learn More About Advances in Identity Management and It's Role in Reducing Cy...
 
Cloud and Big Data Come Together in the Ocean Observatories Initiative to Giv...
Cloud and Big Data Come Together in the Ocean Observatories Initiative to Giv...Cloud and Big Data Come Together in the Ocean Observatories Initiative to Giv...
Cloud and Big Data Come Together in the Ocean Observatories Initiative to Giv...
 
Service Virtualization Solves Quality and Performance Bottlenecks Amid Comple...
Service Virtualization Solves Quality and Performance Bottlenecks Amid Comple...Service Virtualization Solves Quality and Performance Bottlenecks Amid Comple...
Service Virtualization Solves Quality and Performance Bottlenecks Amid Comple...
 
SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...
SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...
SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...
 
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...
 
The State of Mobile Security and How Identity Advancement Plays an Essential ...
The State of Mobile Security and How Identity Advancement Plays an Essential ...The State of Mobile Security and How Identity Advancement Plays an Essential ...
The State of Mobile Security and How Identity Advancement Plays an Essential ...
 
Legal Services Leader Foley & Lardner LLP Achieves Cost Savings and Increased...
Legal Services Leader Foley & Lardner LLP Achieves Cost Savings and Increased...Legal Services Leader Foley & Lardner LLP Achieves Cost Savings and Increased...
Legal Services Leader Foley & Lardner LLP Achieves Cost Savings and Increased...
 
Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...
Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...
Redcentric Uses Advanced Configuration Database to Bring into Focus Massive M...
 
New Health Data Deluges Require Secure Information Flow Enablement Via Standa...
New Health Data Deluges Require Secure Information Flow Enablement Via Standa...New Health Data Deluges Require Secure Information Flow Enablement Via Standa...
New Health Data Deluges Require Secure Information Flow Enablement Via Standa...
 

Similar to The Open Group San Diego Panel Explores Global Cybersecurity Issues for Improved Enterprise Integrity and Risk Mitigation

Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...Dana Gardner
 
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...Dana Gardner
 
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...Dana Gardner
 
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Dana Gardner
 
Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...
Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...
Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...Dana Gardner
 
Growing Threats Make Application Security a Pervasive Necessity, Rather than ...
Growing Threats Make Application Security a Pervasive Necessity, Rather than ...Growing Threats Make Application Security a Pervasive Necessity, Rather than ...
Growing Threats Make Application Security a Pervasive Necessity, Rather than ...Dana Gardner
 
DevOps and Security, a Match Made in Heaven
DevOps and Security, a Match Made in HeavenDevOps and Security, a Match Made in Heaven
DevOps and Security, a Match Made in HeavenDana Gardner
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - HackersDendreon
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowCapgemini
 
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...Dana Gardner
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the YearTripwire
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPNick Selby
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentJonathan Sinclair
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Group
 
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...Dana Gardner
 
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...Dana Gardner
 
BI and big data analytics Force an Overdue Reckoning Between IT and Business ...
BI and big data analytics Force an Overdue Reckoning Between IT and Business ...BI and big data analytics Force an Overdue Reckoning Between IT and Business ...
BI and big data analytics Force an Overdue Reckoning Between IT and Business ...Dana Gardner
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Security personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxSecurity personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxjeffreye3
 

Similar to The Open Group San Diego Panel Explores Global Cybersecurity Issues for Improved Enterprise Integrity and Risk Mitigation (20)

Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
Thought Leader Interview: HP's Global CISO Brett Wahlin on the Future of Secu...
 
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
 
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
 
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
 
Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...
Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...
Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...
 
Growing Threats Make Application Security a Pervasive Necessity, Rather than ...
Growing Threats Make Application Security a Pervasive Necessity, Rather than ...Growing Threats Make Application Security a Pervasive Necessity, Rather than ...
Growing Threats Make Application Security a Pervasive Necessity, Rather than ...
 
DevOps and Security, a Match Made in Heaven
DevOps and Security, a Match Made in HeavenDevOps and Security, a Match Made in Heaven
DevOps and Security, a Match Made in Heaven
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - Hackers
 
Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters Now
 
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity component
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attack
 
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
 
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
How Data Loss Prevention End-Point Agents Use HPE IDOL’s Comprehensive Data C...
 
portfolio.docx
portfolio.docxportfolio.docx
portfolio.docx
 
BI and big data analytics Force an Overdue Reckoning Between IT and Business ...
BI and big data analytics Force an Overdue Reckoning Between IT and Business ...BI and big data analytics Force an Overdue Reckoning Between IT and Business ...
BI and big data analytics Force an Overdue Reckoning Between IT and Business ...
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Security personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docxSecurity personnel are increasingly having to think about the locati.docx
Security personnel are increasingly having to think about the locati.docx
 

Recently uploaded

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

The Open Group San Diego Panel Explores Global Cybersecurity Issues for Improved Enterprise Integrity and Risk Mitigation

  • 1. The Open Group San Diego Panel Explores Global Cybersecurity Issues for Improved Enterprise Integrity and Risk Mitigation Transcript of a live panel discussion at February's The Open Group San Diego 2015. Welcome to a special BriefingsDirect panel discussion overview from The Open Group San Diego 2105 on Feb. 2 through 5, 2015. The following panel, which examines issues and improvements for global enterprise cybersecurity, consists of moderator Dave Lounsbury, Chief Technology Officer, The Open Group; Edna Conway, Chief Security Officer for Global Supply Chain, Cisco; Mary Ann Mezzapelle, Americas CTO for Enterprise Security Services, HP; Jim Hietala, Vice President of Security for The Open Group, and Rance DeLong, Researcher into Security and High Assurance Systems, Santa Clara University. [Disclosure: The Open Group is a sponsor of BriefingsDirect podcasts.] Here are some excerpts: Dave Lounsbury: Following on from the tone that they have set about where the standards have to go and what constitutes a good standard, we have a very exciting Cybersecurity Panel on what is cybersecurity in 2015. We've heard all morning about the security, cybersecurity landscape, and, of course, everyone knows about all the many recent breaches that have been mentioned this morning. Obviously, the challenge is growing in cybersecurity. So, I want to start asking a few questions, and what I will do is start off directing one to Edna Conway, if I may. Attend The Open Group Baltimore 2015 July 20-23, 2015 Early bird registration ends June 19 We've heard about the Verizon Data Breach Investigation of DBIR report that catalogs the various attacks that have been made over the past year. One of the interesting findings was that in some of these breaches, the attackers were on the networks for months before being discovered. What do we need to start doing differently to secure our enterprises? Edna Conway: There are a couple of things. From my perspective, continuous monitoring is absolutely essential. People don't like it because it requires rigor, consistency, and process. The real question is, what do you continuously monitor?
  • 2. It’s what you monitor that makes a difference. Access control and authentication, should absolutely be on our radar screen, but I think the real ticket is behavior. What kind of behavior do you see authorized personnel engaging in that should send up as an alert? That’s a trend that we need to embrace more. The second thing that we need to do differently is drive detection and containment. I think we try to do that, but we need to become more rigorous in it. Some of that rigor is around things like, are we actually doing advanced malware protection, rather than just detection? What are we doing specifically around threat analytics and the feeds that come to us: how we absorb them, how we mine them, and how we consolidate them? The third thing for me is how we get it right. I call that team the puzzle solvers. How do we get them together swiftly? How do you put the right group of experts together when you see a behavior aberration or you get a threat feed that says that you need to address this now? When we see a threat injection, are we actually acting on the anomaly before it makes its way further along in the cycle? Executive support Mary Ann Mezzapelle: Another thing that I'd like to add is making sure you have the executive support and processes in place. If you think how many plans and tests and other things that organizations have gone through for business continuity and recovery, you have to think about that incident response. We talked earlier about how to get the C suite involved. We need to have that executive sponsorship and understanding, and that means it's connected to all the other parts of the enterprise. So it might be the communications, it might be legal, it might be other things, but knowing how to do that and being able to respond to it quickly is also very important. Rance DeLong: I agree on the monitoring being very important as well as the question of what to monitor. There are advances being made through research in this area, both modeling behavior -- what are the nominal behaviors -- and how we can allow for certain variations in the behavior and still not have too many false positives or too many false negatives. Also on a technical level, we can analyze systems for certain invariants, and these can be very subtle and complicated invariance formulas that may be pages long and hold on the system during its normal operation. A monitor can be monitoring both for invariance, these static things, but they can also be monitoring for changes that are supposed to occur and whether those are occurring the way they're supposed to. Lounsbury Mezzapelle DeLong
  • 3. Jim Hietala: The only thing I would add is that I think it’s about understanding where you really have risk and being able to measure how much risk is present in your given situation. In the security industry, there has been a shift in mindset away from figuring that we can actually prevent every bad thing from happening towards really understanding where people may have gotten into the system. What are those markers that something is gone awry and reacting to that in a more timely way -- so detective controls, as opposed to purely preventative type controls. Lounsbury: We heard from Dawn Meyerriecks earlier about the convergence of virtual and physical and how that changes the risk management game. And we heard from Mary Ann Davidson about how she is definitely not going to connect her house to the Internet. So this brings new potential risks and security management concerns. What do you see as the big Internet of Things (IoT) security concerns and how does the technology industry assess and respond to those? Hietala: In terms of IoT, the thing that concern me is that many of the things that we've solved at some level in IT hardware, software, and systems seemed to have been forgotten by many of the IoT device manufacturers. We have pretty well thought out processes for how we identify assets, we patch things, and we deal with security events and vulnerabilities that happen. The idea that, particularly on the consumer class of IoT type devices, we have devices out there with IP interfaces on them, and many of the manufacturers just haven’t had a thought of how they are going to patch something in the field, I think should scare us all to some degree. Maybe it is, as Mary Ann mentioned, the idea that there are certain systemic risks that are out there that we just have to sort of nod our head and say that that’s the way it is. But certainly around really critical kinds of IoT applications, we need to take what we've learned in the last ten years and apply it to this new class of devices. New architectural approach DeLong: I'd like to add to that. We need a new architectural approach for IoT that will help to mitigate the systemic risks. And echoing the concerns expressed by Mary Ann a few minutes ago, in 2014, Europol, which is an organization that tracks criminal  risks of various kinds, predicted by the end of 2014, murder by Internet, in the context of Internet of Things. It didn't happen, but they predicted it, and I think it's not farfetched that we may see it over time. Lounsbury: What do we really know actually? Edna, do you have any reaction on that one? Hietala
  • 4. Conway: Murder by Internet. That’s the question you gave me, thanks. Welcome to being a former prosecutor. The answer is on their derrieres. The reality is do we have any evidentiary reality to be able to prove that? I think the challenge is one that's really well-taken, which is we are probably all in agreement on, the convergence of these devices. We saw the convergence of IT and OT and we haven't fixed that yet. We are now moving with IoT into a scalability of the nature and volume of devices. To me, the real challenge will be to come up with new ways of deploying telemetry to allow us to see all the little crevices and corners of the Internet of Things, so that we can identify risks in the same way that we have. We haven't mastered 100 percent, but we've certainly tackled predominately across the computer networks and the network itself and IT. We're just not there with IoT. Mezzapelle: Edna, it also brings to mind another thing -- we need to take advantage of the technology itself. So as the data gets democratized, meaning it's going to be everywhere -- the velocity, volume, and so forth -- we need to make sure that those devices can maybe be self- defendable, or maybe they can join together and defend themselves against other things. So we can't just apply the old-world thinking of being able to know everything and control everything, but to embed some of those kinds of characteristics in the systems, devices, and sensors themselves. Lounsbury: We've heard about the need. In fact, Ron Ross mentioned the need for increased public-private cooperation to address the cybersecurity threat. Ron, I would urge you to think about including voluntary consensus standards organizations in that essential partnership you mentioned to make sure that you get that high level of engagement, but of course, this is a broad concern to everybody. President Obama has made a call for legislation on enabling cybersecurity and information sharing, and one of the points within that was shaping a cyber savvy workforce and many other parts of public-private information sharing. So what more can be done to enable effective public-private cooperation on this and what steps can we, as a consensus organization, take to actually help make that happen? Mary Ann, do you want to tackle that one and see where it goes? Collaboration is important Mezzapelle: To your point, collaboration is important and it's not just about the public and the private partnership. It also means within an industry sector or in your supply chain and third- party. It's not just about the technology; it's also about the processes, and being able to communicate effectively, almost at machine speed, in those areas. Conway
  • 5. So you think about the people, the processes, and the technology, I don't think it's going to be solved by government. I think I agree with the previous speakers when they were talking about how it needs to be more hand-in-hand. There are some ways that industry can actually lead that. We have some examples, for instance what we are doing with the Healthcare Forum and with the Mining and Minerals Forum. That might seem like a little bit, but it's that little bit that helps, that brings it together to make it easier for that connection. It's also important to think about, especially with the class of services and products that are available as a service, another measure of collaboration. Maybe you, as a security organization, determine that your capabilities can't keep up with the bad guys, because  they have more money, more time, more opportunity to take advantage, either from a financial perspective or maybe even from a competitive perspective, for your intellectual property. You really can't do it yourself. You need those product vendors or you might need a services vendor to really be able to fill in the gaps, so that you can have that kind of thing on demand. So I would encourage you to think about that kind of collaboration through partnerships in your whole ecosystem. DeLong: I know that people in the commercial world don't like a lot of regulation, but I think government can provide certain minimal standards that must be met to raise the floor. Not that companies won't exceed these and use that as a competitive basis, but if minimum is set in regulations, then this will raise the whole level of discourse. Conway: We could probably debate over a really big bottle of wine whether it's regulation or whether it's collaboration. I agree with Mary Ann. I think we need to sit down and ask what are the biggest challenges that we have and take bold, hairy steps to pull together as an industry? And that includes government and academia as partners. But I will give you just one example: ECIDs. They are out there and some are on semiconductor devices. There are some semiconductor companies that already use them, and there are some that don't. A simple concept would be if we could make sure that those were actually published on an access control base, so that we could go and see whether the ECID was actually utilized, number one. Speeding up standards Lounsbury: Okay, thanks. Jim, I think this next question is about standards evolution. So we're going to send it to someone from a standards organization.
  • 6. The cyber security threat evolves quickly, and protection mechanisms evolve along with them. It's the old attacker-defender arms race. Standards take time to develop, particularly if you use a consensus process. How do we change the dynamic? How do we make sure that the standards are keeping up with the evolving threat picture? And what more can be done to speed that up and keep it fresh? Hietala: I'll go back to a series of workshops that we did in the fall around the topic of security automation. In terms of The Open Group's perspective, standards development works best when you have a strong customer voice expressed around the pain points, requirements, and issues. We did a series of workshops on the topic of security automation with customer organizations. We had maybe a couple of hundred inputs over the course of four workshops, three physical events, and one that we did on the web. We collected that data, and then are bringing it to the vendors and putting some context around a really critical area, which is how do you automate some of the security capabilities so that you are responding faster to attacks and threats. Generally, with just the idea that we bring customers into the discussion early, we make sure that their issues are well-understood. That helps motivate the vendor community to get serious about doing things more quickly. One of the things we heard pretty clearly in terms of requirements was that multi-vendor interoperability between security components is pretty critical in that world. It's a multi-vendor world that most of the customers are living with. So building interfaces that are open, where you have got interoperability between vendors, is a really key thing. DeLong: It's a really challenging problem, because in emerging technologies, where you want to encourage and you depend upon innovation, it's hard to establish a standard. It's still emerging. You don't know what's going to be a good standard. So you hold off and you wait and then you start to get innovation, you get divergence, and then bringing it back together ultimately takes more energy. Lounsbury: Rance, since you have got the microphone, how much of the current cybersecurity situation is attributed to poor blocking and tackling in terms of the basics, like doing security architecture or even having a method to do security architecture, things like risk management, which of course Jim and the Security Forum have been looking into? And not only that, what about translating that theory into operational practice and making sure that people are doing it on a regular basis? DeLong: A report I read on SANs, a US Government issued report on January 28 of this year, said that that many, or most, or all of our critical weapons systems contain flaws and vulnerabilities. One of the main conclusions was that, in many cases, it was due to not taking care of the basics -- the proper administration of systems, the proper application of repairs, patches, vulnerability fixes, and so on. So we need to be able to do it in critical systems as well as on desktops.
  • 7. Open-source crisis Mezzapelle: You might consider the open-source code crisis that happened over the past year with Heartbleed, where the benefits of having open-source code is somewhat offset by the disadvantages. That may be one of the areas where the basics need to be looked at. It’s also because those systems were created in an environment when the threats were at an entirely different level. That’s a reminder that we need to look to that in our own organization. Another thing is in mobile applications, where we have such a rush to get out features, revs, and everything like that, that it’s not entirety embedded in the system’s lifecycle or in a new startup company. Those are the some of the other basic areas where we find that the basics, the foundation, needs to be solidified to really help enhance the security in those areas. Hietala: So in the world of security, it can be a little bit opaque, when you look at a given breach, as to what really happened, what failed, and so on. But enough information has come out about some of the breaches that you get some visibility into what went wrong. Attend The Open Group Baltimore 2015 July 20-23, 2015 Early bird registration ends June 19 Of the two big insider breaches -- WikiLeaks and then Snowden -- in both cases, there were fairly fundamental security controls that should have been in place, or maybe were in place, but were poorly performed, that contributed to those -- access control type things, authorization, and so on. Even in some of the large retailer credit card breaches, you can point to the fact that they didn’t do certain things right in terms of the basic blocking and tackling. There's a whole lot of security technology out there, a whole lot of security controls that you can look to, but implementing the right ones for your situation, given the risk that you have and then operating them effectively, is an ongoing challenge for most companies. Mezzapelle: Can I pose a question? It’s one of my premises that sometimes compliance and regulation makes companies do things in the wrong areas to the point where they have a less secure system. What do you think about that and how that impacts the blocking and tackling? Hietala: That has probably been true for, say, the four years preceding this, but there was a study just recently -- I couldn’t tell you who it was from -- but it basically flipped that. For the last five years or so, compliance has always been at the top of the list of drivers for information security spend in projects and so forth, but it has dropped down considerably, because of all these high profile breaches. Senior executive teams are saying, "Okay, enough. I don’t care what the
  • 8. compliance regulations say, we're going to do the things we need to do to secure our environment." Nobody wants to be the next Sony. Mezzapelle: Or the Target CEO who had to step down. Even though they were compliant, they still had a breach, which unfortunately, is probably an opportunity at almost every enterprise and agency that’s out there. The right eyeballs DeLong: And on the subject of open source, it’s frequently given as a justification or a benefit of open source that it will be more secure because there are millions of eyeballs looking at it. It's not millions of eyeballs, but the right eyeballs looking at it, the ones who can discern that there are security problems. It's not necessarily the case that open source is going to be more secure, because it can be viewed by millions of eyeballs. You can have proprietary software that has just as much, or more, attention from the right eyeballs as open source. Mezzapelle: There are also those million eyeballs out there trying to make money on exploiting it before it does get patched -- the new market economy. Lounsbury: I was just going to mention that we're now seeing that some large companies are paying those millions of eyeballs to go look for vulnerabilities, strangely enough, which they always find in other people’s code, not their own. Mezzapelle: Our Zero Day Initiative, that was part of the business model, is to pay people to find things that we can implement into our own products first, but it also made it available to other companies and vendors so that they could fix it before it became public knowledge. Some of the economics are changing too. They're trying to get the white hatter, so to speak, to look at other parts that are maybe more critical, like what came up with Heartbleed. Lounsbury: On that point, and I'm going to inject a question of my own if I may, on balance, is the open sharing of information of things like vulnerability analysis helping move us forward, and can we do more of it, or do we need to channel it in other ways? Mezzapelle: We need to do more of it. It's beneficial. We still have conclaves of secretness saying that you can give this information to this group of people, but not this group of people, and it's very hard. In my organization, which is global, I had to look at every last little detail to say, "Can I share it with someone who is a foreigner, or someone who is in my organization, but not in my organization?" It was really hard to try to figure out how we could use that information more
  • 9. effectively. If we can get it more automated to where it doesn't have to be the good old network talking to someone else, or an email, or something like that, it's more beneficial. And it's not just the vulnerabilities. It's also looking more towards threat intelligence. You see a lot of investment, if you look at the details behind some of the investments in In-Q-Tel, for instance, about looking at data in a whole different way. So we're emphasizing data, both in analytics as well as threat prediction, being able to know where some thing is going to come over the hill and you can secure your enterprise or your applications or systems more effectively against it. Open sharing Lounsbury: Let’s go down the row. Edna, what are your thoughts on more open sharing? Conway: We need to do more of it, but we need to do it in a controlled environment. We can get ahead of the curve with not just predictive analysis, but telemetry, to feed the predictive analysis, and that’s not going to happen because a government regulation mandates that we report somewhere. So if you look, for example, DFARS, that came out last year with regard to concerns about counterfeit mitigation and detection in COTS ICT, the reality is not everybody is a member of GIDEP, and many of us actually share our information faster than it gets into GIDEP and more comprehensively. I will go back to it’s rigor in the industry and sharing in a controlled environment. Lounsbury: Jim, thoughts on open sharing? Hietala: Good idea. It gets a little murky when you're looking at zero-day vulnerabilities. There is a whole black market that has developed around those things, where nations are to some degree hoarding them, paying a lot of money to get them, to use them in cyberwar type activities. There's a great book out now called ‘Zero Day’ by Kim Zetter, a writer from Wired. It gets into the history of Stuxnet and how it was discovered, and Symantec, and I forget the other security researcher firm that found it. There were a number of zero-day vulnerabilities there that were used in an offensive cyberwar a capacity. So it’s definitely a gray area at this point. DeLong: I agree with what Edna said about the parameters of the controlled environment, the controlled way in which it's done. Without naming any names, recently there were some feathers flying over a security research organization establishing some practices concerning a 60- or 90- day timeframe, in which they would notify a vendor of vulnerabilities, giving them an opportunity to issue a patch. In one instance recently, when that time expired and they released it,
  • 10. the vendor was rather upset because the patch had not been issued yet. So what are reasonable parameters of this controlled environment? Supply chains Lounsbury: Let’s move on here. Edna, one of the great quotes that came out of the early days of OTTF was that only God creates something from nothing and everybody else is on somebody’s supply chain. I love that quote. But given that all IT components, or all IT products, are built from hardware and software components, which are sourced globally, what do we do to mitigate the specific risks resulting from malware and counterfeit parts being inserted in the supply chain? How do you make sure that the work to do that is reflected in creating preference for vendors who put that effort into it? Conway: It's probably three-dimensional. The first part is understanding what your problem is. If you go back to what we heard Mary Ann Davidson talk about earlier today, the reality is what is the problem you're trying to solve? I'll just use the Trusted Technology Provider Standard as an example of that. Narrowing down what the problem is, where the problem is located, helps you, number one. Then, you have to attack it from all dimensions. We have a tendency to think about cyber in isolation from the physical, and the physical in isolation from the cyber, and then the logical. For those of us who live in OT or supply chain, we have to have processes that drive this. If those three don't converge and map together, we'll fail, because there will be gaps, inevitable gaps. For me, it's identifying what your true problem is and then taking a three-dimensional approach to make sure that you always have security technology, the combination of the physical security, and then the logical processes to interlock and try to drive a mitigation scheme that will never reduce you to zero, but will identify things. Particularly think about IoT in a manufacturing environment with the right sensor at the right time and telemetry around human behavior. All of a sudden, you're going to know things before they get to a stage in that supply chain or product lifecycle where they can become devastating in their scope of problem. DeLong: As one data point, there was a lot of concern over chips fabricated in various parts of the world being used in national security systems. And in 2008, DARPA initiated a program called TRUST, which had a very challenging objective for coming up with methods by which these chips could be validated after manufacture. Just as one example of the outcome of that, under the IRIS Program in 2010, SRI unveiled an infrared laser microscope that could examine the chips at the nanometer level, both for
  • 11. construction, functionality, and their likely lifetime -- how long they would last before they failed. Lounsbury: Jim, Mary Ann, reactions? Finding the real problem Mezzapelle: The only other thing I wanted to add to Edna’s comment was reiteration about the economics of it and finding where the real problem is. Especially in the security area, information technology security, we tend to get so focused on trying to make it technically pure, avoiding the most 100 percent, ultimate risk. Sometimes, we forget to put our business ears on and think about what that really means for the business? Is it keeping them from innovating quickly, adapting to new markets, perhaps getting into a new global environment? We have to make sure we look back at the business imperatives and make sure that we have metrics all along the road that help us make sure we are putting the investments in the right area, because security is really a risk balance, which I know Jim has a whole lot more to talk about. Hietala: The one thing I would add to this conversation is that we have sort of been on a journey to where doing a better job of security is a good thing. The question is when is it going to become a differentiator for your product and service in the market. For me personally, a bank that really gets online banking and security right is a differentiator to me as a consumer. I saw a study that was quoted this week at the World Economic Forum that said that, by 2:1 margin, consumers -- and they surveyed consumers in 27 countries -- think that governments and businesses are not paying enough attention to digital security. So maybe that’s a mindset shift that’s occurring as a result of how bad cybersecurity has been. Maybe we'll get to the point soon where it can be a differentiator for companies in the business- to-business context and a business-to-consumer context and so forth. So we can hope. Conway: Great point. And just to pivot on that and point out how important it is. I know that what we are seeing now, and it’s a trend, and there are some cutting-edge folks who have been doing it for a while, but most boards of directors are looking at creating a digital advisory board for their company. They're recognizing the pervasiveness of digital risk as its own risk that sometimes it reports up to the audit committee. I've seen at least 20 or 30 in the last three months come around, asking, did you advise every board members to focus on this from multiple disciplines? If we get that right, it might allow us that opportunity to share the information more broadly. Lounsbury: That’s a really interesting point, the point about multiple disciplines. The next question is unfortunately the final question -- or fortunately, since it will get you to lunch. I am going to start off with Rance.
  • 12. At some point, the difference between a security vulnerability failure or other kind of failures all flow into that big risk analysis that a digital-risk management regime would find out. One of the things that’s going on across the Real-Time and Embedded Systems Forum is to look at how we architect systems for higher levels of assurance, not just security vulnerabilities, but other kinds of failures as well. The question I will ask here is, if a system fails its service-level agreement (SLA) for whatever reason, whether it’s security or some other kind of vulnerability, is that a result of our ability to do system architecture or software created without provably secure or provably assured components or the ability of the system to react to those kind of failures? If you believe that, how do we change it? How do we accelerate the adoption of better practices in order to mitigate the whole spectrum of risk of failure of the digital enterprise? Emphasis on protection DeLong: Well, in high assurance systems, obviously we still treat them as very important detection of problems when they occur, recovery from problems, but we put a greater emphasis on prevention, and we try to put greater effort into prevention. You mentioned provably secure components, but provable security is only part of the picture. When you do prove, you prove a theorem, and in a reasonable system, a system of reasonable complexity, there isn’t just one theorem. There are tens, hundreds, or even thousands of theorems that are proved to establish certain properties in the system. It has to do with proofs of the various parts, proofs of how the parts combine, what are the claims we want to make for the system, how do the proofs provide evidence that the claims are justified, and what kind of argumentation do we use based on that set of evidence. So we're looking at not just the proofs as little gems, if you will. A proof of a theorem  think of it as a gemstone, but how are they all combined into creating a system? If a movie star walked out on the red carpet with a little burlap sack around her neck full of a handful of gemstones, we wouldn’t be as impressed as we are when we see a beautiful necklace that’s been done by a real master, who has taken tens or hundreds of stones and combined them in a very pleasing and beautiful way. And so we have to put as much attention, not just on the individual gemstones, which admittedly are created with very pure materials and under great pressure, but also how they are combined into a work that meets the purpose. And so we have assurance cases, we have compositional reasoning, and other things that have to come into play. It’s not just about the provable components and it’s a mistake that is sometimes made to just focus on the proof.
  • 13. Attend The Open Group Baltimore 2015 July 20-23, 2015 Early bird registration ends June 19 Remember, proof is really just a degree of demonstration, and we always want some demonstration to have confidence in the system, and proof is just an extreme degree of demonstration. Mezzapelle: I think I would summarize it by embedding security early and often, and don’t depend on it 100 percent. That means you have to make your systems, your processes and your people resilient. This has been a BriefingsDirect panel discussion overview from The Open Group Conference in San Diego on Feb. 2 through 5, 2015. The panel, which examined issues and improvements for global enterprise cybersecurity, consisted of moderator Dave Lounsbury, Chief Technology Officer, The Open Group; Edna Conway, Chief Security Officer for Global Supply Chain, Cisco; Mary Ann Mezzapelle, Americas CTO for Enterprise Security Services, HP; Jim Hietala, Vice President of Security for The Open Group, and Rance DeLong, Researcher into Security and High Assurance Systems, Santa Clara University. This has been a special BriefingsDirect presentation and panel discussion from The Open Group San Diego 2015. This follows an earlier discussion on cybersecurity standards for safer supply chains. Another earlier discussion from the event focused on synergies among major Enterprise Architecture frameworks. And a presentation by John Zachman, founder of the Zachman Framework. Transcript of a live panel discussion at February's The Open Group San Diego 2015. Copyright  The Open Group and Interarbor Solutions, LLC, 2005-2015. All rights reserved. You may also be interested in: • Enterprise Architecture Leader John Zachman on Understanding and Leveraging Synergies Among the Major EA Frameworks • Cybersecurity standards: The Open Group explores security and safer supply chains • Explore synergies among major Enterprise Architecture frameworks with The Open Group • Health Data Deluge Requires Secure Information Flow Via Standards, Says the Open Group's New Healthcare Director • The Open Group Amsterdam Conference Panel Delves into How to Best Gain Business Value from Open Platform 3.0 • Healthcare Among Thorniest and Yet Most Opportunistic Use Cases for Boundaryless Information Flow Improvement
  • 14. • Gaining Dependability Across All Business Activities Requires Standard of Standards to Tame Dynamic Complexity, Says The Open Group CEO • Big Data success depends on better risk management practices like FAIR, say conference panelists • Improving signal-to-noise in risk management • CSC and HP team up to define the new state needed for comprehensive enterprise cybersecurity