Our presentation from 44con Cyber Security on April 28th 2015 discussing how we use public cyber data and some of the problems we have run into.
Jointly presented with Ernest Li.
This document discusses the growing threat of cyber attacks and the need for organizations to build cyber resilience. It notes that financial institutions in particular may have become distracted from cyber risks in recent years. The key issues outlined are that cyber attacks represent an undeclared war, failures can be silent, risk is challenging to analyze, and cyber risk is systemic. It defines cyber resistance as having secure design, mature controls, good risk decisions and other practices, while cyber resilience relies more on situational awareness, technical agility, and organizational readiness to solve problems. Building successful cyber programs requires addressing all of these aspects through specialist practices and developing capabilities ahead of standards.
A short introductory presentation I gave at the 2015 Fund Management Summit in London on the 8th October. This was simplified and much material was discussed rather than on the slides.
This document outlines an economic framework for cybersecurity investment. It discusses:
- Implementing baseline security controls can address 80% of threats at low cost while improving availability. However, cultural resistance exists to prioritizing "hygiene."
- A framework is proposed with four levels based on mission criticality and threat sophistication. It recommends investing first in baseline controls, then in targeted advanced controls for critical functions facing sophisticated threats.
- Additional principles are outlined for tailoring investments to threats and accepting certain risks. Portfolio approaches are suggested to structure investments across infrastructure, back office systems, and unique mission capabilities.
Vendor Cybersecurity Governance: Scaling the riskSarah Clarke
An overview of the scale of the challenge and rational ways to cut that down to manageable and governable size. Slides compliment recent supplier security governance related posts on Infospectives.co.uk and LinkedIn.
Improve Your Threat Intelligence Strategy With These IdeasRecorded Future
Threat intelligence is a massive subject, and it’s natural to want to produce the most comprehensive range of intelligence possible … but that’s not always useful. In fact it’s usually not.
By concentrating intelligence efforts on highly specific business objectives (e.g., to maintain or improve profitability), this broad subject can be narrowed down to the point where a small amount of highly valuable intelligence is produced.
With this principle firmly in mind, let’s look at some ways to enhance your threat intelligence strategy.
This document discusses zero-day attacks, which exploit unknown vulnerabilities that have no patch. It begins with key terms, then describes the anatomy and methodology of zero-day attacks. Countermeasures are discussed, as well as the economics of cybersecurity and questions from attackers. On average, zero-day attacks last 8 months, allowing theft of valuable assets before detection. They are heavily used in targeted attacks due to the advantage over targets. Overall the document provides an overview of zero-day attacks and potential strategies to secure against unknown threats.
Threat Intelligence Tweaks That'll Take Your Security to the Next LevelRecorded Future
Addictive, isn’t it? Hunting threats. Remediating vulnerabilities. Tirelessly staying abreast of the latest threat intelligence.
And as your knowledge grows, you realize how much more you could be doing to keep your organization safe. So now that you have the fundamentals covered, what’s next?
With these three threat intelligence tweaks, you can take your cyber security from the basics to the world-class level.
This document outlines a top level cyber security strategy that involves assessing systems based on their sophistication, mission criticality, and threat level to determine the appropriate security controls. For less critical or threatened systems with unsophisticated users, it recommends implementing a comprehensive baseline of security controls. For more critical systems or those facing higher threats, it suggests deploying targeted advanced security controls or accepting some risk.
A presentation I gave to the July 2015 NED Forum on Managing Insider Risk using the Critical Pathway to Insider Risk. I've removed a product specific slide for public release.
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
This presentation was given at CampIT. It motivated the need for a high level of maturity of the enterprise security program, by striving for cyber resiliency.
Cade Zvavanjanja presents on securing e-systems as a competitive advantage in global markets. Zimbabwe faces cyber threats from hackers, information warriors, and criminal enterprises seeking economic gain or to inflict damage. Attacks can come through easy means like open source scripts, insider espionage, or disasters. Compared to the global landscape, Zimbabwe has less mature cybersecurity programs, policies, compliance, and infrastructure. A holistic approach is needed involving technology, processes, procedures, and people to contain incidents, conduct digital forensics and response, and learn lessons to improve security.
7 Habits of Smart Threat Intelligence AnalystsRecorded Future
A day in the life of a threat intelligence analyst is often hectic and ever-changing. Threats and related data abound, and an analyst must look at all angles and scenarios before making recommendations.
As information security, in general, garners more interest throughout the enterprise, an analyst’s time is more in demand and he or she might be required to provide frequent updates or participate in meetings to which they’ve never previously been invited.
So, how can a threat analyst keep up?
With so much to do each and every day, smart threat intelligence analysts practice habits that make them more effective and efficient. Above we’ve outlined seven of those habits so you can provide your organization even more value.
Mitigating Risk from Cyber Security AttacksTripwire
This document discusses strategies for mitigating risks from cyber security attacks. Traditional security controls like firewalls and antivirus software are ineffective against targeted attacks. To combat cyber threats, organizations must define a security baseline and monitor for any changes, detect abnormalities as early as possible to minimize damage, and implement automated solutions along with security processes and expertise, as manual auditing alone is not scalable for most organizations. Continuous monitoring that identifies and correlates changes can help quickly detect breaches and threats while providing intelligence to security teams.
Managing Enterprise Risk: Why U No Haz Metrics?John D. Johnson
A panel with Alex Hutton, Jack Jones, Caroline Wong and David Mortman discussing measuring risk and the SMART use of metrics to quantify enterprise risk. RSA Conference 2013
The document discusses modern approaches to security risk assessment that improve upon common practices. It advocates estimating risks through calibrated expert judgment using techniques like measuring base rates, panel-based estimation, and risk calibration training. Risks should be expressed probabilistically using things like likelihood curves and Monte Carlo simulation to better reflect uncertainty. Tools like the risk universe model, bow-tie diagrams, and quantitative analysis can help operationalize the risk assessment process.
Collaborated cyber defense in pandemic times Denise Bailey
This document discusses collaborating on cyber defense during the pandemic. It notes that just as countries work together to address pandemics through vaccine development and information sharing, organizations must also collaborate on cybersecurity through threat intelligence sharing and a combined defensive approach. The document outlines how internal collaboration between security teams and external partnership between organizations can help enhance defenses. It argues that the right balance of human and machine input is needed and describes how to apply threat intelligence before, during and after attacks.
Top 6 Sources for Identifying Threat Actor TTPsRecorded Future
The document discusses 6 key sources for identifying threat actors' tactics, techniques and procedures (TTPs): 1) Open source intelligence from the deep and dark web, 2) Darknets which are intentionally vulnerable networks, 3) Telemetry data collected internally and by vendors, 4) Scanning and crawling the open web actively, 5) Malware processing by vendors to inform security protocols, and 6) Closed source human intelligence developing online relationships. The takeaway is that organizations should assess their needs to determine the appropriate approach based on size and budget.
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeDragos, Inc.
From #CTISUMMIT.
More info here: https://dragos.com/blog/industry-news/meet-me-in-the-middle-threat-indications-and-warning-in-principle-and-practice/
Video here: https://youtu.be/79RdB3aj2vA
Discussions on threat intelligence often get bogged down between “machine speed” ingestion of atomic indicators and in-depth analysis of activity taking weeks (or months) to produce. Left in the cold in such debates is a very important but seldom considered middle ground: time-sensitive and incomplete but enriched threat intelligence. In the U.S. Navy and similar services, this is referred to as threat “indications and warning” (I&W) – a step beyond a simple observable refined to ensure accuracy and timely receipt.
The goal of I&W is to get actionable, important information to those in need of it most as quickly, efficiently, and accurately as possible, even if as a result some context or other insights are lost. As a result of this activity, consumers are better armed and equipped to deal with and counter threats as they emerge, rather than either reacting to items with no context whatsoever or only reading about their challenges weeks after the fact in a complete intelligence report. This discussion explores the concept of threat I&W within the context of network security generally and threat intelligence specifically to identify this topic as a shamefully ignored middle ground between extremes. The presentation explores the conceptual background behind this idea, then transition to real-life examples of I&W drawn from the speaker’s past activity in threat intelligence, incident response, and military operations.
With more than 50,000 new malware created every day organisations can no longer afford to risk the financial and reputational impacts of a security or data breach, which can be too much for a business to recover from. Because of this, IT managers face increasing scrutiny and pressure from CEOs, managing directors and boards to prove that they are keeping the organisation secure.
The changing threat landscape means organisations need to be vigilant and smarter about security. While businesses still face threats from infected devices and malware, attackers have also moved beyond that. For example, there is an increasing number of targeted email attacks with cyber criminals spending time to monitor communications so they can imitate emails that are so sophisticated that even relatively savvy users will open them.
This webinar will explore the building blocks required to ensure you have the roadmap required to best protection against cyber attacks. We will provide you with a high level view of the following topics:
· Audit and discovery – What are your weaknesses and are you compliant?
· Education – Do your employees know when not to open that attachment?
· Policy – Do you have the right policies for your industry?
· Technology – Where to start and what has changed?
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
The digital presence of organizations continues to expand, and with that expansion comes greater exposure to digital risks. Visibility into those risks is critical in order to effectively manage that risk.
Regulators and policymakers are increasingly concerned about cyber risks, as attacks are becoming more frequent, damaging, and potentially systemic. While financial institutions have focused on credit, market and liquidity risks, attention must also be paid to operational and cyber risks. Responding effectively to cyber threats requires more than just technical measures - organizations must improve cyber hygiene, culture, and agility. Most importantly, preparation is key - identifying threat scenarios, gradually building capabilities, and planning comprehensive incident response, so organizations are able to manage attacks and recover when they do occur.
Wade Baker from the Verizon RISK Team gave this presentation at the NESCO Town Hall in May 30-31 in New Orleans, LA. Wade discussed various aspects related to sharing incident information, threat agents along with a great explanation as to what evidence-based Risk management is and looks like.
While traditional cybersecurity defenses focus on prevention, there are many vulnerabilities and potential attacks against weapon systems. While weapon systems are more software dependent and networked than ever before, cybersecurity has not always been prioritized with regards to weapon systems acquisition.
Threat actors have advanced in their sophistication as they are well-resourced and highly skilled, oftentimes gathering detailed knowledge of the systems they want to attack. Ensuring stronger detection methods is imperative, but because these types of threats are very targeted and advanced, agencies need the capability to proactively hunt.
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
In order to effectively defend your organization, you must think about the offensive strategy as well. But before we get ahead of ourselves let’s talk briefly about the building blocks of a good offense. First is an architecture that is built around a security policy that is aligned with the business risk. Risk must be understood and a cookie cutter approach must be avoided here because again every organization is different and so are their risks.
An infographic supporting the PIANOS: Protecting Information About Networks, the Organisation and It's Systems report I authored with support from my colleagues.
This document summarizes various UK laws related to computer and data security, including the Computer Misuse Act, Data Protection Act, Regulation of Investigatory Powers Act, Obscene Publications Act, and Protection of Children Act. It provides overviews of these acts and notes what behaviors they do and do not cover. For example, it states that denial of service attacks are not covered by the Computer Misuse Act. The document also gives advice on monitoring employees and when interception of communications is allowed.
This document outlines a top level cyber security strategy that involves assessing systems based on their sophistication, mission criticality, and threat level to determine the appropriate security controls. For less critical or threatened systems with unsophisticated users, it recommends implementing a comprehensive baseline of security controls. For more critical systems or those facing higher threats, it suggests deploying targeted advanced security controls or accepting some risk.
A presentation I gave to the July 2015 NED Forum on Managing Insider Risk using the Critical Pathway to Insider Risk. I've removed a product specific slide for public release.
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
This presentation was given at CampIT. It motivated the need for a high level of maturity of the enterprise security program, by striving for cyber resiliency.
Cade Zvavanjanja presents on securing e-systems as a competitive advantage in global markets. Zimbabwe faces cyber threats from hackers, information warriors, and criminal enterprises seeking economic gain or to inflict damage. Attacks can come through easy means like open source scripts, insider espionage, or disasters. Compared to the global landscape, Zimbabwe has less mature cybersecurity programs, policies, compliance, and infrastructure. A holistic approach is needed involving technology, processes, procedures, and people to contain incidents, conduct digital forensics and response, and learn lessons to improve security.
7 Habits of Smart Threat Intelligence AnalystsRecorded Future
A day in the life of a threat intelligence analyst is often hectic and ever-changing. Threats and related data abound, and an analyst must look at all angles and scenarios before making recommendations.
As information security, in general, garners more interest throughout the enterprise, an analyst’s time is more in demand and he or she might be required to provide frequent updates or participate in meetings to which they’ve never previously been invited.
So, how can a threat analyst keep up?
With so much to do each and every day, smart threat intelligence analysts practice habits that make them more effective and efficient. Above we’ve outlined seven of those habits so you can provide your organization even more value.
Mitigating Risk from Cyber Security AttacksTripwire
This document discusses strategies for mitigating risks from cyber security attacks. Traditional security controls like firewalls and antivirus software are ineffective against targeted attacks. To combat cyber threats, organizations must define a security baseline and monitor for any changes, detect abnormalities as early as possible to minimize damage, and implement automated solutions along with security processes and expertise, as manual auditing alone is not scalable for most organizations. Continuous monitoring that identifies and correlates changes can help quickly detect breaches and threats while providing intelligence to security teams.
Managing Enterprise Risk: Why U No Haz Metrics?John D. Johnson
A panel with Alex Hutton, Jack Jones, Caroline Wong and David Mortman discussing measuring risk and the SMART use of metrics to quantify enterprise risk. RSA Conference 2013
The document discusses modern approaches to security risk assessment that improve upon common practices. It advocates estimating risks through calibrated expert judgment using techniques like measuring base rates, panel-based estimation, and risk calibration training. Risks should be expressed probabilistically using things like likelihood curves and Monte Carlo simulation to better reflect uncertainty. Tools like the risk universe model, bow-tie diagrams, and quantitative analysis can help operationalize the risk assessment process.
Collaborated cyber defense in pandemic times Denise Bailey
This document discusses collaborating on cyber defense during the pandemic. It notes that just as countries work together to address pandemics through vaccine development and information sharing, organizations must also collaborate on cybersecurity through threat intelligence sharing and a combined defensive approach. The document outlines how internal collaboration between security teams and external partnership between organizations can help enhance defenses. It argues that the right balance of human and machine input is needed and describes how to apply threat intelligence before, during and after attacks.
Top 6 Sources for Identifying Threat Actor TTPsRecorded Future
The document discusses 6 key sources for identifying threat actors' tactics, techniques and procedures (TTPs): 1) Open source intelligence from the deep and dark web, 2) Darknets which are intentionally vulnerable networks, 3) Telemetry data collected internally and by vendors, 4) Scanning and crawling the open web actively, 5) Malware processing by vendors to inform security protocols, and 6) Closed source human intelligence developing online relationships. The takeaway is that organizations should assess their needs to determine the appropriate approach based on size and budget.
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeDragos, Inc.
From #CTISUMMIT.
More info here: https://dragos.com/blog/industry-news/meet-me-in-the-middle-threat-indications-and-warning-in-principle-and-practice/
Video here: https://youtu.be/79RdB3aj2vA
Discussions on threat intelligence often get bogged down between “machine speed” ingestion of atomic indicators and in-depth analysis of activity taking weeks (or months) to produce. Left in the cold in such debates is a very important but seldom considered middle ground: time-sensitive and incomplete but enriched threat intelligence. In the U.S. Navy and similar services, this is referred to as threat “indications and warning” (I&W) – a step beyond a simple observable refined to ensure accuracy and timely receipt.
The goal of I&W is to get actionable, important information to those in need of it most as quickly, efficiently, and accurately as possible, even if as a result some context or other insights are lost. As a result of this activity, consumers are better armed and equipped to deal with and counter threats as they emerge, rather than either reacting to items with no context whatsoever or only reading about their challenges weeks after the fact in a complete intelligence report. This discussion explores the concept of threat I&W within the context of network security generally and threat intelligence specifically to identify this topic as a shamefully ignored middle ground between extremes. The presentation explores the conceptual background behind this idea, then transition to real-life examples of I&W drawn from the speaker’s past activity in threat intelligence, incident response, and military operations.
With more than 50,000 new malware created every day organisations can no longer afford to risk the financial and reputational impacts of a security or data breach, which can be too much for a business to recover from. Because of this, IT managers face increasing scrutiny and pressure from CEOs, managing directors and boards to prove that they are keeping the organisation secure.
The changing threat landscape means organisations need to be vigilant and smarter about security. While businesses still face threats from infected devices and malware, attackers have also moved beyond that. For example, there is an increasing number of targeted email attacks with cyber criminals spending time to monitor communications so they can imitate emails that are so sophisticated that even relatively savvy users will open them.
This webinar will explore the building blocks required to ensure you have the roadmap required to best protection against cyber attacks. We will provide you with a high level view of the following topics:
· Audit and discovery – What are your weaknesses and are you compliant?
· Education – Do your employees know when not to open that attachment?
· Policy – Do you have the right policies for your industry?
· Technology – Where to start and what has changed?
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
The digital presence of organizations continues to expand, and with that expansion comes greater exposure to digital risks. Visibility into those risks is critical in order to effectively manage that risk.
Regulators and policymakers are increasingly concerned about cyber risks, as attacks are becoming more frequent, damaging, and potentially systemic. While financial institutions have focused on credit, market and liquidity risks, attention must also be paid to operational and cyber risks. Responding effectively to cyber threats requires more than just technical measures - organizations must improve cyber hygiene, culture, and agility. Most importantly, preparation is key - identifying threat scenarios, gradually building capabilities, and planning comprehensive incident response, so organizations are able to manage attacks and recover when they do occur.
Wade Baker from the Verizon RISK Team gave this presentation at the NESCO Town Hall in May 30-31 in New Orleans, LA. Wade discussed various aspects related to sharing incident information, threat agents along with a great explanation as to what evidence-based Risk management is and looks like.
While traditional cybersecurity defenses focus on prevention, there are many vulnerabilities and potential attacks against weapon systems. While weapon systems are more software dependent and networked than ever before, cybersecurity has not always been prioritized with regards to weapon systems acquisition.
Threat actors have advanced in their sophistication as they are well-resourced and highly skilled, oftentimes gathering detailed knowledge of the systems they want to attack. Ensuring stronger detection methods is imperative, but because these types of threats are very targeted and advanced, agencies need the capability to proactively hunt.
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
In order to effectively defend your organization, you must think about the offensive strategy as well. But before we get ahead of ourselves let’s talk briefly about the building blocks of a good offense. First is an architecture that is built around a security policy that is aligned with the business risk. Risk must be understood and a cookie cutter approach must be avoided here because again every organization is different and so are their risks.
An infographic supporting the PIANOS: Protecting Information About Networks, the Organisation and It's Systems report I authored with support from my colleagues.
This document summarizes various UK laws related to computer and data security, including the Computer Misuse Act, Data Protection Act, Regulation of Investigatory Powers Act, Obscene Publications Act, and Protection of Children Act. It provides overviews of these acts and notes what behaviors they do and do not cover. For example, it states that denial of service attacks are not covered by the Computer Misuse Act. The document also gives advice on monitoring employees and when interception of communications is allowed.
This document discusses digital activism and hacktivism. It defines digital activism as using technology over large distances to effect political or social change through grassroots campaigns. Hacktivism is separated from digital activism by involving computer crimes like unauthorized access or impairment of computer systems. Early examples of hacktivism included attacks in 1989 promoting anti-nuclear messages. Anonymous emerged in the 2000s and became politicized through protests around Scientology in 2008. Major hacktivist operations since then have included Payback targeting copyright enforcement and Darknet targeting child pornography sites. Lessons from these events have led to guidance for underground communities on operational security.
This document discusses security metrics and summarizes several perspectives on developing and using metrics. It describes growing areas of interest including software security, modeling, and benchmarking. It also summarizes experiences with security metrics from organizations like GE, the Department of Veterans Affairs, and Intel. These cases highlight the importance of clear definitions, focus on high impact events, predictive modeling, and gathering substantial baseline data. The document also reviews standards, common metric types, and challenges around managing to metrics and measuring the right things.
A short presentation (20 minutes) I gave to an internal audience on the use of attack surface and complexity / coupling metrics in analysing system architectures.
A short presentation to my internal peer group on some of the potential shortcomings of current penetration testing practices and what might be done about it.
PIANOS: Protecting Information About Networks The Organisation and It's Syste...Phil Huggins FBCS CITP
A briefing to present the findings of a report I authored with colleagues on the Network Reconnaissance phase of a targeted attack explaining what is targeted, how the attackers operate and what controls help.
This document discusses the topics of risk, uncertainty, probability estimation, and calibration. It notes that there is a difference between cardinal and ordinal measurements. It also distinguishes between foxes, who are less confident in estimates and more tolerant of uncertainty, and hedgehogs, who are highly confident and intolerant of uncertainty. The document recommends methods for calibrating probability estimates, such as using confidence intervals, doing multiple tests of estimates, and considering equivalence bets to improve calibration. Overall, the document focuses on understanding and improving calibration of probability estimates under conditions of uncertainty.
The document discusses intelligence-led cybersecurity. It begins by outlining changes to the threat landscape, from unsophisticated attackers targeting vulnerabilities to advanced persistent threats conducted by well-funded groups. It then discusses risk management, threat management, the intelligence process, and problems that can arise. Key parts of the intelligence process include direction, access to internal and external sources, analysis and assessment, and dissemination of intelligence to customers. The presentation concludes by discussing how to integrate security intelligence into an organization's vision, strategy, governance, operations, engineering, development, compliance and risk management.
Security and Resilience Vulnerabilities in the UK’s Telecoms Networks Phil Huggins FBCS CITP
A review of the risks posed to the regulated Telecoms
Industry by non-deliberate threat, that I participated in while working for BAE Systems Detica on behalf of Ofcom.
Phil Huggins gave a presentation at the Private Security Conference Spring 2010. He discussed his experience delivering large, complex security systems for customers over multiple years. These systems involved teams of 20+ customer employees and 40+ supplier employees. He stated that 4 of the systems would be considered as threatening as the Death Star from Star Wars. Huggins also talked about the importance of having shared security principles and design constraints to guide development teams and ensure consistent security application across all aspects of the system design.
PIANOS: Protecting Information About Networks The Organisation and It's Systems Phil Huggins FBCS CITP
A report I authored with colleagues on the Network Reconnaissance phase of a targeted attack explaining what is targeted, how the attackers operate and what controls help.
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...TI Safe
Cognitive security solutions using artificial intelligence can help address cybersecurity threats by assisting overworked human analysts. Watson provides a cognitive security platform that analyzes both structured security data and vast amounts of unstructured online data to gain insights. It helps speed up investigation of incidents by quickly providing relevant indicators, related threats, and recommended courses of action based on its security knowledge graph. This frees up analysts to focus on higher-level tasks. Customers have seen Watson reduce investigation time from 50 minutes to just 10 minutes on average.
Info-Tech Research Group is a global leader in providing IT research and advice. The document discusses developing a comprehensive data security plan and outlines Info-Tech's three-phase methodology for securing high-risk data. The methodology involves reviewing data security methodologies, developing a data security roadmap, and implementing the roadmap through technical and process-based controls.
The document discusses strategic approaches for information security in 2018, focusing on continuous adaptive risk and trust assessment (CARTA). It recommends adopting a CARTA strategic approach to securely enable access to digital business initiatives in an increasingly complex threat environment. The document outlines key challenges in adapting existing security approaches to new digital business realities and recommends embracing principles of trust and resilience, developing an adaptive security architecture, and implementing a formal risk and security management program.
Getting Real About Security Management and “Big Data” EMC
The document discusses how security professionals can get more value from big data by taking a staged approach to implementing security analytics. It recommends starting with building a scalable infrastructure to collect and analyze security data, deploying basic analytic tools to automate tasks, and then progressively incorporating more advanced analytic techniques. This foundations-first approach helps optimize efficiency and reduce security risks before attempting highly complex predictive analytics.
How the latest trends in data security can help your data protection strategy...Ulf Mattsson
Data breaches are on the rise. The constant threat of cyber attacks combined with the high cost and a shortage of skilled security engineers has put many companies at risk. There is a shift in cybersecurity investment and IT risk and security leaders must move from trying to prevent every threat and acknowledge that perfect protection is not achievable. PCI DSS 3.2 is out with an important update on data discovery and requirements to detect security control failures.
In this webinar, cybersecurity expert Ulf Mattsson will highlight current trends in the security landscape based on major industry report findings, and discuss how we should re-think our security approach.
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteInterset
Presented by Stephan Jou, Interset CTO, at IANS Forum Toronto 2018, this presentation explores how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture.
Don’t be fooled by vague claims about data protection—especially in the cloud. HITRUST Common Security Framework (CFS) is the gold standard for data security and compliance. While security guidelines, like HIPAA, use phrases like “reasonable and appropriate” protection, HITRUST provides clear and actionable guidance for risk management. It’s the only certifiable framework that includes HIPAA, PCI, ISO, and NIST controls—here’s how you can benefit.
Takeaways & Learning Objectives
What is HITRUST CSF, and how does it differ from regulations like HIPAA?
How can your organization leverage HITRUST?
Best practices for secure cloud deployments
Join OnRamp’s VP of Product, Toby Owen, and OnRamp’s Head of Information Security, Nikola Todev in an educational and interactive session
Optimizing Security Operations: 5 Keys to SuccessSirius
Organizations are suffering from cyber fatigue, with too many alerts, too many technologies, and not enough people. Many security operations center (SOC) teams are underskilled and overworked, making it extremely difficult to streamline operations and decrease the time it takes to detect and remediate security incidents.
Addressing these challenges requires a shift in the tactics and strategies deployed in SOCs. But building an effective SOC is hard; many companies struggle first with implementation and then with figuring out how to take their security operations to the next level.
Read to learn:
--Advantages and disadvantages of different SOC models
--Tips for leveraging advanced analytics tools
--Best practices for incorporating automation and orchestration
--How to boost incident response capabilities, and measure your efforts
--How the NIST Cybersecurity Framework and CIS Controls can help you establish a strong foundation
Start building your roadmap to a next-generation SOC.
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
Over 80% of small-medium sized business consider themselves non-targets for cyber-attacks. However, 60% of all targeted attacks are towards small-medium sized organizations. The capabilities of hackers have risen dramatically in the last two years. Organizations of all sizes need a security plan. Security by obscurity is no longer a viable option. Adopt a proven strategy to protect vital corporate assets.
Data Connectors San Antonio Cybersecurity Conference 2018Interset
This document discusses operationalizing big data security analytics. It provides lessons learned from case studies of implementing security analytics at various organizations. The key lessons are: 1) Security analytics should help analysts deal with fewer, higher-quality alerts rather than more alerts. 2) It is important to test the mathematical models on historical data to validate the analytics can surface useful threats. 3) Metrics must be defined to measure the impact and ensure the analytics are optimized over time for the organization's needs. The document advocates agreeing on use cases, evaluating results, assessing risk level, and ensuring feedback for continuous improvement.
This document discusses security status reporting and outlines best practices for developing an effective security monitoring program. It recommends selecting critical business systems as the target environment and defining key performance indicators across areas like user access management, patching, and perimeter security. The document also provides guidance on setting baselines using standards, quantifying security status with CVSS scoring, understanding audience priorities, and building dashboards and reports that follow rules like only displaying relevant, meaningful data at an appropriate refresh rate for the intended audience. The overall aim is to facilitate effective decision making and reporting on security posture.
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
3 Things to Learn About:
* 1. Ransomware is a particular problem and currently the highest priority for healthcare organizations. Machine learning can use the structure of a malicious email to detect an attack even before the email is opened.
* 2. Big data architectures provide the machine-learning models with the volume and variety of data required to achieve complete visibility across the spectrum of IT activity—from packets to logs to alerts.
* 3. Intel and industry partners are currently running one-hour, complimentary, confidential benchmark engagements for HLS organizations that want to see how their security compares with the industry .
Regulatory compliance mandates have historically focused on IT & endpoint security as the primary means to protect data. However, as our digital economy has increasingly become software dependent, standards bodies have dutifully added requirements as they relate to development and deployment practices. Enterprise applications and cloud-based services constantly store and transmit data; yet, they are often difficult to understand and assess for compliance.
This webcast will present a practical approach towards mapping application security practices to common compliance frameworks. It will discuss how to define and enact a secure, repeatable software development lifecycle (SDLC) and highlight activities that can be leveraged across multiple compliance controls. Topics include:
* Consolidating security and compliance controls
* Creating application security standards for development and operations teams
* Identifying and remediating gaps between current practices and industry accepted "best practices”
How do we separate hype from useful information in Cyber Security? As Congress is debating a National privacy law, and several states have their own privacy and breach reporting laws including Georgia, how will that impact our workload? Privacy starts with good cyber-hygiene. We will look at how we can leverage the focus on Privacy to address standards for:
Firewall and network setups
Cloud security
Protocols and ports that need attention
Authentication best practices
Server and network rights
Password rules
Ulf Mattsson will highlight current trends in the security landscape based on major industry report findings, and discuss how we should re-think our security approach.
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
Draft document to present findings of exploratory work on the incorporation of machine learning and AI into an existing data security product. The project was abandoned due to conflicting work done by product management.
Cyber Security in the market place: HP CTO DaySymantec
Cyber Security in the market place overview presented at HP CTO Day,covering: the current cyber-security threats to Enterprise Businesses and Government Departments, along with the board-level concerns and priorities for investment in systems and services to protect and secure their information.
This document contains a presentation on cloud security. It discusses how security approaches need to change to adapt to virtualized and cloud environments. Traditional security methods of provisioning separate security for each server need to change to more automated and workload-aware approaches. The presentation discusses how security can be provisioned automatically during resource provisioning. It also discusses how security capabilities can be managed efficiently at scale through continuous monitoring and vulnerability mitigation techniques. The presentation argues that securing data centers and extending their security to public clouds requires optimizing security to reduce the impact on resources. It outlines shared responsibilities between cloud providers and customers to ensure security. The presentation emphasizes that incident response still requires capabilities like digital forensics to fully investigate security compromises in virtual and
What is Model Context Protocol(MCP) - The new technology for communication bw...Vishnu Singh Chundawat
The MCP (Model Context Protocol) is a framework designed to manage context and interaction within complex systems. This SlideShare presentation will provide a detailed overview of the MCP Model, its applications, and how it plays a crucial role in improving communication and decision-making in distributed systems. We will explore the key concepts behind the protocol, including the importance of context, data management, and how this model enhances system adaptability and responsiveness. Ideal for software developers, system architects, and IT professionals, this presentation will offer valuable insights into how the MCP Model can streamline workflows, improve efficiency, and create more intuitive systems for a wide range of use cases.
HCL Nomad Web – Best Practices and Managing Multiuser Environmentspanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-and-managing-multiuser-environments/
HCL Nomad Web is heralded as the next generation of the HCL Notes client, offering numerous advantages such as eliminating the need for packaging, distribution, and installation. Nomad Web client upgrades will be installed “automatically” in the background. This significantly reduces the administrative footprint compared to traditional HCL Notes clients. However, troubleshooting issues in Nomad Web present unique challenges compared to the Notes client.
Join Christoph and Marc as they demonstrate how to simplify the troubleshooting process in HCL Nomad Web, ensuring a smoother and more efficient user experience.
In this webinar, we will explore effective strategies for diagnosing and resolving common problems in HCL Nomad Web, including
- Accessing the console
- Locating and interpreting log files
- Accessing the data folder within the browser’s cache (using OPFS)
- Understand the difference between single- and multi-user scenarios
- Utilizing Client Clocking
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPathCommunity
Join this UiPath Community Berlin meetup to explore the Orchestrator API, Swagger interface, and the Test Manager API. Learn how to leverage these tools to streamline automation, enhance testing, and integrate more efficiently with UiPath. Perfect for developers, testers, and automation enthusiasts!
📕 Agenda
Welcome & Introductions
Orchestrator API Overview
Exploring the Swagger Interface
Test Manager API Highlights
Streamlining Automation & Testing with APIs (Demo)
Q&A and Open Discussion
Perfect for developers, testers, and automation enthusiasts!
👉 Join our UiPath Community Berlin chapter: https://community.uipath.com/berlin/
This session streamed live on April 29, 2025, 18:00 CET.
Check out all our upcoming UiPath Community sessions at https://community.uipath.com/events/.
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025BookNet Canada
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, transcript, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, presentation slides, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
How Can I use the AI Hype in my Business Context?Daniel Lehner
𝙄𝙨 𝘼𝙄 𝙟𝙪𝙨𝙩 𝙝𝙮𝙥𝙚? 𝙊𝙧 𝙞𝙨 𝙞𝙩 𝙩𝙝𝙚 𝙜𝙖𝙢𝙚 𝙘𝙝𝙖𝙣𝙜𝙚𝙧 𝙮𝙤𝙪𝙧 𝙗𝙪𝙨𝙞𝙣𝙚𝙨𝙨 𝙣𝙚𝙚𝙙𝙨?
Everyone’s talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know 𝗵𝗼𝘄.
✅ What exactly should you ask to find real AI opportunities?
✅ Which AI techniques actually fit your business?
✅ Is your data even ready for AI?
If you’re not sure, you’re not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...Alan Dix
Talk at the final event of Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence funded by the British Council UK-Saudi Challenge Fund 2024, Cardiff Metropolitan University, 29th April 2025
https://alandix.com/academic/talks/CMet2025-AI-Changes-Everything/
Is AI just another technology, or does it fundamentally change the way we live and think?
Every technology has a direct impact with micro-ethical consequences, some good, some bad. However more profound are the ways in which some technologies reshape the very fabric of society with macro-ethical impacts. The invention of the stirrup revolutionised mounted combat, but as a side effect gave rise to the feudal system, which still shapes politics today. The internal combustion engine offers personal freedom and creates pollution, but has also transformed the nature of urban planning and international trade. When we look at AI the micro-ethical issues, such as bias, are most obvious, but the macro-ethical challenges may be greater.
At a micro-ethical level AI has the potential to deepen social, ethnic and gender bias, issues I have warned about since the early 1990s! It is also being used increasingly on the battlefield. However, it also offers amazing opportunities in health and educations, as the recent Nobel prizes for the developers of AlphaFold illustrate. More radically, the need to encode ethics acts as a mirror to surface essential ethical problems and conflicts.
At the macro-ethical level, by the early 2000s digital technology had already begun to undermine sovereignty (e.g. gambling), market economics (through network effects and emergent monopolies), and the very meaning of money. Modern AI is the child of big data, big computation and ultimately big business, intensifying the inherent tendency of digital technology to concentrate power. AI is already unravelling the fundamentals of the social, political and economic world around us, but this is a world that needs radical reimagining to overcome the global environmental and human challenges that confront us. Our challenge is whether to let the threads fall as they may, or to use them to weave a better future.
TrsLabs - Fintech Product & Business ConsultingTrs Labs
Hybrid Growth Mandate Model with TrsLabs
Strategic Investments, Inorganic Growth, Business Model Pivoting are critical activities that business don't do/change everyday. In cases like this, it may benefit your business to choose a temporary external consultant.
An unbiased plan driven by clearcut deliverables, market dynamics and without the influence of your internal office equations empower business leaders to make right choices.
Getting things done within a budget within a timeframe is key to Growing Business - No matter whether you are a start-up or a big company
Talk to us & Unlock the competitive advantage
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungenpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-und-verwaltung-von-multiuser-umgebungen/
HCL Nomad Web wird als die nächste Generation des HCL Notes-Clients gefeiert und bietet zahlreiche Vorteile, wie die Beseitigung des Bedarfs an Paketierung, Verteilung und Installation. Nomad Web-Client-Updates werden “automatisch” im Hintergrund installiert, was den administrativen Aufwand im Vergleich zu traditionellen HCL Notes-Clients erheblich reduziert. Allerdings stellt die Fehlerbehebung in Nomad Web im Vergleich zum Notes-Client einzigartige Herausforderungen dar.
Begleiten Sie Christoph und Marc, während sie demonstrieren, wie der Fehlerbehebungsprozess in HCL Nomad Web vereinfacht werden kann, um eine reibungslose und effiziente Benutzererfahrung zu gewährleisten.
In diesem Webinar werden wir effektive Strategien zur Diagnose und Lösung häufiger Probleme in HCL Nomad Web untersuchen, einschließlich
- Zugriff auf die Konsole
- Auffinden und Interpretieren von Protokolldateien
- Zugriff auf den Datenordner im Cache des Browsers (unter Verwendung von OPFS)
- Verständnis der Unterschiede zwischen Einzel- und Mehrbenutzerszenarien
- Nutzung der Client Clocking-Funktion
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxJustin Reock
Building 10x Organizations with Modern Productivity Metrics
10x developers may be a myth, but 10x organizations are very real, as proven by the influential study performed in the 1980s, ‘The Coding War Games.’
Right now, here in early 2025, we seem to be experiencing YAPP (Yet Another Productivity Philosophy), and that philosophy is converging on developer experience. It seems that with every new method we invent for the delivery of products, whether physical or virtual, we reinvent productivity philosophies to go alongside them.
But which of these approaches actually work? DORA? SPACE? DevEx? What should we invest in and create urgency behind today, so that we don’t find ourselves having the same discussion again in a decade?
Big Data Analytics Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
4. SECURITY SCIENCE
4
Big Data?
Over-used buzzword.
Doug Laney defined 3Vs in 2001
Gartner promoted 3Vs in 2012
Google Trends
“Big Data” search interest over time
The 3Vs
Volume Velocity Variety Value Veracity
5. SECURITY SCIENCE
Big Data Disciplines
More useful to break Big Data down by activities you actually do:
• Decision Making
Data-Driven
Management
Data Science • Analytics, Sense-Making
• Technology, Nuts and Bolts
Data
Engineering
6. SECURITY SCIENCE
6
Data Lakes & CoEs
The data lake, an enterprise-wide Big Data platform, is emerging in
large scale businesses.
• Concentration of data
• Concentration of technology
Tends to be associated with Big Data “Centres of Excellence”.
• Concentration of Data Engineering skills
• Concentration of Data Science skills
• The CoEs are often hunting for well-defined early adopter Use
Cases to prove their value.
• The Data Lakes provide unexpected opportunities for ‘data
enrichment’ across organisational boundaries.
7. SECURITY SCIENCE
7
Why Big Data for Cyber Security?
Cyber Security is increasingly a data problem.
We are collecting, processing and analysing more and more data in
order to address the threat landscape.
• Known threat indicators
• Indicator targeted subsets of monitoring
data
• Assumes in advance what the risk is
• Near real-time analysis with limited memory
Network
Monitoring
using SIEM
8. SECURITY SCIENCE
8
What are the main Cyber Security use cases for Big Data?
Early adoption, provable ROI, vendor can develop a PoC without a
customer
• Probable matches to likely/possible threat
methods
• All the monitoring data over a longer period of
time
• Retroactive analysis using intelligence feeds
• Combining internal and external data sources
Network
Behavioural
Analytics
• More context and more data to investigate
• Single screen analysis
• Faster automated tooling for entity resolution and
event resolution
• Variety of visualisations available, timeline
visualisation especially key
Data-enabled
Investigation
9. SECURITY SCIENCE
Tools
• Hardware and
software
components
• Configuration
and utilization of
solution
components
People
• Skills of people
involved
• Engagement of
necessary
stakeholders
• Training
available
Process
• Essential
processes for
solution to work
• Includes
management of
tools,
knowledge,
intelligence and
people
Data
Sources
• The raw data
from a variety of
tools across the
environment.
• Includes
sensors, security
alerts and log
files.
Intelligence
• Data that
provides the
necessary
context to
enrich, interpret
and prioritize
analytic results
Knowledge
•The goal of the
data analysis
which is both
delivered to
stakeholders
and better
informs further
questions of the
data
9
What is a Big Data Security Analytics Capability?
10. SECURITY SCIENCE
10
What does a Big Data Security Analytics solution look like?
11. SECURITY SCIENCE
11
How does the Security Analytics team fit into an existing Security Team?
13. SECURITY SCIENCE
13
What is Situational Awareness?
Large body of academic work
A variety of different processual vs cognitive models suggested
Warning! The science is not robust in this area.
Dr Mica Endsley described the popular three stage model in 1995
Correlation with John Boyds OODA Loop.
SITUATIONAL AWARENESS
PERCEIVE UNDERSTAND PREDICT
14. SECURITY SCIENCE
14
How does Situational Awareness fit into Cyber Security?
OPERATIONAL CYBER SECURITY
OBSERVE ORIENTATE DECIDE ACT
SITUATIONAL AWARENESS
OPERATORS
HUNTERS
RESPONDERS
RESOLVERS
AUTOMATION?
15. SECURITY SCIENCE
15
How does Situational Awareness fit into Security Management?
SECURITY MANAGMENT
PLAN DO CHECK ACT
STUDY
SITUATION
SET GOALS
PLAN
ACTIVITIES
MEASURE
SUCCESS
STUDY
RESULTS
IMPROVE &
STANDARDISE
DELIVER
ACTIVITIES
SITUATIONAL
AWARENESS
SITUATIONAL AWARENESS AUTOMATION?
17. SECURITY SCIENCE
17
Why Data-Driven Security Management?
“The dearth of metrics and decision-making tools places the
determination of Information Security risk to the enterprise on the
judgment of IT security practitioners.” INFOSEC Research Council
“At present, the practice of measuring security is very ad-hoc. Many of
the processes for measurement and metric selection are mostly or
completely subjective or procedural.” Department of Homeland
Security
Most security decisions made in absence of good data.
Best/Good Practice is “cargo cult security”.
18. SECURITY SCIENCE
18
Low Hanging Fruit – Quantitative Security Management
Mixed Data Sources, Visualisation, Sets of Questions, Summary
Statistics
Trend Analysis, Security Posture, Perimeter View, Operational KPIs,
Controls Performance
Good indicator is large Excel sheets with complex pivot tables
• Multiple data sources; vuln scanners or probes,
hardware inventory, cmdb, patch servers, SOC
monitoring, external information feeds
• Multiple clear questions.
• Candidate for Question-Focused Dataset
Vulnerability
Management
• Multiple data sources; risk register, project
plans, incident reports, SOC feed, audit reports
• Multiple stakeholders with distinct interests
• Candidate for Interactive Visualisation
Executive
Dashboard
19. SECURITY SCIENCE
19
Big Data Security Analytics Opportunities
Once the Cyber use cases have been implemented there are
opportunities to operationalise and potentially automate some aspects
of security management activities
• Continuous monitoring, not just an annual
phishing exercise
• Enrich with HR data
• Report on trends and effectiveness of
awareness programs and training events
• Targeted training
Risky Staff
Behaviour
• Pre-Approved Change Controls at agreed
risk thresholds
• Firewall, network and server configuration
changes
• Increased targeted monitoring
• Distribution of IOCs to multiple endpoints
Automated
Incident
Response
20. SECURITY SCIENCE
20
The Future - Hypothesis-Driven Security Management
Experiments to identify the effectiveness of security activities and
controls in your environment
Multiple iterations following the Deming cycle
Replace Best/Good Practice with the Right Practice for You
Key skills:
1. Forming a useful, practical and measurable hypothesis
2. Achieving executive support for management experimentation
3. Understanding and applying the results to the business
• Some of these are Data Scientist skills, some are CISO skills.
• The CISO of the future will need to understand how to talk to Data
Scientists productively!
21. 21
Conclusion
There are no silver bullets!
We will still need humans in the loop but automation will allow us to
do more with less
Build open cyber big data analytics platforms
Invest in analytics skills now
Security is transforming from a subjective art to a data and
automation discipline