We're selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively.
My goal with this column is to break down the communications surrounding the methods, services, and technologies that the information security industry offers up for the latest in protecting our businesses, our society. I'll take select briefings from vendors, exploring where their solutions best fit, how their solutions can be operationalized, and call the industry out when confusing, or otherwise misleading, messaging is put out for the world to see and hear. We're all sitting here at the edge - which direction will you take? Hopefully this column can help with that decision.
At the edge podcast series
CA Technologies' Mordecai Rosen talks digital transformation and the trust framework with Sean Martin
In today’s episode of At the Edge with Sean Martin, Sean has the pleasure of speaking with Mordecai (Mo) Rosen, Senior Vice President and General Manager of Cybersecurity at CA Technologies. During their chat, Mo tells us of his early days as a Unix kernel hacker at Bell Labs, later moving on to Sun Microsystems, and ultimately having his privileged access management company be acquired by CA technologies.
An identity expert through and through, Mo reminds us that, as an industry, we need to do our best to remove the friction from security, a goal he holds to the highest level as he and his team at CA work to build a trust framework designed to enable the digital economy. Mo has already done a ton to support some of the largest companies achieve their own digital transformation, but it’s clear from my chat with him that he has a ton more on his cybersecurity bucket list.
Have a listen, enjoy the chat, and you might just get inspired.
Shehzad Merchant from Gigamon says it's time for the defenders to take back their advantage
Bad actors are leveraging scalable frameworks and automation to attack their targets. On the other side, companies are still using human-based, manual processes to combat these attacks. The silos within the organization make this even more challenging for them, leaving them to fall behind and face the inevitable. Because of this, it seems the attackers hold the advantage against their targets. However, according to Shehzad Merchant, CTO for Gigamon, we have a chance to reverse the advantage back to the defender. The trick is to leverage the right technologies - such as machine learning + artificial intelligence + automation and orchestration. In order for this to work, however, we need to move from a prevention mindset to one of protection. Think his advice is to have your battles from the inside out using primarily human-driven means? If so, you might want to listen to Shehzad's interview during Black Hat USA 2017 with ITSPmagazine's editor-in-chief, Sean Martin. What he has to say here is short and sweet, but powerful. Enjoy!
William Dixon [Kroll] and Charly Bun [Rapid7] discuss Managed Security Service Providers [MSSPs]
William Dixon from Kroll and Charly Bun from Rapid 7 share some of their own horror stories about managed security service providers. What mistakes are made? What things are missed? What should the RFP look like? What are some of the common misconceptions? And… more importantly, how can these learnings be applied to making a better, more informed, decision when it comes to outsourcing security management for your organization?
Michael Schell, the Innovate Pasadena event organizer eloquently moderates the discussion (as he always does), drawing out interesting questions from the audience and key points from the 2 experts. While originally geared toward the SMBs, this conversation is spot on for companies of all sizes: small, medium, large, and enterprise.
Travis Smith, Principle Security Researcher at TripWire, continues his work on My Bro the Elk
Travis Smith, Principle Security Researcher at TripWire, continues his work on My Bro the Elk - working on it in the context of the small and medium sized businesses. Sean Martin, ITSPmagazine's editor-in-chief, originally covered this topic with Travis presenting a session during Black Hat 2015. This ended up being ITSPmagazine’s first on-publication article.
Travis is now focusing on the SMB market as they are a targeted entity and are often underfunded and understaffed. Travis' work with the new My Bro the Elk combines technologies to create insights, and combines them as part of what he calls the "Sweet Security" offering, which monitors network traffic while providing protection as well.
During our conversation, during Black Hat 2017 in Las Vegas, Smith also offers some core best practices, including network segmentation, which is handles virtually with the Sweet Security device. Goodness all around from Travis, for sure.
Interested parties can find the application stack here - is absolutely free - github.com/travisfsmith/sweetsecurity
Those interested in the first article on ITSPmagazine covering this topic can find it here.
Mounir Hahad from Cyphort Labs reminds us: the end goal is to protect our customers and users
Mounir Hahad, Sr. Director at Cyphort Labs connected with ITSPmagazine’s Sean Martin at Black Hat 2017 in Las Vegas.
During their conversation, Hahad reminds us all that the end goal for the industry is to protect our customers and provide a safe environment for the end users to conduct their business. With this in mind, Hahad also puts a call out to the industry at large to work together, suggesting that business and technical partnerships should not be limited to the behemoths that want to control the market nor the startups that are looking for a creative, partnership-driven means to enter the market. In other words, it’s going to require all of us to work together if we are to successfully tackle the problem of cybercrime.
As Mounir described the threat landscape for me, he noted that, while accessing malicious content via the web is still a prevalent threat, email seems to be the most common vector for delivery of malicious code - such as that found in some of the recent ransomware attacks. As organizations look to address the threat of ransomware, Mounir offered some fundamental recommendations to help them prepare for a pending ransomware attack: 1) back up your data safely offline, 2) employ a defense in depth model while not relying on a single technology for protection, and 3) patch, patch, patch.
Are We Selling - And Therefore Buying - Information Security Wrong?
Rick McElroy from Carbon Black and Ted Harrington from Independent Security Evaluators sit down with ITSPmagazine's Sean Martin to discuss threat modeling, infosec planning, cutting through the marketing noise, the need to trust but verify, the value of assess and measure, and how critical it is to focus on the things that matter.
Tim Jarret from CA Veracode talks about application security during Black Hat USA 2017
Tim Jarret, CA Veracode, talks about application security with Sean Martin during Black Hat USA 2017. What are the drivers behind organizations choosing to invest in application security and who should lead the application security program? How do companies get on top of the problem of insecure components being used in applications? Tim shares his thoughts with us, tying it all together with the Internet of Things and the impact connected devices have on society - due to the vulnerabilities introduced at the application layer.
Do you have a risk management champion at your company? Why not?
Having been a CISO for a fortune 100, a mid-tier enterprise, and a smaller 3rd-party vendor, Jack Jones of the FAIR Institute tells Sean Martin how organizations can successfully begin to approach risk and apply proven risk management principles. It all starts with a common set of terminology and is lead by a champion within the organization. As a CISO, proper risk management can be used to change the binary conversation surrounding InfoSec into one that leads the business toward better decision making and away from simply blaming a CISO for some cyber risk exposure.
Yuji Ukai & Pablo Garcia, from Tokyo-based endpoint security company, FFRI, from Black Hat USA 2017
Years after working with them at eEye Digital Security, Sean Martin connected with Yuji Ukai and Pablo Garcia, now working for Tokyo-based endpoint security company, FFRI. Yuji is the founder and CEO and Pablo is heading up all of the North American operations for FFRI. During our conversation. we discuss some of the challenges small and medium sized businesses face, with the pair offering some suggestions and tips for this massive group of organizations to consider.
The Moral Compass: Autonomous vehicles… whose life is worth more?
When software determines how autonomous vehicles behave - both in normal situations and in life-and-death situations - what can we expect as a society. What will these vehicles “know” about us, the other vehicles, and the the passengers in the surrounding area such that moral decisions can be made on the fly? Will we have control over this moral compass - or are we set to live in a world controlled by machines and software? Ashwin Krishnan, SVP of product and strategy at HyTrust chats about this new world with ITSPmagazine's Sean Martin.
Jeremiah Grossman chats with ITSPmagazine’s Sean Martin about security software guarantees
Jeremiah Grossman, Chief of Security Strategy at SentinelOne, chats with ITSPmagazine’s editor-in-chief, Sean Martin, about security software guarantees and the need to shift the minds, culture and expectations on both sides of the table during the security software purchasing process. How can companies connect the dots (and conversations) between the Chief Risk Officer, Chief Information Officer, Chief Security Officer, and Chief Financial Officer such that the company's security product purchases can have a direct impact on the types and levels of coverage required for their cyberinsurance policy? Listen in and hear how Jeremiah’s crusade to make security product guarantees part of every risk management and security management program will help businesses understand and mitigate their risk much more effectively and accurately.
To view the list mentioned in this podcast, please visit: blog.jeremiahgrossman.com/2017/02/info…rantees.html
Would you like to be notified when a new episode is posted?
How about upcoming ones and other news related to #AtTheEdge Podcast?
Well, problem solved. Subscribe to The At The Edge Mailing List.