Building an open source security program on a budget.pdf - Google ...

3 downloads 164 Views 2MB Size Report
Building an open source security program on a budget.pdf. Building an open source security program on a budget.pdf. Open
Building a Security Program On a budget

Twitter:

@mgschiebel

LinkedIn:

http://www.linkedin.com/in/michaelschiebel

Website:

http://www.ikoloki.co

Volunteerism:

https://www.patreon.com/michaelschiebel

Michael Schiebel Ikoloki [email protected]

“It isn’t whether you are thinking inside or outside the box; it’s realizing that there is no box.” “Life without a challenge is just a job”

WE NOW LIVE IN A CONNECTED WORLD

IN THE LAST 15 YEARS, 52% OF THE FORTUNE 500 COMPANIES HAVE DISAPPEARED Local TV Stations

Netflix

Brick & Mortar Retail

Amazon

Taxi Companies

Uber

Companies must either become a disruptive force or be disrupted

We need to take a new approach to security if we’re to adapt to the connect world

We need disruptive security to adapt to disruptive IT

Budget

To be allowed to be successful

You must first have a record of being successful

Measure current state

KGI: Key goal indicators KPI: Key performance indicators KRI: Key risk indicators

What is the business value of the goal? How much are we spending today? What can happen - in dollars - if things go badly

What is the business value being delivered today AND How can we improve

Find Value

● ● ● ●

Achieve Business Goal Save Time & Money Reduce Risk Improve Experience

Program

Organization

Development ● ● ● ● ●

Agile UX/UI Full Stack DevOps Data Science

Engineering ● ● ● ●

Project Skills Architecture Interviewing Roadmap development

Operations ● ● ● ●

Triage Incident response Investigations Reporting

People

● ●



Invest savings in training Build career pipeline ○ Operations ○ Development ○ Engineering Design for remote work

Architecture

Connected World Architecture Sensor

Mobile

Web UI

Data/Workflow Bus Unstructured Data

Structured Data

Response 3rd Party Services

Analytics

Services

Sensor

Mobile

Web UI

Data/Workflow Bus

Unstructured Data

Structured Data

Response

3rd Party Services

Analytics

Services

Sensor

Mobile

Web UI

Data/Workflow Bus

Unstructured Data

Structured Data

Response

3rd Party Services

Analytics

Services

Sensor

Mobile

Web UI

Data/Workflow Bus

Unstructured Data

Structured Data

Response

3rd Party Services

Analytics

Services

The security agent ● ●

Detection Response

● ● ● ●

Network Process Memory File

Thank You

Suggest Documents