Building an open source security program on a budget.pdf. Building an open source security program on a budget.pdf. Open
Building a Security Program On a budget
Twitter:
@mgschiebel
LinkedIn:
http://www.linkedin.com/in/michaelschiebel
Website:
http://www.ikoloki.co
Volunteerism:
https://www.patreon.com/michaelschiebel
Michael Schiebel Ikoloki
[email protected]
“It isn’t whether you are thinking inside or outside the box; it’s realizing that there is no box.” “Life without a challenge is just a job”
WE NOW LIVE IN A CONNECTED WORLD
IN THE LAST 15 YEARS, 52% OF THE FORTUNE 500 COMPANIES HAVE DISAPPEARED Local TV Stations
Netflix
Brick & Mortar Retail
Amazon
Taxi Companies
Uber
Companies must either become a disruptive force or be disrupted
We need to take a new approach to security if we’re to adapt to the connect world
We need disruptive security to adapt to disruptive IT
Budget
To be allowed to be successful
You must first have a record of being successful
Measure current state
KGI: Key goal indicators KPI: Key performance indicators KRI: Key risk indicators
What is the business value of the goal? How much are we spending today? What can happen - in dollars - if things go badly
What is the business value being delivered today AND How can we improve
Find Value
● ● ● ●
Achieve Business Goal Save Time & Money Reduce Risk Improve Experience
Program
Organization
Development ● ● ● ● ●
Agile UX/UI Full Stack DevOps Data Science
Engineering ● ● ● ●
Project Skills Architecture Interviewing Roadmap development
Operations ● ● ● ●
Triage Incident response Investigations Reporting
People
● ●
●
Invest savings in training Build career pipeline ○ Operations ○ Development ○ Engineering Design for remote work
Architecture
Connected World Architecture Sensor
Mobile
Web UI
Data/Workflow Bus Unstructured Data
Structured Data
Response 3rd Party Services
Analytics
Services
Sensor
Mobile
Web UI
Data/Workflow Bus
Unstructured Data
Structured Data
Response
3rd Party Services
Analytics
Services
Sensor
Mobile
Web UI
Data/Workflow Bus
Unstructured Data
Structured Data
Response
3rd Party Services
Analytics
Services
Sensor
Mobile
Web UI
Data/Workflow Bus
Unstructured Data
Structured Data
Response
3rd Party Services
Analytics
Services
The security agent ● ●
Detection Response
● ● ● ●
Network Process Memory File
Thank You