Sac HDI Big Event

Download Report

Transcript Sac HDI Big Event

Jeff Williams
2015
Intro
Awesome Times
Security Briefing
Service with Security
 Deloitte & Touché consultant during Y2K
 Santa Clara County Office of Education
 Supported Payroll, financial and human resource systems in 44 district, in two counties
 California State University
 9 year in Information Security and resent appoint to Director of Customer Service
 Security experience from briefings (e.g. state, Infragard, Verizon), trainings
(e.g. CISA, CISSP and Incident Handler), books (e.g. ) and most important
from experience
 Philosophy & MBA
 All views, misquotes and materials out of context are the solely my fault;
I’m here to paint you a picture and encourage you to grow
Meet the business goal
with Changing Technology
that is Fragile
 Three stories
 Big Data
 Ted Talks on Machine Learning
 Geekonomics
 Even Data Changes
 3rd Millennium BC
 12th-16th century
 14th century
We solve our problems with the tools available
Rigid exactitude
Correlation
What, not why
“The wonderful and terrifying implication of computers that
can learn”
Jeremy Howard
Portland Cement
No Virtual Crash Test Dummies
Meet the business goal
WITH
Changing Technology
THAT
Is Fragile
 Infragard Briefings
 Verizon Report and Briefings
 Dell SecureWorks Briefings
 Microsoft Briefings
 SANS.org training and Briefings
 Pre-2008 – The lone wolfs…wolves are pack animals
 2008 - roll up high profile Hackers
 2009 - China hires Russian Hackers
 steals cyber attack IP
 2010 - Move to single high value target - multi-verification
 2011 – Russian Hackers become patriots
 2012 - Iran (mother of all cyber attacks, DDoS US banks)
 Iran provided $$$ to hackers to DDoS; ineffective but lots of $$$
 2014 – Disruption: data theft; Anonymous, protest to disrupted and embarrass;
- Recon in network that to them are USA - relations between RU, China, Iran,
N.K.; same code
 Malicious actors go after those who have access to the data
 Poor key implementation and management
 Spear phishing
 Social Engineering
 Changing direct deposits
 Downloading your emails
 Humans can pivot and explore
What is the business goal?
What are the risks?
What are the threats?
What are the right security controls?
What they protect
How they protect
 Confidentiality
 Deter
 Integrity
 Prevent
 Availability
 Detect
 Recover
 Reduce
We Live in Awesome Times
Thank You