95
Akamai Confidential Conventional Defenses + Unconventional Adversaries == ??? Joshua Corman Director, Security Intelligence @joshcorman

Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Akamai Confidential

Conventional Defenses + Unconventional Adversaries

== ??? Joshua Corman

Director, Security Intelligence

@joshcorman

Page 2: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

FRESHLY OLD: About Joshua Corman

Research Director, Enterprise Security for The 451 Group (Oct ‘09)

• Former Principal Security Strategist [IBM ISS]

• Sold stealth custom malware start-up to ISS in 2002

Industry Experience:

• Expert Faculty: The Institute for Applied Network Security (IANS)

• 2009 NetworkWorld Top 10 Tech People to Know

• Co-Founder of “Rugged Software” www.ruggedsoftware.org

Things I’ve been researching:

• Compliance vs Security

• Disruptive Innovations (Virtualization, Cloud, Mobility)

• The Economics of Information Security

• Politically motivated Cyber (APT/APA/SMT)

• Comprehensive Data Security

2

Page 3: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Agenda

Late Breaking News!

Surviving a Zombie Apocalypse

APTs and Adaptive Persistent Adversaries

The Rise of Chaotic Actors: Understanding Anonymous

Rugged…

Page 4: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

2011 VZ DBIR

MISSION ACCOMPLISHED! (no – not really)

Page 5: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

All-Time High # of Incidents

All-Time Low # of Breached Records

Higher Value Records

All but one thing got worse

MOST cases SMB

Page 6: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

2009 141 incidents

2010 761 incidents

Delta

Intellectual Property 10 41 31

National Security Data 1 20 19

Sensitive Organizational 13 81 68

System Information ZERO 41 41

Page 7: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

7

2010 Unholy Trinity:

• Google.cn and Operation Aurora

• Stuxnet

• Bradley Manning/WikiLeaks (and Operation Payback)

2011:

• Anonymous

• EMC/RSA SecurID

• Sony’s Punishment Campaign

• LulzSec

• Lockheed

• IMF

Page 8: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

RSA PechaKucha Happy Hour

20 Slides x 20 Seconds (6 min 40 sec)

Joshua Corman

@joshcorman

Research Director

Enterprise Security

Page 9: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

PechaKucha Happy Hour

Why Zombies Love PCI: or “No Zombie Left Behind Act”

Joshua Corman

Research Director

Enterprise Security

The 451 Group

SPEAKER:

Page 10: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Why Zombies?

Hungry

Persistent

1 at a time vs…

Page 11: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Zombies ++

11 RSA Conference 2011

Page 12: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Is PCI The No Child Left Behind Act for Information Security?

Early Adopters Mainstream Laggards

12

Page 13: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

When “good enough”… isn’t

13

Page 14: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

It’s all about Zombies

Page 15: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

It’s all about Zombies

15

Page 16: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Evolving Threat

Evolving Compliance

Evolving Technology

Evolving Economics

Evolving Business

Cost Complexity

Risk

Disruptive Changes

16

Page 17: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Evolving Threat: Adaptive Persistent Adversaries

17

Page 18: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Fear the auditor more than the attacker

18

Page 19: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

We broke the Information Security Market

19

Evolving Threat

Evolving Compliance

Evolving Technology

Evolving Economics

Evolving Business

Cost Complexity

Risk

HIPAA HITECH

SOX GLB

Page 20: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

20

Page 21: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Thriller

21

1984 1994 2004 2014?

Sony Walkman Sony Discman iPod ?

? Signature AV Signature AV Signature AV Signature AV

Page 22: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

22

94%

89%

0%

Page 23: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

23

Page 24: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Defensible Infrastructure

24

Survival Guide/Pyramid

www.ruggedsoftware.org

Page 25: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Defensible Infrastructure

Operational Discipline

25

Survival Guide/Pyramid

Page 26: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Defensible Infrastructure

Operational Discipline

Situational Awareness

26

Survival Guide/Pyramid

Page 27: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Defensible Infrastructure

Operational Discipline

Situational Awareness

Countermeasures

27

Survival Guide/Pyramid

Page 28: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Surviving The Zombie Apocalypse

Hungry

Persistent

1 at a time vs…

[email protected]

@joshcorman

Page 29: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Evolving Threat: Adaptive Persistent Adversaries

29

Page 30: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 31: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 32: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 33: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

0

20

40

60

80

100

120

1 2 3 4 5 6 7 8 9 10 11

Security Investment

Casual Success

Anon/Lulz Success

APT?APA Success

QSA

Attacker Drop-Offs

Page 34: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

0

20

40

60

80

100

120

1 2 3 4 5 6 7 8 9 10 11

Security Investment

Casual Success

Anon/Lulz Success

APT?APA Success

QSA

Attacker Drop-Offs

HDMoore’s Law

Page 35: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

0

20

40

60

80

100

120

1 2 3 4 5 6 7 8 9 10 11

Security Investment

Casual Success

Anon/Lulz Success

APT?APA Success

QSA

Attacker Drop-Offs : QSAs

Page 36: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

0

20

40

60

80

100

120

1 2 3 4 5 6 7 8 9 10 11

Security Investment

Casual Success

Anon/Lulz Success

APT?APA Success

QSA

Attacker Drop-Offs: APTs/APAs

Page 37: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

0

20

40

60

80

100

120

1 2 3 4 5 6 7 8 9 10 11

Security Investment

Casual Success

Anon/Lulz Success

APT?APA Success

QSA

Attacker Drop-Offs: Chaotic Actors

Page 38: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

What is the Goal…?

Page 39: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Does it matter?

Top Threat Action Types used to steal INTELLECTUAL PROPERTY AND CLASSIFIED INFORMATION by number of breaches - (excludes breaches only involving payment card data, bank account information, personal information, etc)

Was #18 in overall DBIR

Page 40: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house

Defensible Infrastructure

Operational Discipline

Situational Awareness

Countermeasures

Page 41: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house

Defensible Infrastructure

Operational Discipline

Situational Awareness

Countermeasures

Page 42: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house

Defensible Infrastructure

Operational Discipline

Situational Awareness

Countermeasures

Page 43: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house

Defensible Infrastructure

Operational Discipline

Situational Awareness

Countermeasures

Page 44: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house

Defensible Infrastructure

Operational Discipline

Situational Awareness

Countermeasures

Page 45: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Situational Awareness

Countermeasures

Operational Discipline

Defensible Infrastructure

Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house

Page 46: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Zombie Proof Housing http://all-that-is-interesting.com/post/4956385434/the-first-zombie-proof-house

Defensible Infrastructure

Operational Discipline

Situational Awareness

Countermeasures

Page 47: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Defensible Infrastructure

Operational Discipline

Situational Awareness

Countermeasures

A real use case of 'better security' in the face of adaptive adversarieshttp://www.the451group.com/report_view/report_view.php?entity_id=66991

Page 48: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

48

Security Management & GRC

Identity/Entity Security

Data Security

Host

Network

Infrastructure Security

Application Security

CSA Cloud Model

48

Page 49: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Rugged Software Development Joshua Corman, David Rice, Jeff Williams

2010

Page 51: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 52: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

“What is missing from software security?”

Page 53: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 54: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 55: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 56: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Secure software is critically important to almost every aspect of life.

© The Economist, January 16, 2010

Page 57: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 58: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

“A fortress mentality will not work in cyber. We cannot retreat behind a Maginot Line of firewalls…If we stand still for a minute, our adversaries will overtake us.” -William Lynn, U.S. Deputy Secretary of Defense January 2010

Page 59: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

CURRENT SOFTWARE

Page 60: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

RUGGED SOFTWARE

Page 61: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

CURRENT SOFTWARE

Page 62: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

RUGGED SOFTWARE

Page 63: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

CURRENT SOFTWARE

Page 64: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

RUGGED SOFTWARE

Page 65: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

…so software not only needs to be…

Page 66: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

FAST

Page 67: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

AGILE

Page 68: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Are You Rugged?

Page 69: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

HARSH

Page 70: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

UNFRIENDLY

Page 71: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

THE MANIFESTO

Page 72: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

I recognize that my code will be used in ways I cannot anticipate, in ways it was not designed,

and for longer than it was ever intended.

Page 73: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 74: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

WHAT IS RUGGED?

Page 75: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

It’s not about style, it’s about the result.

Page 76: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

It’s not about external compliance…

Page 77: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 78: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

The Masses

The Choir

1) Beyond the choir

Page 79: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

The Choir

2) Beyond technology

Page 80: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

3) Aspirational

Page 81: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

The Journey

Aware Informed Selective Mature

Page 82: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

GETTING INVOLVED

Page 83: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

http://ruggedsoftware.org

Twitter: @RuggedSoftware

Page 85: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

A Rugged Rorschach “What does Rugged mean

to you?”

Page 86: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 87: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

• Supportability – easy to troubleshoot and fix

• Resilience – can handle high loads at unexpected times

• Recoverability – is built to fail gracefully and recover quickly

• Flexibility – can easily be updated

• Security – can withstand accidental or malicious misuse

• Longevity – will serve its purpose for many years to come, that does not assume the ability to update or replace it.

What can Rugged qualities be?

Page 88: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

• Developers • the hearts and minds - the hands on the keyboards

• Development Executives

• an asset to pursuing your SDLC

• Students and Universities

• starting your careers with a head start

• IT Practitioners

• securing the support and budgets you need • identifying the software you deserve

• Procurement

• demanding Rugged infrastructure from your providers

• Citizens

• Something my mother in law and neighbors understand

Rugged Communities

Page 89: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Supply and

_______

Page 90: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Code we WRITE

Code we BUY

OLD Apps NEW Apps

Page 91: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 92: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security
Page 93: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Rugged

www.ruggedsoftware.org

The Beginning of the End: Driving an Era of Rugged Software http://www.the451group.com/intake/rugged/

•The Manifesto •An untapped resource for consumers of software and clouds •An opportunity for cloud and hosting providers

Page 94: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Akamai Confidential ©2011 Akamai Powering a Better Internet

Q&A

Page 95: Conventional Defenses + Unconventional Adversaries · RSA PechaKucha Happy Hour 20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security

Akamai Confidential ©2011 Akamai Powering a Better Internet

THANK YOU

[email protected] @joshcorman @RuggedSoftware