SlideShare a Scribd company logo
Creating a graph-based
security organisation
Dinis Cruz
dinis.cruz@photobox.com
OWASP London Chapter meeting
April / 2019
2
What are Security’s meta objectives
● Allowing the business to execute it’s mission and objectives within their ‘accepted
risk level’
● Allowing the business to make FACT and RISK based decisions
● Improving the business’ ability to deploy changes and enabling it to ‘move faster’
● Allowing the business to understand better how it behaves and what are the side
effects of it’s actions/decisions
● Increasing the cost of malicious entities to execute their objectives
● Effectively handling incidents and preventing crisis
● Making compliance easy
● Enabling the business to think in ‘Graphs’
3
Security is a major
agent of change
(just about everything we do requires a change request)
4
Security is at the
epicentre of data
(we can get data feeds from everywhere)
5
Data is not linear or tabular
Data is hyperlinked and
relational
6
Only effective solution is to:
Manage and visualise data
as a Graph …
7
…and to create a
Graph based security
organisation
8
How we did it
9
10
It all started with this RISK Workflow
11
Now refactored to
12
We use JIRA as a Graph Database
We created a serverless workflow
Graph
database
Queryable
data store
Lambda
functions
Command line /
feedback loop
Our hyperlinked
security taxonomy...
...is dumped every few
seconds into ELK...
...made queryable by
code functions...
...with the user
journey all in Slack.
14
We sync all JIRA data into Elastic Stack
15
We use a Slack bot to access the data
16
Searching Jira and rendering plantuml
17
PlantUML graphs from JIRA data
Creating a graph based security organisation - Apr 2019 (OWASP London chapter meeting)
19
Mapping projects to OKRs
20
Mapping Services to Roles
2
Multiple ways to
Visualise data
22
The Universe
Work done yesterday
Work done last week
‘
The Bicycle
‘
Spot the bad mappings
27
A sail of a boat or Music Equalizer
‘
My Brain on Friday
Where is Everybody?
Funny ones
‘Wardley Maps’
Automatic generation of
Slides
3
33
Creating slides and pdfs from GS Bot
34
35
36
37
38
39
Syncing Google Sheets
with Jira
4
Meet Maeve
Demo
42
Syncing Google Sheets With Jira
OWASP Demo
Maeve Scarry 4th April 2019
1 Create ticket in Jira
2 Create tasks
3 Column view
4 Spider view
5 Graph view
6 Table view
7 Creating a Google Sheet
8 Google Sheet
9 Editing the Sheet
10 Editing the Sheet
11 Syncing Google Sheets to Jira
12 Final Jira View
Rendering Sheets and Slides
in Slack
5
Consume materials created in Slack
Empowering the
business to make
Fact based Security Decisions
5
59
Risk Dashboards (from Jira Data)
Maturity
DEMO DATA
60
Show Risk evolution
FY18
(score of 45)
FY18
(score of 55)
Maturity
DEMO DATA
61
Show Risk Delta (Risk impact of decisions)
DEMO DATA
Show me the code
62
Most of the code is on GitHub
Broken down in modules(build using AWS CodeBuild)
Please contribute
and participante in the
conversation
6
Ok, how can I learn more
about this?
And where can I try it?
66
Open Security Summit 2019
https://docs.google.com/presentation/d/1GlCvPmBHqcn_VA1ciVirgkoP1RSkSccHhd_Wx1BaG4s/edit#slide=id.p1
The place to be to collaborate
https://docs.google.com/presentation/d/1GlCvPmBHqcn_VA1ciVirgkoP1RSkSccHhd_Wx1BaG4s/edit#slide=id.p1
Last year’s action
Buy your ticket now! (we are running out of villas)
https://open-security-summit.org/
Also available at
https://z-developers.com/
Read the ‘Generation Z Developers’
https://leanpub.com/generation-z/
https://github.com/DinisCruz/Book_Generation_Z_Developer
72
Further reading
https://www.youtube.com/watch?v=xwuXz1ZEnhA https://leanpub.com/secdevops
Thanks
73

More Related Content

PDF
Modern security using graphs, automation and data science
PDF
CISO Application presentation - Babylon health security
PDF
Introduction to NIST Cybersecurity Framework
PPTX
Business continuity & disaster recovery planning (BCP & DRP)
PPTX
Cybersecurity Framework - Introduction
PPTX
Moving to the cloud: cloud strategies and roadmaps
PPTX
Cybersecurity Risk Management Framework Strategy Workshop
PDF
NIST cybersecurity framework
Modern security using graphs, automation and data science
CISO Application presentation - Babylon health security
Introduction to NIST Cybersecurity Framework
Business continuity & disaster recovery planning (BCP & DRP)
Cybersecurity Framework - Introduction
Moving to the cloud: cloud strategies and roadmaps
Cybersecurity Risk Management Framework Strategy Workshop
NIST cybersecurity framework

What's hot (20)

PDF
Technology Alignment Framework
PPTX
Data Visualization
PDF
Drone Delivery: By The Numbers
PPTX
PPT
Data Management
PPTX
CASB: Securing your cloud applications
PDF
Endpoint Detection & Response - FireEye
PPTX
Drones Applications in Rail, Oil & Gas, Construction
PPTX
Introduction to the CSA Cloud Controls Matrix
PPTX
Misp(malware information sharing platform)
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PDF
Network Architecture Review Checklist
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PDF
Fraud Management Solutions
PDF
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
PPTX
Healthcare and Cyber security
PDF
Netskope Overview
PPTX
Risk management
PPTX
Privacy by Design as a system design strategy - EIC 2019
PDF
How to Replace Your Legacy Antivirus Solution with CrowdStrike
Technology Alignment Framework
Data Visualization
Drone Delivery: By The Numbers
Data Management
CASB: Securing your cloud applications
Endpoint Detection & Response - FireEye
Drones Applications in Rail, Oil & Gas, Construction
Introduction to the CSA Cloud Controls Matrix
Misp(malware information sharing platform)
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Network Architecture Review Checklist
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Fraud Management Solutions
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Healthcare and Cyber security
Netskope Overview
Risk management
Privacy by Design as a system design strategy - EIC 2019
How to Replace Your Legacy Antivirus Solution with CrowdStrike
Ad

Similar to Creating a graph based security organisation - Apr 2019 (OWASP London chapter meeting) (20)

PDF
Knowledge Graphs for AI-Ready Data and Enterprise Deployment - Gartner IT Sym...
PDF
Thinking in Graphs
PDF
Thinking in graphs v1.0
PDF
4-lessons-of-security-leaders-for-2022.pdf
PDF
Offload, Transform, and Present - The New World of Data Integration
PPTX
Building and deploying a predictive model in Azure Machine Learning
PDF
Neo4j: The Art of Possible with Graph Technology
PDF
Netwrix Hybrid Security Trends Report 2024.pdf
PPTX
Changing mindset&culture when implementing IAAS
PDF
Linkurious Enterprise: graph visualization platform neo4j
PDF
The Art of Possible - GraphTalk Paris Opening Session
PDF
Forecast 2014: Open Your Datacenter
PDF
Overcoming Business Challenges with Azure
PPTX
10 Keynotes in STRATA and HADOOP World Conference
PPTX
Technology Radar Webinar UK - Vol. 22
PDF
Tech Days Sweden - Power BI - A look into the future with mixed reality
PPTX
The Making of a simple Cyber Threat Intelligence Gathering System
PPTX
Customer Presentation - IBM Cloud Pak for Data Overview (Level 100).PPTX
PDF
Cutting through the hype - how to use advanced analytics to do practical thin...
PDF
APM PMC SIG conference 2021, Project controls: but not as we know it, Close o...
Knowledge Graphs for AI-Ready Data and Enterprise Deployment - Gartner IT Sym...
Thinking in Graphs
Thinking in graphs v1.0
4-lessons-of-security-leaders-for-2022.pdf
Offload, Transform, and Present - The New World of Data Integration
Building and deploying a predictive model in Azure Machine Learning
Neo4j: The Art of Possible with Graph Technology
Netwrix Hybrid Security Trends Report 2024.pdf
Changing mindset&culture when implementing IAAS
Linkurious Enterprise: graph visualization platform neo4j
The Art of Possible - GraphTalk Paris Opening Session
Forecast 2014: Open Your Datacenter
Overcoming Business Challenges with Azure
10 Keynotes in STRATA and HADOOP World Conference
Technology Radar Webinar UK - Vol. 22
Tech Days Sweden - Power BI - A look into the future with mixed reality
The Making of a simple Cyber Threat Intelligence Gathering System
Customer Presentation - IBM Cloud Pak for Data Overview (Level 100).PPTX
Cutting through the hype - how to use advanced analytics to do practical thin...
APM PMC SIG conference 2021, Project controls: but not as we know it, Close o...
Ad

More from Dinis Cruz (20)

PDF
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
PDF
Glasswall - Safety and Integrity Through Trusted Files
PDF
Glasswall - How to Prevent, Detect and React to Ransomware incidents
PDF
The benefits of police and industry investigation - NPCC Conference
PDF
Serverless Security Workflows - cyber talks - 19th nov 2019
PDF
Using Wardley Maps to Understand Security's Landscape and Strategy
PDF
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
PDF
Making fact based decisions and 4 board decisions (Oct 2019)
PDF
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
PDF
GSBot Commands (Slack Bot used to access Jira data)
PDF
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
PDF
OSBot - Data transformation workflow (from GSheet to Jupyter)
PDF
Jira schemas - Open Security Summit (Working Session 21th May 2019)
PDF
Template for "Sharing anonymised risk theme dashboards v0.8"
PDF
Owasp and summits (may 2019)
PDF
Open security summit 2019 owasp london 25th feb
PDF
Owasp summit 2019 - OWASP London 25th feb
PDF
Evolving challenges for modern enterprise architectures in the age of APIs
PDF
How to not fail at security data analytics (by CxOSidekick)
PDF
Open Security Summit - April 2018
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - How to Prevent, Detect and React to Ransomware incidents
The benefits of police and industry investigation - NPCC Conference
Serverless Security Workflows - cyber talks - 19th nov 2019
Using Wardley Maps to Understand Security's Landscape and Strategy
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Making fact based decisions and 4 board decisions (Oct 2019)
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
GSBot Commands (Slack Bot used to access Jira data)
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
OSBot - Data transformation workflow (from GSheet to Jupyter)
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Template for "Sharing anonymised risk theme dashboards v0.8"
Owasp and summits (may 2019)
Open security summit 2019 owasp london 25th feb
Owasp summit 2019 - OWASP London 25th feb
Evolving challenges for modern enterprise architectures in the age of APIs
How to not fail at security data analytics (by CxOSidekick)
Open Security Summit - April 2018

Recently uploaded (20)

PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Testing WebRTC applications at scale.pdf
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
E -tech empowerment technologies PowerPoint
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Internet___Basics___Styled_ presentation
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
Sims 4 Historia para lo sims 4 para jugar
Testing WebRTC applications at scale.pdf
Paper PDF World Game (s) Great Redesign.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
WebRTC in SignalWire - troubleshooting media negotiation
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Introuction about ICD -10 and ICD-11 PPT.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
introduction about ICD -10 & ICD-11 ppt.pptx
E -tech empowerment technologies PowerPoint
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
SAP Ariba Sourcing PPT for learning material
Internet___Basics___Styled_ presentation
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Introuction about WHO-FIC in ICD-10.pptx
international classification of diseases ICD-10 review PPT.pptx
SASE Traffic Flow - ZTNA Connector-1.pdf

Creating a graph based security organisation - Apr 2019 (OWASP London chapter meeting)