SlideShare a Scribd company logo
Detect & Respond
Frode Hommedal
Technical Director
PwC.no/Cyber
ISF – August 2019
10 common pit
that will sabotage the effectiveness
of your security program
Frode Hommedal – PwC.no/Cyber
When designing a
strategy for detection
and response there are
numerous pitfalls you
can fall into.
This presentation will
highlight some of them.
[Based on my own experience and discussions with peers]
DateDetect & Respond: 10 common pitfalls
2
Frode Hommedal – PwC.no/Cyber
If you fall into too many
of these, your security
program will likely be
ineffective at protecting
your organization from
internal and external
threats.
Frode Hommedal – PwC.no/Cyber
#whoami
Technical analyst turned
strategic advisor within
the field of detection and
response and … security.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
Risk comes from not
knowing what you're
doing.– Warren Buffett
Pitfall #1
Guessing risk, not basing
it on asset valuation and
threat and vulnerability
assessments.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
Strategy without tactics
is the longest route to
victory, tactics without
strategy is the noise
before defeat. – Sun Tzu
Pitfall #2
Not creating an actual
security strategy.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
I learned that focus is key.
Not just in your running
a company, but in your
personal life as well.
– Tim Cook
Pitfall #3
Not clearly defining the
scope and mission of
your SOC and CSIRT.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
The only thing that you
absolutely have to know,
is the location of the
library.–Albert Einstein
Pitfall #4
Not investing in
centralized logging.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
Information is a source of
learning. But unless it is
organized, processed, and
available to the right people in
a format for decision making,
it is a burden, not a benefit.
– William Pollard
Pitfall #5
Not continuously
investing in data quality.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
You can use all the
quantitative data you can
get, but you still have to
distrust it and use your own
intelligence and judgment.
– Alvin Toffler
Pitfall #6
Blindly trusting that
vendor detection logic
will discover your threats.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
Efficiency is the
foundation for survival.
Effectiveness is the
foundation for success.
– John C. Maxwell
Pitfall #7
Not integrating all your
security solutions in one
centralized cockpit.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
Learning is not attained
by chance, it must be
sought for with ardor and
attended to with diligence.
– Abigail Adams
Pitfall #8
Failing to take the
necessary time to seek
out available knowledge.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
No one can whistle a
symphony. It takes a
whole orchestra to play it.
– H.E. Luccock
Pitfall #9
Not systematically learn
from the insigths offered
by your SOC and CSIRT.
Detect & Respond: 10 common pitfalls
Frode Hommedal – PwC.no/Cyber
Defenders think in lists.
Attackers think in
graphs. As long as this is
true, attackers win.
– John Lambert
Pitfall #10
Not thinking in terms
of dependencies.
Detect & Respond: 10 common pitfalls
pwc.no/Cyber
Thank you
Frode Hommedal
Technical Director
ISF – August 2019
frode.hommedal@pwc.com
Feel free to reach out if you have
any questions or comments.

More Related Content

PPTX
Taking the Attacker Eviction Red Pill [updated]
PPTX
Taking the Attacker Eviction Red Pill (v2.0)
PDF
Click and Dragger: Denial and Deception on Android mobile
PDF
Analogic Opsec 101
PDF
Opsec for security researchers
PDF
The Internet is on fire – don't just stand there, grab a bucket!
PDF
2020 FRsecure CISSP Mentor Program - Class 1
PDF
2018 CISSP Mentor Program Session 1
Taking the Attacker Eviction Red Pill [updated]
Taking the Attacker Eviction Red Pill (v2.0)
Click and Dragger: Denial and Deception on Android mobile
Analogic Opsec 101
Opsec for security researchers
The Internet is on fire – don't just stand there, grab a bucket!
2020 FRsecure CISSP Mentor Program - Class 1
2018 CISSP Mentor Program Session 1

What's hot (9)

PDF
2018 CISSP Mentor Program Session 3
PDF
2019 FRSecure CISSP Mentor Program: Class Ten
PPTX
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
PDF
2019 FRSecure CISSP Mentor Program: Class Three
PDF
[AVTOKYO 2017] What is red team?
PDF
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
PDF
2020 FRSecure CISSP Mentor Program - Class 6
PPTX
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
PDF
2019 FRSecure CISSP Mentor Program: Class Nine
2018 CISSP Mentor Program Session 3
2019 FRSecure CISSP Mentor Program: Class Ten
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
2019 FRSecure CISSP Mentor Program: Class Three
[AVTOKYO 2017] What is red team?
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
2020 FRSecure CISSP Mentor Program - Class 6
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
2019 FRSecure CISSP Mentor Program: Class Nine
Ad

Similar to Detect & Respond: Ten Common Pitfalls (20)

PDF
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
PDF
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
PDF
Marcus Ranum on Bad Idea Zombies
PDF
Priming your digital immune system: Cybersecurity in the cognitive era
PDF
Why Executives Underinvest In Cybersecurity
PPTX
Intro to a Data-Driven Computer Security Defense
PDF
CS Sakerhetsdagen 2015 IBM Feb 19
PDF
Journal of Physical Security 8(1)
PDF
[Bucharest] Attack is easy, let's talk defence
PDF
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
PDF
Sexy defense
PPTX
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
PDF
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
PDF
7 Critical Factors To Grow Your Business By Managing Innovation and Risk
PDF
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
PDF
Cybersecurity report-vol-8
DOCX
Risk is for wimps
PPTX
BSidesSF talk: Overcoming obstacles in operationalizing security
PPTX
CyberSecurity Strategy For Defendable ROI
PPTX
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Marcus Ranum on Bad Idea Zombies
Priming your digital immune system: Cybersecurity in the cognitive era
Why Executives Underinvest In Cybersecurity
Intro to a Data-Driven Computer Security Defense
CS Sakerhetsdagen 2015 IBM Feb 19
Journal of Physical Security 8(1)
[Bucharest] Attack is easy, let's talk defence
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Sexy defense
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
7 Critical Factors To Grow Your Business By Managing Innovation and Risk
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Cybersecurity report-vol-8
Risk is for wimps
BSidesSF talk: Overcoming obstacles in operationalizing security
CyberSecurity Strategy For Defendable ROI
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
Ad

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Machine Learning_overview_presentation.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Cloud computing and distributed systems.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
A Presentation on Artificial Intelligence
MIND Revenue Release Quarter 2 2025 Press Release
Programs and apps: productivity, graphics, security and other tools
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
Machine Learning_overview_presentation.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25-Week II
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Detect & Respond: Ten Common Pitfalls

  • 1. Detect & Respond Frode Hommedal Technical Director PwC.no/Cyber ISF – August 2019 10 common pit that will sabotage the effectiveness of your security program
  • 2. Frode Hommedal – PwC.no/Cyber When designing a strategy for detection and response there are numerous pitfalls you can fall into. This presentation will highlight some of them. [Based on my own experience and discussions with peers] DateDetect & Respond: 10 common pitfalls 2
  • 3. Frode Hommedal – PwC.no/Cyber If you fall into too many of these, your security program will likely be ineffective at protecting your organization from internal and external threats.
  • 4. Frode Hommedal – PwC.no/Cyber #whoami Technical analyst turned strategic advisor within the field of detection and response and … security. Detect & Respond: 10 common pitfalls
  • 5. Frode Hommedal – PwC.no/Cyber Risk comes from not knowing what you're doing.– Warren Buffett Pitfall #1 Guessing risk, not basing it on asset valuation and threat and vulnerability assessments. Detect & Respond: 10 common pitfalls
  • 6. Frode Hommedal – PwC.no/Cyber Strategy without tactics is the longest route to victory, tactics without strategy is the noise before defeat. – Sun Tzu Pitfall #2 Not creating an actual security strategy. Detect & Respond: 10 common pitfalls
  • 7. Frode Hommedal – PwC.no/Cyber I learned that focus is key. Not just in your running a company, but in your personal life as well. – Tim Cook Pitfall #3 Not clearly defining the scope and mission of your SOC and CSIRT. Detect & Respond: 10 common pitfalls
  • 8. Frode Hommedal – PwC.no/Cyber The only thing that you absolutely have to know, is the location of the library.–Albert Einstein Pitfall #4 Not investing in centralized logging. Detect & Respond: 10 common pitfalls
  • 9. Frode Hommedal – PwC.no/Cyber Information is a source of learning. But unless it is organized, processed, and available to the right people in a format for decision making, it is a burden, not a benefit. – William Pollard Pitfall #5 Not continuously investing in data quality. Detect & Respond: 10 common pitfalls
  • 10. Frode Hommedal – PwC.no/Cyber You can use all the quantitative data you can get, but you still have to distrust it and use your own intelligence and judgment. – Alvin Toffler Pitfall #6 Blindly trusting that vendor detection logic will discover your threats. Detect & Respond: 10 common pitfalls
  • 11. Frode Hommedal – PwC.no/Cyber Efficiency is the foundation for survival. Effectiveness is the foundation for success. – John C. Maxwell Pitfall #7 Not integrating all your security solutions in one centralized cockpit. Detect & Respond: 10 common pitfalls
  • 12. Frode Hommedal – PwC.no/Cyber Learning is not attained by chance, it must be sought for with ardor and attended to with diligence. – Abigail Adams Pitfall #8 Failing to take the necessary time to seek out available knowledge. Detect & Respond: 10 common pitfalls
  • 13. Frode Hommedal – PwC.no/Cyber No one can whistle a symphony. It takes a whole orchestra to play it. – H.E. Luccock Pitfall #9 Not systematically learn from the insigths offered by your SOC and CSIRT. Detect & Respond: 10 common pitfalls
  • 14. Frode Hommedal – PwC.no/Cyber Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win. – John Lambert Pitfall #10 Not thinking in terms of dependencies. Detect & Respond: 10 common pitfalls
  • 15. pwc.no/Cyber Thank you Frode Hommedal Technical Director ISF – August 2019 frode.hommedal@pwc.com Feel free to reach out if you have any questions or comments.