SlideShare a Scribd company logo
Do Security
like a start up or
    get FIRED
mentality




                                      Start up




2   © 2012 NetIQ Corporation. All rights reserved.
Trust,


                                   Brand, Reputation

3   © 2012 NetIQ Corporation. All rights reserved.
“We protect our company’s brand - and
    our Security & Risk program allows our
    company to pursue new business
    opportunities safely.”

                   Laura Koetzle, Forrester Research




4   © 2012 NetIQ Corporation. All rights reserved.
IT security says…




5   © 2012 NetIQ Corporation. All rights reserved.
Be seen as a business enabler instead of
    a support function that always gets in the
    way. Evolve from “no” people to
    creative “yes” people, while knowing
    that risk is the variable in the security and
    usability equation




6   © 2012 NetIQ Corporation. All rights reserved.
Do or do not.
                                               There is no try




7   © 2012 NetIQ Corporation. All rights reserved.
Do or do not.
                                               There is no try




8   © 2012 NetIQ Corporation. All rights reserved.
Share with competitors




9   © 2012 NetIQ Corporation. All rights reserved.
Manage risk appropriately




                                                      Not compliance




10   © 2012 NetIQ Corporation. All rights reserved.
Own your security




11   © 2012 NetIQ Corporation. All rights reserved.
12   © 2012 NetIQ Corporation. All rights reserved.
Rugged software

     •   I recognise that my code will be used in ways I cannot
         anticipate, in ways it was not designed, and for longer
         than it was ever intended.
     •   I recognise that my code will be attacked by talented
         and persistent adversaries who threaten our physical,
         economic, and national security.




13       © 2012 NetIQ Corporation. All rights reserved.
“Better to have someone who is good than
            someone who is a specialist”



14   © 2012 NetIQ Corporation. All rights reserved.
15   © 2012 NetIQ Corporation. All rights reserved.
16   © 2012 NetIQ Corporation. All rights reserved.
Standards, APIs




17   © 2012 NetIQ Corporation. All rights reserved.
Key points
     •   Trust, brand, reputation.
     •   Evolve from “no” people to creative “yes” people.
     •   Do or do not. There is no try.
     •   Security is an ecosystem across companies.
     •   Manage risk appropriately, not compliance.
     •   Own your security programme.
     •   Evolving teams.
     •   Identity = reputation, relationships, activity, actionable
         intelligence.
     •   Cloud & BYOD is just IT.
     •   Standards & APIs.


18       © 2012 NetIQ Corporation. All rights reserved.
Do Security Like a Start Up or Get Fired
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.

Copyright © 2012 NetIQ Corporation. All rights reserved.

ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States and other countries.

More Related Content

PDF
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
PPTX
Compliance what does security have to do with it
PDF
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
PDF
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
PDF
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
PPTX
Defining antifragility and the application on organisation design @ DADD 2011...
PDF
Application Security by Ethical Hackers
PDF
DevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Night - Shifting Security to the Left - SCTV Tower - 19 September 2018
Compliance what does security have to do with it
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Defining antifragility and the application on organisation design @ DADD 2011...
Application Security by Ethical Hackers
DevOps Indonesia - DevSecOps - Application Security on Production Environment

What's hot (11)

PPTX
Angel at my Table 2014: Riscoveri
PPTX
Weerbaarheid in je organisatieontwerp
PDF
CLOUDENOMICS FROM A SERICE PROVIDER’S PERSPECTIVE: THE AMAZON FACTOR from Str...
PPTX
Private cloud for the enterprise
PDF
WiTCO - Giới thiệu IT
PPTX
The Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
PDF
Close the Security Gaps of a Remote Workforce
PDF
What is exactly anti fragile in dev ops - v3
PPTX
JoTechies - Azure Backup
PDF
TDC2018SP | Trilha Arq Java - Crie arquiteturas escalaveis, multi-language e ...
PPTX
Top Predictions for the Internet of Everything Era
Angel at my Table 2014: Riscoveri
Weerbaarheid in je organisatieontwerp
CLOUDENOMICS FROM A SERICE PROVIDER’S PERSPECTIVE: THE AMAZON FACTOR from Str...
Private cloud for the enterprise
WiTCO - Giới thiệu IT
The Future of Mobile Security | Kimo Quaintance at Mobile Convention Paris
Close the Security Gaps of a Remote Workforce
What is exactly anti fragile in dev ops - v3
JoTechies - Azure Backup
TDC2018SP | Trilha Arq Java - Crie arquiteturas escalaveis, multi-language e ...
Top Predictions for the Internet of Everything Era
Ad

Viewers also liked (9)

PPTX
Quest One Identity Management Summary
PDF
Central Denmark Region Strengthens Administrative Security with Identity Mana...
PPTX
BrainShare 2014 - NetIQ Partner Information
PDF
NetIQ sessie Boudewijn van Lith
PDF
Oracle tech fmw-05-idm-neum-16.04.2010
PPTX
Flaws in Identity Management and How to Avoid Them
PPT
IAM Solution
PPTX
Leveraging Identity to Manage Change and Complexity
PPTX
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Quest One Identity Management Summary
Central Denmark Region Strengthens Administrative Security with Identity Mana...
BrainShare 2014 - NetIQ Partner Information
NetIQ sessie Boudewijn van Lith
Oracle tech fmw-05-idm-neum-16.04.2010
Flaws in Identity Management and How to Avoid Them
IAM Solution
Leveraging Identity to Manage Change and Complexity
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Ad

Similar to Do Security Like a Start Up or Get Fired (20)

PPTX
Building A Cloud-Ready Security Program
PDF
Agile Project Failures: Root Causes and Corrective Actions
PPTX
Better Do What They Told Ya
PPTX
Better Do What They Told Ya
PPTX
Alfresco Virtual DevCon 2020 - Security First!
PDF
PDF
Security Testing for Testing Professionals
PDF
Software Security for Project Managers: What Do You Need To Know?
PDF
Agile Project Failures: Root Causes and Corrective Actions
PDF
Top Strategies to Capture Security Intelligence for Applications
PPT
Out of the Blue: Responding to New Zero-Day Threats
PPTX
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
PDF
Prolifics at IBM Lotusphere 2012
PPTX
Oracle here. now. your choice.
PDF
Cyber Warfare e scenari di mercato
PPTX
Oracle Netsuite - How Cloud Software Drives Innovation and Growth
PPTX
Shadow IT: The CISO Perspective on Regaining Control
PPT
What CIOs and CFOs Need to Know About Cyber Security
PPTX
Thread Fix Tour Presentation Final Final
PDF
Application Security on Production Environment
Building A Cloud-Ready Security Program
Agile Project Failures: Root Causes and Corrective Actions
Better Do What They Told Ya
Better Do What They Told Ya
Alfresco Virtual DevCon 2020 - Security First!
Security Testing for Testing Professionals
Software Security for Project Managers: What Do You Need To Know?
Agile Project Failures: Root Causes and Corrective Actions
Top Strategies to Capture Security Intelligence for Applications
Out of the Blue: Responding to New Zero-Day Threats
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
Prolifics at IBM Lotusphere 2012
Oracle here. now. your choice.
Cyber Warfare e scenari di mercato
Oracle Netsuite - How Cloud Software Drives Innovation and Growth
Shadow IT: The CISO Perspective on Regaining Control
What CIOs and CFOs Need to Know About Cyber Security
Thread Fix Tour Presentation Final Final
Application Security on Production Environment

More from NetIQ (20)

PDF
Open Enterprise Server With Windows
PDF
Big Payoffs With BYOD and Mobility
PDF
Mobile Apps in Your Business
PPTX
A Smarter, More Secure Internet of Things
PDF
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
PPTX
BrainShare 2014
PDF
Paraca Inc.
PDF
The University of Westminster Saves Time and Money with Identity Manager
PDF
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
PDF
Swisscard Saves Time and Effort in Managing User Access
PDF
Vodacom Tightens Security with Identity Manager from NetIQ
PDF
University of Dayton Ensures Compliance with Sentinel Log Manager
PDF
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
PDF
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
PDF
Netiq css huntington_bank
PDF
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
PDF
NetIQ Identity Manager Unites Hanshan Normal University
PDF
Handelsbanken Takes Control of Identity Management with NetIQ
PDF
Millions of People Depend on Datang Xianyi Technology and NetIQ
Open Enterprise Server With Windows
Big Payoffs With BYOD and Mobility
Mobile Apps in Your Business
A Smarter, More Secure Internet of Things
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
Advanced Persistent Threat - Evaluating Effective Responses
BrainShare 2014
Paraca Inc.
The University of Westminster Saves Time and Money with Identity Manager
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
Swisscard Saves Time and Effort in Managing User Access
Vodacom Tightens Security with Identity Manager from NetIQ
University of Dayton Ensures Compliance with Sentinel Log Manager
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Netiq css huntington_bank
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
NetIQ Identity Manager Unites Hanshan Normal University
Handelsbanken Takes Control of Identity Management with NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
cuic standard and advanced reporting.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectral efficient network and resource selection model in 5G networks
20250228 LYD VKU AI Blended-Learning.pptx
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
cuic standard and advanced reporting.pdf
Electronic commerce courselecture one. Pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation_ Review paper, used for researhc scholars

Do Security Like a Start Up or Get Fired

  • 1. Do Security like a start up or get FIRED
  • 2. mentality Start up 2 © 2012 NetIQ Corporation. All rights reserved.
  • 3. Trust, Brand, Reputation 3 © 2012 NetIQ Corporation. All rights reserved.
  • 4. “We protect our company’s brand - and our Security & Risk program allows our company to pursue new business opportunities safely.” Laura Koetzle, Forrester Research 4 © 2012 NetIQ Corporation. All rights reserved.
  • 5. IT security says… 5 © 2012 NetIQ Corporation. All rights reserved.
  • 6. Be seen as a business enabler instead of a support function that always gets in the way. Evolve from “no” people to creative “yes” people, while knowing that risk is the variable in the security and usability equation 6 © 2012 NetIQ Corporation. All rights reserved.
  • 7. Do or do not. There is no try 7 © 2012 NetIQ Corporation. All rights reserved.
  • 8. Do or do not. There is no try 8 © 2012 NetIQ Corporation. All rights reserved.
  • 9. Share with competitors 9 © 2012 NetIQ Corporation. All rights reserved.
  • 10. Manage risk appropriately Not compliance 10 © 2012 NetIQ Corporation. All rights reserved.
  • 11. Own your security 11 © 2012 NetIQ Corporation. All rights reserved.
  • 12. 12 © 2012 NetIQ Corporation. All rights reserved.
  • 13. Rugged software • I recognise that my code will be used in ways I cannot anticipate, in ways it was not designed, and for longer than it was ever intended. • I recognise that my code will be attacked by talented and persistent adversaries who threaten our physical, economic, and national security. 13 © 2012 NetIQ Corporation. All rights reserved.
  • 14. “Better to have someone who is good than someone who is a specialist” 14 © 2012 NetIQ Corporation. All rights reserved.
  • 15. 15 © 2012 NetIQ Corporation. All rights reserved.
  • 16. 16 © 2012 NetIQ Corporation. All rights reserved.
  • 17. Standards, APIs 17 © 2012 NetIQ Corporation. All rights reserved.
  • 18. Key points • Trust, brand, reputation. • Evolve from “no” people to creative “yes” people. • Do or do not. There is no try. • Security is an ecosystem across companies. • Manage risk appropriately, not compliance. • Own your security programme. • Evolving teams. • Identity = reputation, relationships, activity, actionable intelligence. • Cloud & BYOD is just IT. • Standards & APIs. 18 © 2012 NetIQ Corporation. All rights reserved.
  • 20. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2012 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other countries.