SlideShare a Scribd company logo
BUILDING AN EFFECTIVE SECURITY
TEAM IN 2016
SECURITY
WHO AM I?
▸ I am Mike Mackintosh
▸ On Twitter: @mikemackintosh
▸ On GitHub: @mikemackintosh
▸ I was a Principle Engineer, VZW - Infrastructure
Security
▸ I ran Security at Shutterstock
▸ I currently run Security at Signal Sciences
OBJECTIVE: SHOW THE VALUE IN BUILDING A SMART,
INTEGRATED AND BUSINESS-MINDED SECURITY TEAM
Effective security
WHAT GOES INTO MAINTAINING A SECURITY ORG?
▸ A lot.
▸ Advocating for better security practices to protect the end-user/consumer
▸ Advocating for better security practices to protect the company
▸ Supporting the internal organization’s infrastructure and applications
▸ Providing tools and knowledge to employees to help support security-driven
development
▸ Making sure the company doesn’t get hacked isn’t a goal, it’s a byproduct
ARE YOU THINKING TO YOURSELF “WE DON’T HAVE A BIG SECURITY TEAM”
▸ Actually, you probably don’t have a security team at all…
▸ Or at least not an effective team
GREAT NEWS!
▸ You don’t need a traditional silo’d security team working on secret projects that
no one else in the company knows about.
▸ You need to make security more visible
▸ If integrating services into your web app makes them better, so can integrating
security teams with other business units
ULTIMATE SECTEAM LIFE-HACK
▸ Hire security-focused people with skills in different business units, and attach
them to those units.
▸ Don’t look at me sideways, look at me with batted eyelids
Effective security
NO MORE OF THIS
▸ The following used to run directly under Director/VP of Security/CISO
▸ Application Security Engineers
▸ Security Operation Engineers
▸ Risk Assessment Engineers
▸ Information Security Engineers
BUT THAT’S A BIG SECURITY TEAM
▸ You’re right. And sometimes, especially in smaller businesses, there’s not a
CONSTANT need for a ________ security engineer.
▸ That’s actually O.K.
▸ Instead, hire the same amount of security engineers, but have them benefit the
business in other ways too.
WHY WOULD THIS
WORK?
BECAUSE THEY CAN NOW HAVE KICKASS TEAM NAMES AND LOGOS.
SERIOUSLY, IT CREATES A SENSE OF PRIDE AND A “FREE” SOURCE OF
MOTIVATION.
WHERE DO THE SECURITY-RELATED RESPONSIBILITIES LIVE?
▸ Product Security - Defined by the use of existing sales, frontend, and application engineers that work on customer features
to fix security issues. Security responsibilities include:
▸ AppSec
▸ Brand Integrity
▸ Bug Bounties
▸ Corporate Security - Infrastructure and Information security engineers responsible for the security at a device/node level,
which can serve many responsibilities of Ops and traditional IT teams:
▸ Infrastructure Hardening (opsy-style things)
▸ Endpoint Defense (endpoints, firewalls, etc)
▸ Automation
▸ Training
WHAT DO THE SECURITY OUTFITS BECOME?
▸ Security Planning - Planning is made up of security risk assessors and/or
analysts and fit perfectly with a team under the CFO or Legal. These people are
responsible for identifying and protecting against literal financial attacks.
▸ Security Tooling - Security tooling is one of the most valuable assets to a
company by means of increasing productivity for the company while creating
the toolsets required for both security and non-security personnel to complete
their jobs.
COMPLIANCE IS NOT A SECURITY PROBLEM
▸ Compliance != Security
▸ Sometimes being compliant makes things more secure
▸ Sometimes being more secure makes things compliant
▸ Validating the integrity of scan results could be useful with a security team; but
the security team should not be making/implementing all the changes to
enforce compliance
▸ Security leadership should be an enabler, not a doer.
WHY SHOULD THEY REPORT WITHIN THE BUSINESS ORG TREE?
▸ Security is not a joke. People lose jobs because companies tank because
people don’t take security seriously.
▸ Having security leadership in any team is important, and that leadership is best
prepared and equipped for handling both technical and personal incidents.
▸ Engineering, ops, and other leadership historically have interest in keeping up
with product demands, regardless of security concerns.
▸ Security must adapt with a companies’ move to a more cross-functional
culture, and begin embedding with other parts of the org
HOW WOULD THIS HELP?
▸ Because security teams using sprints are the worst… They’re just the worst…
▸ An engineering team using sprints is pretty effective.
▸ An engineering team that has a dedicated security engineer working within a
sprint while ensuring the product doesn’t outpace security posture is the most
effective use of the companies time and money.
▸ Turn bug fixes and incident response into learning experiences for the devs, ops
and sales.
▸ It’s better than patching fixes after massive amounts of public embarrassment.
I STILL DON’T GET IT
▸ You have to hire engineers to work on your product and you have to hire
people in sales as well as operations.
▸ Have one person from each of those teams report to your security team lead.
▸ This planted security engineer can help deliver company wide goals with the
product or internal milestones while supporting that smaller team’s security
requirements.
WHAT YOUR FLOW LOOKS LIKE
RIGHT NOW (IF YOU HAVE ONE) LOL
Effective security
WHAT YOUR FLOW WILL LOOK
LIKE (IF YOU LISTEN TO ME)
Effective security
WHY WOULD I DO THIS?
▸ Your attackers are motivated by success.
▸ Your employees are motivated by success.
SUCCESS CAN BE…
financial: bug bounty payout, raise,
bonus, promotion, selling stolen
goods on the `dark` web
SUCCESS CAN BE…
Recognition: bug bounty attribution,
peer recognition (giving `props`)
SUCCESS CAN BE…
Thrill and Knowledge: learning
something new, solving an
`impossible` challenge
EMPLOYEES ARE MOTIVATED
▸ If you are in a leadership position, find your motivated employees.
▸ If you are motivated, find your manager.
▸ Inspiration + Motivation = Success
MOTIVATE YOUR EMPLOYEES WITH SUCCESS TO PREVENT A SUCCESSFUL ATTACKER
YOU JUST TRIPLED YOUR SECURITY COVERAGE BY NOT HIRING ANYONE
▸ All you needed to do was a simple reorg.
▸ Tasks need to be completed. People need to complete them.
▸ Have a security SME for that area work with the team to deliver on company
goals and disseminate their security knowledge while allowing someone to
advocate for them.
▸ They won’t always be understood by traditional managers.
▸ Having security leadership support them creates a successful secure
environment.
AND GIVE OUT T-SHIRTS
People. Love. Swag.
Effective security

More Related Content

PDF
Andrew Vermes - You are antifragility
PPTX
Prove it, ship it! - XP2010 Lightning talk
PDF
The Security Ecosystem
PDF
PDF
Shedding Light Onto the Top 6 Threat Modeling Misconceptions
PPTX
7 Must Follow Steps For Safe and Secured Workplace
Andrew Vermes - You are antifragility
Prove it, ship it! - XP2010 Lightning talk
The Security Ecosystem
Shedding Light Onto the Top 6 Threat Modeling Misconceptions
7 Must Follow Steps For Safe and Secured Workplace

Viewers also liked (16)

PDF
Reference Letter
PDF
Material Engineer Experience -Aljmi
PPTX
Feliz día de la madre
PPT
117 o senhor salva...
PDF
Lifejacket
PDF
Recommendation Letter SS
DOCX
Nuevo documento de microsoft word
DOCX
Helen Certificate 2
PPTX
Qué es un virus informático
PPTX
Omayma tommouhi 1r a
PPTX
Diodos
DOC
Amina
PPTX
mariposas
PDF
6633u.pdf
PPT
T&L Starters
DOCX
Eletrônicos santa efigenia são paulo telefones
Reference Letter
Material Engineer Experience -Aljmi
Feliz día de la madre
117 o senhor salva...
Lifejacket
Recommendation Letter SS
Nuevo documento de microsoft word
Helen Certificate 2
Qué es un virus informático
Omayma tommouhi 1r a
Diodos
Amina
mariposas
6633u.pdf
T&L Starters
Eletrônicos santa efigenia são paulo telefones
Ad

Similar to Effective security (20)

PDF
Building Security Teams
PPTX
Agile security
PPT
Cyber Security integration
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PPTX
2019 Metro Atlanta ISSA Conference - Cyber Security Careers
PDF
Hard Truths your CISO won’t tell you.pdf
PPTX
How to balance between Security and Agile Development
PPTX
Security management concepts and principles
PDF
Agile Relevance in the age of Continuous Everything ....
PDF
2005 issa journal-risk-management
PPTX
Successful DevSecOps Organizations - by Dawid Balut
PPTX
2021 BSides Tampa Cyber Security Careers
PPTX
Lean Security - LASCON 2016
PPTX
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
PPTX
SCS DevSecOps Seminar - State of DevSecOps
PDF
Building Security Into Your Cloud IT Practices
PPTX
The Journey to DevSecOps
PPTX
The Journey to DevSecOps
PPTX
ISACA Ireland Keynote 2015
PDF
7 Things Every Ceo Should Know About Information Security
Building Security Teams
Agile security
Cyber Security integration
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
2019 Metro Atlanta ISSA Conference - Cyber Security Careers
Hard Truths your CISO won’t tell you.pdf
How to balance between Security and Agile Development
Security management concepts and principles
Agile Relevance in the age of Continuous Everything ....
2005 issa journal-risk-management
Successful DevSecOps Organizations - by Dawid Balut
2021 BSides Tampa Cyber Security Careers
Lean Security - LASCON 2016
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
SCS DevSecOps Seminar - State of DevSecOps
Building Security Into Your Cloud IT Practices
The Journey to DevSecOps
The Journey to DevSecOps
ISACA Ireland Keynote 2015
7 Things Every Ceo Should Know About Information Security
Ad

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
Getting Started with Data Integration: FME Form 101
cloud_computing_Infrastucture_as_cloud_p
NewMind AI Weekly Chronicles - August'25-Week II
Group 1 Presentation -Planning and Decision Making .pptx
OMC Textile Division Presentation 2021.pptx
Hybrid model detection and classification of lung cancer
1 - Historical Antecedents, Social Consideration.pdf
MIND Revenue Release Quarter 2 2025 Press Release
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Heart disease approach using modified random forest and particle swarm optimi...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Zenith AI: Advanced Artificial Intelligence
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A Presentation on Artificial Intelligence
Encapsulation_ Review paper, used for researhc scholars
SOPHOS-XG Firewall Administrator PPT.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Enhancing emotion recognition model for a student engagement use case through...

Effective security

  • 1. BUILDING AN EFFECTIVE SECURITY TEAM IN 2016 SECURITY
  • 2. WHO AM I? ▸ I am Mike Mackintosh ▸ On Twitter: @mikemackintosh ▸ On GitHub: @mikemackintosh ▸ I was a Principle Engineer, VZW - Infrastructure Security ▸ I ran Security at Shutterstock ▸ I currently run Security at Signal Sciences
  • 3. OBJECTIVE: SHOW THE VALUE IN BUILDING A SMART, INTEGRATED AND BUSINESS-MINDED SECURITY TEAM
  • 5. WHAT GOES INTO MAINTAINING A SECURITY ORG? ▸ A lot. ▸ Advocating for better security practices to protect the end-user/consumer ▸ Advocating for better security practices to protect the company ▸ Supporting the internal organization’s infrastructure and applications ▸ Providing tools and knowledge to employees to help support security-driven development ▸ Making sure the company doesn’t get hacked isn’t a goal, it’s a byproduct
  • 6. ARE YOU THINKING TO YOURSELF “WE DON’T HAVE A BIG SECURITY TEAM” ▸ Actually, you probably don’t have a security team at all… ▸ Or at least not an effective team
  • 7. GREAT NEWS! ▸ You don’t need a traditional silo’d security team working on secret projects that no one else in the company knows about. ▸ You need to make security more visible ▸ If integrating services into your web app makes them better, so can integrating security teams with other business units
  • 8. ULTIMATE SECTEAM LIFE-HACK ▸ Hire security-focused people with skills in different business units, and attach them to those units. ▸ Don’t look at me sideways, look at me with batted eyelids
  • 10. NO MORE OF THIS ▸ The following used to run directly under Director/VP of Security/CISO ▸ Application Security Engineers ▸ Security Operation Engineers ▸ Risk Assessment Engineers ▸ Information Security Engineers
  • 11. BUT THAT’S A BIG SECURITY TEAM ▸ You’re right. And sometimes, especially in smaller businesses, there’s not a CONSTANT need for a ________ security engineer. ▸ That’s actually O.K. ▸ Instead, hire the same amount of security engineers, but have them benefit the business in other ways too.
  • 12. WHY WOULD THIS WORK? BECAUSE THEY CAN NOW HAVE KICKASS TEAM NAMES AND LOGOS. SERIOUSLY, IT CREATES A SENSE OF PRIDE AND A “FREE” SOURCE OF MOTIVATION.
  • 13. WHERE DO THE SECURITY-RELATED RESPONSIBILITIES LIVE? ▸ Product Security - Defined by the use of existing sales, frontend, and application engineers that work on customer features to fix security issues. Security responsibilities include: ▸ AppSec ▸ Brand Integrity ▸ Bug Bounties ▸ Corporate Security - Infrastructure and Information security engineers responsible for the security at a device/node level, which can serve many responsibilities of Ops and traditional IT teams: ▸ Infrastructure Hardening (opsy-style things) ▸ Endpoint Defense (endpoints, firewalls, etc) ▸ Automation ▸ Training
  • 14. WHAT DO THE SECURITY OUTFITS BECOME? ▸ Security Planning - Planning is made up of security risk assessors and/or analysts and fit perfectly with a team under the CFO or Legal. These people are responsible for identifying and protecting against literal financial attacks. ▸ Security Tooling - Security tooling is one of the most valuable assets to a company by means of increasing productivity for the company while creating the toolsets required for both security and non-security personnel to complete their jobs.
  • 15. COMPLIANCE IS NOT A SECURITY PROBLEM ▸ Compliance != Security ▸ Sometimes being compliant makes things more secure ▸ Sometimes being more secure makes things compliant ▸ Validating the integrity of scan results could be useful with a security team; but the security team should not be making/implementing all the changes to enforce compliance ▸ Security leadership should be an enabler, not a doer.
  • 16. WHY SHOULD THEY REPORT WITHIN THE BUSINESS ORG TREE? ▸ Security is not a joke. People lose jobs because companies tank because people don’t take security seriously. ▸ Having security leadership in any team is important, and that leadership is best prepared and equipped for handling both technical and personal incidents. ▸ Engineering, ops, and other leadership historically have interest in keeping up with product demands, regardless of security concerns. ▸ Security must adapt with a companies’ move to a more cross-functional culture, and begin embedding with other parts of the org
  • 17. HOW WOULD THIS HELP? ▸ Because security teams using sprints are the worst… They’re just the worst… ▸ An engineering team using sprints is pretty effective. ▸ An engineering team that has a dedicated security engineer working within a sprint while ensuring the product doesn’t outpace security posture is the most effective use of the companies time and money. ▸ Turn bug fixes and incident response into learning experiences for the devs, ops and sales. ▸ It’s better than patching fixes after massive amounts of public embarrassment.
  • 18. I STILL DON’T GET IT ▸ You have to hire engineers to work on your product and you have to hire people in sales as well as operations. ▸ Have one person from each of those teams report to your security team lead. ▸ This planted security engineer can help deliver company wide goals with the product or internal milestones while supporting that smaller team’s security requirements.
  • 19. WHAT YOUR FLOW LOOKS LIKE RIGHT NOW (IF YOU HAVE ONE) LOL
  • 21. WHAT YOUR FLOW WILL LOOK LIKE (IF YOU LISTEN TO ME)
  • 23. WHY WOULD I DO THIS? ▸ Your attackers are motivated by success. ▸ Your employees are motivated by success.
  • 24. SUCCESS CAN BE… financial: bug bounty payout, raise, bonus, promotion, selling stolen goods on the `dark` web
  • 25. SUCCESS CAN BE… Recognition: bug bounty attribution, peer recognition (giving `props`)
  • 26. SUCCESS CAN BE… Thrill and Knowledge: learning something new, solving an `impossible` challenge
  • 27. EMPLOYEES ARE MOTIVATED ▸ If you are in a leadership position, find your motivated employees. ▸ If you are motivated, find your manager. ▸ Inspiration + Motivation = Success MOTIVATE YOUR EMPLOYEES WITH SUCCESS TO PREVENT A SUCCESSFUL ATTACKER
  • 28. YOU JUST TRIPLED YOUR SECURITY COVERAGE BY NOT HIRING ANYONE ▸ All you needed to do was a simple reorg. ▸ Tasks need to be completed. People need to complete them. ▸ Have a security SME for that area work with the team to deliver on company goals and disseminate their security knowledge while allowing someone to advocate for them. ▸ They won’t always be understood by traditional managers. ▸ Having security leadership support them creates a successful secure environment.
  • 29. AND GIVE OUT T-SHIRTS People. Love. Swag.