SlideShare a Scribd company logo
Eugene Pilyankevich
Chief Technical Officer, Cossack Labs
GETTING SECURE AGAINST CHALLENGES
OR
GETTING SECURITY CHALLENGES DONE
# whoami
(1997) -> #sprintnet, #x25zine, ru.nethack ;)
(2002) -> security & network engineer.
(2008) -> CTO in finance.
(2012) -> C*O in software dev company.
(2015) -> founder, CTO @ cossacklabs.com
Why security projects fail?
?
Problem 1
SOME STORIES TO START WITH
Finnish SNAFU
SOME STORIES TO START WITH
How to be smart and
fail miserably.
CONCLUSIONS?
CONCLUSIONS?
Clients are dumb!
CONCLUSIONS?
So are engineers!
Nope.
ROOT CAUSE?
VALUES.
ROOT CAUSE?
VALUES.
LANGUAGE.
ROOT CAUSE?
VALUES.
LANGUAGE.
REALITY MAPS.
ROOT CAUSE?
ROOT CAUSE –
ROOT CAUSE –
( )
ROOT CAUSE –
?
?
? ?
?
?
ROOT CAUSE –
?
?
?
?
?
?
?
?
?
ROOT CAUSE –
?
?
?
?
?
?
?
?
?


People frequently suck at 

making risk decisions under

pressure and uncertainty.
Problem 1
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security Challenges Done
Problem 2?
TWO MORE STORIES
Banking fraud prevention.
TWO MORE STORIES
Managing risk for real.
Business risk is the possibility a
company will have lower than
anticipated profits or experience 
a loss rather than taking a profit. 
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security Challenges Done
Problem 2

If you’re in an ivory tower,

no one will bother listening.
Let’s take a closer look:
client.
TAKE HARD CONTRACTS AND SURVIVE.
- Excellence is domain-specific.
TAKE HARD CONTRACTS AND SURVIVE.
- Excellence is domain-specific.
- Knowledge is not distributed evenly.

TAKE HARD CONTRACTS AND SURVIVE.
- Excellence is domain-specific.
- Knowledge is not distributed evenly.

- FUD doesn’t work.

TAKE HARD CONTRACTS AND SURVIVE.
- Excellence is domain-specific.
- Knowledge is not distributed evenly.

- FUD doesn’t work.
- Speaking in business risk - helps.
TRY WALKING IN CLIENT’S SHOES
Auditing crypto libraries for fun and profit.
Domain-specific thinking
High-level complex skills do not distribute across
all behavior, and get reinforced locally.
FUD counteracts good decisions
Scaring customer who’s facing the unknown
leads to significant decrease in quality of
decision-making.
Double-layered risk aversion
Instead of mitigating technological risks (proper
risk aversion), people avoid making decisions
about technological risks they don’t understand.
Compliance and forget
Avoiding substance of compliance
to mitigate risks?
Quid faciam?
Let’s take a closer look:
supplier.
supplier client
Who has to cross the gap?
You are to cross the gap.
Misalignment and misunderstanding
is default state anyway.
You are to cross the gap.
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security Challenges Done
Own the problems
Ownership: example
Communicate risk properly
Communicate risk properly
Technical risk, financial impact.
Communicate risk properly
Technical risk, compliance impact.
Communicate risk properly
Process risks with business impact.
Communicate risk properly
Process risks with market impact.
Lead up the chain
Lead down the chain
Lead up the chain
Leadership: Example
It’s actually fun!
Examples: talk to your manager
Examples: talk to your customer
Examples
Manager is a passthru with process
lubrication capabilities, if you take
care of the hard details.
Examples.
Manager is pain in the ass, if you
don’t take care of technical details.
Examples are sad
Praxis.
Talk human.
- Docs & business materials.

Talk human.
- Docs & business materials.
- Talk to customers soon.
Take over processes.
- Self-learning processes.
- Reinforce ownership.
Love compliance.
- PCIDSS, HIPAA, oldschool.
- GDPR.
Avoiding domain specificity.
- Multi-skilled team.
- Boring smoothie tech is relevant.
Talk real risk.
Ain’t no fun unless you find it.
web: cossacklabs.com
mail: eugene@cossacklabs.com
Thank you.

More Related Content

PPTX
BSidesSF talk: Overcoming obstacles in operationalizing security
PDF
Does title make a difference?
PPT
Ignorance Is Risk
PPTX
NZISF Talk: Six essential security services
PDF
Treating Security Like a Product
PDF
Building Security Teams
PDF
Navigating The Cyber-Security Vortex : 4 leadership imperatives
PPTX
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
BSidesSF talk: Overcoming obstacles in operationalizing security
Does title make a difference?
Ignorance Is Risk
NZISF Talk: Six essential security services
Treating Security Like a Product
Building Security Teams
Navigating The Cyber-Security Vortex : 4 leadership imperatives
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx

Similar to Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security Challenges Done (20)

PDF
James Beeson SOURCE Boston 2011
PPT
Ensuring Project Success Through Automated Risk Management
PDF
Managing Cyber and Five Other Technology Risks
PPTX
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
PPTX
GMFI Conference (3)
PPTX
Top Cybersecurity Challenges Facing Your Business
PPT
Real Life Information Security
DOCX
Why Technology Projects Fail .docx
PPT
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
PDF
cybersecurity-in-the-c-suite-a-matt
PDF
Getting A Green Light
PPTX
INFRAGARD 2014: Back to basics security
PPT
Top 10 Security Challenges
PDF
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
PDF
Building a Modern Security Engineering Organization
PPTX
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
PPT
Employees And Fraud Risks - UiTM Masters in Accounting Special Lecture
PDF
Cybersecurity report-vol-8
PPTX
Its not a bug it's a feature - Seattle B sides 2019
James Beeson SOURCE Boston 2011
Ensuring Project Success Through Automated Risk Management
Managing Cyber and Five Other Technology Risks
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
GMFI Conference (3)
Top Cybersecurity Challenges Facing Your Business
Real Life Information Security
Why Technology Projects Fail .docx
Reducing Fraud Losses through Risk Mitigation - ABF Conference on Managing Ri...
cybersecurity-in-the-c-suite-a-matt
Getting A Green Light
INFRAGARD 2014: Back to basics security
Top 10 Security Challenges
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Building a Modern Security Engineering Organization
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Employees And Fraud Risks - UiTM Masters in Accounting Special Lecture
Cybersecurity report-vol-8
Its not a bug it's a feature - Seattle B sides 2019
Ad

More from NoNameCon (20)

PDF
Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
PDF
Anastasiia Vixentael – Encryption basics [NoName CyberKids]
PDF
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
PDF
Olha Pasko - Hunting fileless malware [workshop]
PDF
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
PDF
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
PDF
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
PDF
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
PDF
Oksana Safronova - Will you detect it or not? How to check if security team i...
PDF
Bert Heitink - 10 major steps for Cybersecurity
PDF
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
PDF
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
PDF
Pavlo Zhavoronkov - What is autumn like in prison camps?
PDF
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
PDF
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
PDF
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
PDF
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
PDF
Serhii Korolenko - Passing Security By
PDF
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
PDF
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
Anastasiia Vixentael – Encryption basics [NoName CyberKids]
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
Olha Pasko - Hunting fileless malware [workshop]
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Oksana Safronova - Will you detect it or not? How to check if security team i...
Bert Heitink - 10 major steps for Cybersecurity
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Pavlo Zhavoronkov - What is autumn like in prison camps?
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Serhii Korolenko - Passing Security By
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Ad

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Machine Learning_overview_presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Approach and Philosophy of On baking technology
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Empathic Computing: Creating Shared Understanding
PPT
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
OMC Textile Division Presentation 2021.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Machine Learning_overview_presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
SOPHOS-XG Firewall Administrator PPT.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MIND Revenue Release Quarter 2 2025 Press Release
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25-Week II
TLE Review Electricity (Electricity).pptx
Approach and Philosophy of On baking technology
A comparative study of natural language inference in Swahili using monolingua...
cloud_computing_Infrastucture_as_cloud_p
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Empathic Computing: Creating Shared Understanding
Teaching material agriculture food technology

Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security Challenges Done