SlideShare a Scribd company logo
The San Antonio Security Community
– Past, Present and Future

         John B. Dickson, CISSP
Denim Group Background

•   Privately-held, professional services organization that builds secure
    software and mitigates risk of existing software
•   Takes a software-centric perspective on application security
     – All consultants regularly build software systems
     – Approach the problem of software security from a developers viewpoint
     – Secure development methodology used on all software builds
•   Solving the secure remediation challenge
     – The next “hard” problem in application security
•   Thought Leaders in Secure Development Practices
     – Developed Sprajax – First Open Source AJAX vulnerability scanner
     – Regular speakers at RSA, OWASP, CSI
     – OWASP National Leaders




                                                                               1
My Background

•   Ex-Air Force Officer
     – ESC, AFIWC, AFCERT
•   Entrepreneur
•   Security Practitioner
           y
     – Commercial Experience at Trident Data Systems, KPMG, SecureLogix, Denim
       Group
•   Founder and Former Chairman of SATAI & Past Chair of the North
    Chamber




                                                                                 2
Cluster Theory and San Antonio’s Security Community

•   Michael Porter’s Cluster Theory of Economic Development
     – A Cluster: geographic concentration of competing and cooperating companies,
       suppliers, service providers and associated institutions
•   Sophisticated clusters produce an ecosystem of activity
•   Examples:
     – Silicon Valley semiconductor industry
     – Hollywood film industry
•   Cluster theory central to competitiveness




                                                                                     3
The Springs from which much flowed…




                                      Emerging
                                      Security
                                      Community
                                      in San
                                      Antonio




                                                  4
Cluster Theory and San Antonio’s Security Community

•   Economic analysis prepared by Silicon Valley think tank ICF
    Consulting led by Jim Gollub
•   Delivered in July 2000 for:
     – The City of San Antonio, Economic Development Department
     – San Antonio Technology Accelerator Initiative
•   Captured an “emerging cluster” of IT activity centered around
    information security
•   “In order for San Antonio to economically benefit from the wealth of
    competency in information security expertise, economic inputs must
    be aligned to make it advantageous for local entrepreneurs to stay in
    the region”




                                                                            5
The Higher Education Component – A Crown Jewel
•   UTSA’s Center for Infrastructure Assurance and Security (CIAS)
    – Established 2001
    – Certified by NSA as a Center of Academic Excellence in Information Assurance
      Education 2002
    – Missions
        • Cyber Security Exercise Programs
        • Cyber Security Training
        • Cyber Defense Competitions
    – Governor’s Emerging Technology Fund
•   St. Mary’s
    St Mary s Center for Terrorism Law
•   OLLU InfoSec Program
•   ACCD and the Information Technology & Security Academy



                                                                                     6
Early Case Studies of Successes

•   WheelGroup Corporation
    –   NetRanger: First commercial network intrusion detection technology
    –   Acquired by Cisco Systems for $124m in February 1998
    –   First successful security firm liquidity event
    –   Founders turned around and founded SecureLogix Corporation in San Antonio
•   Secure Network Consulting, Inc
                   Consulting Inc.,
    – Led by ex-Air Force and Trident Data Systems security consultants
    – Acquired by Axent Technologies, who subsequently were acquired by Symantec




                                                                                    7
Immediate Impact of Air Force Decision
•   Reaffirms what we know in San Antonio
    – Critical mass of talents, technologies, and higher ed framework
    – Elected officials and business leaders now acknowledge importance
    – Growing sense that this is an economic development opportunity for our community
•   600+ new jobs
    – Air Force active duty and civilian positions
    – Indirect jobs via contracts
•   Immediate impact on DoD community perception
•   Increased interest in contractor community outside SA




                                                                                         8
The Possibilities Going Forward
•   Expand relocation of national contractors to San Antonio
     – SRC, SAIC, CSC, BAH, et. al.
•   Increase expansion of cyber security missions at:
    I              i    f b          it   i i      t
     – NSA Texas
     – 24th AF
     – Other units
•   Expand of R&D contract dollars via the 24th AF
     – Replace the IW Battlelab?
•   Increase R&D and commercialization via UTSA and others
     – New commercial companies based on intellectual property spun out
•   Communicate to the world that we have are a cyber security leader
•   Pursue additional ETF opportunities
    P       dditi   l          t iti

                                                                          9
The ISSA Chapter – How it can Contribute
•   Current
    – Conducting educational meetings on security topics of interest
    – Networking via monthly meetings
    – Success stories…
•   Future (proposed)
    – Grow the next generation of security leadership in San Antonio
    – Help connect various security interests – cross pollination of security components in
      San Antonio
    – Increase profile of San Antonio via ISSA national
    – Attract higher profile speakers
    – Increase DoD presence!
    – Increase identification outside of the security community




                                                                                              10
Contact Information

•   John B. Dickson, CISSP
    – john@denimgroup.com
    – Twitter @johnbdickson

    www.denimgroup.com
    http://denimgroup.typepad.com/
       p        g p yp p




                                     11

More Related Content

PDF
ISACA Canberra 30th annivesary press release
PDF
ISACA Canberra 30th annivesary press release
PPTX
Achieving Caribbean Cybersecuirty
PDF
Building Cyber Resilience in the Digital Economy
PDF
Minimizing cyber security risks – Digital Security School DSS380
PPTX
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
PPTX
ICO Presentation - Data Protection
PPTX
Can Cyber Insurance Enforce Change in Enterprise GRC
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
Achieving Caribbean Cybersecuirty
Building Cyber Resilience in the Digital Economy
Minimizing cyber security risks – Digital Security School DSS380
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
ICO Presentation - Data Protection
Can Cyber Insurance Enforce Change in Enterprise GRC

What's hot (19)

PPTX
PDF
Data Security in the Insurance Industry: what you need to know about data pro...
PDF
Improved-Cybersecurity-cooperation
PDF
Cyphra - Cyber Security
PDF
Journey to cyber resilience
PDF
Singapore Cybersecurity Strategy and Legislation (2018)
PPTX
Cybersecurity-Real World Approach FINAL 2-24-16
PDF
Cyber Resilience: A New Perspective on Security
PDF
Singapore's National Cyber Security Strategy
PDF
Cybersecurity for Critical National Information Infrastructure
PDF
Personal cyber safety
PPTX
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
PDF
Overview of national cybercrime strategies
PPTX
CSO Magazine Confab 2013 Atlanta - Cyber Security
PDF
IGPC Data Breach Planning braindump
PPTX
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
PDF
Cyber security-in-india-present-status
PDF
BCS ITNow 201403 - Data Loss Prevention
PDF
Global Perspective Cyberlaw, Regulations and Compliance
Data Security in the Insurance Industry: what you need to know about data pro...
Improved-Cybersecurity-cooperation
Cyphra - Cyber Security
Journey to cyber resilience
Singapore Cybersecurity Strategy and Legislation (2018)
Cybersecurity-Real World Approach FINAL 2-24-16
Cyber Resilience: A New Perspective on Security
Singapore's National Cyber Security Strategy
Cybersecurity for Critical National Information Infrastructure
Personal cyber safety
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
Overview of national cybercrime strategies
CSO Magazine Confab 2013 Atlanta - Cyber Security
IGPC Data Breach Planning braindump
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
Cyber security-in-india-present-status
BCS ITNow 201403 - Data Loss Prevention
Global Perspective Cyberlaw, Regulations and Compliance
Ad

Similar to San Antonio Security Community (20)

DOCX
Cover Story Commentary
DOCX
Running head IT SECURITY POLICYIT SECURITY POLICY .docx
PDF
The Cybersecurity Mess
PDF
Cyber Security: Protecting Today's Mission Critical Public Safety Networks
PDF
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
PPTX
Homeland Open Security Technologies (HOST)
DOCX
The man behind the city
PDF
Is3 Capabilities Brief
PPT
Disaster Risk Management in the Information Age
PPT
Infrastructure Security by Sivamurthy Hiremath
PDF
Asymmetric threat 5_paper
PDF
IGSS Corporate Briefing
PPT
TOTEM: Threat Observation, Tracking, and Evaluation Model
PDF
S C A D A Security Keynote C K
PDF
2017 Industry of Things World USA, San Diego CA
PPTX
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
PDF
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
PDF
Information Assurance/USTRANSCOM’s Information Assurance Fusion Center
PDF
DNS Cybersecurity in 2012-2015
PDF
Cybersecurity for modern industrial systems
Cover Story Commentary
Running head IT SECURITY POLICYIT SECURITY POLICY .docx
The Cybersecurity Mess
Cyber Security: Protecting Today's Mission Critical Public Safety Networks
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Homeland Open Security Technologies (HOST)
The man behind the city
Is3 Capabilities Brief
Disaster Risk Management in the Information Age
Infrastructure Security by Sivamurthy Hiremath
Asymmetric threat 5_paper
IGSS Corporate Briefing
TOTEM: Threat Observation, Tracking, and Evaluation Model
S C A D A Security Keynote C K
2017 Industry of Things World USA, San Diego CA
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Information Assurance/USTRANSCOM’s Information Assurance Fusion Center
DNS Cybersecurity in 2012-2015
Cybersecurity for modern industrial systems
Ad

More from Denim Group (20)

PDF
Long-term Impact of Log4J
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PDF
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
PDF
Application Asset Management with ThreadFix
PDF
OWASP San Antonio Meeting 10/2/20
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
PDF
Using Collaboration to Make Application Vulnerability Management a Team Sport
PDF
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
PDF
Security Champions: Pushing Security Expertise to the Edges of Your Organization
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
PDF
An Updated Take: Threat Modeling for IoT Systems
PPTX
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
PDF
A New View of Your Application Security Program with Snyk and ThreadFix
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
PDF
AppSec in a World of Digital Transformation
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
PDF
AppSec in a World of Digital Transformation
PDF
Enumerating Enterprise Attack Surface
Long-term Impact of Log4J
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Application Asset Management with ThreadFix
OWASP San Antonio Meeting 10/2/20
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
Using Collaboration to Make Application Vulnerability Management a Team Sport
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Security Champions: Pushing Security Expertise to the Edges of Your Organization
The As, Bs, and Four Cs of Testing Cloud-Native Applications
An Updated Take: Threat Modeling for IoT Systems
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
A New View of Your Application Security Program with Snyk and ThreadFix
Enabling Developers in Your Application Security Program With Coverity and Th...
AppSec in a World of Digital Transformation
The As, Bs, and Four Cs of Testing Cloud-Native Applications
Enabling Developers in Your Application Security Program With Coverity and Th...
AppSec in a World of Digital Transformation
Enumerating Enterprise Attack Surface

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation theory and applications.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Machine learning based COVID-19 study performance prediction
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Building Integrated photovoltaic BIPV_UPV.pdf
Unlocking AI with Model Context Protocol (MCP)
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation_ Review paper, used for researhc scholars
Dropbox Q2 2025 Financial Results & Investor Presentation
Network Security Unit 5.pdf for BCA BBA.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation theory and applications.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”

San Antonio Security Community

  • 1. The San Antonio Security Community – Past, Present and Future John B. Dickson, CISSP
  • 2. Denim Group Background • Privately-held, professional services organization that builds secure software and mitigates risk of existing software • Takes a software-centric perspective on application security – All consultants regularly build software systems – Approach the problem of software security from a developers viewpoint – Secure development methodology used on all software builds • Solving the secure remediation challenge – The next “hard” problem in application security • Thought Leaders in Secure Development Practices – Developed Sprajax – First Open Source AJAX vulnerability scanner – Regular speakers at RSA, OWASP, CSI – OWASP National Leaders 1
  • 3. My Background • Ex-Air Force Officer – ESC, AFIWC, AFCERT • Entrepreneur • Security Practitioner y – Commercial Experience at Trident Data Systems, KPMG, SecureLogix, Denim Group • Founder and Former Chairman of SATAI & Past Chair of the North Chamber 2
  • 4. Cluster Theory and San Antonio’s Security Community • Michael Porter’s Cluster Theory of Economic Development – A Cluster: geographic concentration of competing and cooperating companies, suppliers, service providers and associated institutions • Sophisticated clusters produce an ecosystem of activity • Examples: – Silicon Valley semiconductor industry – Hollywood film industry • Cluster theory central to competitiveness 3
  • 5. The Springs from which much flowed… Emerging Security Community in San Antonio 4
  • 6. Cluster Theory and San Antonio’s Security Community • Economic analysis prepared by Silicon Valley think tank ICF Consulting led by Jim Gollub • Delivered in July 2000 for: – The City of San Antonio, Economic Development Department – San Antonio Technology Accelerator Initiative • Captured an “emerging cluster” of IT activity centered around information security • “In order for San Antonio to economically benefit from the wealth of competency in information security expertise, economic inputs must be aligned to make it advantageous for local entrepreneurs to stay in the region” 5
  • 7. The Higher Education Component – A Crown Jewel • UTSA’s Center for Infrastructure Assurance and Security (CIAS) – Established 2001 – Certified by NSA as a Center of Academic Excellence in Information Assurance Education 2002 – Missions • Cyber Security Exercise Programs • Cyber Security Training • Cyber Defense Competitions – Governor’s Emerging Technology Fund • St. Mary’s St Mary s Center for Terrorism Law • OLLU InfoSec Program • ACCD and the Information Technology & Security Academy 6
  • 8. Early Case Studies of Successes • WheelGroup Corporation – NetRanger: First commercial network intrusion detection technology – Acquired by Cisco Systems for $124m in February 1998 – First successful security firm liquidity event – Founders turned around and founded SecureLogix Corporation in San Antonio • Secure Network Consulting, Inc Consulting Inc., – Led by ex-Air Force and Trident Data Systems security consultants – Acquired by Axent Technologies, who subsequently were acquired by Symantec 7
  • 9. Immediate Impact of Air Force Decision • Reaffirms what we know in San Antonio – Critical mass of talents, technologies, and higher ed framework – Elected officials and business leaders now acknowledge importance – Growing sense that this is an economic development opportunity for our community • 600+ new jobs – Air Force active duty and civilian positions – Indirect jobs via contracts • Immediate impact on DoD community perception • Increased interest in contractor community outside SA 8
  • 10. The Possibilities Going Forward • Expand relocation of national contractors to San Antonio – SRC, SAIC, CSC, BAH, et. al. • Increase expansion of cyber security missions at: I i f b it i i t – NSA Texas – 24th AF – Other units • Expand of R&D contract dollars via the 24th AF – Replace the IW Battlelab? • Increase R&D and commercialization via UTSA and others – New commercial companies based on intellectual property spun out • Communicate to the world that we have are a cyber security leader • Pursue additional ETF opportunities P dditi l t iti 9
  • 11. The ISSA Chapter – How it can Contribute • Current – Conducting educational meetings on security topics of interest – Networking via monthly meetings – Success stories… • Future (proposed) – Grow the next generation of security leadership in San Antonio – Help connect various security interests – cross pollination of security components in San Antonio – Increase profile of San Antonio via ISSA national – Attract higher profile speakers – Increase DoD presence! – Increase identification outside of the security community 10
  • 12. Contact Information • John B. Dickson, CISSP – john@denimgroup.com – Twitter @johnbdickson www.denimgroup.com http://denimgroup.typepad.com/ p g p yp p 11