SlideShare a Scribd company logo
Security by default -
is it possible?
Are we on the edge of the abyss
Today
● Why?
● Resilience
● Building Blocks
● Future
“Cyber resilience refers to an
entity's ability to continuously deliver
the intended outcome despite
adverse cyber events.”
Source: https://norse-corp.com/map/
Security by default - Building continuous cyber-resilience.
Traditional Software Security
● Risk analysis
● Give security requirements
● Set infrastructure standards
● Define compliance & policies
A lot of changes
Who is taking care of security?
“We need a cybersecurity renaissance in
this country that promotes cyber hygiene
and a security centric corporate culture
applied and continuously reinforced by
peer pressure”
- James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology
● Direct and Indirect attacks
● Privacy vs Transparency
● How do you control social media?
○ Hint: Consider carefully
● Did you find GDPR difficult?
○ Or are you just hoping no-one looks
● Someone or something intelligent is out there
Here’s looking at you…!
Resilience during
exponential change
40 years of
Processor
Performance
Source: John Hennessey and David Patterson, Computer Architecture A Quantitative Approach, 2018
Security by default - Building continuous cyber-resilience.
What is resilience
Cyber resilience helps businesses to recognize that
hackers have the advantage of innovative tools, element of
surprise, target and can be successful in their attempt.
This concept helps business to prepare, prevent, respond
and successfully recover to the intended secure state. This
is a cultural shift as the organization sees security as a
full-time job and embedded security best practices in
day-to-day operations. In comparison to cyber security,
cyber resilience requires the business to think differently
and be more agile on handling attacks.
Resilience during
exponential change
CD: Fundamental building block
Commit
Stage
Compile
Unit Test
Analysis
Build Installers
Automated
Capacity
Testing
Automated
Acceptance
Testing
Manual
Testing
Showcases
Exploratory
Testing
Release
Security by default - Building continuous cyber-resilience.
Product Owner
Experience Designer
Business Analyst
Developer
Tech lead
Project Manager
Security Analyst
Infrastructure Consultant
Build security in: Everyone responsible
QA
Security by default - Building continuous cyber-resilience.
Risk
“If you know almost nothing, almost
anything will tell you something”
- Douglas W. Hubbard
Risk: Quantify
not Qualify
We need to maintain
the balance of
acceptable risk
Inherent Risk – Impact Assessment?
● What data is stored or processed by system?
● What is the reason for storing?
● What is the sensitivity?
● What services are provided by the system?
● What is the purpose of those services?
● What is the sensitivity? (Business critical? Safety sensitive?)
● What types of users or third parties interact with the system
○ What is the purpose these interactions?
○ What can we say about our trust these users or third parties?
Source: https://logrhythm.com/blog/what-is-the-zero-trust-model-for-cybersecurity/
Zero Trust Architecture, also referred to as Zero Trust
Network or simply Zero Trust, refers to security concepts
and threat model that no longer assumes that actors,
systems or services operating from within the security
perimeter should be automatically trusted, and instead
must verify anything and everything trying to connect to
its systems before granting access.
The end of simplicity
How the future is more complex than it might
appear
A complex adaptive system is a system
in which a perfect understanding of the
individual parts does not automatically
convey a perfect understanding of the
whole system's behaviour.
-Miller et. al 2007
Butterfly Effect
Butterfly Effect
Emergence
Adaption
Source: Hiroki Sayama, D.Sc., Collective Dynamics of Complex Systems (CoCo) Research Group
at Binghamton University, State University of New York
Security by default - Building continuous cyber-resilience.
Security by default - Building continuous cyber-resilience.
Dave Elliman
Global Head of Technology, ThoughtWorks
Thank you

More Related Content

PPTX
Alice has a Blue Car: Beginning the Conversation Around Ethically Aware Decis...
PDF
Do No Harm: Do Technologists Need a Code of Ethics?
PDF
Hardware is hard(er)
PPTX
Technology Radar Webinar UK - Vol. 22
PDF
The layperson's guide to software architecture
PPTX
Security and Mobility Co Create Week Jakarta
PPTX
Super Symposium - Art of the possible
PPTX
EXTENT-2017: Putting AI to Test
Alice has a Blue Car: Beginning the Conversation Around Ethically Aware Decis...
Do No Harm: Do Technologists Need a Code of Ethics?
Hardware is hard(er)
Technology Radar Webinar UK - Vol. 22
The layperson's guide to software architecture
Security and Mobility Co Create Week Jakarta
Super Symposium - Art of the possible
EXTENT-2017: Putting AI to Test

What's hot (20)

PDF
Designers, Developers & Dogs
PDF
Playing Nice in the Product Playground #StrataHadoop
PDF
Project Guidelines
PPT
Semantech Inc. InnovationWorx
PPTX
Grasping the Future: Virtual Hands Control for Fine Motor Tasks
PDF
IoT Meetup Stockholm - Designing Connected Products
PDF
NUS-ISS Learning Day 2019-The Power of Data Visualisation
PPT
O'Reilly Webcast: Ten Things Every Software Architect Should Know
PDF
Designing Connected Products - Web Directions 2015 Sydney
PDF
Prototyping Experiences for Connected Products
PPTX
Decision Intelligence: How AI and DI (and YOU) are Evolving to the Next Level
PPTX
Semantech 2014 Corporate Capabilties
PDF
Why So Many ML Models Don't Make It To Production?
PDF
When we design together
PDF
SDNs for the Enterprise
PDF
Design Thinking for Data Science #StrataHadoop
PDF
Customer-centric innovation enabled by cloud
PDF
What is a Creative Technologist?
PDF
Why happier developers create more secure code
PDF
Machine Learning for Product Managers
Designers, Developers & Dogs
Playing Nice in the Product Playground #StrataHadoop
Project Guidelines
Semantech Inc. InnovationWorx
Grasping the Future: Virtual Hands Control for Fine Motor Tasks
IoT Meetup Stockholm - Designing Connected Products
NUS-ISS Learning Day 2019-The Power of Data Visualisation
O'Reilly Webcast: Ten Things Every Software Architect Should Know
Designing Connected Products - Web Directions 2015 Sydney
Prototyping Experiences for Connected Products
Decision Intelligence: How AI and DI (and YOU) are Evolving to the Next Level
Semantech 2014 Corporate Capabilties
Why So Many ML Models Don't Make It To Production?
When we design together
SDNs for the Enterprise
Design Thinking for Data Science #StrataHadoop
Customer-centric innovation enabled by cloud
What is a Creative Technologist?
Why happier developers create more secure code
Machine Learning for Product Managers
Ad

Similar to Security by default - Building continuous cyber-resilience. (20)

PPTX
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
PDF
David Bray - Why Cyber-Resiliency Matters: Unprecedented Exponential Changes
PDF
Introduction to Cyber Resilience
PDF
Presentation- Introduction to Cybersecurity.pdf
PDF
2019 10-22 axio - taking control of cyber risk - grid-seccon
PPTX
The 2018 Threatscape
PDF
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
PPTX
Jack Whitsitt - Yours, Anecdotally
PPTX
Robert Lentz - CSO Perspectives Roadshow 2016
PDF
The Evolution of Cybersecurity in Software Development for 2025
PPTX
Iurii Garasym. The future crimes and predestination of cyber security. Though...
PDF
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
PPTX
The Open Group - ZT Commandments and Reference Model.pptx
PPTX
Architecting trust in the digital landscape, or lack thereof
PPTX
NZISF Talk: Six essential security services
PPT
December ISSA Meeting Executive Security Presentation
PDF
Cybersecurity Basics - Aravindr.com
PDF
ScotSecure Cyber Security Summit 2025 Edinburgh
PPTX
Zero-Trust-Architecture-Reimagining-Network-Security.pptx
PDF
Citrix security booklet
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
David Bray - Why Cyber-Resiliency Matters: Unprecedented Exponential Changes
Introduction to Cyber Resilience
Presentation- Introduction to Cybersecurity.pdf
2019 10-22 axio - taking control of cyber risk - grid-seccon
The 2018 Threatscape
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Jack Whitsitt - Yours, Anecdotally
Robert Lentz - CSO Perspectives Roadshow 2016
The Evolution of Cybersecurity in Software Development for 2025
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
The Open Group - ZT Commandments and Reference Model.pptx
Architecting trust in the digital landscape, or lack thereof
NZISF Talk: Six essential security services
December ISSA Meeting Executive Security Presentation
Cybersecurity Basics - Aravindr.com
ScotSecure Cyber Security Summit 2025 Edinburgh
Zero-Trust-Architecture-Reimagining-Network-Security.pptx
Citrix security booklet
Ad

More from Thoughtworks (20)

PDF
Design System as a Product
PDF
Cloud-first for fast innovation
PDF
More impact with flexible teams
PDF
Culture of Innovation
PDF
Dual-Track Agile
PDF
Developer Experience
PDF
Amazon's Culture of Innovation
PDF
When in doubt, go live
PDF
Don't cross the Rubicon
PDF
Error handling
PDF
Your test coverage is a lie!
PDF
Docker container security
PDF
Redefining the unit
PDF
A Tribute to Turing
PDF
Rsa maths worked out
PDF
Making best-in-class security ubiquitous - Why security is no longer just an ...
PDF
How to tell secrets
PDF
Continuous Delivery for Machine Learning
PDF
Holistic approach to cloud adoption
PDF
Ada Lovelace Day 2019 - Sydney
Design System as a Product
Cloud-first for fast innovation
More impact with flexible teams
Culture of Innovation
Dual-Track Agile
Developer Experience
Amazon's Culture of Innovation
When in doubt, go live
Don't cross the Rubicon
Error handling
Your test coverage is a lie!
Docker container security
Redefining the unit
A Tribute to Turing
Rsa maths worked out
Making best-in-class security ubiquitous - Why security is no longer just an ...
How to tell secrets
Continuous Delivery for Machine Learning
Holistic approach to cloud adoption
Ada Lovelace Day 2019 - Sydney

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
cuic standard and advanced reporting.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Unlocking AI with Model Context Protocol (MCP)
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
cuic standard and advanced reporting.pdf
Spectral efficient network and resource selection model in 5G networks
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing

Security by default - Building continuous cyber-resilience.

  • 1. Security by default - is it possible? Are we on the edge of the abyss
  • 2. Today ● Why? ● Resilience ● Building Blocks ● Future
  • 3. “Cyber resilience refers to an entity's ability to continuously deliver the intended outcome despite adverse cyber events.”
  • 6. Traditional Software Security ● Risk analysis ● Give security requirements ● Set infrastructure standards ● Define compliance & policies A lot of changes Who is taking care of security?
  • 7. “We need a cybersecurity renaissance in this country that promotes cyber hygiene and a security centric corporate culture applied and continuously reinforced by peer pressure” - James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology
  • 8. ● Direct and Indirect attacks ● Privacy vs Transparency ● How do you control social media? ○ Hint: Consider carefully ● Did you find GDPR difficult? ○ Or are you just hoping no-one looks ● Someone or something intelligent is out there Here’s looking at you…!
  • 10. 40 years of Processor Performance Source: John Hennessey and David Patterson, Computer Architecture A Quantitative Approach, 2018
  • 12. What is resilience Cyber resilience helps businesses to recognize that hackers have the advantage of innovative tools, element of surprise, target and can be successful in their attempt. This concept helps business to prepare, prevent, respond and successfully recover to the intended secure state. This is a cultural shift as the organization sees security as a full-time job and embedded security best practices in day-to-day operations. In comparison to cyber security, cyber resilience requires the business to think differently and be more agile on handling attacks.
  • 14. CD: Fundamental building block Commit Stage Compile Unit Test Analysis Build Installers Automated Capacity Testing Automated Acceptance Testing Manual Testing Showcases Exploratory Testing Release
  • 16. Product Owner Experience Designer Business Analyst Developer Tech lead Project Manager Security Analyst Infrastructure Consultant Build security in: Everyone responsible QA
  • 18. Risk
  • 19. “If you know almost nothing, almost anything will tell you something” - Douglas W. Hubbard
  • 21. We need to maintain the balance of acceptable risk
  • 22. Inherent Risk – Impact Assessment? ● What data is stored or processed by system? ● What is the reason for storing? ● What is the sensitivity? ● What services are provided by the system? ● What is the purpose of those services? ● What is the sensitivity? (Business critical? Safety sensitive?) ● What types of users or third parties interact with the system ○ What is the purpose these interactions? ○ What can we say about our trust these users or third parties?
  • 24. Zero Trust Architecture, also referred to as Zero Trust Network or simply Zero Trust, refers to security concepts and threat model that no longer assumes that actors, systems or services operating from within the security perimeter should be automatically trusted, and instead must verify anything and everything trying to connect to its systems before granting access.
  • 25. The end of simplicity How the future is more complex than it might appear
  • 26. A complex adaptive system is a system in which a perfect understanding of the individual parts does not automatically convey a perfect understanding of the whole system's behaviour. -Miller et. al 2007
  • 29. Adaption Source: Hiroki Sayama, D.Sc., Collective Dynamics of Complex Systems (CoCo) Research Group at Binghamton University, State University of New York
  • 32. Dave Elliman Global Head of Technology, ThoughtWorks Thank you