SlideShare a Scribd company logo
#ITWebSS2017NETSQUARENETSQUARE
The Seven Axioms Of Security
SAUMIL SHAH
CEO, NET SQUARE
@therealsaumil
ITWeb Security Summit 2017
Johannesburg, South Africa
PhotoCredit:MukeshAcharya
#ITWebSS2017NETSQUARE
WARNING! Disruptive Thoughts
Ahead
#ITWebSS2017NETSQUARE
WARNING!
Block
Diagrams
Ahead
#ITWebSS2017NETSQUARE
About Me
Saumil Shah
CEO, Net Square
@therealsaumil
hacker, trainer, speaker,
photographer, rebel
educating, entertaining
and exasperating
audiences since 1999
#ITWebSS2017NETSQUARE
The Evolution of Attacks: 2001-17
#ITWebSS2017NETSQUARE
Servers Applications Desktops
Browsers Pockets Populations
The Evolution of Targets: 2001-17
#ITWebSS2017NETSQUARE
...Defense:
2001-17
Firewalls
IDS/IPS
Antivirus
WAF
DLP, EPS
DEP, ASLR
Sandbox
One-way Attacks
FragRouter
Obfuscation
Char Encoding
DNS Exfil
ROP, Infoleak
Jailbreak
Different.... but Same Same
#ITWebSS2017NETSQUARE @Shakespeare doth twate
#ITWebSS2017NETSQUARE
Strange Targets: ROWHAMMER
By Dsimic https://commons.wikimedia.org/w/index.php?curid=38868341
#ITWebSS2017NETSQUARE
IMAJS
STEGO-
DECODER
JAVASCRIPT
TARGET BROWSER
POLYGLOT
PIXEL
ENCODER
EXPLOIT
CODE
IMAGE
ENCODED IMAGE
Strange Techniques: STEGOSPLOIT
http://stegosploit.info
#ITWebSS2017NETSQUARE
There
will always be
vulnerabilities..
#ITWebSS2017NETSQUARE
wherein buildings reveal near-
infinite interiors, capable of being
traversed through all manner of
non-architectural means
http://www.bldgblog.com/2010/01/nakatomi-space/
Nakatomi Space
#ITWebSS2017NETSQUARE
Attacks
succeed
because
today's defense
is REACTIVE.
#ITWebSS2017NETSQUARE
Exploit Development - 2002
Individual effort.
1 week dev time.
3-6 months shelf life.
Hundreds of public
domain exploits.
"We did it
for the LOLs."
#ITWebSS2017NETSQUARE
TWO TIMELINES >
#ITWebSS2017NETSQUARE
Evolution of a new species
MitiGator
RaiseBar-us Myopus
Discovered by
@halvarflake
SafeSEH
DEP
ASLR
CFG
Isolated
Heap
NOZZLE
/GS
SEHOP
RelRO
#ITWebSS2017NETSQUARE
MitiGator raises the bar...
...until it sees no more exploits
Credit @halvarflake
#ITWebSS2017NETSQUARE
A long time ago in a galaxy far,
far away...
MICROSOFT
STRIKES BACK
#ITWebSS2017NETSQUARE
#ITWebSS2017NETSQUARE
2005: Ciscogate – Michael Lynn
https://www.schneier.com/blog/archives/2005/07/cisco_harasses.html
#ITWebSS2017NETSQUARE
2009
CAN
SEC
WEST
Photo credit: Garrett Gee
#ITWebSS2017NETSQUARE
Exploit Development - 2012
2-12 month dev time.
24h to 10d shelf life.
Public domain
exploits = zero.
Cost,value of exploits
has significantly risen.
•  COMMERCIALIZED
•  WEAPONIZED
•  POLITICIZED
#ITWebSS2017NETSQUARE
The defenders
tried to buy
back their
bugs...
#ITWebSS2017NETSQUARE
Bug Bounties: high stakes game
Chris Evans – Pwnium: Element 1337
#ITWebSS2017NETSQUARE
Bug Bounties
tried to fill a
REACTIVE
need.
#ITWebSS2017NETSQUARE
Bug Bounties
Backfiring?
#ITWebSS2017NETSQUARE
#ITWebSS2017NETSQUARE
More on
Reactive
Security
#ITWebSS2017NETSQUARE
Compliance != Security
#ITWebSS2017NETSQUARE
#ITWebSS2017NETSQUARE
Security = "RISK REDUCTION"
Rules
Signatures
Updates
Machine Learning
#ITWebSS2017NETSQUARE
#ITWebSS2017NETSQUARE
Existing defense
measures
do not match
attacker
tactics.
#ITWebSS2017NETSQUARE
Attackers
don't follow
compliance
standards and
certifications.
#ITWebSS2017NETSQUARE
The CISO: 2001-2017
#ITWebSS2017NETSQUARE
In 2001...
CIO CIO
INFOTECH =
BUSINESS
ENABLER
CISO
INFOSEC =
RISK
REDUCTION
$$$
C.Y.A.
#ITWebSS2017NETSQUARE
Dear CISO, Who are Scarier
ATTACKERS or AUDITORS?
#ITWebSS2017NETSQUARE
It is time we
...not by building firewalls...
#ITWebSS2017NETSQUARE
@therealsaumil's
SEVEN AXIOMS
of Security
#ITWebSS2017NETSQUARE
Intelligence Driven Defense
From REACTIVE to PROACTIVE
#ITWebSS2017NETSQUARE
Defense
doesn't mean
Risk Reduction
Axiom 1
#ITWebSS2017NETSQUARE
The CISO's
job is
DEFENSE
Axiom 1
#ITWebSS2017NETSQUARE
Compliance is NOT the CISO's job
"Not my circus,
Not my monkeys"
http://rafeeqrehman.com/2016/10/07/announcing-ciso-mindmap-2016/
90% TIME SPENT ON COMPLIANCE!
#ITWebSS2017NETSQUARE
In 2017...
CISO CISO INFOSEC = DEFENSE
CCO CHIEF COMPLIANCE OFFICER
DEFEND AGAINST ATTACKERS
DEFEND AGAINST AUDITORS
#ITWebSS2017NETSQUARE
Intelligence
begins by
COLLECTING
EVERYTHING!
Axiom 2
#ITWebSS2017NETSQUARE
Collect Everything!
•  Security Data Warehouse: first
step towards proactive security.
•  Retention is CHEAPER than Deletion.
•  Importance of HISTORICAL DATA
increases exponentially with time.
#ITWebSS2017NETSQUARE
Sources of Security Intelligence?
#ITWebSS2017NETSQUARE
"The Universe
tells you
everything you
need to know
about it,
as long as you are
prepared to
watch, to listen,
to smell, in short
to OBSERVE."
Sources of Security Intelligence
#ITWebSS2017NETSQUARE
Get CREATIVE, Get ORGANIC
ORGANIC SECURITY = Grow It Yourself!
#ITWebSS2017NETSQUARE
Schrödinger's Hack:
Systems exist in both
SECURE and HACKED
states at the
same time.
Axiom 3
#ITWebSS2017NETSQUARE
TEST
REALISTICALLY
Axiom 3 – what it means
#ITWebSS2017NETSQUARE
Forgone Conclusion:
"My System Is SECURE"
Test Strategy that will lead you this conclusion
•  Wait for a new production build.
•  Don't test on production only UAT.
•  Perform Non-intrusive testing.
•  X,Y,Z,.. are all out of Scope.
•  Test during off-peak hours only.
#ITWebSS2017NETSQUARE
Can't MEASURE?
Can't Use.
Axiom 4
#ITWebSS2017NETSQUARE
Why Keep Metrics?
•  To show you are succeeding
–  Corollary: to show you are failing
•  To justify your existence and/or budget
•  To argue for change
•  For fun!
Marcus Ranum
Security Metrics: The Quest For Meaning
IT Defense 2016, Mainz
#ITWebSS2017NETSQUARE
How to Establish Metrics
•  Look at your process and make a list of what is
quantifiable
•  Ask yourself what quantities you are interested in
–  Once things are quantified they go up, or down – which is about
the only convenient thing of metrics: they don't go sideways, too
•  Which is a "good" direction: up or down?
•  Do you know what constitutes a significant movement?
•  Measure and iterate
Marcus Ranum
Security Metrics: The Quest For Meaning
IT Defense 2016, Mainz
#ITWebSS2017NETSQUARE Alberto Brandolini @ziobrando (The Bullshit Asymmetry)
#ITWebSS2017NETSQUARE
Why Metrics Win
•  Often information security becomes what I call
a "battle of two narratives"
–  Your opponent has the advantage of lying:
–  "moving this to the cloud will save us $500,000/year!"
–  To defend your narrative you need facts (from metrics) and
credible extrapolations (based on metrics) or your
opponent controls the narrative! *
* Plan B is to respond with lies of your own
Marcus Ranum
Security Metrics: The Quest For Meaning
IT Defense 2016, Mainz
#ITWebSS2017NETSQUARE
Users:
One Size Fits
NONE!
Axiom 5
#ITWebSS2017NETSQUARE
The user's going to pick dancing pigs
over security every time.
Bruce Schneier
#ITWebSS2017NETSQUARE
Technology in the hands of users
@needadebitcard
#ITWebSS2017NETSQUARE
#ITWebSS2017NETSQUARE
NUMBEROFUSERS
INFOSEC MATURITY
HOPELESS UNINFORMED PROACTIVE ROCK STARS
Identify your target users...
ALWAYS
GOING TO
BE AN
ENIGMA
IF PROPERLY GUIDED
THESE USERS ARE
WILLING TO IMPROVE
THEIR USAGE HABITS
THE
NEXT
ROCK STAR
USERS
LEAVE THEM ALONE
AND POSSIBLY
LEARN FROM THEM
#ITWebSS2017NETSQUARE
...and improve their maturity
HOPELESS UNINFORMED PROACTIVE ROCK STARS
NUMBEROFUSERS
INFOSEC MATURITY
#ITWebSS2017NETSQUARE
The Best Defense
is a CREATIVE
Defense.
Axiom 6
#ITWebSS2017NETSQUARE
A Creative
Defense is an
UNEXPECTED
Defense.
Axiom 6 – attacker's view
#ITWebSS2017NETSQUARE
#ITWebSS2017NETSQUARE
Make Defense
VISIBLE,
Make Defense
COUNT.
Axiom 7
#ITWebSS2017NETSQUARE
Visible Defense
•  Improve the User Maturity Curve.
•  Reduce Blue Team's Response Time.
•  Money Saved = Money Earned
Consistent Reduction in Frauds.
•  Produce Creative Defense Tools.
•  Attract Smarter Talent in Infosec.
•  Weekly fitness check...
#ITWebSS2017NETSQUARE
ASSET
INVENTORY
REAL-TIME VISIBILITY
OF EVENTS
DETECT
UNAUTHORIZED ACTIVITY
CLASSIFY
UNAUTHORIZED ACTIVITY
ATTACKER CAPABILITY
DETECT INTRUSIONS
UNCOVER ATTACKERS
TRACK ATTACKERS
DEFEND & RECOVER
...The CISO
Strength
Test
https://github.com/swannman/ircapabilities
#ITWebSS2017NETSQUARE
Is your Infosec
team doing
something
creative
every day?
#ITWebSS2017NETSQUARE
@therealsaumil
www.net-square.com
#ITWebSS2017, Johannesburg
Thank You, Drive Through

More Related Content

PDF
Redefining Defense - HITB2017AMS Keynote
PDF
The Seven Axioms Of Security
PDF
Cross Border Cyber Attacks: Impact on Digital Sovereignty
PDF
The Infosec Crossroads - 44CON 2016
PDF
Hack.LU - The Infosec Crossroads
PDF
2016: The Infosec Crossroads - Keynote at Intuit #Hacktober2015
PDF
NTXISSACSC4 - Cyber Insurance – Did You Know?
PDF
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
Redefining Defense - HITB2017AMS Keynote
The Seven Axioms Of Security
Cross Border Cyber Attacks: Impact on Digital Sovereignty
The Infosec Crossroads - 44CON 2016
Hack.LU - The Infosec Crossroads
2016: The Infosec Crossroads - Keynote at Intuit #Hacktober2015
NTXISSACSC4 - Cyber Insurance – Did You Know?
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard

What's hot (20)

PDF
NTXISSACSC4 - The Art of Evading Anti-Virus
PDF
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
PDF
SOCIAL MEDIA AS A CYBER WEAPON
PDF
CrowdCast Monthly: Operationalizing Intelligence
PDF
You Can't Stop The Breach Without Prevention And Detection
PDF
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
PDF
Securiser son digital workplace avec Microsoft Threat Protection
PPTX
Basi per la sicurezza in rete
PDF
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
PPTX
Security and ethical hacking initiative first session
PDF
Hacking Exposed Live: Mobile Targeted Threats
PDF
From Mirai to Monero – One Year’s Worth of Honeypot Data
PDF
CrowdCasts Monthly: You Have an Adversary Problem
PDF
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
PDF
Ciberamenazas - ¿A qué nos enfrentamos?
PDF
Smart Security Architectures for YOUR Business!
PDF
Bear Hunting: History and Attribution of Russian Intelligence Operations
PDF
Web hacking using Cyber range
PDF
2019 CYBER SECURITY TRENDS REPORT REVIEW
PDF
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
NTXISSACSC4 - The Art of Evading Anti-Virus
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
SOCIAL MEDIA AS A CYBER WEAPON
CrowdCast Monthly: Operationalizing Intelligence
You Can't Stop The Breach Without Prevention And Detection
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
Securiser son digital workplace avec Microsoft Threat Protection
Basi per la sicurezza in rete
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
Security and ethical hacking initiative first session
Hacking Exposed Live: Mobile Targeted Threats
From Mirai to Monero – One Year’s Worth of Honeypot Data
CrowdCasts Monthly: You Have an Adversary Problem
Antonio Sanz. S2Grupo. Ciberamenazas. Semanainformatica.com 2015
Ciberamenazas - ¿A qué nos enfrentamos?
Smart Security Architectures for YOUR Business!
Bear Hunting: History and Attribution of Russian Intelligence Operations
Web hacking using Cyber range
2019 CYBER SECURITY TRENDS REPORT REVIEW
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
Ad

Similar to The Seven Axioms of Security - ITWeb 2017 (20)

PPTX
Netwatcher Credit Union Tech Talk
PDF
CV | Michele Spagnuolo
PDF
Adversary Driven Defense in the Real World
PDF
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
PPTX
SAMBA - Luka Pavol - 12.3.2014
PPTX
The Top 7 Causes of Major Security Breaches
PPTX
Evolving Cybersecurity Threats
PPTX
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking
PPTX
Cyber Resilency VANCOUVER, BC Nov 2017
PPTX
Security and Mobility Co Create Week Jakarta
PDF
The Thing That Should Not Be
PPTX
Securing a great Developer Experience - v1.3
PPTX
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
PDF
The Road To Defendable Systems - Emirates NBD
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
PPTX
New Paradigms for the Next Era of Security
PDF
Top 10 reasons your IoT project will fail
PDF
Carbon Black: Keys to Shutting Down Attacks
PDF
Weaponizing OSINT – Hacker Halted 2019 – Michael James
PDF
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Netwatcher Credit Union Tech Talk
CV | Michele Spagnuolo
Adversary Driven Defense in the Real World
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
SAMBA - Luka Pavol - 12.3.2014
The Top 7 Causes of Major Security Breaches
Evolving Cybersecurity Threats
(ISC)2 CyberSecureGov 2015 - The Next APT: Advanced, Persistent Tracking
Cyber Resilency VANCOUVER, BC Nov 2017
Security and Mobility Co Create Week Jakarta
The Thing That Should Not Be
Securing a great Developer Experience - v1.3
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
The Road To Defendable Systems - Emirates NBD
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
New Paradigms for the Next Era of Security
Top 10 reasons your IoT project will fail
Carbon Black: Keys to Shutting Down Attacks
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Ad

More from Saumil Shah (20)

PDF
The Hand That Strikes, Also Blocks
PDF
Debugging with EMUX - RIngzer0 BACK2WORKSHOPS
PDF
Unveiling EMUX - ARM and MIPS IoT Emulation Framework
PDF
Announcing ARMX Docker - DC11332
PDF
Precise Presentations
PDF
Effective Webinars: Presentation Skills for a Virtual Audience
PDF
INSIDE ARM-X Cansecwest 2020
PDF
Cyberspace And Security - India's Decade Ahead
PDF
Cybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace
PDF
NSConclave2020 The Decade Behind And The Decade Ahead
PDF
Cybersecurity In India - The Decade Ahead
PDF
INSIDE ARM-X - Countermeasure 2019
PDF
Introducing ARM-X
PDF
The CISO's Dilemma 44CON 2019
PDF
The CISO's Dilemma HITBGSEC2019
PDF
Schrödinger's ARM Assembly
PDF
ARM Polyglot Shellcode - HITB2019AMS
PDF
What Makes a Compelling Photograph
PDF
Make ARM Shellcode Great Again - HITB2018PEK
PDF
HackLU 2018 Make ARM Shellcode Great Again
The Hand That Strikes, Also Blocks
Debugging with EMUX - RIngzer0 BACK2WORKSHOPS
Unveiling EMUX - ARM and MIPS IoT Emulation Framework
Announcing ARMX Docker - DC11332
Precise Presentations
Effective Webinars: Presentation Skills for a Virtual Audience
INSIDE ARM-X Cansecwest 2020
Cyberspace And Security - India's Decade Ahead
Cybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace
NSConclave2020 The Decade Behind And The Decade Ahead
Cybersecurity In India - The Decade Ahead
INSIDE ARM-X - Countermeasure 2019
Introducing ARM-X
The CISO's Dilemma 44CON 2019
The CISO's Dilemma HITBGSEC2019
Schrödinger's ARM Assembly
ARM Polyglot Shellcode - HITB2019AMS
What Makes a Compelling Photograph
Make ARM Shellcode Great Again - HITB2018PEK
HackLU 2018 Make ARM Shellcode Great Again

Recently uploaded (20)

PDF
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
PPTX
assetexplorer- product-overview - presentation
PPTX
Tech Workshop Escape Room Tech Workshop
PDF
Topaz Photo AI Crack New Download (Latest 2025)
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
PDF
Complete Guide to Website Development in Malaysia for SMEs
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Introduction to Windows Operating System
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
iTop VPN Crack Latest Version Full Key 2025
PDF
Website Design Services for Small Businesses.pdf
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
assetexplorer- product-overview - presentation
Tech Workshop Escape Room Tech Workshop
Topaz Photo AI Crack New Download (Latest 2025)
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
Complete Guide to Website Development in Malaysia for SMEs
Designing Intelligence for the Shop Floor.pdf
Introduction to Windows Operating System
Wondershare Recoverit Full Crack New Version (Latest 2025)
wealthsignaloriginal-com-DS-text-... (1).pdf
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
iTop VPN Crack Latest Version Full Key 2025
Website Design Services for Small Businesses.pdf
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx

The Seven Axioms of Security - ITWeb 2017