BSidesSF 2020 - So You’re the First Security Hire (Bryan Zimmer)

Security BSides San Francisco
9 Mar 202019:25

Summary

TLDRBrian, a seasoned security expert, shares his journey from protecting data in 2002 to leading Netflix's Zero Trust implementation. He offers insights for building a security program from scratch, emphasizing the importance of understanding business values, compliance, and risk tolerance. Brian advocates for a security culture that serves the business, not hinders it, and stresses the need for simplicity, transparency, and positive relationships with colleagues to effectively integrate security into a company's fabric.

Takeaways

  • 🛡️ Starting a security program from scratch requires a multifaceted approach, including understanding the business's 'crown jewels' and legal compliance requirements.
  • 👷 Wearing many hats is common in startups, where a security engineer might also be responsible for non-security tasks like fixing coffee machines.
  • 🤝 Building a security culture is crucial, emphasizing the importance of social skills to interact with various teams within the company.
  • 💡 Being an advisor, not the police, means understanding the business's priorities and offering security advice that aligns with its goals.
  • 💰 Recognizing that security's purpose is to support business operations, which includes protecting customer data and ensuring compliance for financial and legal reasons.
  • 🚀 Starting with security early in the business or product development process is more efficient than trying to retrofit security measures later.
  • 🔍 Conducting a risk assessment involves evaluating the company's valuable assets, compliance requirements, and the level of risk the business is willing to accept.
  • 📝 Keeping policies simple and straightforward helps maintainability and reduces the likelihood of people circumventing them.
  • 🤖 Leveraging technology platforms and services, like PaaS and zero trust architectures, can simplify security management and reduce the attack surface.
  • 🤝 Cultivating a positive security culture involves being approachable, transparent, and humble, which encourages collaboration and trust.
  • 🔑 Empowering employees to be part of the security process through education and tools helps extend the security team's reach and effectiveness.

Q & A

  • What was Brian's initial career focus in 2002?

    -Brian's initial career focus in 2002 was in security, specifically protecting ones and zeros, before cyber security became a prominent field.

  • What is the significance of the term 'crown jewels' in the context of the script?

    -In the context of the script, 'crown jewels' refers to the most valuable assets of a business, such as customer data, intellectual property, and bank accounts, which need to be protected.

  • What is the importance of understanding the business's risk tolerance when setting up a security program?

    -Understanding the business's risk tolerance is crucial because it helps determine the level of risk the company is comfortable accepting and influences the security measures and policies that are put in place.

  • Why is it recommended to outsource certain compliance tasks when setting up a security program?

    -Outsourcing certain compliance tasks can help reduce the workload and allow the security team to focus on more critical aspects of security. It also leverages specialized expertise that may not be available in-house.

  • What is the role of culture in building an effective security program?

    -Culture plays a significant role in building an effective security program as it helps integrate security into the business, fosters trust, and encourages collaboration across different teams.

  • What is the acronym 'START' mentioned in the script, and what does it stand for?

    -The script does not explicitly mention the acronym 'START', but based on the context, it could be inferred that 'START' could stand for 'Security, Threats, Assets, Risk, and Training', which are key components in building a security strategy.

  • Why is it important for a security professional to be more than just a 'heads down' engineer?

    -A security professional should be more than just a 'heads down' engineer because they need to interact with various teams, understand the business's needs, and advise on security measures that align with the company's goals.

  • What is the significance of the 'Security Shark Award' mentioned in the script?

    -The 'Security Shark Award' is a creative way to recognize and reward employees who contribute positively to security within the company, helping to foster a culture of security awareness.

  • What is the role of physical security in a startup, and why should it be considered?

    -Physical security plays a crucial role in protecting the company's assets and ensuring the safety of employees. It includes access controls, surveillance, and measures to prevent theft and other security incidents.

  • How can a security professional integrate into the business and build trust across different teams?

    -A security professional can integrate into the business and build trust by being transparent, approachable, and collaborative. This includes engaging with different teams, participating in company events, and being open to feedback and learning from others.

Outlines

00:00

🛡️ Embracing Security Challenges at Startups

The speaker, Brian, introduces his background in cybersecurity, starting from 2002 with various roles in security, including a leadership position at Netflix. He addresses the audience, particularly Dr. Seuss fans, with a playful tone. The paragraph focuses on the challenges and opportunities of setting up a security program from scratch, whether at a small company or for an individual taking on a new role. Brian emphasizes the importance of being ready to wear many hats and not limiting oneself to a narrow scope of security. He also discusses the subjective nature of what is considered the 'right way' to do security, acknowledging that what is set up now might be questioned in the future.

05:02

🤔 Navigating the Complexities of Security Roles

This paragraph delves into the multifaceted nature of security roles, especially at startups. Brian discusses the necessity of having strong social skills to interact with various teams within a company. He stresses the importance of establishing a security culture and understanding the business's goals and values. The speaker outlines three key responsibilities: preventing hacks, dealing with compliance, and managing security questionnaires, all of which contribute to the business's financial health. Brian also advises on the advisory role of a security professional, highlighting the need to balance business needs with security measures.

10:02

🏢 Building a Security Strategy from the Ground Up

Brian outlines the initial steps for creating a security strategy in a startup environment. He advises finding management support and understanding the company's security posture and goals. The speaker suggests asking critical questions during the interview process to gauge the company's commitment to security. He also emphasizes the importance of identifying the company's 'crown jewels' and understanding the legal and compliance requirements that will shape the security framework. Brian introduces the concept of determining the business's risk tolerance and the need for a basic risk assessment.

15:03

📝 Crafting a Security Culture and Strategy

The speaker discusses the importance of developing a security culture that is approachable and positive, which encourages people to engage with security practices rather than avoid them. He highlights the need for simplicity in policies and procedures to ensure they are maintainable and effective. Brian introduces the 'guardrails not gates' philosophy, advocating for security measures that enable rather than hinder business operations. He also stresses the importance of being a trusted advisor, fostering self-reliance among employees, and leveraging technology to simplify security management.

🔄 Integrating Security into Business Operations

Brian talks about the importance of integrating security into the business by building relationships and trust across different departments. He suggests being transparent, appreciative, and humble to foster a good working relationship with colleagues. The speaker emphasizes the need for empathy and clear, non-technical communication to ensure everyone understands security practices. He also discusses the importance of engaging with the business to understand its needs and tailor security solutions accordingly.

🎭 Enhancing Security Engagement with Creativity

In this paragraph, Brian shares creative ways to make security engaging and fun. He talks about the 'Security Shark Award' and other initiatives like security education posters and interactive gifts to keep security top of mind for employees. The speaker encourages finding unique ways to communicate security messages to avoid alert fatigue and to make security an enjoyable part of the workplace culture.

👮‍♂️ The Role of Physical Security in a Startup

Brian briefly touches on the importance of physical security, drawing parallels with information security practices. He mentions the basics of physical security such as access controls, cameras, and alarms, and how they apply to a startup environment. The speaker also discusses the potential need for guards and addressing issues like theft and domestic violence as the company grows. He wraps up by emphasizing the role of physical security in meeting auditor requirements and maintaining a secure workplace.

Mindmap

Keywords

💡Security

Security in the context of this video refers to the protection of digital assets and information from unauthorized access, theft, or damage. It is the central theme of the video, as the speaker discusses his career in security and the various aspects of securing a business. For example, the speaker mentions implementing zero trust for Netflix, which is a security framework that limits access to resources based on the least privilege principle.

💡Cybersecurity

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. It is a subset of security that specifically deals with online threats. The speaker's early career in 'protecting ones and zeros' before 'cyber was a thing' illustrates the evolution of cybersecurity as a field and its importance in modern business.

💡Zero Trust

Zero Trust is a security concept that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside the network perimeter. The speaker led Netflix's implementation of Zero Trust, emphasizing its significance in modern security practices.

💡Compliance

Compliance refers to the act of conforming to a set of rules, regulations, or standards. In the video, the speaker discusses the importance of dealing with compliance as part of a security professional's role, ensuring that the company adheres to legal and regulatory requirements that affect security posture.

💡Risk Assessment

Risk assessment is the process of identifying, analyzing, and evaluating risk. It is crucial in security for understanding the potential threats and vulnerabilities that could impact an organization. The speaker talks about finding out what level of risk the business is comfortable accepting, which is part of the risk assessment process.

💡Security Culture

Security culture encompasses the policies, practices, and attitudes associated with the management of security within an organization. The speaker emphasizes the importance of setting a security culture where the security team interacts positively with others and security is valued throughout the company.

💡Phishing Attacks

Phishing attacks are a type of cyber attack where attackers attempt to deceive users into revealing sensitive information or performing actions that compromise security. The speaker mentions the potential for such attacks, highlighting the need for security measures to protect against them.

💡Two-Factor Authentication (2FA)

Two-factor authentication, or 2FA, is a security method that requires users to provide two different authentication factors to verify themselves. The speaker suggests using 2FA as a more memorable and secure alternative to traditional password policies.

💡Third-Party Risk

Third-party risk is the potential for harm to an organization due to the actions of external entities or partners. The speaker discusses the importance of understanding where company data is going and who the sub-processors are, which is essential for managing third-party risk.

💡Security Controls

Security controls are the safeguards or countermeasures that are put in place within an organization to protect against threats and vulnerabilities. The speaker talks about selecting and implementing the right security controls based on the business's needs and the findings from previous steps in the security strategy.

💡Advisor

In the context of the video, an advisor provides guidance and recommendations but does not enforce decisions unilaterally. The speaker positions the security professional as an advisor, helping the business understand risks and make informed choices rather than acting as a police force.

Highlights

Brian began his career in security in 2002, before cyber became a prominent field, and has since worked in various sectors including the Department of Defense, banks, universities, and Netflix.

Led Netflix's implementation of Zero Trust, a security model that has become a must for many corporations.

Discusses the importance of wearing many hats at a startup, especially in security roles, and the evolution of responsibilities over time.

Stresses the need for critical social skills in addition to technical skills for security professionals to interact effectively with various company teams.

Outlines the three most important contributions of security to a business: preventing hacks, dealing with compliance, and filling out security questionnaires.

Advises being an advisor rather than the police within a business, understanding the importance of the business's priorities over personal security preferences.

Highlights the reality of small companies being targeted by attacks and the importance of not underestimating security needs due to size.

Emphasizes the need for management support and buy-in for security initiatives to be successful within a company.

Introduces the concept of 'guardrails not gates' as a guiding principle for security, allowing for business flow while providing necessary security.

Advocates for simplicity in security policies and procedures to ensure they are maintainable and not inviting workarounds.

Suggests using acronyms and frameworks to identify and prioritize what matters most to the business in terms of security.

Recommends outsourcing parts of compliance where possible and focusing on in-house development of security culture.

Details the importance of understanding and managing third-party and subprocessor risks in security.

Describes creating a basic risk spreadsheet as a method for tracking assets and assessing risk levels.

Talks about the importance of integrating security into the business by building relationships and trust across different teams.

Shares creative ideas for engaging employees with security practices, such as the Security Shark Award and interactive gifts.

Mentions the significance of physical security in a business, including badge systems, access controls, and monitoring.

Provides insights on the importance of setting a positive security culture, being approachable, and making security an ally rather than a feared entity.

Transcripts

play00:00

please join me in welcoming Brian from

play00:02

whom ooh so Who am I this one goes out

play00:11

to all the dr. Seuss fans in the

play00:12

audience at the far out of town where

play00:13

the Grieco grass grows I began my career

play00:15

in security protecting ones and zeros

play00:17

back in 2002 before cyber was a thing

play00:19

and clouds were just something about

play00:20

what you might sing from the Department

play00:22

of Defense to banks and universities

play00:23

then on to Netflix to get paid to watch

play00:25

movies

play00:25

I led Netflix's implementation of Xero

play00:27

trust for which most people think beyond

play00:29

Corpse a must now sit back and get comfy

play00:31

I'll spin you a yarn of how to use one

play00:32

pair of hands to protect your business

play00:34

from harm oh thank you

play00:39

so what have you gotten yourself into

play00:40

let's say you're taking over a security

play00:42

program we're starting the security

play00:43

program from scratch of a small company

play00:45

or maybe a security engineer leveling up

play00:46

maybe your manager whose role is

play00:48

expanded or maybe you're the poor IT guy

play00:50

or girl that drew the short straw so

play00:52

first congratulations also second I'm

play00:54

sorry so on the plus side you get to do

play00:56

things from scratch quote-unquote do it

play00:58

the right way but just remember that the

play01:00

right way is very subjective so two

play01:01

years from now people could be looking

play01:02

back and think well what idiot did this

play01:03

and you'll have to own up and say oh

play01:04

sorry that was me be ready to wear many

play01:07

hats at a startup you're definitely

play01:08

gonna do ton of different roles

play01:10

definitely outside of securities so

play01:11

don't don't scope your role too narrowly

play01:13

at first it'll definitely narrow

play01:14

naturally over time for example I'm kind

play01:16

of Handy so I spent a lot of time fixing

play01:18

coffee machine luckily now we have a

play01:20

third party that does that

play01:21

let's see ideally you're not gonna want

play01:23

to be just a heads down security

play01:25

engineer you're definitely to need those

play01:26

skills but you also want critical social

play01:28

skills shall we say because you're gonna

play01:30

be interacting with a lot of different

play01:31

teams around the company engineering IT

play01:33

legal sales leadership ideally so

play01:37

remember that you're not just setting up

play01:39

security controls and all the techie

play01:40

stuff you definitely have to start

play01:41

setting security culture how do you want

play01:44

your security team to interact with

play01:45

people how do you want them to interact

play01:46

with you how do you want security to be

play01:47

valued in the company so why do you

play01:50

exist as the wu-tang clan says cream or

play01:52

cash rules everything around me you need

play01:55

to help that the business get that dolla

play01:56

dolla bill y'all so the three most

play01:58

important things I do for the business

play01:59

are making sure we don't get hacked

play02:01

dealing with compliance and filling out

play02:03

secured incoming security questionnaires

play02:05

they all either directly or indirectly

play02:06

bring in money so you're either winning

play02:08

customers are you closing those deals

play02:10

your media legal requirements to stay in

play02:12

business or your

play02:13

keeping the lights on and by the way

play02:15

just because I didn't directly bring

play02:16

money always remember to protect your

play02:17

customers data because it's the right

play02:19

thing to do keep in mind that you're an

play02:21

advisor you're not the police people the

play02:23

people can in the business can take your

play02:25

advice or just leave it you need to

play02:26

understand what's important for the

play02:27

business and not just you so maybe you

play02:29

have an urgent phone to fix or maybe

play02:31

gotten shiny a new tool to buy but the

play02:33

business might weigh the risk benefit

play02:34

and cost benefit and say and it's really

play02:36

not worth it sorry you have to be okay

play02:38

with that and move on you might think

play02:40

steered you to start but really that big

play02:41

of a deal because we're too small to get

play02:43

attacked but no there's I mean as we

play02:45

know there spray-and-pray attacks but

play02:46

also even just on LinkedIn there's

play02:47

plenty of information to launch spear

play02:49

phishing attacks against you we've seen

play02:51

that definitely we're a small company

play02:52

depending on your customer data and the

play02:54

industry you're in you may start getting

play02:55

more targeted attacks from I like to put

play02:59

out the equation of startup - security

play03:02

equals easy money for attackers because

play03:04

you're gonna space you're gonna face all

play03:05

the same attacks like ransomware

play03:07

extortion data theft all the sort of

play03:09

stuff that the big companies do but

play03:10

attackers know that you do not have a

play03:12

security team or maybe if you're lucky

play03:13

one person so strategy the first part

play03:17

here so first step is finding a company

play03:19

with management support security you

play03:20

definitely need buy-in from the top to

play03:22

get anything done otherwise you are

play03:23

gonna start crying very soon ask you

play03:26

know during the interview process start

play03:28

asking some questions like who's the

play03:29

position report to can you talk to CEO

play03:30

about your strategy what's the budget

play03:32

what's the timeline for like how big

play03:34

does the team want to get and and what

play03:36

are the goals and what's the timeline

play03:37

that sort of thing because you're trying

play03:39

to figure out are they trying to check a

play03:40

box for security or do they actually

play03:41

deeply care about security ideally the

play03:43

company wants to start caring about

play03:44

security early because as we all know

play03:46

bolting on security at the end for

play03:48

either the business or the product is

play03:49

going to take a lot more time and effort

play03:50

and money example would be like see

play03:53

becoming see see see CPA and JP are

play03:55

compliant trying to both those features

play03:58

onto a product after the fact are gonna

play03:59

be a big huge pain and then before

play04:02

putting in the controls and processes

play04:03

and procedures always ask why so take a

play04:05

step back and think okay well what are

play04:06

we trying to do here so what's the

play04:08

reason behind it how will it actually

play04:10

benefit us is there a new or a better

play04:11

way to do it which is one of the

play04:13

benefits of starting from scratch you

play04:14

can you can do that so for example

play04:16

traditionally people have said you know

play04:17

hey we need a crazy long passwords that

play04:18

are rotated every 90 days but then you

play04:20

take a step back and you realize oh

play04:21

actually we can take care of this issue

play04:23

and we can take care of a bunch of

play04:24

different attacks account takeover stuff

play04:26

but just by requiring more memorable

play04:28

passwords but 2fa you know you might

play04:31

traditionally buy fancy was paying

play04:32

firewall with a bunch of security

play04:34

features I won't mention names but then

play04:36

you take a step back and you realize oh

play04:37

actually we can solve all these problems

play04:39

and eliminate a whole bunch of other

play04:40

problems by going with the encore and

play04:42

just a simple firewall so now on to the

play04:45

strategy or the the tote the the meat of

play04:48

the strategy if you or the tofu if you

play04:49

prefer if this Chromebook would scroll

play04:51

oh there we go

play04:53

so you've got one pair of hands so how

play04:54

do you make sure that you are spending

play04:56

your limited amount of time on the most

play04:57

critical things so I've created one

play04:59

simple you need to remember acronym

play05:01

there for you first part is finding what

play05:05

matters most to the business the

play05:05

valuables the crown jewels talk to the

play05:07

the founders the heads of each group

play05:09

what data applications process this

play05:11

procedures matter most to the to the

play05:12

company into things like customer data

play05:14

intellectual property bank accounts you

play05:16

know internal apps blah blah blah blah

play05:18

blah and then find what laws you have to

play05:20

comply with and certifications that the

play05:21

business's wants in addition to those

play05:23

legal requirements that's going to

play05:24

determine determine what frameworks you

play05:25

have to use what controls you're gonna

play05:27

put in place policies and generally how

play05:29

fast and loose you can play with

play05:30

security dealing with compliance might

play05:32

be one of the reasons one of the big

play05:33

reasons why your position was created in

play05:35

the first place so a lot of people hate

play05:36

to admit that but there will likely be

play05:39

some some compliance parts of your job

play05:41

my recommendation is outsource as much

play05:43

of the compliance stuff as you can like

play05:44

GAAP assessments and audits and getting

play05:46

policies but realize you're still gonna

play05:49

be doing a bunch of the heavy lifting

play05:50

putting that in place and then find out

play05:53

what level of risk the business is

play05:54

comfortable accepting so getting a

play05:56

general feel from the co founders like

play05:57

do they want to move faster and accept

play05:58

more risk or do they want to go move a

play06:00

little more slowly and dot all the i's

play06:02

and cross all the t's some basic

play06:04

examples would be you know if there's a

play06:05

medium risk of exposing customer data

play06:07

with this new feature but the new

play06:08

feature is gonna close a giant deal you

play06:10

know do they want to move forward with

play06:11

that or do they want to fix the issue

play06:13

first before moving on or do you block

play06:15

installation of software on employees

play06:17

laptops or do you trust them to use

play06:18

their best judgment and and let them

play06:21

install whatever they want or do you

play06:22

have air gap systems free most sensitive

play06:24

a slight tangent here related to risk

play06:28

third party risk do you really know

play06:29

where your data is so you might think

play06:30

you have a small AWS and GCV or GCP

play06:33

footprint but your data could be going

play06:34

to all kinds of places thanks to G suite

play06:37

plug-ins slack plugins Chrome extensions

play06:39

all that sort of

play06:40

so I recommend turning on a lot

play06:42

whitelisting from the beginning so you

play06:43

can start getting a handle on this sort

play06:44

of stuff especially things that have

play06:46

access to G Drive because that's where a

play06:47

ton of sensitive business information is

play06:49

these days definitely don't take more

play06:51

than like a day to answer those requests

play06:52

otherwise you're gonna be holding up the

play06:53

business which pisses off a lot of

play06:55

people which I'll go into a little bit

play06:56

later and then take an inventory of

play06:58

applications and and integrations try to

play07:00

gather some security information on them

play07:02

good luck if you're a small company and

play07:03

trying to get any sort of response out

play07:04

of security at whatever company calm and

play07:07

then create a basic risk spreadsheet so

play07:08

you can track your assets and your risk

play07:09

I do something basic like likelihood of

play07:11

compromised times impact / remediation

play07:13

effectiveness equals your risk just a

play07:15

good basic idea you can get fancy or

play07:17

something like cbss if you want remember

play07:19

that third party and subprocessor

play07:21

inventory is kind of important for GDP R

play07:23

and C CPA you definitely need to know

play07:24

where your data is going and who your

play07:25

sub processors are back to little more

play07:27

the strategy threats so finding your

play07:29

your cyber threats and ideally your

play07:31

physical threats as well you can use

play07:32

miters attack framework for some ideas

play07:34

you can also use Verizon's D bi report

play07:36

shout out to Alex Pinto I know you're in

play07:37

the audience riding a capybara somewhere

play07:39

and then you can use this CB SS for

play07:41

ranking them unauthorized access to data

play07:43

data being held ransom using trusted

play07:45

access to access your customer or attack

play07:48

your customers those those are some of

play07:49

the big ones

play07:50

talk to the co-founders and get their

play07:51

input see if they agree with you see if

play07:53

they've got some other ideas see what

play07:55

are the biggest threats next you're

play07:56

gonna start setting culture because

play07:58

security isn't just about technology

play07:59

it's definitely the people - I'll get

play08:00

more into that in a couple slides and

play08:02

then good security culture makes it

play08:04

easier to integrate into the business

play08:06

start building trust and getting into

play08:07

those important teams and workflows and

play08:09

I'll get more into that too in a second

play08:10

and the last part of the strategy here

play08:13

so then comes every engineers favorite

play08:16

part the policies you might be able to

play08:19

actually skip these if you're lucky if

play08:20

you don't have a bunch of laws and

play08:21

certifications to comply with but you

play08:23

may actually have large customers that

play08:25

the man do you have certifications so

play08:26

you're back to square one I recommend

play08:28

getting templates from whoever you're

play08:29

outsourcing compliance to also if you

play08:31

want to go the cheap route which might

play08:33

take a little more effort you can go to

play08:34

most universities websites all their

play08:35

policies are typically public work

play08:37

smarter not harder harder copy and paste

play08:39

and let's see then - of course tweak

play08:42

them to fit your business so do you

play08:43

really need that 10 page password policy

play08:45

or you can just go with you know a

play08:46

paragraph you don't really need to go

play08:48

crazy and then lastly you start putting

play08:50

the controls in place this is where all

play08:51

of us engineering types are most

play08:52

comfortable so

play08:53

things like 2fa anti-malware inventory

play08:55

access control yada yada yada you're

play08:58

gonna select those controls based on

play08:59

these inputs you've gotten in the

play09:00

previous steps and select what's right

play09:02

for the business so you know you're

play09:03

probably not gonna have three FA on an

play09:05

air-gap network with you're just selling

play09:07

cad emojis so keep it simple that's one

play09:09

of my guiding principles that I'll go

play09:10

into in a minute and then iterate put

play09:12

the basics in place and then improve as

play09:13

you go along so if you haven't been in a

play09:15

small company before you might be most

play09:17

comfortable with like hey I need to get

play09:19

this done 100% right the first time but

play09:21

you're gonna realize that you know

play09:24

you're gonna want to get like 80% there

play09:26

at a startup cuz you're gonna be moving

play09:27

in tons of directions with one pair of

play09:28

hands and then come back and finish the

play09:30

20% later remember that perfect is the

play09:32

enemy the good guiding principles so

play09:36

guardrails not gates is a saying I got

play09:38

from Jason Shannon from my time at

play09:39

Netflix so people hate hearing no it

play09:41

definitely gets in their way prevents

play09:42

them from doing their job yeah you

play09:44

become a source of their anger so they

play09:45

won't want to come work with you again

play09:47

they'll definitely try to go around you

play09:48

so don't hold up the business unless

play09:49

it's something critical let people get

play09:51

their jobs done and like I said you're

play09:52

here to serve as an advisor you're not

play09:54

the military and be wanted not feared

play09:56

you know do you want to be this feared

play09:57

security person or do you want to the

play09:59

one that people love to work with which

play10:00

one is going to get better results for

play10:01

you definitely create an approachable

play10:04

and positive security culture people are

play10:05

gonna want to bring you their questions

play10:07

and issues rather than you having to go

play10:08

and dig them up which takes a lot a lot

play10:10

more time

play10:10

I'll go into that in a little bit and

play10:11

then keep it simple like I mentioned

play10:13

here so complex policies and procedures

play10:15

are gonna be hard to maintain and there

play10:18

we go scroll and they're definitely

play10:20

gonna invite people to the point of

play10:21

going around them so choose short

play10:24

policies she's paying the security

play10:25

reviews choose platforms of service

play10:27

choose erode trust choose life choose

play10:28

Trainspotting references keep it simple

play10:31

and you're gonna remove an entire class

play10:32

of security concerns like

play10:33

platform-as-a-service has almost no

play10:34

infrastructure to administer remained

play10:36

IRB's insecure zero trust is gonna you

play10:39

know eliminate a bunch of traditional

play10:40

network security architecture and and

play10:42

network security concerns so you've got

play10:44

one pair hands so let AWS and GCP take

play10:47

care of all those old school security

play10:48

issues for you shameless plug for

play10:50

minding my talk from a couple years ago

play10:51

on zero trust and it flicks and then

play10:54

make people self reliance so they can be

play10:55

your hands your hand or sorry your eyes

play10:57

and ears because you can't be everywhere

play10:59

at once so give them the tools you know

play11:01

to be on that paved path that's inside

play11:03

the guardrails and the education to use

play11:05

them because you won't

play11:06

have the time de birria around and be

play11:08

involved in every single security

play11:09

decision

play11:10

let me start getting the culture here

play11:12

how well you integrate into the business

play11:13

is Howie

play11:15

well you integrate security into the

play11:16

business is gonna depend on the

play11:17

principles you set like the also the

play11:19

culture and how your you and your future

play11:22

team interact with people so be

play11:24

transparent you know if you're gonna

play11:25

install something on someone's laptop

play11:26

the first thing they're gonna be like

play11:27

what's what's going on here you've

play11:28

spying on me it's like no we're this

play11:30

thing is gonna catch malware for you

play11:32

it's gonna it's gonna protect you

play11:33

there's literally no way can spy on you

play11:35

here's the manual if you want to double

play11:36

check just having some some rapport with

play11:38

the person showing them what's going on

play11:40

and and being transparent on your

play11:42

decisions I appreciate people so say

play11:44

thank you it's simple but it goes a long

play11:48

way just hearing thank you in the office

play11:49

really goes really improves a lot of

play11:51

things like a relationship with people

play11:52

you know what I do is if someone that

play11:55

has helped improve security some way or

play11:57

they report a good phishing attack or

play11:58

whatever I give a security shark award

play12:00

at our All Hands meetings so it's like a

play12:02

Amazon gift certificate I'll say hey

play12:03

person X did this thank you very much

play12:05

and give them a little reward gets gets

play12:07

the word out there keep security in

play12:09

people's minds and also says thank you

play12:10

to the person and be humble so no one

play12:12

works no one wants to work with a

play12:13

brilliant jerk we've all worked with

play12:14

brilliant jerks I do jujitsu and it's

play12:17

taught me many things most importantly

play12:19

is that you're gonna learn of course

play12:20

from people above you and you know your

play12:22

peers probably ideally but you're also

play12:24

gonna learn from people below you so

play12:25

treat everyone with respect to treat

play12:27

everyone as a pro that you can learn

play12:28

something from you know say like hey

play12:31

this area is not my area of expertise

play12:33

can you teach can you teach me how

play12:34

something about this and we can work

play12:35

together on this issue it's exactly what

play12:37

I did with some apps egg phones we had I

play12:38

can barely spell apps X so I went to our

play12:42

head engineer was like hey we've got

play12:44

this issue can you explain it to me can

play12:46

we work together like how can we fix

play12:47

this and the two of us worked on it

play12:48

together which goes much better than

play12:50

just like hey fix this for me feedback

play12:53

so you can't improve and you definitely

play12:55

should want to improve so you can't

play12:57

improve in a vacuum ask people for

play12:59

feedback see the conversation with

play13:00

examples like hey we just rolled out

play13:01

this tool would you think about it or

play13:03

we're gonna do this what you think about

play13:04

that or in this meeting I said this did

play13:05

I sound like a jackass what do you think

play13:07

how can i how can I improve empathy so

play13:09

always assume good intent you know

play13:11

people are just trying to get their jobs

play13:12

done you know some traditional security

play13:15

person might hear like oh hey person

play13:16

comes up to you and says I need an FTP

play13:18

server right now like I need to transfer

play13:19

this file and you might go whoa

play13:20

head explode but no take take a step

play13:22

back and realize okay let's dig in a

play13:24

little bit this person's trying to get

play13:25

their job done okay they have this

play13:27

important file for the CEO or whoever

play13:28

they need to transfer it now they just

play13:30

didn't realize that we've got a paved

play13:31

path here to like get this transferred

play13:33

security and quick it's securely and

play13:34

quickly or maybe they don't have an

play13:36

option right now so then you come up you

play13:38

work with them to come up with a more

play13:39

secure solution so I always assume good

play13:41

intent the little things speak English

play13:44

not techie either couple these points

play13:47

were in some of the other talks as well

play13:48

it definitely alienates people if you're

play13:50

going to talk about the lithium crystals

play13:51

and rotating your cables every hundred

play13:53

thousand packets that sort of thing you

play13:55

know if you're talking to legal they're

play13:56

gonna be like what in the hell are you

play13:57

talking about they're not gonna want to

play13:57

come back and talk to you again so

play13:59

tailor your your level of techie to the

play14:02

audience and say hi in the hallway make

play14:04

eye contact just basic interpersonal

play14:07

skills I mean not just on your team but

play14:09

like random people in the office it

play14:11

definitely improves the the culture and

play14:13

it helps get you get you integrated into

play14:16

the company let's see and also try it

play14:20

out in the real world it's nice and then

play14:22

last thing on security culture is

play14:23

setting the elevator back down so use

play14:25

your position of power at the top to

play14:26

help out others below you we're never

play14:28

gonna increase diversity or fill hiring

play14:30

gaps if you don't get out they like

play14:31

spend some effort trying to get out

play14:32

there finding women of minorities who

play14:34

either work with you or outside the

play14:35

office interns recent college graduates

play14:37

we're trying to start their careers

play14:38

invite them to conversations and

play14:40

projects and write them to industry

play14:42

events try to help them try to help them

play14:43

build their network give them career

play14:44

advice high school teachers definitely

play14:46

need people to come talk and inspire

play14:47

their students

play14:48

you can skip fancy universities people

play14:50

at community colleges high schools and

play14:52

poor school districts are gonna

play14:52

definitely appreciate it and use it a

play14:54

lot more integrating the companies

play14:57

socialize so start building

play14:58

relationships and trust across the

play15:00

business you know you you're gonna need

play15:02

to work with engineering for production

play15:04

type stuff IT for malware and corporate

play15:06

type stuff legal for contract review

play15:08

sales for incoming Security

play15:09

questionnaires go talk the sales team

play15:11

and ask how many deals if you we lost

play15:13

because we didn't have security thing X

play15:14

and that'll show that you're trying to

play15:16

help out the security team you can also

play15:17

take that number to leadership and say

play15:19

hey we need to spend a bunch of money

play15:20

and here's one of the reasons why we've

play15:21

you know

play15:22

trade-off of cost there times really

play15:25

running out and then find that the major

play15:28

stakeholders and the team leaders meet

play15:30

with them regularly over lunch and

play15:31

one-on-ones and then try to build a

play15:33

relationship you like I talk

play15:34

about increasing visibility so you want

play15:37

to find the security issues and also

play15:39

keep yourself visible in the eyes of the

play15:41

rest of the company so you know have new

play15:43

employee security training yearly

play15:45

security training developer security

play15:46

training go to the other teams all hands

play15:48

it's like a fly on the wall to keep your

play15:50

finger on the pulse and hear what's

play15:51

going on security related there of

play15:52

course don't over communicate because

play15:53

people are gonna because people are

play15:54

gonna get alert fatigue and just start

play15:56

ignoring you after a while and remember

play15:57

to tailor the content to the specific

play15:59

audience don't blast out email to the

play16:00

entire company if it only applies to

play16:01

half the company and then recruit people

play16:03

on the other teams who are interested in

play16:05

securities to be your to be your eyes

play16:06

and ears and potentially hands to help

play16:07

you fix issues and report things

play16:09

collaborate don't be a dictator don't

play16:11

just throw stuff over the fence like I

play16:12

mentioned earlier it's gonna go much

play16:14

better if you could say hey how can we

play16:15

work on this together rather than just

play16:16

like here please fix this problem

play16:19

[Music]

play16:20

engagement so we all know security is a

play16:23

dry topic like hey pick a strong

play16:25

password don't share your password don't

play16:26

do this don't do that I like to get

play16:28

creative make a little fun here's the

play16:30

security shark award that I hand out

play16:33

with the Amazon gift certificate at the

play16:34

All Hands meetings when I was at Netflix

play16:37

did some security education posters

play16:39

around the office in October this one

play16:41

was pushing password managers who

play16:43

doesn't love hedgehogs the head of legal

play16:44

said she loved this one also two-factor

play16:47

off I know somebody here was attending

play16:49

had an icon of a sloth thank you

play16:52

and then a little last one or a couple

play16:55

more slides our white elephant Christmas

play16:57

party a couple years ago my contribution

play16:59

for the gift pile was a picture of

play17:00

myself which people thought was

play17:01

hilarious until I told them that there

play17:04

was a hidden gift card in there so they

play17:07

did the trading and then eventually

play17:08

pulled apart they didn't find a gift

play17:09

card so what they did they took awhile

play17:11

but they eventually found out if you

play17:12

held the picture over heat source the

play17:14

Amazon gift card was written in lemon

play17:15

juice and then it appeared the CEO loved

play17:18

that so much that he now hides this

play17:19

picture regularly around the office with

play17:21

another card hidden in it a coffee card

play17:22

and then if you find it you get to hide

play17:24

it for the next person people love that

play17:26

so much that they took my picture and

play17:27

then put it on put on t-shirts for our

play17:30

one of our Halloween costume competition

play17:33

things and on the back you'll see

play17:34

there's a bunch of letters and if you

play17:35

unscramble that you found out where the

play17:37

prize was now I have a picture a write

play17:40

up a t-shirt with my picture on it which

play17:42

is weird

play17:44

anyway I love wearing it around it's

play17:46

great make me look famous or something

play17:48

and last thing oh good I think it's

play17:50

gonna work out physical security why

play17:52

would you care about physical security

play17:53

you know maybe you want to learn

play17:54

something new you know really who else

play17:57

is gonna do it at startup so there's a

play17:59

lot of similarities with InfoSec so

play18:00

you've got badges and doors for

play18:01

authentication and access controls you

play18:03

got cameras facing ideally out the

play18:06

external doors for after the fact

play18:07

monitoring Remer do not face the cameras

play18:09

in that tends to creep people out and

play18:11

likely you're not gonna have alarms

play18:12

because ideally people are taking their

play18:13

laptops homes at home at the end of the

play18:15

day you've gotta be on Corp Network so

play18:16

if someone does plug into your network

play18:17

whatever that's nice and then you know

play18:21

people also forget to set alarms anyway

play18:23

so they're kind of useless yes sir thank

play18:25

you and then other things you know like

play18:28

you're only gonna have to worry about

play18:29

theft for really the first few years but

play18:31

as you get bigger you might want to

play18:32

start investing in guards and there

play18:34

could be domestic violence issues is one

play18:35

of the big ones that comes up targeted

play18:37

attacks higher you know as you is your

play18:41

leadership gets higher profile maybe

play18:43

attacks against them that sort of stuff

play18:45

you know I've heard of things like teams

play18:47

of doing international extractions on

play18:49

like big physical security teams but

play18:50

don't worry about that really all you

play18:51

have to worry about his theft keeping

play18:53

the doors locked and then auditors to

play18:55

satisfy cameras to satisfy the auditors

play18:58

and potentially like tracking down what

play18:59

got stolen and I went a little fast

play19:02

because we lost some time with filling

play19:04

the theater but I think I got in under

play19:06

the wire I don't think I have any time

play19:08

for questions but I'll take softball

play19:10

questions outside and then if you want

play19:14

to you can add me on LinkedIn I will be

play19:16

happily answer any questions via

play19:17

LinkedIn or just find me outside and ask

play19:19

your questions thank you

play19:21

[Applause]

Rate This

5.0 / 5 (0 votes)

Étiquettes Connexes
Security ProgramCybersecurityComplianceRisk ManagementZero TrustStartup CultureData ProtectionPolicy CreationSecurity StrategyBusiness Integration
Besoin d'un résumé en anglais ?