T.E.N. Knowledge Base

ISE® North America 2016

Deception as a Security Discipline: Going on the Offensive in the Cybersecurity Battlefield  > Download Whitepaper
In reality, the idea of keeping attackers completely out of the network is fundamentally flawed. As human error is, by nature, prone to occur, and attackers will continue to get more sophisticated and targeted in their tactics, even the “castle with the tallest walls and largest moats” can be penetrated. A different approach is needed; one that has been used for decades to beat attackers at their own game. Rather than watching every movement and action on the network, and correlating with “known good” behaviors to assess maliciousness, set traps that mimic the attackers’ targets, and lay bait to lure the attackers into these “no way out” traps. At its core, deception, as this approach is called, is about tricking a foe into engaging and revealing itself—the antithesis of the foe’s intent—and without the foe realizing that it has been discovered.



Enterprise Cyber Risk Management – Protecting IT Assets that Matter  > Download Whitepaper
Protecting IT assets is a complicated business. With so many moving parts and concerns, it’s no wonder how quickly security teams can be overwhelmed by the threats and vulnerabilities barraging their enterprises every day.



Solving the Encryption Conundrum in Financial Services  > Download Whitepaper
Encryption has gone mainstream.

In March this year, WhatsApp announced that it would encrypt all users’ communications. Viber and Facebook soon followed suit. In one fell swoop, these three companies shifted the user base of strong encryption from what most believed to be whistleblowers and journalists to almost three billion people worldwide.

Meanwhile, government bodies are busy endeavouring to weaken strong encryption in the interest of national security as technology companies, opposed to such a precedent, are arguing that the privacy and the security of millions of innocent citizent would be at risk.

The encryption debate has captured the world’s attention. And coupled with the inevitability of another notable data breach, awareness of encryption as a tool to mitigate threat is at an all-time high.



Yusuf Kapadia
CIRC - Global Operations Manager and Regional Manager Americas
ADP
Biography

Detecting and Addressing Security Attacks Through Behavioral Analysis  > Download Presentation
Over the last few years ADP has been focused on looking for tools specifically designed to help better analyze security and business transaction data in order to protect client funds and data. Without tools that take historical security event behavior into account, it is difficult for teams to detect targeted threat actors. To address this issue, ADP developed an advanced approach with its Global Enterprise Behavioral Profiling program. It allows for deeper insight into long-term behavior of an associate’s user accounts; systems used; and “act as” functionality of users by implementing a global user behavioral analysis technology. Implementing this technology has given ADP’s threat monitoring analysts a massive boost in productivity—identity profiling and group/network zone comparisons that used to take weeks now takes minutes. Join us to learn how ADP’s project provides significantly more confidence in investigations free from human error, and how their analysis, raw log collection, and analytics are automated and provided in real time.


Jeannette Rosario

Jeannette Rosario
Director, Global Security
Aetna
Biography

You Only Have to ASK: Security Assurance in the Assessment Security Knowledgebase  > Download Presentation
With the continuous increase in threats, the number of regulator, auditor and customer inquiries surpassed 40,000 in one year. Aetna created the Assessment Security Knowledgebase (ASK) which has reduced the number of single inquiries by 15,000. ASK is based on two critical parts: the Security Portal, an internet accessible portal presenting Aetna’s security capabilities, and the Audit Locker, an automated internal tool for auditors to validate security controls. Together they help maintain control over the level of requests while also consistently meeting common regulatory requirements. The program has resulted in significant cost savings due to the consolidated efforts and efficiency of ASK—audit assessments that took months to complete can now be done in weeks. Join the conversation to learn how the Aetna team was able to make significant returns on investment by more efficiently receiving and addressing requests, solving an unaddressed problem of corporate America: an overload of internal and external audit assessments.


Johannes Jaskolski
Distinguished Member of the Technical Staff
AT&T

Peter Galanis
Director, Security
AT&T

Simplifying and Refining Secure User Authentication  > Download Presentation
The unprecedented threat levels present in information security today necessitate advanced authentication technologies beyond simple passwords and security questions. However, more complex authentication methods can run the risk of being difficult or confusing for users to implement, and attackers are still consistently able to uncover ways to impersonate users and bypass typical authentication methods. AT&T worked on a solution that would provide high-level authentication that was not only significantly more secure, but also effortless for the end-user to utilize. Furthermore, these methods had to be so finely tailored to users that potential threats would be unable to replicate the responses or information required. Join AT&T as they tell us how their Identity and Access Management Platform integrates commercial software elements with custom developed technologies to provide highly unique authentication options that are effortless for an end-user to implement and extremely difficult for attackers to compromise.


Harold Dibler
Managing Director, Business Technology
Best Western
Biography

Transforming User Accounts: Access Management, Security, and Stability  > Download Presentation
For Best Western Hotels & Resorts, creating user accounts within a significant client base and providing the correct access heavily relied upon company help desk assistance due to the use of a home-grown system, and opened up the accounts of many users to potential risk. This home grown system also led to difficulties in establishing partnerships, as the process worked slowly and delayed the rollout of new products to market. As a result, Best Western sought a solution that made many of their user account and partnership creations more efficient and secure. This led to establishing their Business Transformation Project. Through it, Best Western upgraded its identity and access management capabilities from a home-grown account management system using outdated SSO implementation to an industry-leading Identity Management Suite and SSO/Web Access Management solution. Learn how this program has streamlined account creation, access and management, nearly eliminating any assistance from their help desk; tightened security around all accounts to protect client information; and significantly sped up the process of establishing partnerships to improve time to market for its products.


Raj Rajagopalan
Senior Security Architect, Enterprise Risk & Security
Cox Automotive
Biography

A Lean Approach to Enterprise Security  > Download Presentation
Cox Automotive is a heterogenous federated Enterprise whose goal is to transform the way the world buys, sells and owns cars. To do that Cox Automotive follows the Lean Business model of being nimble, customer focused and innovative. Securing such an environment requires a matching approach, Lean Security whose primary focus is to Enable Business. The fundamentals of the approach are to see Security as an intrinsic aspect of Quality and Quality as an indivisible part of the development to production process. This includes the concept of Shift Left introducing Security into the requirements process, educating Development and QA teams on Security concepts and automated Security scanning of all code on a continuous basis.


name

Gary Hayslip
Deputy Director/CISO
City of San Diego
ISE® West Executive of the Year Award Winner 2015
ISE® North America People's Choice Award Winner 2015

Biography

Cyber, The Path to CISO: How Cyber is Evolving the Role of the Modern CISO  > Download Presentation
The path to being a CISO is not for the faint of heart. Gary Hayslip started his journey over 20 years ago, and as with many who are now CISO’s it has been filled with positions other than cybersecurity. This brings us to the nexus of our discussion, to be a CISO there are unique challenges and specific paths that we follow in response to them. However, in today’s dynamic environment we find our original role as CISO is evolving, organizations seek to understand how to use cybersecurity as a strategic business process and it’s up to us as Security Executives to lead that discussion and define the value of our security programs.


Richard McClure
GVP, Business Continuity
SunTrust
Biography

Leveling Up Your Organization’s Business Continuity  > Download Presentation
SunTrust’s DR Next Project set out to support a 5 year Business Continuity Program by heightening recovery preparedness and operational excellence through broader testing, infrastructure flexibility, and administration optimization. DR Next key elements, including end-to-end transactional testing capabilities, consolidation of standards, application level recovery, and extended accessibility to DR environments were delivered. The project also addressed concerns around broader testing capabilities and maturing of these capabilities as well as solicited input across the enterprise including business, delivery managers, and operational owners to develop a common and holistic testing strategy. Learn how this multi-year program has elevated the level of preparedness and risk management for the organization while supporting and managing long term operational excellence.


Sponsored by

echoworx

Tony Spurlin

Tony Spurlin
VP and CSO
Earthlink
Atlanta, GA
ISE® North America People's Choice Award Winner 2005
Biography

Security from the Inside: Combating Insider Threats  > Summary
While the popular view of most security threats tends to be of outsiders, the last few years have also seen an increasing emphasis on threats to the enterprise from the inside. Insider threats can range from something as simple as a negligent employee who clicks on a bad email link to a disgruntled employee with privileged access to sensitive data and portions of the enterprise. A 2016 survey on insider threats by Bitglass revealed that one in three organizations interviewed had experienced insider attacks, with 56% saying they have gone up in the past year. Organizations are starting to see improvements in detecting insider threats however. In the same survey, 64% of the respondents said they can now detect breaches within a week, compared to the previous year where only 42% were able to do so. While there have been some improvements in dealing insider threats, there still remains a strong need for a more vigilant and proactive approach to identifying, isolating, and mitigating damage from these kinds of attacks.


Paul Huesken

Paul Huesken
Chief Information Assurance Officer
The Coca-Cola Company
ISE® Southeast & ISE® North America Judge
Biography

Protecting Data: Keeping the Keys to the Kingdom Out of the Hands of Hackers  > Summary
Breaches invariably involve data loss (for example: Anthem, JPMC, and Target), so finding the best practices to prevent them should be an essential part of your organization. Protection of data can be done at multiple network levels and can involve encryption, masking, or tokenization. The many options for data security offer a variety of security advantages, but they each have their own flaws to take into consideration. These include issues like malicious insiders abusing encryption keys, malware-based bypasses, and overall costs. Join our conversation to learn what kinds of secure data solutions are best for your business requirements; why and when to use each solution; and how you can combine solutions to minimize risk.


Dan Solero

Dan Solero
Executive Director, Tech Security
AT&T
Biography

Maintaining Security on the Move: Best Practices for Securing Mobile Apps  > Summary
In our era of mobile technology, there are millions of applications available for mobile device users to download. According to a report by Statistica, there were over 4 million applications available from Google Play (2.2M) and Apple’s App Store (2 M) alone as of June 2016. The list seems endless and new apps are popping up every day. It should come as no surprise that smartphones and tablets are targeted by threat actors and present a large security risk to end-users and companies. Compounding that risk is the fact that many companies aren’t investing enough time or money for mobile application security. In fact, 65% of people surveyed by the Ponemon Institute said that security of mobile applications is sometimes put at risk because of the “rush” to meet a customer need or market opportunity. Securing mobile applications against threats posed by cyber theft, malware, and viruses requires balancing the need to release applications quickly with the rigor and discipline required by secure coding and testing best practices for application development.


Dimitra Kane

Dimitra Kane
Enterprise Architecture, Sr, Manager
Discover
Biography

Ransomware on the Rise  > Summary
Malware has long been the bane of many security professionals. However, a more frightening evolution in this long-time InfoSec foe has become increasingly dangerous and more prevalent in recent years. Ransomware has continued to grow as one of the most prevalent threats to industries of all shapes and sizes. A 2015 report by McAfee found a huge jump of late, from 257,357 new ransomware samples in the first half of 2014, to 380,652 in the second half. By the first half of 2015, that number jumped 5.3 times to over 2 million. In 2016, we saw several increasingly high-profile examples, including, most notably, the case of Hollywood Presbyterian Medical Center, a 434-bed hospital whose network effectively ground to a halt after hackers breached the system in early February. After relying on pen and paper records briefly, Hollywood Presbyterian paid the 40 bitcoin ($17,000) ransom to regain control of its network. As ransomware continues to spread, what can security professionals do to better protect themselves from this most malevolent of malware?


Shelbi Rombout

Shelbi Rombout
SVP, Deputy CISO
Mastercard
Biography

Social [Media] Security: The Impact of Social Media on Information Security  > Summary
Social media has become such an integral part of our day to day actions that we sometimes neglect to consider the greater impact it has at the business level. Cyber criminals run rampant across every social network today. While we see headlines about social marketing faux pas and account hacks, those are just the tip of the security risk iceberg. Companies’ poor social media security practices can put their brands, customers, executives, at serious risk. According to Cisco, Facebook scams were the most common form of malware distributed in 2015. The FBI said that social media-related events had quadrupled over the past five years and PricewaterhouseCoopers found that more than one in eight enterprises suffered a security breach due to a social media-related cyberattack. While adapting best practices for social media usage for employees is a decent start, there’s much more to be done. Security professionals must start treating social channels like the potential security threat they are and align strategies to effectively fend against the range of cyber techniques currently in use.


Selim Aissi
Chief Security Officer
Ellie Mae
ISE® West Executive Award Finalist 2015
ISE® North America Executive Award Finalist 2015 - Commercial Category

Biography

The Internet of Things is Here and Growing but are You Ready for it?  > Summary
The once nebulous Internet of Things has slowly but surely become a more defined and pressing issue for Information Security professionals as more organizations begin to adopt the IoT into their business structure. Gartner predicts that in the year 2020, 25 billion ‘things’ worldwide are connected to the internet with a collective economic value of two trillion dollar. While that still leaves current InfoSec professionals some time to adapt to a more pervasive Internet of Things, the question remains; “How ready is your organization for IoT adoption now?” Does your organization have the right skillsets and capabilities in place now to start investing in IoT related projects? Aside from all the innovative, technical and business skills needed, perhaps the greatest skill needed is the ability to understand what missing factors are in the organization’s capabilities.


Jennifer Cole

Jennifer Cole
CISO, VP of Information Security and Governance
ServiceMaster
ISE® Southeast Executive Award Finalist 2016
Biography

Preparing for the New Edge: Improving Security for Digital Business  > Summary
Digital expansion is reshaping organizational security and risk management. Mobile, cloud computing, social networking and the Internet of Things are just some of the factors driving this business transformation. A 2016 survey sponsored by Unisys Corporation found that 72% of executives surveyed show a strong commitment to adopting a digital business model, with the cloud as the key enabler. However, only 15% of respondents indicated that their organizations currently have the “extremely flexible/nimble” attributes required to implement a digital model that enables them to capitalize fully on future business opportunities. Gartner predicts that by 2020, 60% of digital businesses will suffer major service failures due to the inability of security teams to manage digital risk. Organizations must now address cybersecurity and risks in technologies and assets they no longer own or directly control. As more companies make the move to bigger digital business efforts, digital ethics, analytics, and people focus will become as important as technical controls.


Ed Yousfi

Ed Yousfi
Director, Security and IT Governance
Walgreens Boots Alliance
Biography

Securing What You Share: Improving Your Third Party Security  > Summary
When organizations start working with third-party vendors, they have to consider a variety of security concerns. These vendors often have access to valuable, sensitive corporate data, yet according to a 2016 study by the Ponemon Institute, more than one third of companies don’t believe these vendors would tell them if they had a data breach. Additionally, About 60% of respondents said they felt vulnerable because they were sharing sensitive data with third parties that might have weak security policies. While including data privacy and security procedures in third-party contracts to ensure vendors have appropriate measures in place to protect company data has become commonplace, it is difficult to evaluate how the vendor is protecting data from unauthorized access, use, and disclosure, and to know whether the vendor has appropriate contractual terms in place with downstream, who may also have access to your data. This disconnect creates a high-risk area for all industries as more and more data loss through third-party vendors results in a breakdown of trust and communication. To help prevent potential damages, organizations need to develop plans for working with third parties that involve data mapping vendors, contract specificity, and regular data audits.