CogInjection - Protecting a Better Internet

Transcription

CogInjection - Protecting a Better Internet
Cognitive Injection:
Herding Lizards for Fun, Profit, and Safety
Andy Ellis
Chief Security Officer
@csoandy
Stupid
Why Do People Make “Bad” Decisions?
Incomprehensible
Business Owner
Security
Modal bias!
@csoandy A typical business risk conversation
Business Owner
Here is my project. Is it safe?
That’s really long.
Can you fill it out
for me?
Really? Is that a
showstopper?
@csoandy Security
Here’s our ISO 27002
checklist of every mistake anyone’s ever
made. Prove you haven’t.
Sure. You have a bunch of esoteric risk here.
If I say yes, you’re going to
override me, aren’t you?
And if I say no, I’m in
trouble if this goes wrong...
Security Poverty Line
Organizations that don’t have enough resources to implement perceived basic security needs.
Security
Subsistence
Syndrome
“I can’t even do the
barest minimum to
cover my ass, so I’d
better not do
anything but cover
my ass.”
Accruing Technical Debt
With every step
forward, the undone
work increases risk
and makes future
steps harder.
This is a dangerous way to operate!
@csoandy Historical paranoia
“Monkey on rope ladder” © CC-BY-SA 2010 Rachel Coleman Finch
@csoandy The economics of the Prisoner’s Dilemma
Cheat
Cooperate
13% of the *me!
@csoandy Cooperate
Cheat
-­‐3
-­‐3
-­‐1
-­‐10
-­‐10
-­‐1
-­‐5
-­‐5
40% of the *me!
Adding value: “measuring” a security program
@csoandy Security value balances perceived risk
@csoandy SECURITY VALUE
PERCEIVED RISK
Tolerance of perceived risk drives to a stable equilibrium
How much security is “good enough”?
“Perfect” security
SECURITY VALUE
What you need to fend off a persistent adversary
Where a good assessor can help you
“Good” security
Sufficient against the casual adversary
Enough to convince a serious auditor
Enough to fool the standard auditor
What your organization thinks it can get away with
@csoandy How much security is “good enough”?
“Perfect” security
SECURITY VALUE
What you need to fend off a persistent adversary
Where a good assessor can help you
“Good” security
Sufficient against the casual adversary
Enough to convince a serious auditor
Enough to fool the standard auditor
What your organization thinks it can get away with
@csoandy Peltzman Effect
What your organization thinks
thinks it can get away with
Organizations
don’t think:
@csoandy People do.
Thinking, Fast and Slow
Or do they?
@csoandy System 1: The Fast Lizard-Brain
@csoandy System 1: The bigot
@csoandy System 1 vs System 2
LEFT
LEFT
LEFT
LEFT
@csoandy RIGHT
RIGHT
RIGHT
RIGHT
System 1 vs System 2
@csoandy LEFT
LEFT
LEFT
RIGHT
RIGHT
RIGHT
RIGHT
LEFT
System 1 in action
Annual Security Awareness Training is required by all employees to ensure your compliance with the security policies of the company while conducHng your daily tasks in furtherance of our goals to protect company data, systems, and informaHon against malfeasance, adversarial acHon, and other systemic failures that might be introduced by an inaLenHon to appropriate risk management acHviHes or non-­‐compliance with industry standard best pracHces as laid out in various control frameworks such as ISO 27002, PCI, HIPAA, SOX, SSAE-­‐16, NIST 800-­‐53, FedRAMP…
@csoandy It’s not a ROSI scenario
$5B
.01%
N/day!
Loss: $5M
Probability: 10%/yr
$50K
$14K maintenance
ALE: $500,000
10% reducHon in events
Cost:$26K/yr
Savings:$50K/yr
@csoandy people
What do organizations consider risk?
lizards
Business Owner
Is my P/L good? Will I gain market share?
Sales
Can I meet my quota with this?
Employees
Will I have a job?
@csoandy CEO
Is this profitable?
CFO
Is this a good allocation
of resources?
Security
Is this safe?
PERCEIVED RISK
SECURITY VALUE
Set-point theory of risk tolerance
Perceived risk tolerance seeks a stable equilibrium!
@csoandy SECURITY VALUE
PERCEIVED RISK
A C T U A L R I S K*
Unmitigated Risk Psychosis
*not actually actual risk
Attempts to leave residual risk may result in new risk budgets!
@csoandy SECURITY VALUE
PERCEIVED RISK
ACTUAL RISK
Training Lizards
Risk management is like muscle memory.
@csoandy Perceived Risk vs. Actual Risk
“FUD”
PERCEIVED
awareness
threat
ignorance
stealth
improvements
risk reduction
security
theater
ACTUAL
@csoandy known
vulnerability
blind
compliance
Actual Prisoners in a Dilemma
Cheat
Cooperate
30% of the *me!
@csoandy Cooperate
Cheat
-­‐3
-­‐3
-­‐1
-­‐10
-­‐10
-­‐1
-­‐5
-­‐5
19% of the *me!
Where is your residual risk?
Business Owner
Competitors are gaining.
Have to move faster!
Sales
That last product didn’t sell.
I’ll sell something else.
Employees
This business is unprofitable.
Update my resume!
@csoandy CEO
Products A & B are
high risk. C should be safer.
CFO
You came in over budget.
Are your numbers accurate?
Security
Here’s our ISO 27002
checklist of every mistake
anyone’s ever made. Prove you haven’t.
A better business risk conversation
Business Owner
Here is my project. Is it safe?
Wait, what?
Security
I don’t know. Is it?
Here’s how to think
about safety. Do you
think your product is
safe?
Ummm....
Here’s my assessment of my risk. I think this is reasonably safe.
@csoandy Great, glad to hear it. Can you fix those
outliers in your next release?
How do you get better?
@csoandy Takeaway: Improve security value
!
!
Andy Ellis
aellis@akamai.com
@csoandy
http://www.csoandy.com/
Goal of any security program: dv/dt > 0
Below the Security Poverty Line, we see Security Subsistence Syndrome:
relying on resources, not capabilities.
Goal: dr/dt > 0
A good security program wants to create surplus.
Goal: dc/dt > 0
@csoandy Questions, Answers, and Pontifications
!
!
Andy Ellis
aellis@akamai.com
@csoandy
http://www.csoandy.com/
@csoandy 

Similar documents