How Silicon Valley startups are approaching security differently
-
Upload
scott-cressman -
Category
Technology
-
view
58 -
download
1
Transcript of How Silicon Valley startups are approaching security differently
![Page 1: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/1.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
How Silicon Valley startups are approaching security differently
a.k.a. The New Security Stack
Scott CressmanSenior Product Manager, OpenDNS
@scott_cressman
![Page 2: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/2.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org @scott_cressman
</me>
• BEng, Computer
• Early experience in Support & Professional Services
• Over 12 years in security doing Product Management
• Regularly work with security thought leaders of Fortune 500, Bay Area “startups”
<me>
![Page 3: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/3.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Agenda
@scott_cressman
• Baseline• Who are these “Silicon Valley startups?”• How do they approach security differently?• Bringing it all together• What can you do?
![Page 4: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/4.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
BASELINEWhy we’re here. Why they’re adapting.
@scott_cressman
![Page 5: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/5.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Last 20 years of security:
Got a problem?BUY A BOX
FIREWALL
@scott_cressman
![Page 6: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/6.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
VPN
EMAIL GATEWAY
WEB PROXY
DLP
NEW OFFICE
REPLACEMENT BOX
Another problem?ANOTHER BOX! Keep Stacking…
SANDBOX
FASTER ROUTER
FIREWALL
@scott_cressman
![Page 7: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/7.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
BUT, your users have left the building…
@scott_cressman
![Page 8: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/8.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
AND, your apps are in the Cloud…
@scott_cressman
![Page 9: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/9.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
DarkHotel Attack
OFF NETWORK AND SUPPLIERS
BRANCH OFFICE/STORE/CLINIC
HQ
Attackers are Targeting the Weakest Links
@scott_cressman
![Page 10: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/10.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
WHO ARE THESE “STARTUPS”?How they’re different
@scott_cressman
![Page 11: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/11.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Who are they?
@scott_cressman
![Page 12: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/12.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
How do they work?
@scott_cressman
![Page 13: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/13.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
What do they value?
@scott_cressman
Productivity over obstruction
Mobility over control
Visibility over prevention
Automation over repetition
Outsourcing over distraction
Partnership over dictatorship
![Page 14: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/14.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
HOW ARE THEY DOING IT?Differently…
@scott_cressman
![Page 15: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/15.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
A lighter touch
![Page 16: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/16.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org @scott_cressman
Mostly Microsoft
![Page 17: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/17.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org @scott_cressman
Content filtering focus
![Page 18: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/18.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org @scott_cressman
Traditional Web Proxy
![Page 19: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/19.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org @scott_cressman
Heavyweight endpoint agents
![Page 20: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/20.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org @scott_cressman
Off-network security VPN dependence
![Page 21: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/21.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Focus on mobility
@scott_cressman
![Page 22: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/22.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Off-network devices
@scott_cressman
![Page 23: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/23.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Maintain security without violating privacy
@scott_cressman
![Page 24: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/24.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Federate Identity
@scott_cressman
![Page 25: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/25.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Federated Identity is a prerequisite
@scott_cressman
![Page 26: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/26.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Identity always, everywhere
@scott_cressman
![Page 27: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/27.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
The device is expendable
@scott_cressman
![Page 28: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/28.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Optimize for productivity
@scott_cressman
+
=
![Page 29: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/29.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Invest in security teams & automation
@scott_cressman
![Page 30: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/30.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Internal focus on simplification & discovery
@scott_cressman
• “Internal” focus• Shift to discovery from prevention• Simplification of their “protection ecosystem”
![Page 31: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/31.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Demand openness from their vendors
@scott_cressman
![Page 32: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/32.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Analysts actually doing security
@scott_cressman
• Analysts spending time on analysis• Run security drills• Threat Intelligence sharing (STIX/TAXII)• Consumption of threat intel (e.g. FBI Flash
bulletins, FS-ISAC, etc.)
![Page 33: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/33.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Operationalize their intelligence
@scott_cressman
![Page 34: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/34.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Threat Intelligence Platforms
@scott_cressman
![Page 35: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/35.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
BRINGING IT ALL TOGETHERThe new Security Stack & Protection Ecosystem
@scott_cressman
![Page 36: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/36.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
The Shifting Security Stack
@scott_cressman
![Page 37: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/37.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org @scott_cressman
UMBRELLAEnforcementInstant protection on- and off-network.
ReportingNear real-time visibility on- and off-network of all DNS traffic.
INVESTIGATEIntelligenceEnrich threat intel and assist with investigations and IR (incident response).
context on domains,
IPs, or ASNs
GETInternal Systems
logs
SECURITY INCIDENT &
EVENT MANAGEMENT
THREAT INTEL
PLATFORM
logsGET
POSTevents
Example security lifecycle
![Page 38: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/38.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
WHAT CAN YOU DO?Today and in the coming months & years
@scott_cressman
![Page 39: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/39.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Revisit your priorities
@scott_cressman
![Page 40: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/40.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Demand more of your vendors
@scott_cressman
![Page 41: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/41.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Invest in (cloud) identity management
@scott_cressman
![Page 42: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/42.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
Invest in your security team & automation
@scott_cressman
![Page 43: How Silicon Valley startups are approaching security differently](https://reader038.fdocuments.net/reader038/viewer/2022103118/55c2ca66bb61eb9d768b482e/html5/thumbnails/43.jpg)
Celebrating a decadeof guiding securityprofessionals.
@Secure360 or #Sec360 www.Secure360.org
OPEN CONVERSATIONQuestions & commentary
@scott_cressman