YOU'RE SPECIAL (BUT NOT THAT SPECIAL)
DON’T DO SECURITY STUFF (JUST BECAUSE)
& THE MOST IMPORTANT WORD
IN BUSINESS (WHY)
Sandy Dunn, CISO Blue Cross of Idaho
June 7, 2018 pm
1
You’re Special
Don’t Do
Security Stuff
Data
Governance
Hot Potato
The Most
Important Word
in Business
*** Disclaimer ***
This presentation views and opinions are my own, and do not represent the views or endorsement of my
employer Blue Cross of Idaho. All the information is publicly available.
Topics
2
Data is to this century what oil was to the last one: a driver
of growth and change.
Flows of data have created new infrastructure, new
businesses, new monopolies, new politics and—crucially—new
economics.
Digital information is unlike any previous resource; it is
extracted, refined, valued, bought and sold in different
ways.
It changes the rules for markets and it demands new
approaches from regulators. Many a battle will be fought over
who should own, and benefit from, data.
https://www.economist.com/briefing/2017/05/06/data-is-giving-rise-to-a-new-economy
You’re Special
Thank you for inviting me to speak to the Northwest Data Governance Networking
meeting
Let’s face it, data governance people are the most important people in the organization.
You manage what is the “new oil”
3
Chief Information Security Officer
(CISO)
• Sheriff – tickets when people break the law (policy), run law breakers out of town, or at
least restrict their access
• Evangelist – More important part of the role is “evangelizing” deputizing every person in
your organization into the security team.
• Fierce protector of the organization, network, customers, assets
• Direct communication to business leadership on risk, impact, (As a security team we
must always think and act as a service to business, we can be the best security team on
the planet but if we don’t keep business success as the very top objective then nobody
has a job.
4
“You’re either a learning
organization or you’re losing to
somebody who is” Andrew Shafer
• I hit the wall of “Crisis fatigue” Comparing cybersecurity incident crisis fatigue to being a
villager where the boy cried wolf, not only are you not running to see if there is a wolf,
you actually hope there is one, and he will eat the sheep, so you can see your family,
and get some sleep.
• Determined to understand how to improve efficiency
• In the Goal Al states they have 4 priorities of orders, Hot, Very Hot, Red Hot, and DO IT
NOW
5
Mine worker x-rayed for diamond check 1954
But NotThat Special
• Think about looking outside of the development, data, and software world for building
process and controls.
• People have been creating process and controls for workers who required access to
valuables for centuries. I’m not suggesting you require everyone be x-rayed like what is
shown in this picture, but I am encouraging you to change the paradigm, leverage the
experiences from history and drive creative solutions at your organization.
• How do producers from around the world manage to consistently deliver, safe food into
grocery stores (for the most part) statistically pretty amazing !
• If there is a health risk, what is the process to identify, communicate, and protect
consumers ? Can we learn or replicate?
Picture reference https-3A__rarehistoricalphotos.com_mine-2Dworker-2Dx-2Drayed-
2Ddiamond-2Dcheck-2D1954_&d=DwMBaQ&c=NdSJ4ILlWpqW3-
KBBqEbZ68qQuJ1JYIOBIexwqzU-
qw&r=W5Rjnie4gKpHnLTKlYr9pJwYMQKBvKRm1dVVMZrxq6s&m=regfud8HICSfZzHV4tncw-
I0QUFAkq4GXyyszgrJuXo&s=JL6WCn7x6yn0K4090nX5IJOh-k-1Nj8J6TMuT1v9nIE&e=
6
Don’t Do Security Stuff Just Because
• Learn from code signing (and those who survived it)
• What, Who, How
• Avoid a $2000.00 fence for an $800.00 cow
• Reduce the attack surface
• No production data in dev or test
• Only as strong as the weakest link.
• Understand the trade offs
• Data Governance / key management headache
• Can restriction of granular access can be mitigated by better detective controls
• Recovery from back up harder
• Keys in back up
• Usability
• If they’re rogue they are crossing county lines
• There have been benefits from MS requiring all windows packages to be signed, but not
as much as there should be
• Limited rigor in the process around code signing and ensuring trusted process on
what was signed
• Lack of rigor around protecting the private key, keys stolen and then malicious
code trusted
• Revoking the key never happens, if a key does happen to be revoked, no way to
retro revoke. Can only revoke from current time stamp forward.
• One size does not fit all
• The first three questions I ask is “What do we need to protect, who do we need
to protect it from how do we protect it?
• Security is understanding requirements and putting controls in place that meet
requirements (no magic fairy dust required to “hack” and no magic fairy dust to
prevent)
• With news lines screaming, and panicky questions from management, the hyperbole
around security can pull you in but security investment needs to be a business risk and
impact discussion.
• Sometimes the risk can’t be justified to the investment, make sure everyone
agrees, have a paper trail
• Security is only as strong as the weakest link.. There is no value in mading15 character
7
passwords, but then not having policy that makes it a requirement employees must
adhere to.
• Understand the trade offs
• The longer the encryption key the more application performance slows down
• The more difficult or cumbersome security policy or process is the higher
likelihood people will skirt, escalate, or avoid the right way. Putting 5 locks on a
door that induvial use multiple times a day make it more likely someone will just
get angry and prop the door open.
7
Be Afraid of WhatYou Don’t See
Exiftool
Microsoft Documents
Adobe PDF
Browser Fingerprinting
Hidden Metadata in files can be an inconspicuous way that sensitive data is leaking from
your organization
8
Data Governance
Business Owner Legal /
Compliance /
Enterprise Risk
Data
Governance
Cybersecurity
Data
Stewardship
Identify data
roles &
responsibility
Define Requirements SME Audit / Enforce
Structured /
Unstructured
Own process /
workflow
Requirements How Find / Enforce
Data
Classification
Public
Restricted
Confidential
Do Define Monitor use Enforce
Implement
Controls
Data Quality Only Good Data Enforce Requirements How
Data
Management
Building the full
data lifecycle
Do Requirements How Protect
• Who creates the data?
• Who owns the data?
• Who has responsibility for the data?
• Who Uses the data
• Who routes it
9
Why ?
Why is the most important word in business
Deming reminds us you don’t change culture you change behavior and culture is the result
Celebrate every failure because it provides the opportunity to identify and swarm the
problem
10
Summary
• Data is the new currency
• Opportunity to learn from the past
• Think through security controls
• Think through Data Governance
• Think through security controls, more not always better, sometimes worse (remember
the 5 locks)
• Think through Data Governance, no organization will be exactly the same, there are too
many variables that impact the strategy.
11
Links toTools and Papers
Test Browser Fingerprint https://amiunique.org/
Protect against browser fingerprint https://amiunique.org/tools
Exiftool – view metadata on files https://www.sno.phy.queensu.ca/~phil/exiftool/
Remove hidden files Adobe PDF https://helpx.adobe.com/acrobat/using/removing-sensitive-
content-pdfs.html
Remove hidden files Microsoft https://support.office.com/en-us/article/remove-hidden-
data-and-personal-information-by-inspecting-documents-
presentations-or-workbooks-356b7b5d-77af-44fe-a07f-
9aa4d085966f
Web Browser Fingerprinting Article https://www.1and1.com/digitalguide/online-marketing/web-
analytics/browser-fingerprints-tracking-without-cookies/
White Paper Web Browser Fingerprinting http://cs.ucsb.edu/~vigna/publications/2013_SP_cookieless.
pdf
12
Questions ?
13

More Related Content

PDF
Privacy: Regulatory Pressure is the Consequence of a Broader Problem
PPTX
Creating a Data-Driven Organizational Culture
PDF
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
PPTX
IIBA London event at qBA North Highland on 6 Nov 2013
PDF
Innovation series 112318
PPTX
FINAL presentationMay2016
PPTX
NSTIC and IDESG Update
PDF
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Privacy: Regulatory Pressure is the Consequence of a Broader Problem
Creating a Data-Driven Organizational Culture
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
IIBA London event at qBA North Highland on 6 Nov 2013
Innovation series 112318
FINAL presentationMay2016
NSTIC and IDESG Update
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud

What's hot (10)

PDF
Interested in working at Druva?
PPTX
Next Dimension: How to create a Cybersecurity Strategy
PDF
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
PDF
The state of data privacy with dimensional research
PDF
How to unlock new data-driven potential for your organization
PDF
Brighttalk getting back on track - final
PPTX
SXSW 2015 - Session Highlights
PDF
Digital Marketing in the "Secure Age"
PDF
Creating a Data-Driven Organization, Data Day Texas, January 2016
PDF
People Analytics and Data Science
Interested in working at Druva?
Next Dimension: How to create a Cybersecurity Strategy
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
The state of data privacy with dimensional research
How to unlock new data-driven potential for your organization
Brighttalk getting back on track - final
SXSW 2015 - Session Highlights
Digital Marketing in the "Secure Age"
Creating a Data-Driven Organization, Data Day Texas, January 2016
People Analytics and Data Science
Ad

Similar to Your're Special (But Not That Special) (20)

PDF
MacIT 2014 - Essential Security & Risk Fundamentals
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
PDF
The Trust Paradox: Access Management and Trust in an Insecure Age
 
PPTX
A guide to Sustainable Cyber Security
PPSX
The 5 ws of Cyber Security
PDF
Information security principles to the private versus public sector.pdf
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
DOCX
®Three Undocumented Layers of the OSI Model  and The.docx
ODP
CISSP Week 12
PPTX
Defensible cybersecurity-jan-25th-
PPTX
Aligning Application Security to Compliance
PPTX
Privacies are coming
PPTX
What is Information Security and why you should care ...
PPTX
Secure Iowa Oct 2016
PPTX
Presentation 10.pptx
PPTX
(2016_01_20)_IS_Management_Basics_LinkedIn
PDF
Data_Security_Guide_Everything_You_Need_to_Know.pdf
PDF
User_Access_IIA-LA_3-9-2016
PPTX
People are the biggest risk
PDF
CIA-Triad-Presentation.pdf
MacIT 2014 - Essential Security & Risk Fundamentals
BSIDES DETROIT 2015: Data breaches cost of doing business
The Trust Paradox: Access Management and Trust in an Insecure Age
 
A guide to Sustainable Cyber Security
The 5 ws of Cyber Security
Information security principles to the private versus public sector.pdf
Proven Practices to Protect Critical Data - DarkReading VTS Deck
®Three Undocumented Layers of the OSI Model  and The.docx
CISSP Week 12
Defensible cybersecurity-jan-25th-
Aligning Application Security to Compliance
Privacies are coming
What is Information Security and why you should care ...
Secure Iowa Oct 2016
Presentation 10.pptx
(2016_01_20)_IS_Management_Basics_LinkedIn
Data_Security_Guide_Everything_You_Need_to_Know.pdf
User_Access_IIA-LA_3-9-2016
People are the biggest risk
CIA-Triad-Presentation.pdf
Ad

More from Sandra (Sandy) Dunn (7)

PDF
Osint part 1_personal_privacy
PDF
Data goverance two_8.2.18 - copy
PDF
Bsu skills and_careers_in_cybersecurity
PDF
Step by-step-guide risk-security-dunn_firth_v.1.8
PDF
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
DOC
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
PPTX
Presentation2 certificate farce
Osint part 1_personal_privacy
Data goverance two_8.2.18 - copy
Bsu skills and_careers_in_cybersecurity
Step by-step-guide risk-security-dunn_firth_v.1.8
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Presentation2 certificate farce

Recently uploaded (20)

PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
STKI Israel Market Study 2025 version august
DOCX
search engine optimization ppt fir known well about this
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Microsoft Excel 365/2024 Beginner's training
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
What is a Computer? Input Devices /output devices
PPTX
Configure Apache Mutual Authentication
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Five Habits of High-Impact Board Members
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
TEXTILE technology diploma scope and career opportunities
sustainability-14-14877-v2.pddhzftheheeeee
Consumable AI The What, Why & How for Small Teams.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
STKI Israel Market Study 2025 version august
search engine optimization ppt fir known well about this
Improvisation in detection of pomegranate leaf disease using transfer learni...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
UiPath Agentic Automation session 1: RPA to Agents
Build Your First AI Agent with UiPath.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Microsoft Excel 365/2024 Beginner's training
Final SEM Unit 1 for mit wpu at pune .pptx
What is a Computer? Input Devices /output devices
Configure Apache Mutual Authentication
Training Program for knowledge in solar cell and solar industry
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Benefits of Physical activity for teenagers.pptx
Five Habits of High-Impact Board Members

Your're Special (But Not That Special)

  • 1. YOU'RE SPECIAL (BUT NOT THAT SPECIAL) DON’T DO SECURITY STUFF (JUST BECAUSE) & THE MOST IMPORTANT WORD IN BUSINESS (WHY) Sandy Dunn, CISO Blue Cross of Idaho June 7, 2018 pm 1
  • 2. You’re Special Don’t Do Security Stuff Data Governance Hot Potato The Most Important Word in Business *** Disclaimer *** This presentation views and opinions are my own, and do not represent the views or endorsement of my employer Blue Cross of Idaho. All the information is publicly available. Topics 2
  • 3. Data is to this century what oil was to the last one: a driver of growth and change. Flows of data have created new infrastructure, new businesses, new monopolies, new politics and—crucially—new economics. Digital information is unlike any previous resource; it is extracted, refined, valued, bought and sold in different ways. It changes the rules for markets and it demands new approaches from regulators. Many a battle will be fought over who should own, and benefit from, data. https://www.economist.com/briefing/2017/05/06/data-is-giving-rise-to-a-new-economy You’re Special Thank you for inviting me to speak to the Northwest Data Governance Networking meeting Let’s face it, data governance people are the most important people in the organization. You manage what is the “new oil” 3
  • 4. Chief Information Security Officer (CISO) • Sheriff – tickets when people break the law (policy), run law breakers out of town, or at least restrict their access • Evangelist – More important part of the role is “evangelizing” deputizing every person in your organization into the security team. • Fierce protector of the organization, network, customers, assets • Direct communication to business leadership on risk, impact, (As a security team we must always think and act as a service to business, we can be the best security team on the planet but if we don’t keep business success as the very top objective then nobody has a job. 4
  • 5. “You’re either a learning organization or you’re losing to somebody who is” Andrew Shafer • I hit the wall of “Crisis fatigue” Comparing cybersecurity incident crisis fatigue to being a villager where the boy cried wolf, not only are you not running to see if there is a wolf, you actually hope there is one, and he will eat the sheep, so you can see your family, and get some sleep. • Determined to understand how to improve efficiency • In the Goal Al states they have 4 priorities of orders, Hot, Very Hot, Red Hot, and DO IT NOW 5
  • 6. Mine worker x-rayed for diamond check 1954 But NotThat Special • Think about looking outside of the development, data, and software world for building process and controls. • People have been creating process and controls for workers who required access to valuables for centuries. I’m not suggesting you require everyone be x-rayed like what is shown in this picture, but I am encouraging you to change the paradigm, leverage the experiences from history and drive creative solutions at your organization. • How do producers from around the world manage to consistently deliver, safe food into grocery stores (for the most part) statistically pretty amazing ! • If there is a health risk, what is the process to identify, communicate, and protect consumers ? Can we learn or replicate? Picture reference https-3A__rarehistoricalphotos.com_mine-2Dworker-2Dx-2Drayed- 2Ddiamond-2Dcheck-2D1954_&d=DwMBaQ&c=NdSJ4ILlWpqW3- KBBqEbZ68qQuJ1JYIOBIexwqzU- qw&r=W5Rjnie4gKpHnLTKlYr9pJwYMQKBvKRm1dVVMZrxq6s&m=regfud8HICSfZzHV4tncw- I0QUFAkq4GXyyszgrJuXo&s=JL6WCn7x6yn0K4090nX5IJOh-k-1Nj8J6TMuT1v9nIE&e= 6
  • 7. Don’t Do Security Stuff Just Because • Learn from code signing (and those who survived it) • What, Who, How • Avoid a $2000.00 fence for an $800.00 cow • Reduce the attack surface • No production data in dev or test • Only as strong as the weakest link. • Understand the trade offs • Data Governance / key management headache • Can restriction of granular access can be mitigated by better detective controls • Recovery from back up harder • Keys in back up • Usability • If they’re rogue they are crossing county lines • There have been benefits from MS requiring all windows packages to be signed, but not as much as there should be • Limited rigor in the process around code signing and ensuring trusted process on what was signed • Lack of rigor around protecting the private key, keys stolen and then malicious code trusted • Revoking the key never happens, if a key does happen to be revoked, no way to retro revoke. Can only revoke from current time stamp forward. • One size does not fit all • The first three questions I ask is “What do we need to protect, who do we need to protect it from how do we protect it? • Security is understanding requirements and putting controls in place that meet requirements (no magic fairy dust required to “hack” and no magic fairy dust to prevent) • With news lines screaming, and panicky questions from management, the hyperbole around security can pull you in but security investment needs to be a business risk and impact discussion. • Sometimes the risk can’t be justified to the investment, make sure everyone agrees, have a paper trail • Security is only as strong as the weakest link.. There is no value in mading15 character 7
  • 8. passwords, but then not having policy that makes it a requirement employees must adhere to. • Understand the trade offs • The longer the encryption key the more application performance slows down • The more difficult or cumbersome security policy or process is the higher likelihood people will skirt, escalate, or avoid the right way. Putting 5 locks on a door that induvial use multiple times a day make it more likely someone will just get angry and prop the door open. 7
  • 9. Be Afraid of WhatYou Don’t See Exiftool Microsoft Documents Adobe PDF Browser Fingerprinting Hidden Metadata in files can be an inconspicuous way that sensitive data is leaking from your organization 8
  • 10. Data Governance Business Owner Legal / Compliance / Enterprise Risk Data Governance Cybersecurity Data Stewardship Identify data roles & responsibility Define Requirements SME Audit / Enforce Structured / Unstructured Own process / workflow Requirements How Find / Enforce Data Classification Public Restricted Confidential Do Define Monitor use Enforce Implement Controls Data Quality Only Good Data Enforce Requirements How Data Management Building the full data lifecycle Do Requirements How Protect • Who creates the data? • Who owns the data? • Who has responsibility for the data? • Who Uses the data • Who routes it 9
  • 11. Why ? Why is the most important word in business Deming reminds us you don’t change culture you change behavior and culture is the result Celebrate every failure because it provides the opportunity to identify and swarm the problem 10
  • 12. Summary • Data is the new currency • Opportunity to learn from the past • Think through security controls • Think through Data Governance • Think through security controls, more not always better, sometimes worse (remember the 5 locks) • Think through Data Governance, no organization will be exactly the same, there are too many variables that impact the strategy. 11
  • 13. Links toTools and Papers Test Browser Fingerprint https://amiunique.org/ Protect against browser fingerprint https://amiunique.org/tools Exiftool – view metadata on files https://www.sno.phy.queensu.ca/~phil/exiftool/ Remove hidden files Adobe PDF https://helpx.adobe.com/acrobat/using/removing-sensitive- content-pdfs.html Remove hidden files Microsoft https://support.office.com/en-us/article/remove-hidden- data-and-personal-information-by-inspecting-documents- presentations-or-workbooks-356b7b5d-77af-44fe-a07f- 9aa4d085966f Web Browser Fingerprinting Article https://www.1and1.com/digitalguide/online-marketing/web- analytics/browser-fingerprints-tracking-without-cookies/ White Paper Web Browser Fingerprinting http://cs.ucsb.edu/~vigna/publications/2013_SP_cookieless. pdf 12