<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spire Security Viewpoint &#187; Random</title>
	<atom:link href="http://spiresecurity.com/?cat=14&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Fri, 14 Nov 2014 00:11:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Advanced Malware Protection Evaluation Criteria</title>
		<link>http://spiresecurity.com/?p=1401</link>
		<comments>http://spiresecurity.com/?p=1401#comments</comments>
		<pubDate>Thu, 24 Oct 2013 02:41:48 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[AMP Firehose]]></category>
		<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Random]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1401</guid>
		<description><![CDATA[[Pete Lindstrom is VP of Research at Spire Security, LLC and host of the AMP Firehose 1-day Workshop (vendor bakeoff) coming up in Chicago on 10/29. Register at www.regonline.com/AMPFirehoseCHI.] I believe the folks at Gartner put a lot of research&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1401">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>[<em>Pete Lindstrom is VP of Research at Spire Security, LLC and host of the AMP Firehose 1-day Workshop (vendor bakeoff) coming up in Chicago on 10/29. Register at</em> <a href="http://www.regonline.com/AMPFirehoseCHI">www.regonline.com/AMPFirehoseCHI</a>.]</p>
<p>I believe the folks at Gartner put a lot of research and effort into their Magic Quadrant analysis. That said, I can&#8217;t help but conclude that &#8220;vision&#8221; and &#8220;execution&#8221; don&#8217;t quite do it for me when it comes to identifying appropriate candidate solutions to address a problem. They just seem to be too much about marketing, which is very important to the companies but only ancillary to an enterprise&#8217;s needs. Sure, they want a solution that will be viable for the long-term, but other than that it is pretty insignificant.</p>
<p>To address this issue, I have put together a set of questions in 4+1 evaluation categories that I believe provide more insight into the important attributes of a solution. The first round of categories was introduced at AMP NYC a month ago. Here is my second revision. Opinions and advice are welcome.</p>
<p><strong>1. Company/Product Information:</strong> What level of confidence does the company information provide that the company and product will remain viable for your organization?</p>
<p>Consider:<br />
• What year was the company founded?<br />
• What is the background of the management team?<br />
• How many employees does the company have?<br />
• What is the funding status/source of finances?<br />
• What is the product name and version?<br />
• How many customers does the company have for the pertinent product?<br />
• What certifications and tests were done on the product?<br />
• What other 3rd party reviews, awards, or other supporting evidence exists about the product?<br />
• What is the pricing model for the solution?</p>
<p><strong>2. Functional Operation:</strong> What level of benefit does the functional operation of the product have?</p>
<p>Consider:<br />
• Primary operation &#8211; scan memory state, scan configuration/file system/network state, monitor/record system call activity, monitor/record network traffic, isolate memory, isolate system activity, isolate network communications.<br />
• Trigger action &#8211; detect &#8220;known good&#8221; execution, detect &#8220;known good&#8221; activity, detect &#8220;known bad&#8221; execution, detect &#8220;known bad&#8221; behavior, detect anomalous execution, detect anomalous behavior.<br />
• Response options &#8211; allow, deny execution, kill process, kill network connection, reroute network communication, log event, notify user, notify admin (alert), other.<br />
• Recovery options (post-infection) &#8211; Restore config to known good state, remove bad files/objects, identify similar issues across network, notify/update other control solutions.</p>
<p><strong>3. Architecture &amp; Administration:</strong> How well does the product&#8217;s architecture fit in with your organization&#8217;s existing security processes? How likely is it to provide benefits? What features does it have to support implementation and administration?</p>
<p>Consider:<br />
• Where/how are any product sensors or agents deployed throughout an enterprise (endpoint, network, cloud, other)? How are they protected?<br />
• Where/how does the product admin/management function work? How is it protected? (endpoint, network, cloud, other)<br />
• Where/how does the product log/data/storage function work? How is it protected? (endpoint, network, cloud, other)<br />
• How is information shared a) with the solution components; and b) with others?<br />
• How does the solution get installed/implemented in the environment?<br />
• How customizable is the configuration and interface?</p>
<p><strong>4. Technical Integration:</strong> How well does the solution integrate into the IT ecosystem? How easy will it be to implement and maintain?</p>
<p>Consider:<br />
• How does the solution integrate with other products from the same company?<br />
• How does the solution integrate with 3rd party security solutions?<br />
• How does the solution integrate into an IT architecture?<br />
• What are the prerequisites for user directories, management servers, etc?<br />
• What standards, communication protocols, platforms, languages, frameworks, etc. are supported?<br />
• How robust is the API for third party access?</p>
<p>The final category is actually a rollup of the other four, since the differentiators and value come from the previous specifics being identified.</p>
<p><strong>Key Differentiators / Overall Value Proposition</strong><br />
When looking at the complete picture of the solution, how strong are the overall benefits derived from the individual evaluation categories?</p>
<p>I believe these evaluation categories more properly reflect the needs of the enterprise. What do you think?<em id="__mceDel"><strong><br />
</strong></em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1401</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The 7-day Itch: Ups and Downs of Google&#8217;s New Disclosure Policy</title>
		<link>http://spiresecurity.com/?p=1331</link>
		<comments>http://spiresecurity.com/?p=1331#comments</comments>
		<pubDate>Wed, 05 Jun 2013 14:13:51 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Random]]></category>
		<category><![CDATA[Vulnerability Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1331</guid>
		<description><![CDATA[Recently, members of the security team at Google made an important announcement about &#8220;real-world exploitation of publicly unknown vulnerabilities.&#8221; While it was done on the Google Online Security blog, all indications are that this is an official Google policy statement.&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1331">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">Recently, members of the security team at Google made an <a href="http://googleonlinesecurity.blogspot.com/2013/05/disclosure-timeline-for-vulnerabilities.html">important announcemen</a>t about &#8220;real-world exploitation of publicly unknown vulnerabilities.&#8221; While it was done on the Google Online Security blog, all indications are that this is an official Google policy statement. To wit, Google announced that &#8220;after 7 days have elapsed without a patch or advisory, we will support researchers making details available so that users can take steps to protect themselves.&#8221;</span></p>
<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">This is an important announcement because it highlights the very real problem of &#8220;<a href="http://spiresecurity.com/?p=36">in-the-wild-exploits of undercover vulnerabilities</a>.&#8221; This strain of &#8220;0day&#8221; is the most significant given that active exploits are already happening when they are discovered. In these scenarios, the threats (malicious actors) and vulnerabilities have already collided in the real world and losses are being actively incurred. Thus, <strong>this type of situation is the most important type that technology risk (techrisk) managers must deal with in their environments.</strong></span></p>
<p>The announcement itself highlights some important, underappreciated aspects of the techrisk profession:</p>
<p>- That exploits/breaches/incidents are the fundamental &#8220;unwanted outcome&#8221; that we are trying to prevent. It is not uncommon for techrisk pros to focus efforts on software quality, control weaknesses, or compliance violations &#8211; all useful intentions to the extent that they address the aforementioned incidents.</p>
<p>- That techrisk professionals can identify attacks even when the vulnerability is unknown. Much of our profession&#8217;s focus revolves around the notion that we must find vulnerabilities in order to protect ourselves, yet time and again we succeed in identifying these types of attacks using behavioral analysis and other techniques. With the growth in popularity of forensic archiving, we can now also determine to what extent we have been victims in the past to assist with understanding the risks of the future.</p>
<ul>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">That much of the profession&#8217;s effort associated with vulnerability management is ineffective. Our efforts to identify each vulnerability prior to exploit are simply overwhelmed by scale and can simply be shown through a thought exercise &#8211; consider how many vulnerabilities are created every day (in the aggregate) as compared with how many are found. Perhaps more importantly, it is worth noting that the vast majority of vulnerabilities that are found are never known to be actively exploited <a href="https://www.isecpartners.com/media/12955/eip-final.pdf">[pdf]</a>.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">That there is a variance in how different types of attacks &#8211; namely, targeted vs. opportunistic &#8211; manifest themselves online. Google&#8217;s primary cited reason for its new policy involves political activists as victims of targeted attacks that may lead to physical harm. The history of infosec and techrisk highlight other scenarios &#8211; the NIMDA worm, WMF exploit, WebDAV, etc &#8211; that involve opportunistic exploits across a multitude of targets.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">That the most significant way to &#8220;move the marker&#8221; in security is through the identification of exploits and not vulnerabilities. As with Code Red and Nimda in the Fall of 2001 leading to Bill Gates&#8217; well-known &#8220;<a href="http://www.microsoft.com/en-us/news/features/2012/jan12/GatesMemo.aspx">Trustworthy Computing Memo</a>,&#8221; active exploits are the best drivers of change in the techrisk profession.</span></li>
</ul>
<p><span style="letter-spacing: 0.05em; line-height: 1.6875;"> </span><span style="letter-spacing: 0.05em; line-height: 1.6875;">While Google&#8217;s new policy offers and opportunity to assess the state of security on the Internet overall, it also demonstrates significant deficiencies in its approach:</span></p>
<ul>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">The 7-day deadline has no risk basis. With the significant variance in number of affected parties and speed of compromise associated with opportunistic attacks versus targeted ones, the number is an arbitrary one. In the primary example cited (activists at risk of physical harm), speed is highly unlikely to have a significant impact on risk reduction.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">The capabilities of enterprises and/or users to protect themselves can vary significantly. There are many reasons why some parties choose to remain vulnerable to certain types of attacks &#8211; system complexities, legacy support needs, lack of technical skill, competitive priorities, etc. Through the years some security researchers (including some employees of Google) have expressed disdain for those that cannot protect themselves. A company the size of Google should be held to a higher standard in its willingness to protect those online that can&#8217;t always protect themselves.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;"> </span><span style="letter-spacing: 0.05em; line-height: 1.6875;">No consideration of economics. The policy completely ignores tradeoffs like the risk of breaking systems when taking precautionary measures (e.g. patch failures), the well-known increase in exploits that occur after the disclosure of many new vulnerabilities [<a href="http://www.cs.umd.edu/~waa/pubs/Windows_of_Vulnerability.pdf">Arbaugh, McHugh, 2000 pdf</a>; <a href="http://users.ece.cmu.edu/~tdumitra/public_documents/bilge12_zero_day.pdf">Bilge, Dumitras 2013 pdf</a>], and the opportunity costs associated with new requirements. When Google says, for example, &#8220;each day an actively exploited vulnerability remains undisclosed to the public and unpatched, more computers will be compromised&#8221; they neglect the significant likelihood that computers will be compromised regardless of the state of disclosure to the public and fall back on the age-old myth that only patches can protect systems.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;"> </span><span style="letter-spacing: 0.05em; line-height: 1.6875;">It can lead to even more exploitations and incidents. Anyone paying close attention to the vulnerability research community knows that there is wide variance in how researchers disclose their information and some decisions are made based on annoyance, frustration, spite and sometimes even malice. If a vulnerability will get &#8220;noticed&#8221; more quickly, researchers may be tempted to &#8220;test&#8221; it in the wild in order to increase its priority level.</span></li>
</ul>
<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">A company with the talent and resources at Google can do better. Here are some opportunities for improving the state of security on the Internet and addressing the real, significant risk associated with actively exploited 0days:</span></p>
<ul>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">Encourage and train political activists in obfuscation and evasion techniques. It is challenging to discuss a blanket policy across all scenarios simply by highlighting arguably the most important one &#8211; that involving physical harm. It seems highly unlikely that this case is a common one and the best way to discuss the overall implications of the policy itself is to remove this scenario from the discussion as it tends to cause an emotional reaction. As many of us know, there are many ways political activists can protect themselves online that would be much more effective than a 7-day disclosure policy which comes after they have been compromised.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;"> </span><span style="letter-spacing: 0.05em; line-height: 1.6875;">Increase focus on actively exploited 0days. Since these are the most important scenarios the techrisk profession has to deal with, Google should be making every effort to identify these exploits and employ or invent new ways to protect against them. Google researchers still participate in random, ineffective vulnerability research that simply distracts from this very real problem.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;"> </span><span style="letter-spacing: 0.05em; line-height: 1.6875;">Provide more insight into the &#8220;dozens&#8221; of 0days identified &#8220;through the years&#8221; that was mentioned in the blog announcement. If there is one thing Google has, it is great data. As evidenced by past reports [<a href="http://static.googleusercontent.com/external_content/untrusted_dlcp/research.google.com/en/us/archive/provos-2008a.pdf">Provos, 2008 pdf</a>], Google could very easily provide more specific evidence on the number of 0days they have identified, the volume of exploits, and their disposition by vendors. The fact that they haven&#8217;t yet, especially in the face of this policy announcement, is disappointing and makes it difficult to evaluate the measure.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;"> </span><span style="letter-spacing: 0.05em; line-height: 1.6875;">Take a risk-based approach to disclosure. Fast-moving worms do most of their damage in hours and days &#8211; in those cases, seven days is too long. Targeted attacks are unlikely to get repeated in a way that demands immediate attention for most environments &#8211; in those cases, seven days is too short. A risk-based approach would take into account the frequency of exploit, probability of future exploit within a target population, and impact of the exploit while evaluating the changes to these variables over time &#8211; in particular before and after disclosure.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;"> </span><span style="letter-spacing: 0.05em; line-height: 1.6875;">Monitor the situation closely. Google&#8217;s unique ability to gather data in this regard is worth mentioning again as a function of its ability to assess its own policy. Collecting and publishing data on actual 0days throughout their exploit lifecycle would be a boon to the entire profession.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;"> </span><span style="letter-spacing: 0.05em; line-height: 1.6875;">Initiate or participate in discussions to create new ways to address this very real problem. Commercial, community, and government mechanisms already exist for sharing data publicly and privately that could be used as models for minimizing the risks associated with these types of attacks. For example, a (private) process similar to federal wiretap capabilities in secrecy and opportunity may be more effective in addressing targeted attacks. There are countless other approaches that could be leveraged to address this problem.</span></li>
</ul>
<p>Make no mistake, the Google 7-day policy announcement sheds light on a <strong>real and significant issue</strong> in technology-related risk. While it highlights some of the challenges techrisk professionals face on a daily basis, it also demonstrates significant deficiencies in its approach to address the problem. This is a great opportunity to evaluate the existing state of the Internet from a risk and security perspective to determine where inconsistencies or weaknesses lay and map out a risk-based program that has the highest likelihood of success.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1331</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cognitive Dissonance or Spite?</title>
		<link>http://spiresecurity.com/?p=1302</link>
		<comments>http://spiresecurity.com/?p=1302#comments</comments>
		<pubDate>Mon, 11 Feb 2013 16:56:28 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Random]]></category>
		<category><![CDATA[Vulnerability Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1302</guid>
		<description><![CDATA[I happened to see a tweet the other day that said: &#8220;If you want a bug fixed quickly, sell it on the Russian black market. It&#8217;ll be so heavily abused that the vendor will patch out of cycle.&#8221; Now, it&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1302">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>I happened to see a tweet the other day that said:</p>
<blockquote><p><em>&#8220;If you want a bug fixed quickly, sell it on the Russian black market. It&#8217;ll be so heavily abused that the vendor will patch out of cycle.&#8221;</em></p></blockquote>
<p>Now, it could be the joke&#8217;s on me and the 126 people who retweeted this message (a large number for security tweets) were in on it. Or, they all don&#8217;t realize how ludicrous this is. In the infosec/techrisk field, this kind of thinking is not unheard of so I will treat this as if it is legitimate.</p>
<p>The tweet highlights just how biased people can be when they get caught up in a notion without understanding the implications. Apparently, this tweeter wants bugs fixed quickly. At first blush this seems like a simple enough concern, shared by many. But peel one small layer deeper and the statement often ends up being &#8220;want bugs that you know about (or worse, that you discovered) fixed quickly after your discovery?&#8221; It becomes easier to see how certainty bias and the focusing illusion come into play.</p>
<p>there is plenty of evidence to demonstrate that it is unlikely that the bug in question is the only bug that remains unfixed &#8211; we have any number of bugs in various stages of discovery and disclosure all the time. If we assume that the average bug takes 120 days from discovery (or at least vendor notification) to patch release, and vendors generally release patches on a monthly cycle, then there are four months of undisclosed (typically) vulns on your systems that remain upatched.</p>
<p>Now, you might assert that this makes the point &#8211; of course we want them patched &#8220;quickly.&#8221; But that completely ignores the tradeoffs. If your patch is prioritized, that means another one must be de-prioritized. I suppose you could say that security developers aren&#8217;t operating at capacity and therefore can absorb the workload for both bugs, but that seems farfetched to me and doesn&#8217;t scale in any case.</p>
<p>Of course, the worst part of the tweet is the part that purposely increases risk by increasing the threat of compromise. No need for a soapbox/high horse here to recognize that purposely inflating risk to get attention in spite of how detrimental it is to Internet users is certainly unprofessional and really kind of pathetic.</p>
<p>Too often, folks get caught up in some perceived solution to a problem and neglect the bigger picture. Many times, the bugfinder is sincerely concerned. But it is important to understand the cost/benefit and risk dynamics involved if you really want to positively affect Internet risk.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1302</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How Much did Amazon Lose in Yesterday&#8217;s Outage?</title>
		<link>http://spiresecurity.com/?p=1294</link>
		<comments>http://spiresecurity.com/?p=1294#comments</comments>
		<pubDate>Fri, 01 Feb 2013 14:55:18 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Incidents]]></category>
		<category><![CDATA[Random]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1294</guid>
		<description><![CDATA[One of the crucial aspects of risk management for infosec pros to learn is how to estimate consequences. It can be helpful to review incidents and create a model for thinking about losses. Amazon&#8217;s outage for an hour yesterday, is&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1294">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>One of the crucial aspects of risk management for infosec pros to learn is how to estimate consequences. It can be helpful to review incidents and create a model for thinking about losses. Amazon&#8217;s outage for an hour yesterday, is a good, simple example for us to play with &#8211; this exact example used to be the one I used when teaching my security metrics class because it is so clean. Or is it?</p>
<p>When estimating losses, it isn&#8217;t entirely unreasonable to do the high-level straight-line math like <a href="http://www.itworld.com/cloud-computing/339609/amazoncom-suffers-outage-nearly-5m-down-drain">IT World did here</a>:</p>
<blockquote><p><em>&#8220;Amazon.com&#8217;s latest earnings report showed that the company makes about $10.8 billion per quarter, or about $118 million per day and $4.9 million per hour.&#8221;</em></p></blockquote>
<p>It&#8217;s really quick and dirty &#8211; and in a general sense legitimate &#8211; but can we do better? There are other ways to look at this that might shed some light on impact assessment. First, the assessment above makes no mention of costs. That might be the biggest weakness since costs are more under the control of Amazon and (probably) don&#8217;t fluctuate as much as revenue.</p>
<p>Luckily for us, Amazon just released its quarterly earnings report and <a href="http://articles.marketwatch.com/2013-01-29/commentary/36613307_1_margins-tom-szkutak-fourth-quarter">this report</a> asserts that its operating margin is about 3%. So right off the bat, we could suggest that Amazon lost 97% of $5 million or $4.85 million in costs. A more conservative estimate might try to determine whether the costs were unrecoverable or not, etc. Hopefully, you get the idea. A cost-oriented approach also works well as an example in infosec since that is often a big piece of the losses we face.</p>
<p>It is important to note here that these costs are additive to the lost revenue estimate &#8211; not only did we lose the $4.85 million in operating costs, but also (presumably) we lost that initial $4.9 million in revenue, for a total of (let&#8217;s say) $10 million.</p>
<p>Now, let&#8217;s look again at that lost revenue estimate. As mentioned earlier, coarse numbers like those used in the calculation above are certainly justifiable but we can probably do better. A quick thought exercise can help here &#8211; by creating the experience of an &#8220;average customer&#8221; of Amazon&#8217;s we can better assess the impact of the outage. This is harder than it sounds because we&#8217;ll have to second guess our own biases, but let&#8217;s try anyway. Let&#8217;s call him Joe.</p>
<p>Given that the outage was simply a &#8220;denial-of-service&#8221; of sorts, the big variable we must evaluate is time. More specifically for our scenario, we need to answer the question &#8220;How timely does Joe&#8217;s interaction with Amazon need to be, or, how likely is Joe to wait an hour to complete his purchase?&#8221; At the very least, we know Joe is willing to wait two days (maybe more &#8211; not sure what the average delivery time is for Amazon) to receive whatever goods he purchases. Throw in what we might assume (my bias) about Amazon&#8217;s low prices and the corresponding brand loyalty that comes with it and it seems reasonable to conclude that Joe will wait an hour to make the purchase, and therefore the lost revenue is actually only deferred revenue to be recognized in the future.</p>
<p>But not everyone is average (usually nobody is), and so once we cover a generic case, it is useful to consider the impact of the outliers. Now, we can imagine scenarios where even though a customer can wait for delivery, she can&#8217;t wait to place the order &#8211; too many other things going on in life. Or even a case where the customer would actually lose a full day due to delivery cutoff times. These are the types of cases that warrant more attention. Certainly it is reasonable to factor these cases into a loss scenario. Let&#8217;s say this is true 10% of the time.</p>
<p>The goal here is to be conservative in our estimates (even though it is sometimes beneficial for companies to be liberal after the fact &#8211; can hide other problems) so we should remember that these scenarios are typically useful in identifying some sort of discount factor to apply to the initial $5 million estimate. Though it is possible to come up with scenarios where there is a multiplier &#8211; maybe holiday seasons &#8211; it is less common.</p>
<p>Our lost revenue evaluation has led us to conclude that 90% of purchases will still be made in the future, so the remaining 10% of cases will discount our $5 million loss down to $500,000. Add that to our lost costs and we are back to the initial $5 million estimate, though from a different perspective. While it might be attractive to decide all was for nought, it is worth considering the situations where the costs are much lower, or the revenue is more likely to be lost to see the value in the exercise.</p>
<p>Now, <a href="http://erratasec.blogspot.com/2013/02/risk-analysis-v-downtime.html">some might suggest</a> (essentially) that the above analysis is really not worth it because a loss is a loss. Not only that, but Amazon&#8217;sown numbers have shown (?) that there is no discernible uptick in sales in the period following the outage. As mentioned earlier, it is easier to see how costs are fairly static and therefore turn into losses. On the revenue side, however, it is not clear at all.</p>
<p>In assessing lost revenue in this case, one must do two things: first distinguish between necessity and convenience and second evaluate the impact of buyer&#8217;s capacity. The purported lack of a noticeable uptick in sales in the short term could easily be explained if purchases are more oriented around convenience than necessity. Measures associated with shopping carts might be of assistance here (I sometimes leave items in my shopping cart for days if not weeks). Again, this information can be factored into the estimates if need be.</p>
<p>It is uncommon to consider a &#8220;buyer&#8217;s capacity&#8221; but especially with convenience purchases, one might decide that the rate of purchase is a determining factor and even though the shopper returns, she will be buying other items, etc. This justification is easier to believe in cases where capacity is high &#8211; that is, the shopper is buying at a rate where fitting in the &#8220;lost&#8221; purchases is unlikely (and when it happens is noticeable in the numbers). My assessment is that this scenario is unlikely; people are more casual in their shopping experience and will therefore wait to make their purchases. (A similar capacity limit could have an effect on the Amazon side, but that is even more farfetched).</p>
<p>My conclusion is that $5 million is a reasonable loss estimate for Amazon&#8217;s outage, but not for the reasons initially believed.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1294</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How the Cost of Interventions provides Insight into Security Decisionmaking</title>
		<link>http://spiresecurity.com/?p=1286</link>
		<comments>http://spiresecurity.com/?p=1286#comments</comments>
		<pubDate>Thu, 31 Jan 2013 15:55:33 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Metrics]]></category>
		<category><![CDATA[Random]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1286</guid>
		<description><![CDATA[In 1994, Tengs, et.al. published the research paper &#8220;Five-Hundred Life-Saving Interventions and Their Cost-Effectiveness.&#8221; (pdf) The research reviewed 587 different interventions and calculated the &#8220;cost per life-year saved&#8221; as a normalized metric across over 200 different studies on economic costs. So,&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1286">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>In 1994, Tengs, et.al. published the research paper <a href="http://www.ce.cmu.edu/~hsm/bca2005/lnotes/500-interventions.pdf">&#8220;Five-Hundred Life-Saving Interventions and Their Cost-Effectiveness.&#8221;</a> (pdf) The research reviewed 587 different interventions and calculated the &#8220;cost per life-year saved&#8221; as a normalized metric across over 200 different studies on economic costs.</p>
<p>So, for example, using available data they calculated that automatic fire extinguishers in airplane lavatory trash receptacles cost $16,000 per life year saved. (This was in 1993 &#8211; maybe smoking was still allowed then?)</p>
<p>Interestingly, these costs ranged from &#8220;those that save more resources than they consume to those costing more than 10 billion dollars per year of life saved.&#8221; The median cost per life year saved was $42,000. The paper also breaks down amounts by type of intervention, prevention stage, and even provides some data on proposed govt regulations by regulatory agency (FAA median $23,000; EPA median $7,600,000).</p>
<p>As a quick aside, the existence of this data helps one understand that even though circumstances where &#8220;success means nothing happened&#8221; (in this case, death didn&#8217;t happen), there is still plenty of opportunity to assess the benefit of some particular intervention.</p>
<p>These types of &#8220;revealed preference&#8221; study results can be eye-opening to those that suggest we should spend &#8220;whatever it takes&#8221; to address some particular concern. In looking at the large variance in costs, perhaps that isn&#8217;t the best course of action. It is nice to think we have unlimited resources, but at some point they run out. When they do, not only does that impact overall effectiveness, but opportunity costs come into play.</p>
<p>What does this mean for cybersecurity? Though it is not fair any more to say there is no data available to our profession, it certainly is difficult to leverage the data coming out in ways that are helpful to an organization. However, we can start thinking in terms of estimates and measures that make sense. In particular, we can evaluate and compare costs of various controls to each other and factor in some notion of anticipated risk reduction.</p>
<p>We can learn a lot from studies like these.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1286</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ruminations on Info Asset Value, Impact, and Control Horizons</title>
		<link>http://spiresecurity.com/?p=1279</link>
		<comments>http://spiresecurity.com/?p=1279#comments</comments>
		<pubDate>Wed, 17 Oct 2012 15:49:27 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Metrics]]></category>
		<category><![CDATA[Random]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1279</guid>
		<description><![CDATA[One of the most challenging characteristics in our space is that *direct* information asset value &#8211; what the business is interested in &#8211; has an ambiguous relationship to consequences/impact &#8211; what security professionals are trying to minimize. I am a&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1279">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>One of the most challenging characteristics in our space is that *direct* information asset value &#8211; what the business is interested in &#8211; has an ambiguous relationship to consequences/impact &#8211; what security professionals are trying to minimize. I am a huge believer in what is essentially a &#8220;revealed preference&#8221; approach to understanding the value. At the very least, at the point a decision is made by business to spend $5m on some system they are making the bet that the system will drive that much benefit to the organization, either in increased revenue or decreased costs.</p>
<p>The challenge for us when measuring impact of some infosec-related incident is that the systems/assets often keep generating the expected value to an organization. Even DoS events against eCommerce sites &#8211; perhaps one of the easiest impacts to measure &#8211; should consider loyalty at this stage for people to come back and shop later if a system is out. It is often much more difficult than that &#8211; if the formula for Coca-Cola is stolen, it doesn&#8217;t impact Coke&#8217;s ability to make/distribute the drink; it is more likely to have some impact like lost market share due to black-market knockoffs (not sure if this is a problem in the soft drink world). Even more challenging might be the situations where an illegitimate third party can make even more revenue through stolen IP than the victim &#8211; did the victim actually lose that?</p>
<p>Creating estimates with problems like this is really challenging so I think we are much better off starting with the revealed preference thresholds that are out there &#8211; trying to assess just how much we spend to pursue/defend IP rights through legal means and using that as a baseline, for example. The logic being, again, that if you spend $5m protecting your IP, that is at least as much as you believe you could lose if you didn&#8217;t. I&#8217;d take this method over the notions of &#8220;brand&#8221; and &#8220;reputation&#8221; that get bandied about (for non-human organizations, it *should* all boil down to lost income and/or increased costs &#8211; current or future).</p>
<p>Considering thresholds and revealed preferences, security spending is a great baseline number for estimating risk. That is, if our security spending is $5m then we are betting that $5m is offsetting $5m in potential losses, at minimum (advocates of the GLEIS model might even suggest it is something like 39% of potential losses). This line of reasoning is also useful in helping us develop a &#8220;control horizon&#8221; &#8211; we can draw a line on a risk matrix using this spending (aka minimum estimated risk) as the slope. we can also plot the intersection with IT spending, profit, revenue, or other numbers that might be useful in comparison. As we slice up a risk matrix like this, we can determine whether our judgments about risk are holding up based on where they fit as well.</p>
<p>I consider this approach very ALE-like &#8211; certainly aggregated and coarse (though it could be applied to individual scenarios as well) and with the caveat that security spending must be carefully calculated. At the level enterprises are working today, I think this information would be very useful in helping folks understand the risk decisions they are making.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1279</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How Red Meat can make Cybersecurity Healthier</title>
		<link>http://spiresecurity.com/?p=1272</link>
		<comments>http://spiresecurity.com/?p=1272#comments</comments>
		<pubDate>Mon, 26 Mar 2012 14:16:47 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Metrics]]></category>
		<category><![CDATA[Random]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1272</guid>
		<description><![CDATA[Recently, the L.A. Times and other places wrote about a study done by Dr. Walter Willett of Harvard, et.al. regarding the impact of red meat on one&#8217;s mortality. He found that eating as little as one extra serving of red&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1272">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Recently, the <a href="http://articles.latimes.com/2012/mar/24/health/la-he-five-questions-walter-willett-20120324">L.A. Times</a> and other places wrote about a <a href="http://archinte.ama-assn.org/cgi/content/full/archinternmed.2011.2287">study done</a> by Dr. Walter Willett of Harvard, et.al. regarding the impact of red meat on one&#8217;s mortality. He found that eating as little as one extra serving of red meat a week contributed to a 13% or 20% increased risk of death. More specifically, they found that</p>
<p style="padding-left: 30px;">&#8220;After multivariate adjustment for major lifestyle and dietary risk factors, the pooled hazard ratio (HR) (95% CI) of total mortality for a 1-serving-per-day increase was 1.13 (1.07-1.20) for unprocessed red meat and 1.20 (1.15-1.24) for processed red meat.&#8221;</p>
<p>As with many studies about diet, lifestyle, and death, this one has sparked discussion. The Numbers Guy from the Wall Street Journal, Carl Bialik, wrote <a href="http://online.wsj.com/article/SB10001424052702304636404577297802304647434.html">two</a> <a href="http://blogs.wsj.com/numbersguy/the-risk-numbers-1128/">articles</a> on the study itself and the difference between absolute risk and relative risk numbers that often create confusion and annoyance. That article led me to the always excellent Understanding Uncertainty blog post by Dr. David Spiegelhalter&#8217;s <a href="http://understandinguncertainty.org/what-does-13-increased-risk-death-mean">fuller treatment</a> of exactly what a 13% increased risk of death actually means (dying about a year younger, in case you are wondering). It also provides discussion on correlation/causation caveats and the practical application of the numbers.</p>
<p>All this discussion is interesting and should be useful for any IT risk professional interested in quantitative treatments of risk. But these details are not the reason I am writing this. As I was reviewing the information, it struck me just how difficult this is in the physical world. This quote from Dr. Willett in the L.A. Times article really highlights the problem:</p>
<p style="padding-left: 30px;">&#8220;In principle, the ideal study would take 100,000 people and randomly assign some to eating several servings of red meat a day and randomize the others to not consume red meat and then follow them for several decades. But that study, even with any amount of money, in many instances is simply not possible to do.&#8221;</p>
<p>What struck me was not only how hard this is, but also the rigor of the results in the face of the described obstacles. And, even more importantly how much easier this would be for IT risk professionals in the virtual world.</p>
<p>In the virtual world, we actually <em>could</em> design and conduct a study that controlled for almost every variable to quantify risk. We could, for example, deploy 10,000 or 100,000 virtual machine clients around the Internet that were all configured exactly alike with the exception of some specified difference &#8211; patched vs. non-patched, different anti-malware solutions and/or signature updates, open vs. closed ports, other configuration changes, etc. About the hardest part would be determining how/where to deploy the VMs and coming up with a &#8220;honeymonkey&#8221; algorithm to mimic user activity.</p>
<p>Perhaps the biggest challenge would be recognizing and characterizing the intelligent adversary contribution to the variance in the numbers &#8211; the popularity of vulnerabilities, exploit techniques, 0days, etc. And that would be the good stuff, as well.</p>
<p>Conducting an experiment like this seems so easy to me that I wonder if somebody is already doing it. I am pretty sure some group (ISC?) used to do some sort of &#8220;time-to-compromise&#8221; metric for unpatched systems. And I suspect there may be others. Does anyone know of experiments/studies being done similar to this? If so, I&#8217;d love to hear about them. If not, why not?</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1272</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>RSA Conference 2012 &#8211; The Sessions I Don&#8217;t Want to Miss</title>
		<link>http://spiresecurity.com/?p=1265</link>
		<comments>http://spiresecurity.com/?p=1265#comments</comments>
		<pubDate>Tue, 14 Feb 2012 20:54:43 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Metrics]]></category>
		<category><![CDATA[Random]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1265</guid>
		<description><![CDATA[The sessions I don&#8217;t want to miss (but probably will). These sessions all strike my fancy in some way, and I would love to make it to them. Some are time competing and others take place after I am gone,&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1265">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>The sessions I don&#8217;t want to miss (but probably will). These sessions all strike my fancy in some way, and I would love to make it to them. Some are time competing and others take place after I am gone, but I wish I could attend. There are at least two that I am sure I will attend:</p>
<table border="0" cellspacing="0" cellpadding="3">
<tbody>
<tr>
<td class="formPromptTd">Session Code:</td>
<td class="formReqTd"></td>
<td class="formElementTd">P2P-108C</td>
</tr>
<tr>
<td colspan="3"></td>
</tr>
<tr>
<td class="formPromptTd"><strong>Session Title:</strong></td>
<td class="formReqTd"></td>
<td class="formElementTd"><strong>Where will InfoSec be in 2020?</strong></td>
</tr>
<tr>
<td class="formPromptTd">Facilitator:</td>
<td class="formReqTd"></td>
<td class="formElementTd"><a href="https://ae.rsaconference.com/US12/scheduler/speakers/speaker.jsp?key=44751&amp;ts=1329252741819&amp;back=true">Pete Lindstrom</a> <small>Research Director</small><br />
<span class="note">Spire Security</span></td>
</tr>
<tr>
<td class="formPromptTd">Scheduled Date(s)/Time(s):</td>
<td class="formReqTd"></td>
<td class="formElementTd">Tuesday, February 28 03:50 p.m.<br />
Room 112</td>
</tr>
<tr>
<td class="formPromptTd">Session Length:</td>
<td class="formReqTd"></td>
<td class="formElementTd">50 minutes</td>
</tr>
<tr>
<td class="formPromptTd">Session Abstract:</td>
<td class="formReqTd"></td>
<td class="formElementTd">Take off your flak jacket and put on your thinking cap. It&#8217;s not often we get to be fearless prognosticators, but now is the time. Come to this session to listen, brainstorm, and debate the nature of risk and security in the year 2020. What will IT architectures look like? How will we protect them? Come with an open mind and leave with strategic ideas and interests for your security program.</td>
</tr>
</tbody>
</table>
<table border="0" cellspacing="0" cellpadding="3">
<tbody>
<tr>
<td class="formPromptTd">Session Code:</td>
<td class="formReqTd"></td>
<td class="formElementTd">DEB-001</td>
</tr>
<tr>
<td colspan="3"></td>
</tr>
<tr>
<td class="formPromptTd"><strong>Session Title:</strong></td>
<td class="formReqTd"></td>
<td class="formElementTd"><strong>Software Liability: Our Saving Grace or Kiss of Death?</strong></td>
</tr>
<tr>
<td class="formPromptTd">Moderator:</td>
<td class="formReqTd"></td>
<td class="formElementTd"><a href="https://ae.rsaconference.com/US12/scheduler/speakers/speaker.jsp?key=44751&amp;ts=1329252785057&amp;back=true">Pete Lindstrom</a> <small>Research Director</small><br />
<span class="note">Spire Security</span></td>
</tr>
<tr>
<td class="formPromptTd">Panelist:</td>
<td class="formReqTd"></td>
<td class="formElementTd"><a href="https://ae.rsaconference.com/US12/scheduler/speakers/speaker.jsp?key=50984&amp;ts=1329252785057&amp;back=true">Bruce Schneier</a> <small>Chief Technology Security Officer</small><br />
<span class="note">BT</span><br />
<a href="https://ae.rsaconference.com/US12/scheduler/speakers/speaker.jsp?key=43515&amp;ts=1329252785057&amp;back=true">Marcus Ranum</a> <small>Chief Security Officer</small><br />
<span class="note">Tenable Network Security, Inc.</span></td>
</tr>
<tr>
<td class="formPromptTd">Scheduled Date(s)/Time(s):</td>
<td class="formReqTd"></td>
<td class="formElementTd">Wednesday, February 29 12:00 p.m.<br />
Room 134</td>
</tr>
<tr>
<td class="formPromptTd">Session Length:</td>
<td class="formReqTd"></td>
<td class="formElementTd">50 minutes</td>
</tr>
<tr>
<td class="formPromptTd">Session Abstract:</td>
<td class="formReqTd"></td>
<td class="formElementTd">&#8220;Software could be more secure&#8221; may be the understatement of the century. Vulnerabilities have infested our code for as long as there&#8217;s *been* code. Nobody refutes the notion that we want more secure code; it is getting there that is the challenge &#8211; and also the focus of this debate.Software liability is oft-cited as one potential approach to creating more secure code. Clearly, there are strong advocates and as strong detractors. Today is the day we work everything out and decide whether software liability would be our saving grace or the kiss of death.</td>
</tr>
</tbody>
</table>
<p>For these others, I will do my best to make them:</p>
<table border="0" cellspacing="0" cellpadding="0" width="858">
<colgroup>
<col width="84"></col>
<col width="492"></col>
<col width="90"></col>
<col width="95"></col>
<col width="97"></col>
</colgroup>
<tbody>
<tr height="19">
<td width="84" height="19">ASEC-203</td>
<td width="492">Never Waste a Crisis &#8212; Necessity Drives   Software Security Improvements</td>
<td width="90">Wednesday</td>
<td width="95">February 29</td>
<td width="97">10:40   AM</td>
</tr>
<tr height="19">
<td height="19">ASEC-302</td>
<td>Remediation Statistics: What Does Fixing Application Vulnerabilities   Cost?</td>
<td>Thursday</td>
<td>March 1</td>
<td>9:30 AM</td>
</tr>
<tr height="19">
<td height="19">ASEC-401</td>
<td>Engineering Smart Grid Security</td>
<td>Friday</td>
<td>March 2</td>
<td>9:00 AM</td>
</tr>
<tr height="19">
<td height="19">ASEC-402</td>
<td>Hacking’s Gilded Age: How APIs Will Increase Risk and Foment IT Chaos</td>
<td>Friday</td>
<td>March 2</td>
<td>10:10 AM</td>
</tr>
<tr height="19">
<td height="19">AUTH-003</td>
<td>David Brooks: The Social Animal: The Hidden Sources of Love, Character,   and A…</td>
<td>Wednesday</td>
<td>February 29</td>
<td></td>
</tr>
<tr height="19">
<td height="19">DAS-201</td>
<td>Can Data Breaches Be Stopped, Really?</td>
<td>Wednesday</td>
<td>February 29</td>
<td></td>
</tr>
<tr height="19">
<td height="19">DAS-302</td>
<td>Message in a Bottle &#8211; Finding Hope in a Sea of Security Breach Data</td>
<td>Thursday</td>
<td>March 1</td>
<td>9:30 AM</td>
</tr>
<tr height="19">
<td height="19">EXP-108</td>
<td>The Six Most Dangerous New Attack Techniques and What&#8217;s Coming Next</td>
<td>Tuesday</td>
<td>February 28</td>
<td>3:50 PM</td>
</tr>
<tr height="19">
<td height="19">EXP-204</td>
<td>The Role of Security in Company 2.0</td>
<td>Wednesday</td>
<td>February 29</td>
<td>1:00 PM</td>
</tr>
<tr height="19">
<td height="19">EXP-302</td>
<td>Hacking Exposed: Embedded &#8211; The Dark World of Tiny Systems and Big Hacks</td>
<td>Thursday</td>
<td>March 1</td>
<td>9:30 AM</td>
</tr>
<tr height="19">
<td height="19">EXP-303</td>
<td>Terrorist Groups in the Online World</td>
<td>Thursday</td>
<td>March 1</td>
<td>10:40 AM</td>
</tr>
<tr height="19">
<td height="19">EXP-401</td>
<td>Web Breaches in 2011-“This is Becoming Hourly News and Totally   Ridiculous&#8221;</td>
<td>Friday</td>
<td>March 2</td>
<td>9:00 AM</td>
</tr>
<tr height="19">
<td height="19">EXP-403</td>
<td>From Technology to Psychology: Understanding the Social Psychology of   Hackers</td>
<td>Friday</td>
<td>March 2</td>
<td>11:20 AM</td>
</tr>
<tr height="19">
<td height="19">GRC-106</td>
<td>Risk Management Smackdown II: The Wrath of Kuhn</td>
<td>Tuesday</td>
<td>February 28</td>
<td>1:10 PM</td>
</tr>
<tr height="19">
<td height="19">GRC-107</td>
<td>Taking Information Security Risk Management Beyond Smoke &amp; Mirrors</td>
<td>Tuesday</td>
<td>February 28</td>
<td>2:40 PM</td>
</tr>
<tr height="19">
<td height="19">GRC-203</td>
<td>The Metric System: Why Meaningful Metrics Matter</td>
<td>Wednesday</td>
<td>February 29</td>
<td>10:40 AM</td>
</tr>
<tr height="19">
<td height="19">HOT-107</td>
<td>BYOD(evice) without BYOI(nsecurity)</td>
<td>Tuesday</td>
<td>February 28</td>
<td>2:40 PM</td>
</tr>
<tr height="19">
<td height="19">HOT-201</td>
<td>Embedded Insecurity: What Lies Beneath</td>
<td>Wednesday</td>
<td>February 29</td>
<td>8:00 AM</td>
</tr>
<tr height="19">
<td height="19">HOT-203</td>
<td>Hacking Exposed: Mobile RAT Edition</td>
<td>Wednesday</td>
<td>February 29</td>
<td>10:40 AM</td>
</tr>
<tr height="19">
<td height="19">HT1-108</td>
<td>Vulnerability Panel: Is it ZERO Day or ZERO Care?</td>
<td>Tuesday</td>
<td>February 28</td>
<td>3:50 PM</td>
</tr>
<tr height="19">
<td height="19">HT1-203</td>
<td>The Psychology of a Cyber Predator; Decoding the Deviate Mind</td>
<td>Wednesday</td>
<td>February 29</td>
<td>10:40 AM</td>
</tr>
<tr height="19">
<td height="19">HT1-204</td>
<td>Why is Search Engine Poisoning Still the #1 Web Malware Vector?</td>
<td>Wednesday</td>
<td>February 29</td>
<td>1:00 PM</td>
</tr>
<tr height="19">
<td height="19">HT1-402</td>
<td>The Three Myths of Cyberwar</td>
<td>Friday</td>
<td>March 2</td>
<td>10:10 AM</td>
</tr>
<tr height="19">
<td height="19">HT1-403</td>
<td>Estimating the Likelihood of Cyber Attacks When There’s “Insufficient   Data”</td>
<td>Friday</td>
<td>March 2</td>
<td>11:20 AM</td>
</tr>
<tr height="19">
<td height="19">HT2-107</td>
<td>SSL and the Future of Authenticity</td>
<td>Tuesday</td>
<td>February 28</td>
<td>2:40 PM</td>
</tr>
<tr height="19">
<td height="19">HT2-202</td>
<td>Corporate Espionage for Dummies: The Hidden Threat of Embedded Web   Servers</td>
<td>Wednesday</td>
<td>February 29</td>
<td>9:30 AM</td>
</tr>
<tr height="19">
<td height="19">LAW-204</td>
<td>Tackling the Identity Management Liability Problem</td>
<td>Wednesday</td>
<td>February 29</td>
<td>1:00 PM</td>
</tr>
<tr height="19">
<td height="19">MBS-302</td>
<td>Vetting Mobile Apps for the Warfighter</td>
<td>Thursday</td>
<td>March 1</td>
<td>9:30 AM</td>
</tr>
<tr height="19">
<td height="19">MBS-303</td>
<td>BYOD: Securing Mobile Devices You Don’t Own</td>
<td>Thursday</td>
<td>March 1</td>
<td>10:40 AM</td>
</tr>
<tr height="19">
<td height="19">MBS-402</td>
<td>iOS Security Internals</td>
<td>Friday</td>
<td>March 2</td>
<td>10:10 AM</td>
</tr>
<tr height="19">
<td height="19">P2P-204B</td>
<td>Cloudy With a Chance of Risk</td>
<td>Wednesday</td>
<td>February 29</td>
<td>1:00 PM</td>
</tr>
<tr height="19">
<td height="19">SECT-201</td>
<td>Innovation and Technology Transfer in Security: From the Lab to General   Use</td>
<td>Wednesday</td>
<td>February 29</td>
<td>8:00 AM</td>
</tr>
</tbody>
</table>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1265</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Evaluating the Oracle Security Manifesto</title>
		<link>http://spiresecurity.com/?p=1257</link>
		<comments>http://spiresecurity.com/?p=1257#comments</comments>
		<pubDate>Tue, 30 Aug 2011 15:21:48 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Random]]></category>
		<category><![CDATA[Vulnerability Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1257</guid>
		<description><![CDATA[The cool thing about Mary Ann Davidson is she doesn&#8217;t mince her words; you know where she stands on every issue and she is willing to own it in the security world. So when I started hearing some buzz about&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1257">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>The cool thing about Mary Ann Davidson is she doesn&#8217;t mince her words; you know where she stands on every issue and she is willing to own it in the security world. So when I started hearing some buzz about her latest blog post &#8211; <a href="http://blogs.oracle.com/maryanndavidson/entry/those_who_can_t_do">Those Who Can&#8217;t Do, Audit</a> &#8211; I expected some sizzle. And got it.</p>
<p>It turns out the target this time is &#8220;SASO,&#8221; a company that must be making headway in driving legislation towards third party code reviews.</p>
<blockquote><p><em>&#8220;<span> I’ve opined in previous blogs on the importance of defining what problem you want to solve, specifying what “it” is that you want to legislate, understanding costs – especially those pertaining to unintended consequences &#8211; and so on.&#8221;</span></em></p></blockquote>
<p>-&gt; Hear, hear (or is that here, here?). In any case, we should all be finding ways to understanding exactly what we want. For example, do you simply want &#8220;more secure software&#8221; or do you really want &#8220;fewer incidents?&#8221; I am utterly against legislation because we haven&#8217;t defined the problem and more importantly we haven&#8217;t scoped out the solution.</p>
<blockquote><p><em> This includes legislative mandates on suppliers – who, as we all know – </em>[sarcasm] <em>are busy throwing crappy code over the wall with malice aforethought. Those evil suppliers simply cannot be trusted&#8230;</em>[/sarcasm]</p></blockquote>
<p>-&gt; I had to emphasize the sarcasm here because <em>some security folks actually believe this</em>. However, Mary Ann seems to insinuate that simply because developers are not <em>trying </em>to write write crappy code, they aren&#8217;t creating it. And there is good reason to believe (ahem) that software ships with vulnerabilities. The code isn&#8217;t necessarily crappy, per se, but it is hard to refute the evidence that it <em>does</em> have vulnerabilities &#8211; sometimes many.</p>
<p>Though I understand the frustration and strong emotions here, on both sides, I am not a fan of setting this up as some sort of moral, &#8220;good vs. evil&#8221; argument. In my experience, most folks really are trying to &#8220;do the right thing&#8221; even though the approaches conflict.</p>
<blockquote><p><span><em>Having to plow through 1000 alleged vulnerabilities to find the three that are legitimate is way too expensive for any company to contemplate doing it.</em></span></p></blockquote>
<p>-&gt; In my opinion, this is the real problem with this entire space. The tools do not provide high quality, which makes security expensive. And I immediately segue into most vulns aren&#8217;t exploited and there are no defined bounds to how long you can look for vulnerabilities.</p>
<blockquote><p><span> <em>“creating a market for themselves.”</em></span></p></blockquote>
<p>-&gt; Reference to &#8220;demand creation,&#8221; one of a handful of conflicts of interest in the security world (really, everywhere). Another is the conflict between security and shipping products.</p>
<blockquote><p><em>&#8220;<span> they analyze the binaries to do static analysis&#8221;</span></em></p></blockquote>
<p>-&gt; I wonder who this could be. Oh, that&#8217;s right, it&#8217;s &#8220;SASO.&#8221;</p>
<blockquote><p><span><em>And thus, suppliers are out of business if they screw it up, because their competitors will be ruthless. Competitors are ruthless.</em></span></p></blockquote>
<p>-&gt; This is standard far &#8220;it&#8217;s not us, it&#8217;s them&#8221; mentality that is extremely tricky. Vendors think &#8220;competitors&#8221; are ruthless which implies they are some sort of exception. Enterprises believe &#8220;everyone&#8221; is ruthless &#8211; there are no &#8220;competitors&#8221; only prospective suppliers. And again, in a very ambiguous space, it is rare to find a software company that doesn&#8217;t have something to say about the quality of their security program.</p>
<p>Of course, of much more importance in all of this &#8211; and perhaps Oracle can attest to this as well &#8211; is the value the software product provides to the company.</p>
<blockquote><p><span><em>Whom do you think is more trustworthy? Who has a greater incentive to do the job right – someone who builds something, or someone who builds FUD around what others build? Did I mention that most large hardware and software companies run their own businesses on their own products so if there’s a problem, they – or rather, we – are the first ones to suffer? Can SASO say that? I thought not.</em></span></p></blockquote>
<p>-&gt; A strawman that seems a bit of a stretch based on the evidence. I agree wholeheartedly that developers really do try to write secure software, and that companies really do try to ship secure products. Unfortunately, in today&#8217;s world there is plenty of evidence that it isn&#8217;t good enough. And, to be honest, I think the answer is that SASO has more incentive to do the job &#8220;right&#8221; &#8211; it is their core business.</p>
<blockquote><p><span><em>&#8230;why SASO will never darken our code base&#8230;</em></span></p></blockquote>
<p>-&gt; I can&#8217;t help but think of a CFO asserting that external auditors will never &#8220;darken&#8221; his financial statements&#8230; umm, yeah. Moving on, now.</p>
<p>This next section is the &#8220;manifesto&#8221; part:</p>
<blockquote><p><span><em>1) We have source code and we do our own static analysis.</em></span></p></blockquote>
<p>-&gt; It is very hard not to be trite here with a &#8220;and how is that working out for the industry?&#8221; line. This is true of every significant software developer. It seems like vulnerabilities are still missed (ahem).</p>
<blockquote><p><span>2) <em>Security != testing</em></span></p></blockquote>
<p><span>-&gt; Agreed! There is much more to it. But vulnerabilities are where the rubber meets the road. The good news is that the corollary to this statement also refutes Mary Ann&#8217;s earlier point that she would never outsource &#8220;security.&#8221; It really isn&#8217;t security, it is testing that is (potentially) being outsourced.</span></p>
<blockquote><p><span>3) <em>Precedent&#8230; </em></span><span>4) <em>Fixability&#8230;</em></span></p></blockquote>
<p><span>-&gt; I worry a lot about Precedent. Just not in this case. And fixability is simply a truism that is irrelevant as far as I can tell.</span></p>
<blockquote><p><span><span>5) <em>Equality as public policy.</em></span></span></p></blockquote>
<p><span><span>-&gt; The more vulnerabilities you fix, the more every customer benefits. I don&#8217;t see how this is unfair or unequal.</span></span></p>
<blockquote><p><span>6) <em>Global practices for global markets.</em></span></p></blockquote>
<p><span>-&gt; Aha! Finally, we get to the real argument, which is that they already use Common Criteria labs to evaluate security, and Oracle believes it is more comprehensive. A much stronger argument, I believe. Buried.</span></p>
<blockquote><p><span><span>7) <em>All tools are not created equal.</em></span></span></p></blockquote>
<p><span><span>-&gt; Wow. Lots of nuances to this one. I agree that you shouldn&#8217;t mandate a tool, or even approach. That runs the risk of ambiguity and leads to the reason why there shouldn&#8217;t be legislation in this regard. But that doesn&#8217;t mean there is no value to third-party reviews. The biggest value I see is not independence as if developers are colluding in producing bad code, but independence in that another set of eyes can provide new ways to look at the code and, as has been shown by public disclosures (which I generally don&#8217;t support), find more vulnerabilities.</span></span></p>
<p><span><span>[man, this Oracle post goes on forever!]</span></span></p>
<blockquote><p><span>[A "cautionary tale"] <em>I told the product group that they absolutely, positively, needed in-house security expertise, that “outsourcing testing” would create an “outsourcing security” mentality that is unacceptable.</em></span></p></blockquote>
<p><em>-&gt;</em> If I had a dollar for every &#8220;cautionary tale&#8221; I&#8217;ve heard, I would be a rich man. The notion that there aren&#8217;t a thousand ways to address &#8220;mentality&#8221; issues is simply wrong.</p>
<blockquote><p><span><em>By way of contrast, consider another company that does static analysis as a service.</em></span></p></blockquote>
<p><em>-</em>&gt; So, that contrasting story doesn&#8217;t really contrast. It seems to indicate that you *can* outsource security testing, if you do it &#8220;ethically,&#8221; which I am sure everyone would suggest that is how they work, and, as with the other arguments about what is in the best interests of companies, is certainly in the testing companies&#8217; best interests.</p>
<blockquote><p><span><em> I recently heard that SASO has hired a lobbyist. (I did fact check with them and they stated that, while they had hired a lobbyist, they weren’t “seriously pursuing that angle” – yet.)</em></span></p></blockquote>
<p><em>-</em>&gt; Ugh. Just ugh.</p>
<blockquote><p><span><em>I have to wonder, what are they going to lobby for?</em></span></p></blockquote>
<p><em>-</em>&gt; A great, important question that really should be answered by the industry.</p>
<blockquote><p><span><em>In my opinion, neither SASO &#8211; nor any other requirement for third party security testing &#8211; has any place in a supply chain discussion. If the concern is assurance, the answer is to work within existing international assurance standards, not create a new one. Particularly not a new, US-only requirement to “hand a big fat market win by regulatory fiat to any vendor who lobbied for a provision that expanded their markets.” Ka-ching.</em></span></p></blockquote>
<p><span><em></em></span><em>-</em>&gt; Though I think Mary Ann is a bit too confident in her in-house setup, I believe this is a reasonable approach and agree more than I disagree with it<em>.</em> And I find myself agreeing with the rest of the post (minus the book recommendations <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> ).</p>
<p>After reading the entire article (!) I find myself missing something. The assertions about how much security there is seems to conflict with the evidence in the public. I am no fan of public disclosures, but that is the way software security world operates today, and to leave the challenges in the entire software world unacknowledged is missing the point.</p>
<p>The only thing worse than the market is government. So I choose the lesser of two evils, almost every time. But it is worth noting that the amount of &#8220;demand creation&#8221; in the security space is reprehensible as well. Regardless of that, the software security profession as a whole completely ignores</p>
<p>THE MOST IMPORTANT QUESTION IN SOFTWARE TODAY: For any given application, how many vulnerabilities should be tolerated?</p>
<p>If your answer is none, please follow the yellow brick road to the emerald city. We have to get away from working to perfection and set standards as an industry that define a reasonable level of attention to the vulnerable state of software. This reasonability or vuln tolerance measure could be based on effort, code base churn, size, complexity, age, etc.</p>
<p>Obviously, this is a complex problem with many options, perhaps none of which is perfect. But if we don&#8217;t want another &#8220;compliance&#8221; state regarding software, we really need to address this problem with something other than &#8220;we try really hard.&#8221;</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1257</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>My Dream Metrics Status Report</title>
		<link>http://spiresecurity.com/?p=1243</link>
		<comments>http://spiresecurity.com/?p=1243#comments</comments>
		<pubDate>Thu, 12 May 2011 12:25:51 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Metrics]]></category>
		<category><![CDATA[Random]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1243</guid>
		<description><![CDATA[&#8220;Last month, our IT and information assets generated $20 million in revenue in support of 15,000 people using 350 applications. To accomplish this feat, over 32 million connections were attempted across our systems and we applied specific control measures an&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1243">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><span><em>&#8220;Last month, our IT and information assets generated $20 million in revenue in support of 15,000 people using 350 applications. To accomplish this feat, over 32 million connections were attempted across our systems and we applied specific control measures an average of 2.4 times per connection to ensure the completeness and accuracy of our transactions. As a result, over 4 million connections were blocked instantly for not meeting our basic requirements (with 99.75 percent success rate) and we identified 1,700 suspect connections that required further analysis. We ultimately determined that five of those 1,700 were attempted intrusions which we subsequently acted upon according to established procedures. There were no losses associated with the incidents.&#8221;</em></span></p>
<p><span><em><span><em>&#8220;Last month&#8217;s activity has brought to light some opportunities for improvement. We revisited our policies associated with the 4 million blocked connections and determined that approximately 10,000 (.25 percent) should have been allowed and we made a configuration change to address the issue. In addition, the policy associated with the 1695 initially suspected connections were evaluated and changes to our security posture were made that should reduce these false positives by 50 percent. To address the 5 incidents, we have instituted remedial training for the individuals involved and instrumented the affected systems with new means for intrusion detection.&#8221;</em></span></em></span></p>
<p>Read more in <a href="http://www.csoonline.com/article/print/682043">my article at CSOonline.com</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1243</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
