cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
TedKozenko
Newcomer I

March 2022 Meeting Minutes

Meeting Announcement / Invite Message:

Let’s get together - IN PERSON

We’re hosting a new event, and we’d love to see you there.  Join us for March, 29, 2022 (ISC)2 Cleveland Chapter Meeting - InfoSec - In house or Outsource?,

It was virtual last month but we're ONLY in person this month - at the Wild Eagle.

 

Every organization needs to address Information and Cyber security needs.  But how to do it?  Should they hire some cheap, energetic, computer kid to do it and let him figure it out?  ("It's just a firewall, right, that Internet thing we bought 5 years ago?")  Should they impress the investors and appease the insurance carrier by hiring another fancy "suit" to build another big department?  How about just paying some company who has "security and admin guys" to just take care of it and watch everything?  Ignoring the absurd extremes, there are worthy points and considerations along this spectrum.  Billy Heiser will moderate a group discussion with our chapter featuring our co-sponsors and panel participants from MRK.

 

We will be gathering at the Wild Eagle in Broadview Hts. Ohio (NW "sector," Rt. 82 & I-77 - the official address is: 5001 East Royalton Rd., Broadview Heights, OH 44147).

 

Co-Sponsors: MRK and the Cybersecurity Summit

We hope you’re able to join us - IN PERSON!!!

 

Start: 17:32

Attendees: 29

Sponsored: MRK

Security Friends

  • Canadian ransomware against Tampa - Netwalker RW Attack
  • OKTA hack puts thousands of companies on alert by Lap$$

                        ○ Supply chain laptop hacked

  • RW Bridgestone subsidiary - outage for a week

                        ○ Toyota suppliers getting hit

  • MS Lap$$ attack - Krebs on Security article

                        ○ 1st generation of MFA attack

                        ○ High value assets should be under MFAv2 - digital dongs (UbiKey) no push

                        ○ Also offering cash per week for credentials

  • 50% of all data breaches involve some form of insider threat
  • DOJ charges Russian employees for hacking energy sectors in 135 companies
  • What can security people do to influence decisions within their companies

                        ○ Quick and pointed presentations & information

  • FCC puts Kaspersky on security watch list - pose an unacceptable risk

Topic 1 - InfoSec In-house or Outsourced

  • What are the differences between in and out

                        ○ Many people who were specialists and larger cross-teams (in); doing same job for multiple companies, see commonalities evolve between companies (out)

                        ○ Swim upstream and learning to speak a language (in), customers want to listen (out)

                        ○ Small teams (in), different challenges within companies (out)

  • In a services role, is there a demographic of companies that choose one over the other

                        ○ Small companies want someone to do it all for them and outsource

                        ○ Commercial orgs have dedicated FTEs and compliment with outsourcing, most don't have the CISO position, looking to strike a balance

                        ○ Large enterprises have big sec staffs (500+ FTEs) to run things, have factor spending

                        ○ IT maturity can drive the run for CISO or MSSP

                        ○ Full time CISO can find more work than workers can do, outsourcing makes things more part time and manageable

  • Is it worth outsourcing because it becomes too difficult / expensive to staff

                        ○ Need to keep the staff engaged if inside

                        ○ Can move money and resources to other areas by outsourcing

                        ○ Retaining security people is hard as expertise increases - growth internal or they go elsewhere

                        ○ Security teams >10 have big turnover due to skills increases, no advancement, and inability of company to create roles

                        ○ Buy, build, or outsource - three choices

                        ○ Time, money, and accuracy - needs for security professionals

                        ○ Real, validated, and actionable - the needs of when something hits the desk

                        ○ Outsourcing the SOC allows for leveraging the knowledge of many other people

                        ○ Do not outsource vendor management

  • Engineering and operations side of the house

                        ○ Keep engineering inside, operations can be outsourced

                        ○ Drive a car vs build a car

                        ○ Firewall management - open a ticket to make it happen

                        ○ Automated response and actions can be outsourced

                        ○ Bring in experts where needed to assist in getting it happening

                        ○ Outsourcing engineering takes away your ability to affirm that security is being done

                        ○ Can outsource the work but cannot outsource the risk, the company always owns the risk

                        ○ Bring in people due to the acceptance of working remote - able to get talented people who might not have been able to work for the company

                        ○ Outsource M&A due diligence

  • RW tabletop = 1 technical to make sure it can be done, 1 with only execs for them to figure out what will actually happen, then share with each team
  • Highest value outsourced service (basic to advanced) = MDR/EDR, O365, managed SIEM, SOAR, vCISO, pen testing
  • It's easier to get $500K than to get 5 staff - if you're not willing to put the staffing, we're not doing the project
  • Reducing the EPS on the SIEM to meet the level of what the 3 staff can watch means you are actually reducing your realized value of the SIEM
  • Technical debt or tools rationalization - how can I pay for it

Job Postings

  • Progressive - FW Engineer
  • Black & Decker - interns
  •  

End: 19:44

 

0 Replies