I’ll keep this relatively brief as I have already covered this conference in some detail while blogging live from the event. I think the write ups ended up around 12000 words in total across the three days! I hope you have managed to read those covering content that was of interest to you – there was certainly a lot of information there that I found useful!
As usual with conferences like this some of the presentations had slight vendor bias, with an prime example being companies like EMC championing the need to prioritise spending from limited security budgets on more advanced tools for detecting and preventing longer term advanced threats (Advanced Persistent Threats – APT) at the expense of older more stable technologies such as AV. EMC is currently selling and promoting products in this area.. This was followed by Symantec who obviously highlighted that they think AV is still critical and should continue to be invested in, unsurprising as anti-virus / anti-malware is still one of their key products and revenue streams.
On this point I fall between the two in that I completely agree AV is still important, but due to the maturity of the market and quality of most products you should be looking to drive costs down in this area while still maintaining an acceptable level of quality. By managing costs in established areas and looking for end point solutions that cover multiple vectors such as AV, firewalling, DLP etc. you should hopefully be able to free up budget to invest in some of the newer more advanced tools or improve key areas such as your log monitoring and correlation capabilities.
Overall the presentations remained fairly vendor neutral and contained loads of useful content. Highlights for me included;
– Wireless hacking demos
– Man in the browser demos
– Discussion around the state of the industry
– Presentations on building a cyber-security capability and improving the way we in security can interact with the business
– Presentations on the threat landscape
All of which were covered in the conference blog posts.
To wrap up my commentary of the conference, I’ll finish with a few of what were, for me, the key take away points;
– Understand your environment and your industry – where is your data, what are your important assets and what are the key threats to your organisation. If you don’t know this how can you know what to protect and how?
– Following on from that, make sure you are protecting the right things and to correct level.
– Read useful reports such as the Verizon Breach report – the data is frankly eye opening if you are not yet aware of the time most breaches take to be discovered and how poorly protected many businesses are (416 days and likely to rise..)
– Become better at interfacing with the business – it is our job to make sure the decision makes at the highest level are aware of the risks and what they mean to our business / organisation. Board level executives may choose to accept or ignore risks, but they should do with a full awareness of the threat landscape and our risks. If the business / the board are unaware of the risks to the environment this is 100% our failing. If they accept a risk and we are breached it is on them and they accepted the risk(s) with awareness they may be exploited. If your organisation is exploited and the board / business were unaware then it is on us.
– Finally it reminded me how much I love IT security and creating secure solutions and environments! Take pride in what you do and do it well; jobs, money and peoples identities rely on us doing this right.
As always, feel free to ask if you want any more information, I’m more than happy to evangelise on these topics!