Dailydave mailing list archives

Re: Punching above your weight class


From: "Adriel T. Desautels" <adriel () netragard com>
Date: Mon, 07 May 2007 16:39:39 -0400

Dave, 
   I couldn't agree with you more.  When my partner and I founded Netragard
we did it with the intention of addressing the issue that you talk about
below. 

  Specifically, there is a significant gap in the level and the quality of
security services being offered to businesses internationally, and the
actual threat level created by malicious hackers... To make matters worse,
that gap is growing rapidly.

   *** A quick story...

About three weeks ago I spoke on a panel during a CIO conference with Steve
Wozniak.  Before my panel went up I was listening to the first panel present
their ideas about corporate security. One of the panelists began talking
about defining "Acceptable Risk Levels" within organizations. (These were
CIO's, CTO's, CSO's etc for multi billion/million dollar companies.)

When I heard these people speaking I realized that they never got into
anything specific. Instead it was as if they were just talking about ideas
that they briefly read about in magazines or online articles. So I decided
to ask them something specific.

My first question to them was "In order to properly understand your
acceptable risk level you must first understand the threats faced by your
business, correct?"

They all nodded in agreement.

My second question to them was "Where do you get your threat intelligence?"

None of them could answer the question, instead they tried to "market" their
way around it, or provided answers that were not at all related to the
question. Later I was accused of asking a "trick question", when there was
nothing trick about it.

    *** End of my quick story...

That's when it hit me. I've always known that a very significant gap existed
between the capabilities of malicious hackers and the IT defense
capabilities of businesses and government agencies. What I never realized
was how little "good" threat intelligence was available to the people trying
to defend themselves against malicious hackers.

I've made it a point to always have good threat intelligence by maintaining
a team of people to harvest the intelligence for my business. So I suppose
that I just take the intelligence capability for granted, but what has the
rest of the world been doing? Who are they trying to protect themselves
against if they don't have that capability?

I'm sure that many of the people on this list also have ways of collecting
threat intelligence, but then again the people on this list are most
probably an acceptation. Am I wrong?

I'm very curious...


On 5/3/07 11:05 AM, "Dave Aitel" <dave () immunityinc com> wrote:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The best hacker teams in the world right now may belong to organized
crime groups. In my spare time in between packing lunch boxes and
cleaning the floor under the high chair, I've been thinking about ways
in which these organizations differ from most commercial companies who
do penetration testing. A company has a rather large budget, dedicated
infrastructure, and an experienced and skilled staff. So why do so
many of them fight like flabby novices? The fact is, giving someone a
LOT of money, and a big mission to solve, often gives them a good
excuse to get fat and useless. I don't know how to solve your problem
if you're a hundred million dollar attack team yet. But if you're at
ten million or less, these are the rules I've come up with.


Six Rules for Punching Above Your Weight Class:
o Never use an exploit in the wild you don't completely understand. If
you can't debug it on the fly, you can't use it
o Don't split up research from attack. Your research team needs to be
focused on the mission.
o Develop a fast-reaction team that can hit easy or very time critical
vulnerabilities within 8 hours or less.
o Be target focused
o Develop technical partnerships with other people who can write
exploits. There just aren't that many of them.
o One team, one mission. People naturally want to work on only Windows
or only Unix, but that's not the way to success. Find people who can
work on the whole picture.

- -dave
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGOfo7B8JNm+PA+iURAmnWAJ9fMkFiaNwsiOsiKUqgq2p3bJsv9QCg6u+7
Yc5yKpsBP3b857WvhQRtXkc=
=rzBU
-----END PGP SIGNATURE-----

_______________________________________________
Dailydave mailing list
Dailydave () lists immunitysec com
http://lists.immunitysec.com/mailman/listinfo/dailydave

-- 

Regards, 
    Adriel T. Desautels
    Chief Technology Officer - Netragard, LLC
    Office: 617-934-0269 || Mobile : 857-636-8882
    http://www.linkedin.com/pub/1/118/a45
    http://www.netragard.com
    -------------------------
    "We make IT secure."


_______________________________________________
Dailydave mailing list
Dailydave () lists immunitysec com
http://lists.immunitysec.com/mailman/listinfo/dailydave


Current thread: