|
Julian Cohen
@
HockeyInJune
New York, NY
|
|
Risk philosopher.
CISO.
Advisor.
Mentor.
Retired vulnerability researcher.
Retired CTF organizer and competitor.
he/him
|
|
|
721
Tweetovi
|
488
Pratim
|
5.487
Osobe koje vas prate
|
| Tweetovi |
|
Julian Cohen
@HockeyInJune
|
3. velj |
|
"While $5.6M is a lot for 30 seconds, it's probably comparable on a per-view basis with a Facebook or a magazine ad."
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
30. sij |
|
|
||
|
Julian Cohen
@HockeyInJune
|
28. sij |
|
If you can only identify with one or two of these types of security people, you're probably leaving a significant portion of your security program on the table. A good security practitioner can apply different perspectives to a problem to find the best solution for that problem. twitter.com/halvarflake/st…
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
28. sij |
|
"...any change in a system, even a change intended to prevent or mitigate a potential hazardous incident, also has the potential to introduce new hazards, or new mechanisms by which existing hazards can result in an incident."
sci-hub.se/10.1002/prs.68…
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
17. sij |
|
This is @swagitda_'s OC: twitter.com/swagitda_/stat…
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
17. sij |
|
I disagree with a lot of the risk forecasting work for these same reasons, but you are one hundred percent right that we have no quant insight into so many things that would have models in any other industry. As much as I disagree with it, it's super important and useful work.
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
13. sij |
|
If you don't understand your adversaries, you can't defend against them.
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
9. sij |
|
I am also not an expert on Iran, but I found this CISA alert surprisingly accurate based on what I know about Iran. They are not a sophisticated adversary in terms of capabilities, but they are very good at making simple, effective techniques scale well.
us-cert.gov/ncas/alerts/aa…
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
24. pro |
|
You can outsource your threat intelligence gathering and analysis to a third-party. Like with anything, the better information you have, the better decisions you can make.
Also, see part 1: medium.com/@HockeyInJune/…
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
24. pro |
|
For systems that are being built, I think you're right. But for systems that already exist, looking at systemic and individual vulnerabilities through an adversary-based lens can help you prioritize and allocate resources. Stay tuned for part 3!
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
24. pro |
|
All of that is easily managed if you follow the steps and treat the model like an iterative process. :)
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
24. pro |
|
Adversary-Based Threat Modeling
medium.com/@HockeyInJune/…
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
20. pro |
|
Sometimes that means best practices and state-of-the-art tools and technology and sometimes it doesn't. Sometimes that means a 24/7 in-house SOC and sometimes it doesn't. But it always means understanding your risks and your adversaries and meticulously defending against them.
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
20. pro |
|
Your job as a security engineer isn't to build unhackable systems or fix every security vulnerability. It's to allow the business to succeed despite hackable systems and security vulnerabilities. This means using all available resources to prioritize what's best for the business.
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
20. pro |
|
Always remember to take a step back and make sure the control you're building or the detection you're engineering or the problem you are solving is still relevant and prudent. New information about your adversary may require you to change course. Do not ignore it.
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
20. pro |
|
Continuation bias (commonly referred to as get-there-itis) is the unconscious cognitive bias to continue with an original plan despite mounting evidence and changing conditions. This is a common problem in a lot of places, but especially in cybersecurity.
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
14. pro |
|
The actor Jonny Lee Miller is a better hacker than Kevin.
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
10. pro |
|
|
||
|
Julian Cohen
@HockeyInJune
|
7. pro |
|
Why bother try because of a chance it won't work? Why take any security advice, then? All defenses might not work. Our job as security practitioners is to make work more difficult for adversaries and that includes not publishing tools that help them complete their objectives. twitter.com/carnal0wnage/s…
|
||
|
|
||
|
Julian Cohen
@HockeyInJune
|
6. pro |
|
"Is that a hill you're willing to die on? Because I have the murder weapon right here."
|
||
|
|
||