I AM THE CAVALRY
http://iamthecavalry.org
@iamthecavalry
SHOULDN’T YOU BE ALSO?
CLAUS CRAMON HOUMANN
Infosec Community Manager @ Peerlyst
(A start-up Infosec community/Social platform that wants to turn the
tables on cyber security)
Infosec Consultant
The Analogies contributor
Twitter: @claushoumann
IDEA
“Our dependence on technology
is growing faster than our ability
to secure it”
IDEA
“Our society has evolved
faster than our laws”
IDEA
But why wait.......
ALL SYSTEMS FAIL*
* Yes; all
WHERE DO WE SEE CONNECTIVITY NOW?
In Our Bodies In Our Homes
In Our InfrastructureIn Our Cars
HEARTBLEED + (UNPATCHABLE) INTERNET OF
THINGS == ___ ?
In Our Bodies In Our Homes
In Our InfrastructureIn Our Cars
SAY BABY MONITORS AGAIN?
In Our Homes
Source: Rapid7 research/Mark Stanislav: Baby monitors
https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-
THEN
BUT ALSO
IT’S SAFETY
NOT JUST SECURITY
Ouch!
Cars have computers
Computers have security issues
Security issues in cars are safety issues
Safety issues can cost or imperil lives
www.iamthecavalry.org
@iamthecavalry
Past versus Future
Bolt-On Vs Built-In
SOMEONE WILL FIX IT
FOR US
Chapter 2
Thecavalryisus owasp eee-oct2015_v2
OR NOT……..
Chapter 3
Let’s create ripples
A DO-OCRACY OF
DO’ERS.
W H ER E D OIN G STARTS W ITH
EMPATHY
And by ripples I mean
Thecavalryisus owasp eee-oct2015_v2
Thecavalryisus owasp eee-oct2015_v2
Thecavalryisus owasp eee-oct2015_v2
The Point?
NEVER DOUBT THAT A SMALL GROUP
OF THOUGHTFUL, COMMITTED
CITIZENS CAN CHANGE THE WORLD;
IT’S THE ONLY THING
THAT EVER HAS.
- MAR GAR ET MEAD
( A N A M E R I C A N C U LT U R A L A N T H R O P O L O G I S T )
•The
The Cavalry isn’t coming… It falls to us
Problem Statement
Our society is adopting connected
technology faster than we are able to
secure it.
Mission Statement
To ensure connected technologies with
the potential to impact public safety
and human life are worthy of our trust.
Collecting existing research, researchers, and resources
Connecting researchers with each other, industry, media, policy, and legal
Collaborating across a broad range of backgrounds, interests, and skillsets
Catalyzing positive action sooner than it would have happened on its own
Why Trust, public safety, human life
How Education, outreach, research
Who Infosec research community
Who Global, grass roots initiative
WhatLong-term vision for cyber safety
Medical Automotive
Connected
Home
Public
Infrastructure
I Am The Cavalry
Connections and Ongoing Collaborations
5-Star Framework
5-Star Capabilities
 Safety by Design – Anticipate failure and plan mitigation
 Third-Party Collaboration – Engage willing allies
 Evidence Capture – Observe and learn from failure
 Security Updates – Respond quickly to issues discovered
 Segmentation & Isolation – Prevent cascading failure
Addressing Automotive Cyber Systems
Automotive
Engineers
Security
Researchers
Policy
Makers
Insurance
Analysts
Accident
Investigators
Standards
Organizations
https://www.iamthecavalry.org/auto/5star/
www.iamthecavalry.org
@iamthecavalry
5-Star Cyber Safety
Formal Capacities
1. Safety By Design
2. Third Party Collaboration
3. Evidence Capture
4. Security Updates
5. Segmentation and Isolation
Plain Speak
1. Avoid Failure
2. Engage Allies To Avoid
Failure
3. Learn From Failure
4. Respond to Failure
5. Isolate Failure
5 STARS
5 star ICS
5 star IoT
5 star medical devices
www.iamthecavalry.org
@iamthecavalry
And!
• Dräger on board with I am the Cavalry as first
medical device producer working directly in
sync with us
• Their Product Security Manager is even
directly involved now
AND MORE IN OTHER AREAS
COMING
We try to connect researchers to
1. Lawmakers to inform of meaningful changes to laws to enforce
secure by default
2. Vendors/producers to inform of secure ways to build securely by
design and of identified vulnerabilities
3. Purchasers of devices (example: Pacemakers, car distributors) to
explain to them why they need to contractually demand security – if
there is demand vendors will supply
AND YES I DID SAY LAWMAKERS
It is WEIRD for you to have to listen to. I
agree, but
WHAT YOU CAN DO
Chapter 5
CONNECTIONS/CONNECTORS
WANTED
Breakers and Builders
Legal and Policy
Citizens, Connectors
Parents/Guardians
Community Leaders/Bloggers/Podcasters/etc.
MOUNT UP AND BE THE
CAVALRY
YOU DON’T ACTUALY
NEED A HORSE
SAFER.
SOONER.
TOGETHER
http://iamthecavalry.org
@iamthecavalry
-> OWASK SKF
-> OWASP SECURITY SHEPHERD
-> OWASP ZAP
Recommendations:
Use SDLC

More Related Content

PPTX
Threat Check for Struts Released, Equifax Breach Dominates News
PPTX
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
PPTX
Are Your IT Systems Secure?
PPTX
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
PPTX
Any of these folks work with you?
PDF
What are the top 10 web security risks?
PPT
Organizational Security: When People are Involved
PDF
10 Consequences of tech use and abuse
Threat Check for Struts Released, Equifax Breach Dominates News
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Are Your IT Systems Secure?
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Any of these folks work with you?
What are the top 10 web security risks?
Organizational Security: When People are Involved
10 Consequences of tech use and abuse

What's hot (20)

PDF
9 Alarming developments in the fight for digital privacy
PDF
The Silver Bullet of Cyber Security v1.1
PDF
Security Awareness Training: Are We Getting Any Better at Organizational and ...
DOC
Five Mistakes of Incident Response
PDF
Stki summit2013 infra_pini sigaltechnologies_v5 final
PPTX
Protecting your Data in Google Apps
PDF
Cybersecurity Powerpoint Presentation Slides
PPTX
How to Improve Your Board’s Cyber Security Literacy
PPTX
100903 e assessment (dundee)
PDF
Wiretap 5-collaboration-security-risks-revealed
PDF
Maleeff university of toronto 11 july 2019
PPT
Social Media Policy
PDF
Autisable com-2020-05-13-cybersecurity-matters-
PPTX
Business continuity in the lean times
PDF
How secure is your company's information?
PDF
7 cyber security questions for boards
PPT
Managing insider threat
PDF
Review Paper ( Research Articles )
PPT
Philippines ‘lagging behind’ on cloud adoption
PPTX
Valuing Data in the Age of Ransomware
9 Alarming developments in the fight for digital privacy
The Silver Bullet of Cyber Security v1.1
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Five Mistakes of Incident Response
Stki summit2013 infra_pini sigaltechnologies_v5 final
Protecting your Data in Google Apps
Cybersecurity Powerpoint Presentation Slides
How to Improve Your Board’s Cyber Security Literacy
100903 e assessment (dundee)
Wiretap 5-collaboration-security-risks-revealed
Maleeff university of toronto 11 july 2019
Social Media Policy
Autisable com-2020-05-13-cybersecurity-matters-
Business continuity in the lean times
How secure is your company's information?
7 cyber security questions for boards
Managing insider threat
Review Paper ( Research Articles )
Philippines ‘lagging behind’ on cloud adoption
Valuing Data in the Age of Ransomware
Ad

Similar to Thecavalryisus owasp eee-oct2015_v2 (20)

PPTX
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
PPTX
The cavalry is us i tdays-luxembourg 2014.11.20 v1.0
PDF
Netflix SIRT - Culture and Tech -Trainman
PDF
Unpatchable: Living with a vulnerable implanted device
PDF
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
PDF
Tech Talent Meetup Hacking Security Event Recap
DOCX
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PPTX
Copy of OWASP Threat and Safeguard Matrix.pptx
PDF
Cybrary's navigating a security wasteland
PPTX
Cognitive Computing in Security with AI
PPTX
IT security
PPTX
Digital Defense for Activists (and the rest of us)
PDF
The Rising Tide Raises All Boats: The Advancement of Science of Cybersecurity
PDF
Avoiding The Seven Deadly Sins of IT
PPTX
Intro to INFOSEC
DOCX
Why security is the kidney not the tail of the dog v3
PDF
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
PDF
Threat intelligence minority report
PPT
Bulletproof IT Security
PDF
Looking into the future of security
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
The cavalry is us i tdays-luxembourg 2014.11.20 v1.0
Netflix SIRT - Culture and Tech -Trainman
Unpatchable: Living with a vulnerable implanted device
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
Tech Talent Meetup Hacking Security Event Recap
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
Copy of OWASP Threat and Safeguard Matrix.pptx
Cybrary's navigating a security wasteland
Cognitive Computing in Security with AI
IT security
Digital Defense for Activists (and the rest of us)
The Rising Tide Raises All Boats: The Advancement of Science of Cybersecurity
Avoiding The Seven Deadly Sins of IT
Intro to INFOSEC
Why security is the kidney not the tail of the dog v3
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Threat intelligence minority report
Bulletproof IT Security
Looking into the future of security
Ad

Recently uploaded (20)

PPT
Expect The Impossiblesssssssssssssss.ppt
PDF
Paper: World Game (s) Great Redesign.pdf
PPTX
北安普顿大学毕业证UoN成绩单GPA修改北安普顿大学i20学历认证文凭
PDF
Lesson.-Reporting-and-Sharing-of-Findings.pdf
PPTX
National-Historical-Commission-of-the-PhilippinesNHCP.pptx
PPTX
日本横滨国立大学毕业证书文凭定制YNU成绩单硕士文凭学历认证
PDF
JuanConnect E-Wallet Guide for new users.pdf
PPSX
AI AppSec Threats and Defenses 20250822.ppsx
PPTX
Data Flows presentation hubspot crm.pptx
PPTX
WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx
PPTX
IOT LECTURE IOT LECTURE IOT LECTURE IOT LECTURE
PPTX
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
PPTX
IT-Human Computer Interaction Report.pptx
PPTX
Basic_of_Computer_System.pptx class-8 com
PPTX
Introduction to networking local area networking
PPT
chapter 5: system unit computing essentials
PPTX
Networking2-LECTURE2 this is our lessons
PPTX
PORTFOLIO SAMPLE…….………………………………. …pptx
DOCX
Audio to Video AI Technology Revolutiona
PPTX
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
Expect The Impossiblesssssssssssssss.ppt
Paper: World Game (s) Great Redesign.pdf
北安普顿大学毕业证UoN成绩单GPA修改北安普顿大学i20学历认证文凭
Lesson.-Reporting-and-Sharing-of-Findings.pdf
National-Historical-Commission-of-the-PhilippinesNHCP.pptx
日本横滨国立大学毕业证书文凭定制YNU成绩单硕士文凭学历认证
JuanConnect E-Wallet Guide for new users.pdf
AI AppSec Threats and Defenses 20250822.ppsx
Data Flows presentation hubspot crm.pptx
WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx
IOT LECTURE IOT LECTURE IOT LECTURE IOT LECTURE
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
IT-Human Computer Interaction Report.pptx
Basic_of_Computer_System.pptx class-8 com
Introduction to networking local area networking
chapter 5: system unit computing essentials
Networking2-LECTURE2 this is our lessons
PORTFOLIO SAMPLE…….………………………………. …pptx
Audio to Video AI Technology Revolutiona
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证

Thecavalryisus owasp eee-oct2015_v2

  • 1. I AM THE CAVALRY http://iamthecavalry.org @iamthecavalry SHOULDN’T YOU BE ALSO?
  • 2. CLAUS CRAMON HOUMANN Infosec Community Manager @ Peerlyst (A start-up Infosec community/Social platform that wants to turn the tables on cyber security) Infosec Consultant The Analogies contributor Twitter: @claushoumann
  • 3. IDEA “Our dependence on technology is growing faster than our ability to secure it”
  • 4. IDEA “Our society has evolved faster than our laws”
  • 7. WHERE DO WE SEE CONNECTIVITY NOW? In Our Bodies In Our Homes In Our InfrastructureIn Our Cars
  • 8. HEARTBLEED + (UNPATCHABLE) INTERNET OF THINGS == ___ ? In Our Bodies In Our Homes In Our InfrastructureIn Our Cars
  • 9. SAY BABY MONITORS AGAIN? In Our Homes Source: Rapid7 research/Mark Stanislav: Baby monitors https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-
  • 10. THEN
  • 12. IT’S SAFETY NOT JUST SECURITY Ouch!
  • 13. Cars have computers Computers have security issues Security issues in cars are safety issues Safety issues can cost or imperil lives
  • 15. SOMEONE WILL FIX IT FOR US Chapter 2
  • 19. A DO-OCRACY OF DO’ERS. W H ER E D OIN G STARTS W ITH EMPATHY And by ripples I mean
  • 24. NEVER DOUBT THAT A SMALL GROUP OF THOUGHTFUL, COMMITTED CITIZENS CAN CHANGE THE WORLD; IT’S THE ONLY THING THAT EVER HAS. - MAR GAR ET MEAD ( A N A M E R I C A N C U LT U R A L A N T H R O P O L O G I S T )
  • 25. •The The Cavalry isn’t coming… It falls to us Problem Statement Our society is adopting connected technology faster than we are able to secure it. Mission Statement To ensure connected technologies with the potential to impact public safety and human life are worthy of our trust. Collecting existing research, researchers, and resources Connecting researchers with each other, industry, media, policy, and legal Collaborating across a broad range of backgrounds, interests, and skillsets Catalyzing positive action sooner than it would have happened on its own Why Trust, public safety, human life How Education, outreach, research Who Infosec research community Who Global, grass roots initiative WhatLong-term vision for cyber safety Medical Automotive Connected Home Public Infrastructure I Am The Cavalry
  • 26. Connections and Ongoing Collaborations 5-Star Framework 5-Star Capabilities  Safety by Design – Anticipate failure and plan mitigation  Third-Party Collaboration – Engage willing allies  Evidence Capture – Observe and learn from failure  Security Updates – Respond quickly to issues discovered  Segmentation & Isolation – Prevent cascading failure Addressing Automotive Cyber Systems Automotive Engineers Security Researchers Policy Makers Insurance Analysts Accident Investigators Standards Organizations https://www.iamthecavalry.org/auto/5star/
  • 27. www.iamthecavalry.org @iamthecavalry 5-Star Cyber Safety Formal Capacities 1. Safety By Design 2. Third Party Collaboration 3. Evidence Capture 4. Security Updates 5. Segmentation and Isolation Plain Speak 1. Avoid Failure 2. Engage Allies To Avoid Failure 3. Learn From Failure 4. Respond to Failure 5. Isolate Failure
  • 28. 5 STARS 5 star ICS 5 star IoT 5 star medical devices
  • 29. www.iamthecavalry.org @iamthecavalry And! • Dräger on board with I am the Cavalry as first medical device producer working directly in sync with us • Their Product Security Manager is even directly involved now
  • 30. AND MORE IN OTHER AREAS COMING We try to connect researchers to 1. Lawmakers to inform of meaningful changes to laws to enforce secure by default 2. Vendors/producers to inform of secure ways to build securely by design and of identified vulnerabilities 3. Purchasers of devices (example: Pacemakers, car distributors) to explain to them why they need to contractually demand security – if there is demand vendors will supply
  • 31. AND YES I DID SAY LAWMAKERS It is WEIRD for you to have to listen to. I agree, but
  • 32. WHAT YOU CAN DO Chapter 5
  • 33. CONNECTIONS/CONNECTORS WANTED Breakers and Builders Legal and Policy Citizens, Connectors Parents/Guardians Community Leaders/Bloggers/Podcasters/etc.
  • 34. MOUNT UP AND BE THE CAVALRY YOU DON’T ACTUALY NEED A HORSE
  • 36. -> OWASK SKF -> OWASP SECURITY SHEPHERD -> OWASP ZAP Recommendations: Use SDLC