際際滷shows by User: sounilyu / http://www.slideshare.net/images/logo.gif 際際滷shows by User: sounilyu / Wed, 03 Aug 2022 18:34:29 GMT 際際滷Share feed for 際際滷shows by User: sounilyu Cyber Defense Matrix: Revolutions /sounilyu/cyber-defense-matrix-revolutions-252417499 str-m01cyberdefensematrix-revolutions-slideshare-220803183429-7fec9b3c
The Cyber Defense Matrix helps people organize and understand gaps in their overall security program. These slides describe several additional use cases of the Cyber Defense Matrix, including how to map the latest startup vendors and security trends, anticipate gaps, develop program roadmaps, capture metrics, reconcile inventories, improve situational awareness, and create a board-level view of their entire program. See the 2016 version at: http://bit.ly/cyberdefensematrix See the 2019 version at: http://bit.ly/cyberdefensematrixreloaded]]>

The Cyber Defense Matrix helps people organize and understand gaps in their overall security program. These slides describe several additional use cases of the Cyber Defense Matrix, including how to map the latest startup vendors and security trends, anticipate gaps, develop program roadmaps, capture metrics, reconcile inventories, improve situational awareness, and create a board-level view of their entire program. See the 2016 version at: http://bit.ly/cyberdefensematrix See the 2019 version at: http://bit.ly/cyberdefensematrixreloaded]]>
Wed, 03 Aug 2022 18:34:29 GMT /sounilyu/cyber-defense-matrix-revolutions-252417499 sounilyu@slideshare.net(sounilyu) Cyber Defense Matrix: Revolutions sounilyu The Cyber Defense Matrix helps people organize and understand gaps in their overall security program. These slides describe several additional use cases of the Cyber Defense Matrix, including how to map the latest startup vendors and security trends, anticipate gaps, develop program roadmaps, capture metrics, reconcile inventories, improve situational awareness, and create a board-level view of their entire program. See the 2016 version at: http://bit.ly/cyberdefensematrix See the 2019 version at: http://bit.ly/cyberdefensematrixreloaded <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/str-m01cyberdefensematrix-revolutions-slideshare-220803183429-7fec9b3c-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Cyber Defense Matrix helps people organize and understand gaps in their overall security program. These slides describe several additional use cases of the Cyber Defense Matrix, including how to map the latest startup vendors and security trends, anticipate gaps, develop program roadmaps, capture metrics, reconcile inventories, improve situational awareness, and create a board-level view of their entire program. See the 2016 version at: http://bit.ly/cyberdefensematrix See the 2019 version at: http://bit.ly/cyberdefensematrixreloaded
Cyber Defense Matrix: Revolutions from Sounil Yu
]]>
2567 0 https://cdn.slidesharecdn.com/ss_thumbnails/str-m01cyberdefensematrix-revolutions-slideshare-220803183429-7fec9b3c-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How I Learned to Stop Information Sharing and Love the DIKW /slideshow/how-i-learned-to-stop-information-sharing-and-love-the-dikw/237611060 howilearnedtostopinformationsharingandlovethedikw-generic-200806124545
A briefing that proposes ways to improve our cybersecurity defenses by sharing understanding and knowledge instead of just information.]]>

A briefing that proposes ways to improve our cybersecurity defenses by sharing understanding and knowledge instead of just information.]]>
Thu, 06 Aug 2020 12:45:45 GMT /slideshow/how-i-learned-to-stop-information-sharing-and-love-the-dikw/237611060 sounilyu@slideshare.net(sounilyu) How I Learned to Stop Information Sharing and Love the DIKW sounilyu A briefing that proposes ways to improve our cybersecurity defenses by sharing understanding and knowledge instead of just information. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howilearnedtostopinformationsharingandlovethedikw-generic-200806124545-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A briefing that proposes ways to improve our cybersecurity defenses by sharing understanding and knowledge instead of just information.
How I Learned to Stop Information Sharing and Love the DIKW from Sounil Yu
]]>
1338 0 https://cdn.slidesharecdn.com/ss_thumbnails/howilearnedtostopinformationsharingandlovethedikw-generic-200806124545-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
New Paradigms for the Next Era of Security /slideshow/new-paradigms-for-the-next-era-of-security/234283875 newparadigmsforthenexteraofsecurity-rsac2020-200519172833
As we enter the 2020s, we will see the attacks culminate to where machines, infrastructure, and data become irrecoverable. In these scenarios, our old security paradigm of confidentiality, integrity, and availability no longer apply. Instead, we need a new paradigm of distributed, immutable, and ephemeral design patterns for the next era.]]>

As we enter the 2020s, we will see the attacks culminate to where machines, infrastructure, and data become irrecoverable. In these scenarios, our old security paradigm of confidentiality, integrity, and availability no longer apply. Instead, we need a new paradigm of distributed, immutable, and ephemeral design patterns for the next era.]]>
Tue, 19 May 2020 17:28:33 GMT /slideshow/new-paradigms-for-the-next-era-of-security/234283875 sounilyu@slideshare.net(sounilyu) New Paradigms for the Next Era of Security sounilyu As we enter the 2020s, we will see the attacks culminate to where machines, infrastructure, and data become irrecoverable. In these scenarios, our old security paradigm of confidentiality, integrity, and availability no longer apply. Instead, we need a new paradigm of distributed, immutable, and ephemeral design patterns for the next era. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/newparadigmsforthenexteraofsecurity-rsac2020-200519172833-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As we enter the 2020s, we will see the attacks culminate to where machines, infrastructure, and data become irrecoverable. In these scenarios, our old security paradigm of confidentiality, integrity, and availability no longer apply. Instead, we need a new paradigm of distributed, immutable, and ephemeral design patterns for the next era.
New Paradigms for the Next Era of Security from Sounil Yu
]]>
1641 0 https://cdn.slidesharecdn.com/ss_thumbnails/newparadigmsforthenexteraofsecurity-rsac2020-200519172833-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Lessons Learned in Automated Decision Making / How to Delay Building Skynet /slideshow/lessons-learned-in-automated-decision-making-how-to-delay-building-skynet/140362753 mlai-t06lessonslearnedinautomateddecisionmaking-uncensored-190410193439
There is much talk of topics like artificial intelligence, machine learning, and automation within the security industry. We are led to believe that these capabilities will revolutionize our security practices. However, we need to be conscious of the limits of these capabilities before we entrust them with matters of importance. To understand the limits, we need to understand what each of these capabilities really mean and how they fit together. Unfortunately, most people combine these capabilities and use the terms almost interchangeably. Doing so is dangerous and can create unintended consequences.]]>

There is much talk of topics like artificial intelligence, machine learning, and automation within the security industry. We are led to believe that these capabilities will revolutionize our security practices. However, we need to be conscious of the limits of these capabilities before we entrust them with matters of importance. To understand the limits, we need to understand what each of these capabilities really mean and how they fit together. Unfortunately, most people combine these capabilities and use the terms almost interchangeably. Doing so is dangerous and can create unintended consequences.]]>
Wed, 10 Apr 2019 19:34:39 GMT /slideshow/lessons-learned-in-automated-decision-making-how-to-delay-building-skynet/140362753 sounilyu@slideshare.net(sounilyu) Lessons Learned in Automated Decision Making / How to Delay Building Skynet sounilyu There is much talk of topics like artificial intelligence, machine learning, and automation within the security industry. We are led to believe that these capabilities will revolutionize our security practices. However, we need to be conscious of the limits of these capabilities before we entrust them with matters of importance. To understand the limits, we need to understand what each of these capabilities really mean and how they fit together. Unfortunately, most people combine these capabilities and use the terms almost interchangeably. Doing so is dangerous and can create unintended consequences. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mlai-t06lessonslearnedinautomateddecisionmaking-uncensored-190410193439-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> There is much talk of topics like artificial intelligence, machine learning, and automation within the security industry. We are led to believe that these capabilities will revolutionize our security practices. However, we need to be conscious of the limits of these capabilities before we entrust them with matters of importance. To understand the limits, we need to understand what each of these capabilities really mean and how they fit together. Unfortunately, most people combine these capabilities and use the terms almost interchangeably. Doing so is dangerous and can create unintended consequences.
Lessons Learned in Automated Decision Making / How to Delay Building Skynet from Sounil Yu
]]>
1623 0 https://cdn.slidesharecdn.com/ss_thumbnails/mlai-t06lessonslearnedinautomateddecisionmaking-uncensored-190410193439-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security /slideshow/distributed-immutable-ephemeral-new-paradigms-for-the-next-era-of-security/140096422 distributedimmuatableephemeral-newparadigmsforthenexteraofsecurityfull-190408212721
We are rapidly approaching the next era of security where we need to be focused on the ability to recover from irrecoverable attacks. This can also be defined as resiliency. The traditional view of resiliency attempts to quickly restore assets that support services that we care about. This new approach/paradigm looks at resilience in ways that promote design patterns (distributed, immutable, ephemeral) where we do not care about a given asset at all while still keeping the overall service functioning. This new approach allows us to avoid having to deal with security at all.]]>

We are rapidly approaching the next era of security where we need to be focused on the ability to recover from irrecoverable attacks. This can also be defined as resiliency. The traditional view of resiliency attempts to quickly restore assets that support services that we care about. This new approach/paradigm looks at resilience in ways that promote design patterns (distributed, immutable, ephemeral) where we do not care about a given asset at all while still keeping the overall service functioning. This new approach allows us to avoid having to deal with security at all.]]>
Mon, 08 Apr 2019 21:27:21 GMT /slideshow/distributed-immutable-ephemeral-new-paradigms-for-the-next-era-of-security/140096422 sounilyu@slideshare.net(sounilyu) Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security sounilyu We are rapidly approaching the next era of security where we need to be focused on the ability to recover from irrecoverable attacks. This can also be defined as resiliency. The traditional view of resiliency attempts to quickly restore assets that support services that we care about. This new approach/paradigm looks at resilience in ways that promote design patterns (distributed, immutable, ephemeral) where we do not care about a given asset at all while still keeping the overall service functioning. This new approach allows us to avoid having to deal with security at all. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/distributedimmuatableephemeral-newparadigmsforthenexteraofsecurityfull-190408212721-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We are rapidly approaching the next era of security where we need to be focused on the ability to recover from irrecoverable attacks. This can also be defined as resiliency. The traditional view of resiliency attempts to quickly restore assets that support services that we care about. This new approach/paradigm looks at resilience in ways that promote design patterns (distributed, immutable, ephemeral) where we do not care about a given asset at all while still keeping the overall service functioning. This new approach allows us to avoid having to deal with security at all.
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security from Sounil Yu
]]>
8405 0 https://cdn.slidesharecdn.com/ss_thumbnails/distributedimmuatableephemeral-newparadigmsforthenexteraofsecurityfull-190408212721-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Defense Matrix: Reloaded /slideshow/cyber-defense-matrix-reloaded/136470971 str-t09cyberdefensematrix-190314231450
This is an update to the Cyber Defense Matrix briefing given at the 2019 RSA Conference. Cybersecurity practitioners can use this to organize vendors, find gaps in security portfolios, understand how to organize security measurements, prioritize investments, minimize business impact, visualize attack surfaces, align other existing frameworks, and gain a fuller understanding of the entire space of cybersecurity.]]>

This is an update to the Cyber Defense Matrix briefing given at the 2019 RSA Conference. Cybersecurity practitioners can use this to organize vendors, find gaps in security portfolios, understand how to organize security measurements, prioritize investments, minimize business impact, visualize attack surfaces, align other existing frameworks, and gain a fuller understanding of the entire space of cybersecurity.]]>
Thu, 14 Mar 2019 23:14:50 GMT /slideshow/cyber-defense-matrix-reloaded/136470971 sounilyu@slideshare.net(sounilyu) Cyber Defense Matrix: Reloaded sounilyu This is an update to the Cyber Defense Matrix briefing given at the 2019 RSA Conference. Cybersecurity practitioners can use this to organize vendors, find gaps in security portfolios, understand how to organize security measurements, prioritize investments, minimize business impact, visualize attack surfaces, align other existing frameworks, and gain a fuller understanding of the entire space of cybersecurity. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/str-t09cyberdefensematrix-190314231450-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is an update to the Cyber Defense Matrix briefing given at the 2019 RSA Conference. Cybersecurity practitioners can use this to organize vendors, find gaps in security portfolios, understand how to organize security measurements, prioritize investments, minimize business impact, visualize attack surfaces, align other existing frameworks, and gain a fuller understanding of the entire space of cybersecurity.
Cyber Defense Matrix: Reloaded from Sounil Yu
]]>
15672 1 https://cdn.slidesharecdn.com/ss_thumbnails/str-t09cyberdefensematrix-190314231450-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (RSA Conference 2016) /slideshow/understanding-the-security-vendor-landscape-using-the-cyber-defense-matrix-60562115/60562115 pdil-w02fyu-160406134415
The Cyber Defense Matrix enables organizations to define clear categories for the range of products and services that are available in the marketplace to solve our various infosec problems. This model removes confusion around the security technologies that we buy and helps organizations align their vendors to have the right suite of capabilities to execute their information security mission. See the 2019 version at: http://bit.ly/cyberdefensematrixreloaded See the 2022 version at: http://bit.ly/cyberdefensematrixrevolutions]]>

The Cyber Defense Matrix enables organizations to define clear categories for the range of products and services that are available in the marketplace to solve our various infosec problems. This model removes confusion around the security technologies that we buy and helps organizations align their vendors to have the right suite of capabilities to execute their information security mission. See the 2019 version at: http://bit.ly/cyberdefensematrixreloaded See the 2022 version at: http://bit.ly/cyberdefensematrixrevolutions]]>
Wed, 06 Apr 2016 13:44:15 GMT /slideshow/understanding-the-security-vendor-landscape-using-the-cyber-defense-matrix-60562115/60562115 sounilyu@slideshare.net(sounilyu) Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (RSA Conference 2016) sounilyu The Cyber Defense Matrix enables organizations to define clear categories for the range of products and services that are available in the marketplace to solve our various infosec problems. This model removes confusion around the security technologies that we buy and helps organizations align their vendors to have the right suite of capabilities to execute their information security mission. See the 2019 version at: http://bit.ly/cyberdefensematrixreloaded See the 2022 version at: http://bit.ly/cyberdefensematrixrevolutions <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pdil-w02fyu-160406134415-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Cyber Defense Matrix enables organizations to define clear categories for the range of products and services that are available in the marketplace to solve our various infosec problems. This model removes confusion around the security technologies that we buy and helps organizations align their vendors to have the right suite of capabilities to execute their information security mission. See the 2019 version at: http://bit.ly/cyberdefensematrixreloaded See the 2022 version at: http://bit.ly/cyberdefensematrixrevolutions
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (RSA Conference 2016) from Sounil Yu
]]>
15164 2 https://cdn.slidesharecdn.com/ss_thumbnails/pdil-w02fyu-160406134415-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding the Cyber Security Vendor Landscape /slideshow/understanding-the-cyber-security-vendor-landscape/48396242 understandingthecybersecurityvendorlandscape-150520170511-lva1-app6892
We are often inundated with vendors offering their products and services to solve our various information security problems. How can you make sense of the wide range of technologies and ensure that your control gaps are being covered? Where are opportunities for technology disruption? Where are you overly reliant on technology? This is a framework for understanding security technologies so that you can align vendors in the right bucket to ensure that you have the suite of technologies that you need to execute your information security mission.]]>

We are often inundated with vendors offering their products and services to solve our various information security problems. How can you make sense of the wide range of technologies and ensure that your control gaps are being covered? Where are opportunities for technology disruption? Where are you overly reliant on technology? This is a framework for understanding security technologies so that you can align vendors in the right bucket to ensure that you have the suite of technologies that you need to execute your information security mission.]]>
Wed, 20 May 2015 17:05:11 GMT /slideshow/understanding-the-cyber-security-vendor-landscape/48396242 sounilyu@slideshare.net(sounilyu) Understanding the Cyber Security Vendor Landscape sounilyu We are often inundated with vendors offering their products and services to solve our various information security problems. How can you make sense of the wide range of technologies and ensure that your control gaps are being covered? Where are opportunities for technology disruption? Where are you overly reliant on technology? This is a framework for understanding security technologies so that you can align vendors in the right bucket to ensure that you have the suite of technologies that you need to execute your information security mission. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/understandingthecybersecurityvendorlandscape-150520170511-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We are often inundated with vendors offering their products and services to solve our various information security problems. How can you make sense of the wide range of technologies and ensure that your control gaps are being covered? Where are opportunities for technology disruption? Where are you overly reliant on technology? This is a framework for understanding security technologies so that you can align vendors in the right bucket to ensure that you have the suite of technologies that you need to execute your information security mission.
Understanding the Cyber Security Vendor Landscape from Sounil Yu
]]>
8837 8 https://cdn.slidesharecdn.com/ss_thumbnails/understandingthecybersecurityvendorlandscape-150520170511-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png cyberdefensematrix.com https://cdn.slidesharecdn.com/ss_thumbnails/str-m01cyberdefensematrix-revolutions-slideshare-220803183429-7fec9b3c-thumbnail.jpg?width=320&height=320&fit=bounds sounilyu/cyber-defense-matrix-revolutions-252417499 Cyber Defense Matrix: ... https://cdn.slidesharecdn.com/ss_thumbnails/howilearnedtostopinformationsharingandlovethedikw-generic-200806124545-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/how-i-learned-to-stop-information-sharing-and-love-the-dikw/237611060 How I Learned to Stop ... https://cdn.slidesharecdn.com/ss_thumbnails/newparadigmsforthenexteraofsecurity-rsac2020-200519172833-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/new-paradigms-for-the-next-era-of-security/234283875 New Paradigms for the ...