Upgrade to Pro — share decks privately, control downloads, hide ads and more …

How To Have Impact In Security: Stories About R...

Avatar for Bryan Payne Bryan Payne
April 22, 2025
6

How To Have Impact In Security: Stories About Risk Reduction At Scale

Computer security is not all about technology, despite what we’ve often been taught. In this talk, Dr. Payne pulls back the curtain on how security teams at some of the world’s most well-known tech companies operate. You will discover how the most successful teams go beyond technical expertise by leveraging company culture, change management, strategic thinking, listening, persuasion, and more to get the job done. Along the way, you’ll explore fascinating real-world security projects that highlight what you can accomplish when you bring all these skills together.

Avatar for Bryan Payne

Bryan Payne

April 22, 2025
Tweet

Transcript

  1. Washington Univ BS CS & Math Univ of MD MS

    CS Georgia Tech PhD CS NSA BAE Georgia Tech SNL IBM 1995 - 2000 2000 - 2005 2005 - 2010 2010 - 2015 2015 - 2020 Nebula Netflix CMU CISO Government Research Industry Academia 2020 - 2025 AWS Adobe BU
  2. Est Number of Infected Hosts 1 100 10000 1000000 100000000

    Year Released 1999 2000.5 2002 2003.5 2005 ILOVEYOU Email worm Mydoom Fastest spreading email worm Code Red Defaced websites Blaster Sircam SQL Slammer Double in size every 8.5 seconds Infected 90% of vulnerable hosts in 10 minutes
  3. Threat Intel Report - Targets - Goals - Methods -

    Skill Level - Defense Reverse Engineering - Protected lab setting - Observe behavior - Find signatures - Attribution
  4. TOP SKILLS UTILIZED REVERSE ENGINEERING MALWARE ▸ Understanding how software

    / compilers work ▸ Teamwork ▸ Visual thinking ▸ Connecting with resources across the agency ▸ Writing
  5. Hypervisor User VM Security VM Hooks User Processes ... Memory

    Protector Virtual Machine Introspection Network Traffic Trampoline Hardware Events Hook Events Security Application Memory Analysis Mouse / Keyboard Network Disk Architecture enables secure active monitoring of virtual machines. Secure Access - Passive - Active Memory Analysis - Semantic gap Applications - Feasibility - Performance
  6. Memory analysis techniques to locate data structures across software versions.

    Secure Access - Passive - Active Memory Analysis - Semantic gap Applications - Feasibility - Performance
  7. Anti-virus Linking user intent to security policy Secure Access -

    Passive - Active Memory Analysis - Semantic gap Applications - Feasibility - Performance
  8. TOP SKILLS UTILIZED RESEARCH PUBLICATION AT GA TECH ▸ Operating

    systems ▸ Forensic memory analysis ▸ Software engineering ▸ Writing and editing ▸ Grit / Solving New Problems ▸ Teamwork
  9. CHALLENGES WITH VMI ▸ Semantic gap ▸ Performance ▸ Platform

    support ▸ User-space vs kernel-space vs hypervisor-space
  10. LIBVMI FEATURES (CIRCA 2011) - Virtual address translation - Kernel

    symbol resolution - Read / Write to memory - physical addresses - virtual addresses - kernel symbols - Read registers - Pause / Resume VM - Get total size of memory - Map physical memory pages - Read registers - Pause / Resume VM - Get total size of memory VMM Platform LibVMI
  11. LIBVMI INTERNALS (CIRCA 2011) ▸ Initialization of LibVMI ▸ Runtime

    guest introspection ▸ Memory access (read / write) ▸ Register access ▸ Pause / resume ▸ Hypervisor-level support ▸ OS-level support
  12. LIBVMI + VOLATILITY INTEGRATION (CIRCA 2011) LibVMI (C language API)

    pyvmi (Python language wrapper for LibVMI) Volatility (memory analysis framework) pyvmi address space plugin plugin plugin plugin plugin plugin Runtime analysis capabilities augment Volatility's rich memory analysis. ... KVM Xen Other VMM Memory Snapshot patch ‣ Read keyboard buffer from real mode memory ‣ Print list of open network connections ‣ Crash dump information ‣ List loaded DLLs for each process ‣ List open handles for each process ‣ Parse / traverse registry hives ‣ Find and decrypt LSA secrets from registry ‣ Dump a process or kernel driver to an executable sample ‣ List loaded kernel modules ‣ List running processes ‣ Display SSDT entries ‣ Display VAD tree information ‣ Reconstruct wireframe view of screen ‣ Various malware detection techniques ‣ Reconstruct event timeline information
  13. TOP SKILLS UTILIZED LIBVMI ▸ Operating systems ▸ Software engineering

    ▸ Navigating the bureaucracy ▸ Building an open source community ▸ Convincing others of the value of this work ▸ Create a lasting change
  14. June 29, 2013 — “The OpenStack Security Guide Book Sprint

    fi nished yesterday and 38,000 words of wisdom from some of the top experts is now available.”
  15. OPENSTACK SECURITY PATH (CIRCA 2014) OpenStack Security Jenkins Enhancements Threat

    Analysis Static Analysis Cryptography Review OpenStack Security Guide OpenStack Security Notes Tempest Modules Developer Security Guidelines Key Projects Best Practices Stretch Goals
  16. TOP SKILLS UTILIZED OPENSTACK SECURITY GROUP ▸ Navigating a global

    open source project, fi nding a need, and leading the way ▸ Pulling together a group of people to solve important problems but who had very different motivations ▸ Advertising the work ▸ Scaling the work - book writing, commit checks, security response functions ▸ Create a lasting change
  17. Service Identity at Scale at Net fl ix https://www.youtube.com/watch?v=-mmOT9I6JlY USENIX

    Enigma 2016 - PKI at Scale Using Short-lived Certi fi cates https://www.youtube.com/watch?v=7YPIsbz8Pig
  18. TOP SKILLS UTILIZED METATRON ▸ Problem identi fi cation, fi

    nding the root cause of the problem ▸ User experience as a critical acceptance criteria ▸ Motivating change across the company ▸ The adoption curve ▸ Building an ecosystem (secrets, authN, authZ, etc.)
  19. Team Health Security Outcomes Team Happiness Individual Performance Talent Magnet

    / Team Flywheel Team “Charter” Clarity Trust & Coach
  20. TOP SKILLS UTILIZED PEOPLE LEADERSHIP ▸ Building team health ▸

    Developing team culture ▸ Strategy for impact ▸ Creating a self sustaining team ▸ Solving the right technical problems