Table of Contents
- What is a Security Thought Leader - Updated November 18th, 2009
- Framework for Security Thought Leader Interview - August 26th, 2009
- Daniel B. Cid, Sucuri - November 21st, 2013
- Dominique Karg, AlienVault - November 20th, 2013
- Lance Spitzner, Securing The Human, founder - Updated November 29th, 2012
- Bill Pfeifer, Juniper Networks - March 4th, 2011
- Chris Pogue, Senior Security Analyst - July 8th, 2010
- John Kanen Flowers - May 26th, 2010
- Kees Leune, Leune Consultancy, LLC - February 13th, 2010
- Joel Yonts, CISO - February 12th, 2010
- Maury Shenk, TMT Advisor, Steptoe & Johnson - January 31st, 2010
- Chris Wysopal, CTO, Veracode - January 27th, 2010
- Amir Ben-Efraim, CEO, Altor Networks - November 25th, 2009
- Ed Hammersla, COO, Trusted Computer Solutions - Updated November 19th, 2009
- Amit Klein, CTO, Trusteer - September 27th, 2009
- An Interview with Ron Gula from Tenable about the role of a vulnerability scanner in protecting sensitive information - Updated August 13th, 2009
- A. N. Ananth, CEO, Prism Microsystems, Inc. - August 7th, 2009
- Jeremiah Grossman, Founder and CTO of WhiteHat Security - Updated April 24th, 2009
- Mike Yaffe, Director of Product Marketing, Core Security Technologies. - April 15th, 2009
- Chris Petersen, Chief Technology Officer, LogRhythm - March 13th, 2009
- John Pirc, IBM, ISS Product Line & Services Executive: Security and Intelligent Network - February 17th, 2009
- Leigh Purdie, InterSect Alliance, co-founder of Snare: Evolution of log analysis - January 28th, 2009
- Bill Worley, Chief Technology Officer, Secure64 Software Corporation - December 9th, 2008
- Doug Brown, former Manager of Security Resources, University of North Carolina at Chapel Hill - October 30th, 2008
- Amrit Williams, Chief Technology Officer, BigFix - June 30th, 2008
- Andrew Hay, Q1 Labs - May 13th, 2008
- Gene Schultz, CTO of High Tower - April 4th, 2008
- Tomasz Kojm, original author of ClamAV - April 3rd, 2008
- Bill Johnson, CEO TDI - April 2nd, 2008
- Gene Kim, Tripwire - March 14th, 2008
- Kevin Kenan, Managing Director, K2 Digital Defense - March 14th, 2008
- Leigh Purdie, InterSect Alliance, co-founder of Snare - March 7th, 2008
- Marty Roesch, Sourcefire CEO and Snort creator - February 26th, 2008
- Dr. Anton Chuvakin, Chief Logging Evangelist with LogLogic - January 28th, 2008
- Kishore Kumar, CEO of Pari Networks - Updated January 28th, 2008
- Interview with Dr. Robert Arn, CTO of Itiva - November 1st, 2007
- Interview with Charles Edge - September 15th, 2007
- Ivan Arce, CTO of Core Security Technologies - Updated May 6th, 2009
- Mike Weider, CTO for Watchfire - Updated July 23rd, 2007
- Interview with authors of The Art of Software Security Assessment - Updated July 9th, 2007
- Ryan Barnett, Director of Application Security Training at Breach Security, Inc. - June 29th, 2007
- Dinis Cruz, Director of Advanced Technology, Ounce Labs - June 11th, 2007
- Brian Chess, Chief Scientist for Fortify Software - June 9th, 2007
- Caleb Sima, CTO for SPI Dynamics - Updated May 29th, 2007
- An Interview with David Hoelzer, author of DAD, a log aggregator - May 1st, 2007
Joel Yonts, CISOStephen Northcutt - February 12th, 2010
Joel Yonts is a true thought leader in information security, those of us at the Security Leadership Lab were really excited when he agreed to participate and hope you will enjoy his interview. And, as always, we thank him for his time!
Joel, can you start by sharing the short version of your bio please, that seems to be the fastest way to introduce you to the community.
Certainly Stephen, here is my published bio: Joel Yonts is a seasoned security executive with a passion for information security research. He has over 20 years of IT experience with certifications in the areas of Security Leadership, Computer Forensics, Malware Analysis, Incident Handling, and Reverse Engineering. His research interests include malware analysis and defense, computer forensics, and enterprise security. His information security contributions include the published work, Mac OS X Malware Analysis, and is a frequent conference speaker on topics such as Rootkit Techniques, Battle Against Malware, and Protecting your Teen in a Highly Connected Society. In addition to his research, Joel is currently serving as CISO of a Fortune 500 retailer.
Thank you, Joel, and I know you are published; would you kindly list three URLs of papers or presentations you have written that are available on the web:
Emerging Rootkit Techniques and Trends
The Battle Against Malware
I think you did an incredible job on the rootkit paper, thank you for that. Can we also ask you to list your top three “must read” papers that are available on the web that you did not write:
Reverse Engineering by Crayon by Danny Quist and Lorie Liebrock
2009 Data Breach Investigations Report by Verizon Business
Thank you for the tips, Joel, let's get started with the interview; how did you become interested in the field of information security?
I have always had a passion for scientific research. I was a chemistry major in college and was involved in many research projects in the “Hard Sciences”. On a parallel track, I had a love of computers and spent many hours developing programs and exploring the technology world. Information Security merged these passions for me into a single thread. I can think of very few areas where the pace and need for technology research is greater. The other thing that grabbed my attention was the computer virus. I had just finished a “Hard Sciences” project to classify and map the behaviors of native fish in the local streams of Virginia when I was reintroduced to the computer virus. I immediately recognized the similarity in capturing, analyzing, and classifying these tiny “cyber” life forms as a strong parallel to my recent native fish project. I was hooked, no pun intended.
What happened after you met that virus? Did you jump straight into reverse engineering to figure out how it worked? Also, do you remember the time frame, I always find it interesting to learn when people heard the "song" of security?
I have dealt with malware throughout my 20 year IT career but my reintroduction occurred in 2006. The culprit was a SQL worm with an IRC Bot payload. There was a good bit of adrenaline associated with the incident but I was captivated by how the specimen propagated through the network and the function of the payload. I did attempt to pull an isolated sample apart using basic IT tools, but my technique was far too crude to call it reverse engineering. It is amazing how much information you can get by examining strings embedded in a binary. I pulled out enough info to give me the gist of the malware and a desire to learn how the pros pull these things apart.
Thanks for sharing that! What project or product are you working on today? What are some of its unique characteristics? What differentiates it from the competition?
I am currently working on an automated Malware Analysis Zoo. The intent is to automate the mundane aspects of malware analysis and provide a framework for organizing samples and supporting analysis artifacts. As part of this project, I am developing a white paper on the topic of building a malware zoo. The intent is to equip a wide audience with the ability to build their own malware storage and analysis system. The paper is part of my GIAC GREM Gold certification with an anticipated completion of mid-2010. I have a functioning malware zoo in my lab environment today but I have a long list of enhancements planned. At some point, I hope to solidify a release and potentially release it to the public under a GPL license.
Joel, you seem to gravitate towards some pretty specialized SANS courses *grin*. Other than reversing malware, is there a course you have particularly enjoyed, and if so, what was special or unique about it?
Hands down, SANS709 Developing Exploits for Penetration Testers and Security Researchers. My original intent for taking the course was to fill a few gaps in my reversing skills, particularly in the identification and mapping of exploits embedded in malware. What I hadn’t counted on was how much I would use my new knowledge of exploit mechanics in day-to-day security decisions. My eyes were opened to see how simple OS configuration decisions and application development choices could influence an environment’s susceptibility to various memory exploitation techniques. The other benefit I discovered was the ability to find zero day flaws in legacy and homegrown applications. Most of us have them, in some form or fashion, sitting on our networks with potential zero-day vulnerabilities. These flaws would never be discovered by vulnerability scanner signatures and there are no patches forthcoming to remediate. The skills taught in the class would give a corporate security engineer the ability to find these opportunities before they were exploited by someone with malicious intent.
Additionally, it was the first security course where I felt like we were really breaking new ground. We were actually discovering new software vulnerabilities and developing custom exploits right in the class. I enjoyed the sense of empowerment. In the past I had to leave the heavy lifting of exploit discovery to the software vendors or, heaven forbid, the attackers. Hats off to Stephen Sims for putting together such a ground breaking and widely applicable course.
What do you think the security products in your space will look like in two years, what will they be able to do?
I think we will continue to see new technology and techniques added to our automated defenses, followed by attacker techniques that will defeat them. In other cases, the attackers may be the first to innovate, with the defensive counter following close behind. This cycle will not end anytime soon. To supplement this I think we will see resurgence in Incident Response (IR) technology, techniques, and training. I think there will be a greater understanding that even if I do everything I can as a defender, things can and will go wrong, and that IR is critical to plug the gap. (In this IR umbrella I am also including monitoring and other detective controls). IR can mean the difference between an attacker gaining a toehold into your systems and a full data breach.
If I may ask a favor, we ask the security products question on most of the interviews, would you be willing to look at a couple of other recent interviews and choose a prediction and comment on why you agree or disagree with the asserted trend?
I thoroughly enjoyed the interview with Chris Wysopal, CTO at Veracode. I believe he is dead-on with the need and direction for clean code. In his interview he talked about future compilers having built in security validation and cloud computing based holistic program analyzers. I definitely see the need and probability that future compilers will have the capability he outlined, but I am not sure about the cloud computing solution. Developer systems passing potentially sensitive source code to the Internet for some reason gives me an uneasy feeling. Regardless of the specifics, though, I believe Chris is hitting at the root of the problem.
Please share your impression of the defensive information community. Are we making progress against the bad guys? Are we losing ground?
We have made tremendous progress in securing our systems and networks. Generally I would say our systems have better patch management, more secure configuration, and greater adoption of defensive technology than ever before. Unfortunately, this is not a level playing field. We have seen a nearly exponential explosion in malware growth, and attackers have become very organized. Attackers have become skilled in taking the smallest holes and quickly turning them into avenues of intrusion. Both sides are advancing this battle, but if I had to weigh the number of corporate intrusions/data breaches vs. the number of cyber criminal arrests, it doesn’t feel like we are winning. This is not a defeatist statement. We need to understand this fact and use it to increase our determination to win this battle in the long run.
Joel, I would love to hear your thoughts concerning the most dangerous threats information security professionals will be facing in the next year to eighteen months. What is coming down the pipe?
Targeted attacks! Specially crafted exploits and malware combined with laser focused social engineering. This will be the downfall of many huge targets (i.e., Operation Aurora – Google)
For the not so huge targets such as home users and smaller companies, the market is ripening for attacks on emerging platforms, specifically mobile devices and Mac OS X. These platforms have been on the security watch list for some time and, at some point, the scales will tip and there will be an onslaught against these platforms.
What is your biggest source of frustration as a member of the defensive information community?
Lack of information sharing. There are many groups that hold pieces to the cyber crime puzzle. I would like to see the various law enforcement, credit brands (VISA, MasterCard), banks, merchants, security vendors, and corporate security groups come together in some way to collectively document attack patterns and track criminal activity. I think such collaboration could help us build better protection and bring more cyber criminals to justice.
Yes, we are all concerned about the lack of information sharing in security. That was the problem the ISACs (example, https://www.it-isac.org/ ) were created to help with. That was the problem InfraGard was created to solve. If you could give one actionable piece of advice to Howard Schmidt on this topic, what would it be?
Mr. Schmidt is in an unbelievably demanding position. My first general comment to him would be that we want you to be successful, leverage the talent in the information security community to help you shoulder the load. With that said, we need to change our definition of success in the information security community. Too often we are content with saying we are winning this war when we are simply diverting the attacks at the gates. To win, bad people must go to jail! To facilitate this focus on the cyber criminal I believe Mr. Schmidt could institute a Cyber Crime Most Wanted similar to the FBI program. The information shared would, of course, be tailored to information security and contain attack specific details. I believe the information security community working together could build a more complete profile of the cyber criminal groups and pin more crimes to the groups. This enhanced definition and increased allegations would be a natural stepping-stone to more arrests.
We like to give our interview candidates a bully pulpit, a chance to share what is on their mind, what makes their heart burn, even if it is totally unrelated to the rest of the interview. Please share the core message you want people to know.
Technology has impacted every age group in our society but none are more at risk than our teenagers. A whole new world has been presented to every teen that can access a computer or wireless device. Images and text pass between peers at a blinding rate with little or no forethought or supervision by adults. Teens have no idea the digital trail this activity can leave that follows them the rest of their lives. Also, as if being a teenager wasn’t hard enough in the past, new issues have arisen such as sexting, cyber bullying, and cyber stalking. There have been very disturbing cases of social networking being used by pedophiles to stake out a target. Also, most teens don’t realize that taking a partially nude photo of their 17-year-old girlfriend and then sending it to their buddy is production, possession, and distribution of child pornography! It is a very serious crime that could result in jail time and a spot on the sex offender’s registry. I believe there are two keys in protecting our young people in this highly connected society: education and empowerment of parents. First, we need to make teens and parents aware of the problem and how bad things could be. Second, we need to empower parents with the ability to monitor and control the teen's use of mobile devices and the Internet. Many new solutions exist that can help parents be dialed into what is going on in their teen's cyber life.
And it is not just teens! I was visiting a friend's house when his nine year old suddenly got quiet, which is not normal for this kid, so the dad went to check on him and he was using Google images to search for "breasts". Would you kindly suggest either a few products that can help parent manage their kid's Internet use or a place to get further information. And, at my house we *still* have all the computers in a public room and my son is 25 and no longer lives in Hawaii; it is just too easy to run into trouble if you think no one can see what you are doing!
I love the idea of using public areas for family computers. We follow a similar model in our house. In regards to products, I have been impressed with Safe Eyes by InternetSafety.com. This product combines traditional content & keyword filtering with monitoring of social networking sites. Safe Eyes even has an iPhone product. Internet usage is not the only potential land mine for our teens (or pre-teen) though; monitoring who is calling your child’s cell phone and what is being sent through text and images can be equally as important. For monitoring phone and mobile messaging I would recommend a product called MyMobileWatchDog. There are many good Internet Safety sites out there to help with education. Two that stand out in my mind are National Center for Missing and Exploited Children and Focus on the Family.
Almost done! I notice you are a CISO. You are clearly very well versed in the technical aspects of security, what do you think got you selected for the CISO position and what tips would you have for a newly selected CISO?
I believe the CISO role is truly unique. Having a grasp of the technical aspects of security is important so you can make good security decisions and focus on the true problems in the weeds. Also, in the CISO position you are interfacing with senior management. If you can project the sense that you are dialed into what matters in the security space and that you have an understanding of the dynamics of security, it will inspire confidence in your recommendations and lend to good senior management support. At the same time, you must be able to speak the language of the business. Understanding the key initiatives of the business and how the security team can support those initiatives is important. This balancing act of technical depth with the ability to speak the language of the business is a must for a CISO. I believe this balanced path is what led me to the role.
For someone new to the role, I would warn against becoming a security dictator. A CISO can have a considerable amount of control within an organization. Don’t use this control to “police” the organization. You will be absolutely hated and your effectiveness as a security leader will be diminished. Instead, build an atmosphere of cooperation where together you build controls and make decisions that help the organization stay safe with minimal pain. At times you may still need to play the security trump card but, hopefully, this is the exception.
Please tell us something about yourself, what do you do when you are not in front of a computer?
At this stage in my life, I would call myself a family man. I have two beautiful young children and a lovely wife that I enjoy spending time with. I still have time though to enjoy a little mountain biking and I am involved with my local Church.