SlideShare une entreprise Scribd logo
1  sur  52
Télécharger pour lire hors ligne
Disrupting
Security
Dug Song, CEO
duo.com
Disrupting
Security
Dug Song, CEO
duo.com
Disruptive Innovation
An innovation that creates a new market
by providing a different set of values,
which ultimately (and unexpectedly)
overtakes an existing market
w00w00: Disrupting Industries Since 1999
w00w00: Disrupting Industries Since 1999
w00w00: Disrupting Industries Since 1999
w00w00: Disrupting Industries Since 1999
w00w00: Disrupting Industries Since 1999
Best-In-Class SaaS Growth
$15M
$30M
$45M
$60M
Q 1 Q 2 Q 3 Q 4 Q 5 Q 6 Q 7 Q 8 Q 9 Q 10 Q 11 Q 12 Q 13 Q 14 Q 15 Q 16 Q 17 Q 18 Q 19 Q 20
Best-In-Class SaaS Efficiency
$150M
$300M
$450M
$600M
$60M
$87M$90M$96M$99M
$119M
$143M
$177M
$347M
$559M
$49M
Median
1. Threats
2. Architecture
3. Market
1. Threats
2. Architecture
3. Market
A Portrait Of The Hacker As A Young Man (ca. 1999)
Break Build
Authentication
dsniff,

Kerberos v4
OpenSSH,

RPCSEC_GSS (NFSv4)
Firewalls
Cisco PIX,

Check Point FW-1
pf (OpenBSD)
VPN Check Point FW-1
OpenBSD IPSEC,

dsocks
IDS / IPS Sourcefire, ISS, etc.
Anzen/NFR (Check Point),

Arbor Networks
“A lot of people think that nation-
states are running on zero-days, but
there are so many more vectors that
are easier, productive, and less risky.”
Rob Joyce, NSA TAO, Jan 2016
“In the world of advanced persistent
threat actors, credentials are king for
gaining access to systems.”
Rob Joyce, NSA TAO, Jan 2016
“Better-defended networks require
specific methods for accessing
resources, monitoring credential use,
looking for anomalous behavior, and
two-factor authentication.”
Rob Joyce, NSA TAO, Jan 2016
95% OF BREACHES
involve stolen credentials
— Verizon 2015 Data Breach Investigations Report
#1: Users
#2: Devices
75% Of Breaches Involve Compromised Devices
Source: Duo analysis of 2M+ devices, Jan 2016
#3: Access
Obama To Schmidt: Nation’s Cybersecurity Priorities?
Obama To Schmidt: Nation’s Cybersecurity Priorities?
✓ Strong Authentication
✓ Up-to-Date Devices
✓ End-to-End Encryption
President Obama’s $19 Billion Cybersecurity Proposal
Calls for 35% Increase Over 2016 Enacted Level
Major Pieces of the Cybersecurity National Action Plan
Critiques from the Tech Industry
• While manyin the techindustryhave applauded
the president’s proposal for investment, many
of the suggestionsare seen as basic and a sign
at how woefully behind our governmentis on
cybersecurity.BrianBarrett,a writer for Wired
magazine,compares the plan to “standard
advice you’d give a tech novice”.
• With the proposalcoming from a “lame-duck”
president nearingthe end of his second term,
there is a growingpessimismthat pieces that
require congressionalaction will go unfunded.
• Despite being a basic tenet of internet security,
encryptionis notablyabsentfromthe
president’s press release.While many in the
tech communitybelieve encryption is necessary
for continued cyber safety, the topic remains
controversialin Congress.
Full Multi-StepAuthentication Rollout
While a large portion of the government uses 2-step or multi-step
authenticationfor internal logins,the initiativeplans to extend this extra
layer of security to citizen-facingfederal governmentdigital services.The
President hopes this switch will also increase public awarenessof this
identity proofing mechanism,encouragingmore wide use amongprivate
online systems.
$3.1billionInformation TechnologyModernization Fund
This fund enables the retirement, replacementand modernizationof IT
equipment throughout the government.Many see this initiative as overdue
as some branches of the governmentare running antiquated as old as
Windows XP which Microsoft stopped officiallysupporting in 2014.
National Initiative for CybersecurityEducation
$62 billion is requested to invest in educatingthe nation’s next generation of cybersecuritypersonnel. Proposed programs
include the CyberCorpsReserve which would offer scholarshipsfor Americanswho wish to obtain cybersecurityeducation in
exchange for civil service in government.
EINSTEINandthe ContinuousDiagnostic andMitigation Program
The president proposes allocatingincreasedfunding to the government’s
primarycyberdefense system: EINSTEIN,which has faced significantcriticism
since it is currently unable to dynamicallydetect new kinds of cyber
intrusions, makingit only useful against known threats.
President Obama’s $19 Billion Cybersecurity Proposal
Calls for 35% Increase Over 2016 Enacted Level
Major Pieces of the Cybersecurity National Action Plan
Critiques from the Tech Industry
• While manyin the techindustryhave applauded
the president’s proposal for investment, many
of the suggestionsare seen as basic and a sign
at how woefully behind our governmentis on
cybersecurity.BrianBarrett,a writer for Wired
magazine,compares the plan to “standard
advice you’d give a tech novice”.
• With the proposalcoming from a “lame-duck”
president nearingthe end of his second term,
there is a growingpessimismthat pieces that
require congressionalaction will go unfunded.
• Despite being a basic tenet of internet security,
encryptionis notablyabsentfromthe
president’s press release.While many in the
tech communitybelieve encryption is necessary
for continued cyber safety, the topic remains
controversialin Congress.
Full Multi-StepAuthentication Rollout
While a large portion of the government uses 2-step or multi-step
authenticationfor internal logins,the initiativeplans to extend this extra
layer of security to citizen-facingfederal governmentdigital services.The
President hopes this switch will also increase public awarenessof this
identity proofing mechanism,encouragingmore wide use amongprivate
online systems.
$3.1billionInformation TechnologyModernization Fund
This fund enables the retirement, replacementand modernizationof IT
equipment throughout the government.Many see this initiative as overdue
as some branches of the governmentare running antiquated as old as
Windows XP which Microsoft stopped officiallysupporting in 2014.
National Initiative for CybersecurityEducation
$62 billion is requested to invest in educatingthe nation’s next generation of cybersecuritypersonnel. Proposed programs
include the CyberCorpsReserve which would offer scholarshipsfor Americanswho wish to obtain cybersecurityeducation in
exchange for civil service in government.
EINSTEINandthe ContinuousDiagnostic andMitigation Program
The president proposes allocatingincreasedfunding to the government’s
primarycyberdefense system: EINSTEIN,which has faced significantcriticism
since it is currently unable to dynamicallydetect new kinds of cyber
intrusions, makingit only useful against known threats.
✓ Up-to-Date
Devices
President Obama’s $19 Billion Cybersecurity Proposal
Calls for 35% Increase Over 2016 Enacted Level
Major Pieces of the Cybersecurity National Action Plan
Critiques from the Tech Industry
• While manyin the techindustryhave applauded
the president’s proposal for investment, many
of the suggestionsare seen as basic and a sign
at how woefully behind our governmentis on
cybersecurity.BrianBarrett,a writer for Wired
magazine,compares the plan to “standard
advice you’d give a tech novice”.
• With the proposalcoming from a “lame-duck”
president nearingthe end of his second term,
there is a growingpessimismthat pieces that
require congressionalaction will go unfunded.
• Despite being a basic tenet of internet security,
encryptionis notablyabsentfromthe
president’s press release.While many in the
tech communitybelieve encryption is necessary
for continued cyber safety, the topic remains
controversialin Congress.
Full Multi-StepAuthentication Rollout
While a large portion of the government uses 2-step or multi-step
authenticationfor internal logins,the initiativeplans to extend this extra
layer of security to citizen-facingfederal governmentdigital services.The
President hopes this switch will also increase public awarenessof this
identity proofing mechanism,encouragingmore wide use amongprivate
online systems.
$3.1billionInformation TechnologyModernization Fund
This fund enables the retirement, replacementand modernizationof IT
equipment throughout the government.Many see this initiative as overdue
as some branches of the governmentare running antiquated as old as
Windows XP which Microsoft stopped officiallysupporting in 2014.
National Initiative for CybersecurityEducation
$62 billion is requested to invest in educatingthe nation’s next generation of cybersecuritypersonnel. Proposed programs
include the CyberCorpsReserve which would offer scholarshipsfor Americanswho wish to obtain cybersecurityeducation in
exchange for civil service in government.
EINSTEINandthe ContinuousDiagnostic andMitigation Program
The president proposes allocatingincreasedfunding to the government’s
primarycyberdefense system: EINSTEIN,which has faced significantcriticism
since it is currently unable to dynamicallydetect new kinds of cyber
intrusions, makingit only useful against known threats.
✓ Up-to-Date
Devices
✓ Two-Factor
Authentication
President Obama’s $19 Billion Cybersecurity Proposal
Calls for 35% Increase Over 2016 Enacted Level
Major Pieces of the Cybersecurity National Action Plan
Critiques from the Tech Industry
• While manyin the techindustryhave applauded
the president’s proposal for investment, many
of the suggestionsare seen as basic and a sign
at how woefully behind our governmentis on
cybersecurity.BrianBarrett,a writer for Wired
magazine,compares the plan to “standard
advice you’d give a tech novice”.
• With the proposalcoming from a “lame-duck”
president nearingthe end of his second term,
there is a growingpessimismthat pieces that
require congressionalaction will go unfunded.
• Despite being a basic tenet of internet security,
encryptionis notablyabsentfromthe
president’s press release.While many in the
tech communitybelieve encryption is necessary
for continued cyber safety, the topic remains
controversialin Congress.
Full Multi-StepAuthentication Rollout
While a large portion of the government uses 2-step or multi-step
authenticationfor internal logins,the initiativeplans to extend this extra
layer of security to citizen-facingfederal governmentdigital services.The
President hopes this switch will also increase public awarenessof this
identity proofing mechanism,encouragingmore wide use amongprivate
online systems.
$3.1billionInformation TechnologyModernization Fund
This fund enables the retirement, replacementand modernizationof IT
equipment throughout the government.Many see this initiative as overdue
as some branches of the governmentare running antiquated as old as
Windows XP which Microsoft stopped officiallysupporting in 2014.
National Initiative for CybersecurityEducation
$62 billion is requested to invest in educatingthe nation’s next generation of cybersecuritypersonnel. Proposed programs
include the CyberCorpsReserve which would offer scholarshipsfor Americanswho wish to obtain cybersecurityeducation in
exchange for civil service in government.
EINSTEINandthe ContinuousDiagnostic andMitigation Program
The president proposes allocatingincreasedfunding to the government’s
primarycyberdefense system: EINSTEIN,which has faced significantcriticism
since it is currently unable to dynamicallydetect new kinds of cyber
intrusions, makingit only useful against known threats.
✓ Up-to-Date
Devices
✓ Two-Factor
Authentication
X Encryption?!



THANKS OBAMA
1. Threats
2. Architecture
3. Market
Security Bingo
Network
Firewall/
VPN
UTM
IDS/IDP
Data
Messaging/
Encryption
DLP
Web WAF/Fraud
Endpoint
Desktop
Mobile
Identity IAM/SSO
Management
SIEM/
Analytics
VA/GRC
Security Flipped! ( °□°
Network
Firewall/
VPN
Cloud & SaaS
Microsoft, Amazon, Google, Salesforce, Box, etc.
UTM
IDS/IDP
Data
Messaging/
Encryption
DLP
Web WAF/Fraud
Endpoint
Desktop
Modern Devices
iOS, Android, Windows 10, OS X, ChromeOSMobile
Identity IAM/SSO
Management
SIEM/
Analytics
VA/GRC
From Bolt-On To Built-In Security
1. Threats
2. Architecture
3. Market
Defense

in Depth
Defense

in Depth
Expense

in Depth
Better Security,
Not Just More
Goldilocks Strategy
Goldilocks Strategy
Solve for Time, Value, Access, & Skill
Enterprise-Grade Security + Consumer-Grade Design
Mission
DEMOCRATIZE SECURITY
by making it easy & effective
2
7 7
Siloed Point SolutionsSiloed Point Solutions
Users Devices Network Apps
13
Modern Access SecurityModern Access Security
Users Devices Network Apps
Trusted Access
14
Trusted Access
Ensure only trusted users & devices

can access protected applications
2017DuoProductLine
Duo Free
Easy two-factor
authen1ca1on, free for up
to 10 users.
$0
Duo MFA
Easy, best-of-breed two-
factor authen1ca1on for
cloud and on-premise
applica1ons.
$3
Duo Beyond
Our next-genera1on
security control pla?orm
for modern, perimeter-less
organiza1ons.
$9
Duo Access
Our essen1al security suite
to manage trust and
address risks from mobile,
BYOD, and cloud adop1on.
$6
Inbound Marketing: 93% of Leads, 75% of ACV
1/12
3/12
5/12
7/12
9/12
11/12
1/13
3/13
5/13
7/13
9/13
11/13
1/14
3/14
5/14
7/14
9/14
11/14
1/15
3/15
5/15
7/15
9/15
11/15
1/16
3/16
5/16
7/16
9/16
11/16
High-Velocity, High-Volume, Predictable Growth
‣ Time: 75% of customers up and running in < 1 day
‣ Value: 50%+ new ACV from expansion & upsell
‣ Access: 25% SMB, 25% Mid-Mkt, 50% Enterprise
‣ Skill: Most buyers IT, not security
‣ Love: 70 NPS, 1000+ New Logos/Qtr
Series A
Series B
Series C
1/12
3/12
5/12
7/12
9/12
11/12
1/13
3/13
5/13
7/13
9/13
11/13
1/14
3/14
5/14
7/14
9/14
11/14
1/15
3/15
5/15
7/15
9/15
11/15
1/16
3/16
5/16
7/16
9/16
11/16
High-Velocity, High-Volume, Predictable Growth
‣ Time: 75% of customers up and running in < 1 day
‣ Value: 50%+ new ACV from expansion & upsell
‣ Access: 25% SMB, 25% Mid-Mkt, 50% Enterprise
‣ Skill: Most buyers IT, not security
‣ Love: 70 NPS, 1000+ New Logos/Qtr
Series A
Series B
Series C
duo.com
Moscone South #1247

Contenu connexe

Plus de Dug Song

Entrepreneurs Foundation of Ann Arbor
Entrepreneurs Foundation of Ann ArborEntrepreneurs Foundation of Ann Arbor
Entrepreneurs Foundation of Ann ArborDug Song
 
Monkey-In-The-Middle (2001)
Monkey-In-The-Middle (2001)Monkey-In-The-Middle (2001)
Monkey-In-The-Middle (2001)Dug Song
 
Network Situational Awareness with d00gle
Network Situational Awareness with d00gleNetwork Situational Awareness with d00gle
Network Situational Awareness with d00gleDug Song
 
Silver Needle in the Skype
Silver Needle in the SkypeSilver Needle in the Skype
Silver Needle in the SkypeDug Song
 
Fragroute - NIDS Testing Revisited (2002)
Fragroute - NIDS Testing Revisited (2002)Fragroute - NIDS Testing Revisited (2002)
Fragroute - NIDS Testing Revisited (2002)Dug Song
 
Intrusion Detection 101 (1999)
Intrusion Detection 101 (1999)Intrusion Detection 101 (1999)
Intrusion Detection 101 (1999)Dug Song
 
SSH Traffic Analysis Attacks (2001)
SSH Traffic Analysis Attacks (2001)SSH Traffic Analysis Attacks (2001)
SSH Traffic Analysis Attacks (2001)Dug Song
 
A Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm ActivityA Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm ActivityDug Song
 
A Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm ActivityA Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm ActivityDug Song
 
A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)Dug Song
 
A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)Dug Song
 
Ann Arbor Startup Community Development H1'09
Ann Arbor Startup Community Development H1'09Ann Arbor Startup Community Development H1'09
Ann Arbor Startup Community Development H1'09Dug Song
 

Plus de Dug Song (12)

Entrepreneurs Foundation of Ann Arbor
Entrepreneurs Foundation of Ann ArborEntrepreneurs Foundation of Ann Arbor
Entrepreneurs Foundation of Ann Arbor
 
Monkey-In-The-Middle (2001)
Monkey-In-The-Middle (2001)Monkey-In-The-Middle (2001)
Monkey-In-The-Middle (2001)
 
Network Situational Awareness with d00gle
Network Situational Awareness with d00gleNetwork Situational Awareness with d00gle
Network Situational Awareness with d00gle
 
Silver Needle in the Skype
Silver Needle in the SkypeSilver Needle in the Skype
Silver Needle in the Skype
 
Fragroute - NIDS Testing Revisited (2002)
Fragroute - NIDS Testing Revisited (2002)Fragroute - NIDS Testing Revisited (2002)
Fragroute - NIDS Testing Revisited (2002)
 
Intrusion Detection 101 (1999)
Intrusion Detection 101 (1999)Intrusion Detection 101 (1999)
Intrusion Detection 101 (1999)
 
SSH Traffic Analysis Attacks (2001)
SSH Traffic Analysis Attacks (2001)SSH Traffic Analysis Attacks (2001)
SSH Traffic Analysis Attacks (2001)
 
A Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm ActivityA Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm Activity
 
A Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm ActivityA Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm Activity
 
A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)
 
A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)
 
Ann Arbor Startup Community Development H1'09
Ann Arbor Startup Community Development H1'09Ann Arbor Startup Community Development H1'09
Ann Arbor Startup Community Development H1'09
 

Dernier

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Dernier (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Disrupting Security (2017)

  • 3. Disruptive Innovation An innovation that creates a new market by providing a different set of values, which ultimately (and unexpectedly) overtakes an existing market
  • 9. Best-In-Class SaaS Growth $15M $30M $45M $60M Q 1 Q 2 Q 3 Q 4 Q 5 Q 6 Q 7 Q 8 Q 9 Q 10 Q 11 Q 12 Q 13 Q 14 Q 15 Q 16 Q 17 Q 18 Q 19 Q 20
  • 13.
  • 14.
  • 15. A Portrait Of The Hacker As A Young Man (ca. 1999) Break Build Authentication dsniff,
 Kerberos v4 OpenSSH,
 RPCSEC_GSS (NFSv4) Firewalls Cisco PIX,
 Check Point FW-1 pf (OpenBSD) VPN Check Point FW-1 OpenBSD IPSEC,
 dsocks IDS / IPS Sourcefire, ISS, etc. Anzen/NFR (Check Point),
 Arbor Networks
  • 16.
  • 17.
  • 18. “A lot of people think that nation- states are running on zero-days, but there are so many more vectors that are easier, productive, and less risky.” Rob Joyce, NSA TAO, Jan 2016
  • 19. “In the world of advanced persistent threat actors, credentials are king for gaining access to systems.” Rob Joyce, NSA TAO, Jan 2016
  • 20. “Better-defended networks require specific methods for accessing resources, monitoring credential use, looking for anomalous behavior, and two-factor authentication.” Rob Joyce, NSA TAO, Jan 2016
  • 21. 95% OF BREACHES involve stolen credentials — Verizon 2015 Data Breach Investigations Report #1: Users
  • 22. #2: Devices 75% Of Breaches Involve Compromised Devices Source: Duo analysis of 2M+ devices, Jan 2016
  • 24. Obama To Schmidt: Nation’s Cybersecurity Priorities?
  • 25. Obama To Schmidt: Nation’s Cybersecurity Priorities? ✓ Strong Authentication ✓ Up-to-Date Devices ✓ End-to-End Encryption
  • 26. President Obama’s $19 Billion Cybersecurity Proposal Calls for 35% Increase Over 2016 Enacted Level Major Pieces of the Cybersecurity National Action Plan Critiques from the Tech Industry • While manyin the techindustryhave applauded the president’s proposal for investment, many of the suggestionsare seen as basic and a sign at how woefully behind our governmentis on cybersecurity.BrianBarrett,a writer for Wired magazine,compares the plan to “standard advice you’d give a tech novice”. • With the proposalcoming from a “lame-duck” president nearingthe end of his second term, there is a growingpessimismthat pieces that require congressionalaction will go unfunded. • Despite being a basic tenet of internet security, encryptionis notablyabsentfromthe president’s press release.While many in the tech communitybelieve encryption is necessary for continued cyber safety, the topic remains controversialin Congress. Full Multi-StepAuthentication Rollout While a large portion of the government uses 2-step or multi-step authenticationfor internal logins,the initiativeplans to extend this extra layer of security to citizen-facingfederal governmentdigital services.The President hopes this switch will also increase public awarenessof this identity proofing mechanism,encouragingmore wide use amongprivate online systems. $3.1billionInformation TechnologyModernization Fund This fund enables the retirement, replacementand modernizationof IT equipment throughout the government.Many see this initiative as overdue as some branches of the governmentare running antiquated as old as Windows XP which Microsoft stopped officiallysupporting in 2014. National Initiative for CybersecurityEducation $62 billion is requested to invest in educatingthe nation’s next generation of cybersecuritypersonnel. Proposed programs include the CyberCorpsReserve which would offer scholarshipsfor Americanswho wish to obtain cybersecurityeducation in exchange for civil service in government. EINSTEINandthe ContinuousDiagnostic andMitigation Program The president proposes allocatingincreasedfunding to the government’s primarycyberdefense system: EINSTEIN,which has faced significantcriticism since it is currently unable to dynamicallydetect new kinds of cyber intrusions, makingit only useful against known threats.
  • 27. President Obama’s $19 Billion Cybersecurity Proposal Calls for 35% Increase Over 2016 Enacted Level Major Pieces of the Cybersecurity National Action Plan Critiques from the Tech Industry • While manyin the techindustryhave applauded the president’s proposal for investment, many of the suggestionsare seen as basic and a sign at how woefully behind our governmentis on cybersecurity.BrianBarrett,a writer for Wired magazine,compares the plan to “standard advice you’d give a tech novice”. • With the proposalcoming from a “lame-duck” president nearingthe end of his second term, there is a growingpessimismthat pieces that require congressionalaction will go unfunded. • Despite being a basic tenet of internet security, encryptionis notablyabsentfromthe president’s press release.While many in the tech communitybelieve encryption is necessary for continued cyber safety, the topic remains controversialin Congress. Full Multi-StepAuthentication Rollout While a large portion of the government uses 2-step or multi-step authenticationfor internal logins,the initiativeplans to extend this extra layer of security to citizen-facingfederal governmentdigital services.The President hopes this switch will also increase public awarenessof this identity proofing mechanism,encouragingmore wide use amongprivate online systems. $3.1billionInformation TechnologyModernization Fund This fund enables the retirement, replacementand modernizationof IT equipment throughout the government.Many see this initiative as overdue as some branches of the governmentare running antiquated as old as Windows XP which Microsoft stopped officiallysupporting in 2014. National Initiative for CybersecurityEducation $62 billion is requested to invest in educatingthe nation’s next generation of cybersecuritypersonnel. Proposed programs include the CyberCorpsReserve which would offer scholarshipsfor Americanswho wish to obtain cybersecurityeducation in exchange for civil service in government. EINSTEINandthe ContinuousDiagnostic andMitigation Program The president proposes allocatingincreasedfunding to the government’s primarycyberdefense system: EINSTEIN,which has faced significantcriticism since it is currently unable to dynamicallydetect new kinds of cyber intrusions, makingit only useful against known threats. ✓ Up-to-Date Devices
  • 28. President Obama’s $19 Billion Cybersecurity Proposal Calls for 35% Increase Over 2016 Enacted Level Major Pieces of the Cybersecurity National Action Plan Critiques from the Tech Industry • While manyin the techindustryhave applauded the president’s proposal for investment, many of the suggestionsare seen as basic and a sign at how woefully behind our governmentis on cybersecurity.BrianBarrett,a writer for Wired magazine,compares the plan to “standard advice you’d give a tech novice”. • With the proposalcoming from a “lame-duck” president nearingthe end of his second term, there is a growingpessimismthat pieces that require congressionalaction will go unfunded. • Despite being a basic tenet of internet security, encryptionis notablyabsentfromthe president’s press release.While many in the tech communitybelieve encryption is necessary for continued cyber safety, the topic remains controversialin Congress. Full Multi-StepAuthentication Rollout While a large portion of the government uses 2-step or multi-step authenticationfor internal logins,the initiativeplans to extend this extra layer of security to citizen-facingfederal governmentdigital services.The President hopes this switch will also increase public awarenessof this identity proofing mechanism,encouragingmore wide use amongprivate online systems. $3.1billionInformation TechnologyModernization Fund This fund enables the retirement, replacementand modernizationof IT equipment throughout the government.Many see this initiative as overdue as some branches of the governmentare running antiquated as old as Windows XP which Microsoft stopped officiallysupporting in 2014. National Initiative for CybersecurityEducation $62 billion is requested to invest in educatingthe nation’s next generation of cybersecuritypersonnel. Proposed programs include the CyberCorpsReserve which would offer scholarshipsfor Americanswho wish to obtain cybersecurityeducation in exchange for civil service in government. EINSTEINandthe ContinuousDiagnostic andMitigation Program The president proposes allocatingincreasedfunding to the government’s primarycyberdefense system: EINSTEIN,which has faced significantcriticism since it is currently unable to dynamicallydetect new kinds of cyber intrusions, makingit only useful against known threats. ✓ Up-to-Date Devices ✓ Two-Factor Authentication
  • 29. President Obama’s $19 Billion Cybersecurity Proposal Calls for 35% Increase Over 2016 Enacted Level Major Pieces of the Cybersecurity National Action Plan Critiques from the Tech Industry • While manyin the techindustryhave applauded the president’s proposal for investment, many of the suggestionsare seen as basic and a sign at how woefully behind our governmentis on cybersecurity.BrianBarrett,a writer for Wired magazine,compares the plan to “standard advice you’d give a tech novice”. • With the proposalcoming from a “lame-duck” president nearingthe end of his second term, there is a growingpessimismthat pieces that require congressionalaction will go unfunded. • Despite being a basic tenet of internet security, encryptionis notablyabsentfromthe president’s press release.While many in the tech communitybelieve encryption is necessary for continued cyber safety, the topic remains controversialin Congress. Full Multi-StepAuthentication Rollout While a large portion of the government uses 2-step or multi-step authenticationfor internal logins,the initiativeplans to extend this extra layer of security to citizen-facingfederal governmentdigital services.The President hopes this switch will also increase public awarenessof this identity proofing mechanism,encouragingmore wide use amongprivate online systems. $3.1billionInformation TechnologyModernization Fund This fund enables the retirement, replacementand modernizationof IT equipment throughout the government.Many see this initiative as overdue as some branches of the governmentare running antiquated as old as Windows XP which Microsoft stopped officiallysupporting in 2014. National Initiative for CybersecurityEducation $62 billion is requested to invest in educatingthe nation’s next generation of cybersecuritypersonnel. Proposed programs include the CyberCorpsReserve which would offer scholarshipsfor Americanswho wish to obtain cybersecurityeducation in exchange for civil service in government. EINSTEINandthe ContinuousDiagnostic andMitigation Program The president proposes allocatingincreasedfunding to the government’s primarycyberdefense system: EINSTEIN,which has faced significantcriticism since it is currently unable to dynamicallydetect new kinds of cyber intrusions, makingit only useful against known threats. ✓ Up-to-Date Devices ✓ Two-Factor Authentication X Encryption?!
 
 THANKS OBAMA
  • 31.
  • 33. Security Flipped! ( °□° Network Firewall/ VPN Cloud & SaaS Microsoft, Amazon, Google, Salesforce, Box, etc. UTM IDS/IDP Data Messaging/ Encryption DLP Web WAF/Fraud Endpoint Desktop Modern Devices iOS, Android, Windows 10, OS X, ChromeOSMobile Identity IAM/SSO Management SIEM/ Analytics VA/GRC
  • 34. From Bolt-On To Built-In Security
  • 40. Goldilocks Strategy Solve for Time, Value, Access, & Skill
  • 41. Enterprise-Grade Security + Consumer-Grade Design
  • 43. 2
  • 44. 7 7
  • 45. Siloed Point SolutionsSiloed Point Solutions Users Devices Network Apps 13
  • 46. Modern Access SecurityModern Access Security Users Devices Network Apps Trusted Access 14
  • 47. Trusted Access Ensure only trusted users & devices
 can access protected applications
  • 48. 2017DuoProductLine Duo Free Easy two-factor authen1ca1on, free for up to 10 users. $0 Duo MFA Easy, best-of-breed two- factor authen1ca1on for cloud and on-premise applica1ons. $3 Duo Beyond Our next-genera1on security control pla?orm for modern, perimeter-less organiza1ons. $9 Duo Access Our essen1al security suite to manage trust and address risks from mobile, BYOD, and cloud adop1on. $6
  • 49. Inbound Marketing: 93% of Leads, 75% of ACV
  • 50. 1/12 3/12 5/12 7/12 9/12 11/12 1/13 3/13 5/13 7/13 9/13 11/13 1/14 3/14 5/14 7/14 9/14 11/14 1/15 3/15 5/15 7/15 9/15 11/15 1/16 3/16 5/16 7/16 9/16 11/16 High-Velocity, High-Volume, Predictable Growth ‣ Time: 75% of customers up and running in < 1 day ‣ Value: 50%+ new ACV from expansion & upsell ‣ Access: 25% SMB, 25% Mid-Mkt, 50% Enterprise ‣ Skill: Most buyers IT, not security ‣ Love: 70 NPS, 1000+ New Logos/Qtr Series A Series B Series C
  • 51. 1/12 3/12 5/12 7/12 9/12 11/12 1/13 3/13 5/13 7/13 9/13 11/13 1/14 3/14 5/14 7/14 9/14 11/14 1/15 3/15 5/15 7/15 9/15 11/15 1/16 3/16 5/16 7/16 9/16 11/16 High-Velocity, High-Volume, Predictable Growth ‣ Time: 75% of customers up and running in < 1 day ‣ Value: 50%+ new ACV from expansion & upsell ‣ Access: 25% SMB, 25% Mid-Mkt, 50% Enterprise ‣ Skill: Most buyers IT, not security ‣ Love: 70 NPS, 1000+ New Logos/Qtr Series A Series B Series C