Learning Library

← Back to Library

Pre‑Mortem Security Architecture

Key Points

  • A security architect must understand both how a system works and anticipate all possible failure scenarios, essentially thinking like a hacker.
  • The “pre‑mortem” approach flips traditional post‑mortem analysis by assuming a system has already failed and working backwards to prevent those failures before attackers exploit them.
  • Ethical hackers use this mindset to simulate attacks, uncover vulnerabilities, and help organizations strengthen defenses.
  • IBM’s X‑Force is divided into three units: Intel (researching threat actor activities), Incident Response (handling and recovering from breaches), and Red (conducting adversary simulations).
  • Patrick, the interviewee, serves as the Global Head of Adversary Simulation at IBM X‑Force, leading a Red‑team that acts as professional hackers to expose and remediate security weaknesses.

Full Transcript

# Pre‑Mortem Security Architecture **Source:** [https://www.youtube.com/watch?v=WYkbKzDfgqo](https://www.youtube.com/watch?v=WYkbKzDfgqo) **Duration:** 00:07:10 ## Summary - A security architect must understand both how a system works and anticipate all possible failure scenarios, essentially thinking like a hacker. - The “pre‑mortem” approach flips traditional post‑mortem analysis by assuming a system has already failed and working backwards to prevent those failures before attackers exploit them. - Ethical hackers use this mindset to simulate attacks, uncover vulnerabilities, and help organizations strengthen defenses. - IBM’s X‑Force is divided into three units: Intel (researching threat actor activities), Incident Response (handling and recovering from breaches), and Red (conducting adversary simulations). - Patrick, the interviewee, serves as the Global Head of Adversary Simulation at IBM X‑Force, leading a Red‑team that acts as professional hackers to expose and remediate security weaknesses. ## Sections - [00:00:00](https://www.youtube.com/watch?v=WYkbKzDfgqo&t=0s) **Pre‑Mortem Thinking for Security Architects** - The speaker describes how security architects must imagine system failures by reverse‑engineering attacks—using a “pre‑mortem” mindset and hacker’s perspective—to design mitigations before threats materialize. - [00:03:04](https://www.youtube.com/watch?v=WYkbKzDfgqo&t=184s) **Red vs Blue & Hat Hackers** - The speakers explain the military‑originated Red‑Team/Blue‑Team model for adversarial simulations and contrast white‑hat (authorized) and black‑hat (unauthorized) hackers, highlighting their roles and motivations. - [00:06:08](https://www.youtube.com/watch?v=WYkbKzDfgqo&t=368s) **Testing Systems with Adversary Simulation** - The speaker outlines how a Global Head of Adversary Simulation uses ethical hackers to rigorously assess and secure systems before production, while previewing a multi‑part video series on the role’s responsibilities and career path. ## Full Transcript
0:00A colleague of mine once said that a normal 0:03IT architect envisions how a system will work, 0:06whereas a security architect envisions 0:09how a system will fail. 0:11Really turns out that a security architect has to do both. 0:14They have to figure out how the system will work, 0:17so that they can figure out what all the different failure cases 0:20might derive from that. 0:22Well, you may have heard of a postmortem 0:24where an analysis is done after a project is completed in order 0:28to extract lessons that can be learned 0:30and applied to future projects. Well, 0:32how about the idea of a "pre-mortem", 0:36where we start with the idea that the system 0:39we're now designing has already failed, 0:42and now backtrack to figure out why, 0:44then build in the mitigations 0:47so that all of this stuff doesn't happen 0:50before the bad guys actually attack. 0:52A skilled security architect would use their knowledge, 0:56their experience, their imagination 1:00to envision how a system might fail. 1:04In other words, they have to think like a hacker. 1:07Yeah, that's exactly right. 1:09And Patrick, that's essentially what you do for a living, right? 1:13That's exactly You're an ethical hacker. I am indeed. 1:16Okay, well, so what we're going to be doing 1:18in this series, we've got three videos. 1:20We're going to take a look at what it means 1:23to be an ethical hacker, what 1:25does the job involve 1:27and how can I get a career in this particular space. 1:31So Patrick, you work for IBM's X-Force. 1:35What ... what is that organization about? What do they do? 1:37Sure. X-Force is made up of three primary sections. Uh ... 1:41The first one I would start with is Intel. 1:43These are the folks that uh ... do lots of research 1:46and investigation to figure out what type of things are ... 1:49are real bad guys out there doing. 1:51Yeah. So they might be looking at the dark web and stuff 1:53like that in order to figure out what ... 1:55what's happening and alert people, right? 1:57Exactly. 1:59The next one would be IR. 2:00This is also known as incident response. 2:02These are the folks that you call if you have a breach in your network 2:05and you need some help figuring out what happened, 2:07how do we get the bad guys out of there. 2:09They're your 911 for an incident. 2:11Got you. And they can help you post incident as well as pre incident, sort 2:15of planning for what a disaster might be and what might occur, right? 2:19Exactly. Okay. 2:20All right. And then the third group? 2:22The third group is Red. So that's where I work. 2:24These are the folks that you call 2:25if you want to figure out "How is a hacker 2:27going to break into my network?" 2:28So these are our professional hackers that will then come in and ... 2:31and help you see where are my vulnerabilities and how are the bad guys 2:34going to exploit those. Gotcha, gotcha. 2:36And ... and with that group then that's, as you said, where you are. 2:40So tell us, what's your title? 2:42Sure. My title is the Global Head of Adversary Simulation. Uh ... 2:45I run a group of these hackers. 2:48That sounds pretty cool. 2:49So another way of thinking about that is it's essentially a RED team operator. 2:54That's exactly Okay, 2:55so now that I've mentioned this idea of teams, 2:58let's talk about what these teams are. So, 3:00we've got teams on here 3:02and we've got Red teams. 3:04and we got Blue teams. What's the difference? 3:07Sure. So our Red team is our ... our pretend bad guys. 3:10These are acting as our adversary. 3:12They're the ones who are testing our defenses. 3:14The Blue team is our defensive team. 3:16So they're the ones who are responding and making sure, hey, 3:18the bad guys can't get in. Gotcha. 3:20And ... and those terms kind of come from military background. 3:23Is that right? That's exactly right. 3:25The military coined these terms uh ... quite a long time ago 3:28to ... to sort of begin the idea of, hey, 3:31we need to make sure we have a pretend bad guy 3:33so we get a good, thorough test of our ... our defensive capabilities. 3:36So it's that adversarial simulation. 3:38You've got the defense guys and you've got the attack 3:41guys. And you're running exercises, 3:43hopefully before the bad guys get around to doing it. That's exactly Yeah, 3:46so we've got teams, we've got colors, 3:50we've got hats. Uh, 3:51we like to use this term informally 3:54to refer to different types of hackers. 3:57And there are good hackers and bad hackers. 4:00And so we refer to them as what kinds? 4:04So we've got our white hat and our black hat hackers. 4:07Yeah. And what's the main difference between those? 4:10The ...the primary difference would be permission. 4:12So the white hats are the ones that you call 4:14and ask to break into your network. 4:15The black hats are the ones who are doing it without permission. 4:18Yeah. And I would say a big difference amongst those is 4:22these guys get paid 4:24and these guys steal. 4:27So that's one distinction. 4:29But if you start looking at career earnings, well, 4:31the possibility is you get a nice collection at one point in time 4:36and then you go to jail. Uh 4:38... whereas this career path 4:40you keep earning and keep earning and keep earning and you stay out of jail. 4:44So maybe this is the better long-term career decision. 4:48Yeah, there's a lot of possibility for career progression at this. 4:51I think if you go down the path of black hat, 4:53sort of, captain, like you said, probably end up in jail. 4:56Yeah. So, Patrick, you're an ethical hacker. 4:59What goes into that? Well, let's dissect this a little bit. 5:02Sure. It's a topic you can imagine is, uh, is quite big. 5:05And there's lots of ways that you can think about it, 5:07but one way we could approach 5:09it is to think of it in this, in this pyramid 5:11of the pieces of a ... a testing program 5:13when it comes to ethical hacking. 5:15At the bottom of that pyramid, we might put vulnerability scanning. 5:18This is your more automated type of testing, where 5:21we're looking at ... at the big picture, trying to capture as much data as possible 5:25and understanding where all the vulnerabilities are. Right on 5:28top of that, we might put penetration testing. 5:31This is where you're starting to bring in your ... your 5:33skilled testers to look at specific systems, 5:36maybe web applications or hardware, 5:38and they're going to be able to test those things and understand, 5:41you know, are they exploitable? 5:42What's the impact of those exploits? 5:44And give you the information about how to fix those things. 5:46A lot of this stuff is automated using tools and things like that, right? 5:50I'd say it's right down the middle. 5:51So, supported by tools, but with a skilled person behind them. Okay. Gotcha. 5:55And then the top of the pyramid? 5:57That's where you're going to put your Red team 5:59in. So this is where we're pretending to be a true adversary. Think, 6:02you know, everything from ... from nation state to ransomware operators. 6:06How do they work? And are they going to be able to break in? 6:08What's the effect of those types of things? 6:09Yeah. And this is where you, as Global Head of Adversary Simulation, 6:15you and your team are going to exist in this space, right? 6:18That's exactly Yeah. So, 6:19these are the kinds of things that you would want to do 6:22to put your system through its paces. 6:24You wouldn't take a system 6:26and just put it into production without ever testing it, right? Well, 6:29you wouldn't put a system without testing it for security. 6:33Look for all its vulnerabilities. 6:34Bring in skilled, ethical hackers, like Patrick 6:37and his team, in order to figure out 6:40whether you have covered all the bases here or not. 6:43So, what we've done so far in this video 6:46is we basically looked at what's involved in the role. 6:50And in the next video, we'll take a look at a little more deeper 6:53dive into what's involved in the job. 6:55What are some of the tasks that go into this? 6:58And then the ... the third video in this series, 7:00we'll take a look at how you can go 7:02about getting a career in this space. 7:04So, like and subscribe so that you're aware 7:07when future videos come out in the series.