Top Banner
The State of Risk- Based Security Management (Global Report)
40

2012 Ponemon Report: The State of Risk-Based Security Management

Dec 18, 2014

Download

Technology

Tripwire

Download the full report here: www.Tripwire.com/Ponemon2012

Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of RBSM in the US. Discover the study’s key findings:

+Although organizations profess a strong commitment to RBSM, they’re taking little action
+Those organizations with a formal approach to RBSM tend to walk the talk.
+Most organizations implement the appropriate preventive controls, but neglect to implement sufficient detective controls.
+Position level of the respondent in the organization affects how threats rank on their "Security Fright Index."
+How perceptions of RBSM differ in the US, the UK, Germany and the Netherlands

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 2012 Ponemon Report: The State of Risk-Based Security Management

The State of Risk-Based Security Management (Global Report)

Page 2: 2012 Ponemon Report: The State of Risk-Based Security Management

The State of Risk-Based Security Management

(Global Report)

Page 3: 2012 Ponemon Report: The State of Risk-Based Security Management

The State of Risk-BasedSecurity ManagementDwayne Melancon, CTOCindy Valladares, Product Marketing

Page 4: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION

@TripwireInc #RiskyBiz2012

Today’s Speakers

Dwayne Melancon

Chief Technology Officer

@ThatDwayne

Cindy Valladares

Product Marketing Manager

@cindyv

Page 5: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION5

@TripwireInc #RiskyBiz2012

The State of Risk-Based Security Management 2012

Why The Interest in Risk-Based Security?

About The Study

Key Findings

Obstacles and Inhibitors

Recommendations

Page 6: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION

@TripwireInc #RiskyBiz2012

Interest in Risk Management is Spiking

Increasingly required to engage non-technical executives for budget

Habitual security spending not aligned with the business

More objective methods needed to allocate limited budgets

Scary things in the news, noticed by business guys

Compliance is driving the conversation around risk

Page 7: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION7

@TripwireInc #RiskyBiz2012

What is Risk-Based Security Management?

Let’s first define Risk

Risk = Probability (x) Impact

An approach that relates the costs of mitigating risks to the perceived value of an asset in the context of:• Threats

• Vulnerabilities

• Impacts to the business

Part of a wider Enterprise Risk Management system and specific to Information Security

The goal is to enable the business

Page 8: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION8

@TripwireInc #RiskyBiz2012

About The State of Risk-Based Security Management Report

Surveyed 2,145 individuals

Four countries: US, UK, Germany, Netherlands

Commissioned by Tripwire

Conducted by an independent research organization

Page 9: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION9

@TripwireInc #RiskyBiz2012

Demographics – By Industry

Page 10: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION10

@TripwireInc #RiskyBiz2012

Demographics – By Job Title

Page 11: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION11

@TripwireInc #RiskyBiz2012

What is Covered in the Report

Perceptions about risk-based security management (RBSM)

The relationship between RBSM maturity and security posture

The evolving role of the CISO

Comparison of the state of RBSM in various countries

Page 12: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION12

@TripwireInc #RiskyBiz2012

Top Findings

1. More talk than walk

2. Unbalanced approach to information and risk management

3. Lack of metrics to measure success

Page 13: 2012 Ponemon Report: The State of Risk-Based Security Management

#1 – Lots of Talk. Starting to Walk.

13

Page 14: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION14

@TripwireInc #RiskyBiz2012

Stated Commitment to RBSM is High

77%

Page 15: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION15

@TripwireInc #RiskyBiz2012

Does a Formal Risk Management Strategy Exist?

Page 16: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION16

@TripwireInc #RiskyBiz2012

Does a Formal Risk Management Function or Program Exist?

Page 17: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION17

@TripwireInc #RiskyBiz2012

Deployments Range in RBMS Maturity

Page 18: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION18

@TripwireInc #RiskyBiz2012

Perceived Benefits of RBSM

Page 19: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION19

@TripwireInc #RiskyBiz2012

Importance of Benefits Differ by Region

Page 20: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION20

@TripwireInc #RiskyBiz2012

Summary: Starting to Walk

Most organizations are talking about risk-based security management

Most claim to be serious about it

Less than half have formal strategies or procedures in place

Page 21: 2012 Ponemon Report: The State of Risk-Based Security Management

#2 – Unbalanced Approach to Risk & Security

21

Page 22: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION22

@TripwireInc #RiskyBiz2012

Perceived Risk vs Allocated Spending

Evidence of “habitual spending”, not risk-based security spending

Page 23: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION23

@TripwireInc #RiskyBiz2012

Existence of Common Preventive Controls

Setting expectations and making it easier to do the right things

Page 24: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION24

@TripwireInc #RiskyBiz2012

Existence of Common Detective Controls

Ensuring reality matches expectations … accountability

Page 25: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION25

@TripwireInc #RiskyBiz2012

Do the Steps for Assessing and Managing Security Risks Exist?

Basic Steps to Assessing and Managing Security Risk:

1. Identify the information that is key to the business

2. Categorize information according to its importance to the business

3. Identify threats to the information

4. Assess vulnerabilities to the systems that process the information

5. Assess the risks of loss or corruption of the information

6. Identify controls necessary to mitigate the risks

7. Implement the controls

8. Monitor controls continuously

Page 26: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION26

@TripwireInc #RiskyBiz2012

8 Steps for Assessing and Managing Security Risks

Page 27: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION27

@TripwireInc #RiskyBiz2012

Maturity Makes a Difference

Risk assessment and controls vary by level of RBSM maturity

Page 28: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION28

@TripwireInc #RiskyBiz2012

Most Are Missing Critical Steps of Risk-based Security Management

Basic Steps to Assessing and Managing Security Risk

1. Identify the information that is key to the business

2. Categorize information according to its importance to the business

3. Identify threats to the information

4. Assess vulnerabilities to the systems that process the information

5. Assess the risks of loss or corruption of the information

6. Identify controls necessary to mitigate the risks

7. Implement the controls

8. Monitor controls continuously

Page 29: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION29

@TripwireInc #RiskyBiz2012

Summary: Unbalanced Approach

Security resources are not aligned with the perceived risks• Over-investing in some areas, woefully underinvested in others

Preventive vs. Detective control implementation• Organizations making good progress on preventive controls, yet they are

• Behind on detective controls; which means

• They have good expectations, but no way to hold others accountable

Most have work to do on the critical last steps of RBSM

Page 30: 2012 Ponemon Report: The State of Risk-Based Security Management

#3 – Lack of Metrics to Measure Success

30

Page 31: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION31

@TripwireInc #RiskyBiz2012

Use of Metrics to Measure Success

Page 32: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION32

@TripwireInc #RiskyBiz2012

What Is Being Measured?

Page 33: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION33

@TripwireInc #RiskyBiz2012

What Is Being Measured?

Page 34: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION34

@TripwireInc #RiskyBiz2012

Summary: No Metrics = No Success

Less than half of organizations are using metrics for RBSM

Many organizations are using “false flag” metrics• Cost of security program

• Number of vulnerabilities in the environment

Page 35: 2012 Ponemon Report: The State of Risk-Based Security Management

Field Observations & Recommendations

35

Page 36: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION36

@TripwireInc #RiskyBiz2012

Configuration Quality:• % of configurations compliant with target security standards (risk-aligned)

• i.e. >95% in Critical; >75% in Medium

• number of unauthorized changes

• patch compliance by target area based on risk level• i.e. % of systems patched within 72 hours for Critical; …within 1 week for Medium

Control effectiveness:• % of incidents detected by an automated control

• % of incidents resulting in loss

• mean time to discover security incidents

• % of changes that follow change process

Security program progress:• % of staff (by business area) completing security training

• average scores (by business area) for security recall test

Snapshot: Examples Of Metrics That Are Working

Page 37: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION37

@TripwireInc #RiskyBiz2012

Investigating and adopting a repeatable framework• Careful - don’t over-study it!

Applying risk ranking/scoring methods

Engaging cross-functional “steering committees” to examine various risks• Strategic & Operational, Information Security, Financial,

Employment Practices, Intellectual Property, Physical, Legal, Regulatory, etc.

Prioritizing projects, actions, and investments to bias toward areas of highest risk and impact

Establishing Key Risk Indicators (KRI’s) and Key Risk Objectives (KRO’s) to measure progress

How Are Orgs Approaching This?

Page 38: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION38

@TripwireInc #RiskyBiz2012

“Boil the ocean” approaches

No executive sponsorship or “Tone at the Top”

No (or ineffective) metrics

Too much focus on cost

What Can Make the Move to Risk-Orientation Difficult?

Page 39: 2012 Ponemon Report: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION39

@TripwireInc #RiskyBiz2012

Recommendations: Risk-Based Security Management (RBSM)

Institute a formal RBSM program or function with a formal strategy

Ensure the appropriate balance of preventive and detective controls

Establish and use metrics to demonstrate program success

Page 40: 2012 Ponemon Report: The State of Risk-Based Security Management

www.tripwire.comTripwire Americas: 1.800.TRIPWIRETripwire EMEA: +44 (0) 20 7382 5440Tripwire Japan: +812.53206.8610Tripwire Singapore: +65 6733 5051Tripwire Australia-New Zealand: +61 (0) 402 138 980

@TripwireInc #RiskyBiz201240

www.tripwire.com/ponemon2012www.tripwire.com/blog@TripwireInc

Dwayne Melancon@ThatDwayne

Cindy Valladares@cindyv