Top Banner
The Security Dashboard Visualizing IT and Business Risk Information Security Decisions October 6, 2004
10

Panelists

Jan 21, 2016

Download

Documents

verlee

The Security Dashboard Visualizing IT and Business Risk Information Security Decisions October 6, 2004. Panelists. Pete Lindstrom, Spire Security Shon Harris, Logical Security Bill Boni, Motorola Moderator: Andy Briney, InfoSecurity. What’s a Security Dashboard?. Dashboard Wish List. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Panelists

The Security Dashboard

Visualizing IT and Business Risk

Information Security DecisionsOctober 6, 2004

Page 2: Panelists

Panelists

Pete Lindstrom, Spire Security

Shon Harris, Logical Security

Bill Boni, Motorola

Moderator: Andy Briney, InfoSecurity

Page 3: Panelists

What’s a Security Dashboard?

Page 4: Panelists

Dashboard Wish List

1. Simplifies the management of operational and IT security activities.

2. Correlates data from multiple sources and turns it into actionable information.

3. Maximizes technology investments by integrating with existing products.

4. Measures compliance with accepted practices, internal standards and government regulations (ISO 17799, GLBA, HIPAA, Basel II).

5. Tracks vulnerabilities and remediation status.

6. Prioritizes remediation activities by business impact.

7. Maintains historical information for trend analysis.

8. Maintains prioritized remediation action plans.

9. Facilitates communication between the Business, Information Security, Operations, Audit/Compliance and Risk Management.

10. Produces a meaningful management console/dashboard.

Source: Steve Katz

Page 5: Panelists

In a Nutshell…Asset discovery and management

Vulnerability remediation

Threat correlation and assessment

Compliance/policy management

Reporting/audit

Prioritizes risks, remediation workflow

Treats operational risk as a lifecycle

Page 6: Panelists

How realistic is Andy’s wish list?

1. It’s real: I’m running a management system that

does most of this

2. Likely to happen, but not for a few years

3. Unlikely to happen in the near future

4. What you’re asking for is impossible.

5. I dunno enough about this to have an opinion.

Page 7: Panelists
Page 8: Panelists
Page 9: Panelists
Page 10: Panelists

Now, for a dose of realityDASHBOARD OBSTACLES

Poorly conceived and executed risk analysis models and processes

Constantly changing risk environment

Evolving (immature?) technologies

Immature communications protocols and standards: No lingua franca

Poor understanding of relationship of technical risk to business risk