Top Banner
Session ID: Session Classification: PROFM02 General Interest Will They EVER “Get” Security? CXOWARE Jack Jones
37

Prof m02 v2

Jan 22, 2018

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Prof m02 v2

Session ID:

Session Classification:

PROF-­‐M02

General  Interest

Will They EVER “Get” Security?

CXOWAREJack Jones

Page 2: Prof m02 v2

News Flash...

Management doesn’t care about security

Page 3: Prof m02 v2

Question...

How are 1/4” drill bits similar to security?

Page 4: Prof m02 v2

What we’ll cover...

► Infosec’s value proposition► Crippling misconceptions► Packaging and conveying our value prop► Be careful what you wish for...► Q&A

Page 5: Prof m02 v2

Infosec’s Value Proposition

Page 6: Prof m02 v2

Remember my question...

How are 1/4” drill bits similar to security?

Page 7: Prof m02 v2

Infosec’s Value Proposition

Its affect on the frequency and magnitude of loss (i.e., managing risk)

Page 8: Prof m02 v2

Which is likely to be more meaningful?

We need to implement security technology/process/policy X because it’s best practice

or...

If we implement security technology/process/policy X it will take us from a level 4 (high) risk to a level 2 (medium) risk

or...

Page 9: Prof m02 v2

Which is likely to be more meaningful?

If we implement security technology/process/policy X at a cost of $120k, we’ll reduce our average annualized loss exposure from $1.5M to $200k

$1,500,000&

$200,000&

Before& A.er&

Annualized*Loss*Exposure*(avg)*

Page 10: Prof m02 v2

News flash...

Management cares about exposure to loss

Page 11: Prof m02 v2

Crippling Misconceptions

Page 12: Prof m02 v2

Crippling misconceptions

► Risk can’t be measured► There isn’t enough data for quantitative analysis► Quantitative analysis is impractical► Infosec risk is different from other forms of risk► Business people will always accept risk► You can do meaningful math on ordinal values

Page 13: Prof m02 v2

Risk can’t can be measured...but first you have to define it and understand it

► From a practical perspective, risk boils down to “exposure to loss”

► If you can estimate/measure the probable frequency of a loss event and the probable impact of that event, then you are measuring the risk associated with the event

Page 14: Prof m02 v2

A common problem though...Recently reviewed an organization’s risk register and found things like: ► Failure to patch vulnerabilities► Default passwords► Failure to make system backups► Disgruntled employees► Unencrypted laptops

Problem: These aren’t loss events, so you can’t assign a meaningful frequency and magnitude of loss to them

Page 15: Prof m02 v2

There isn’t enough data

► You have more data than you think you do, and you need less data than you think you do

► You just have to know where to look and how to make the best use of what you have

► Book: How to Measure Anything - by Douglas Hubbard

► Leverage ranges, distributions, and Monte Carlo

Page 16: Prof m02 v2

There isn’t enough data

Page 17: Prof m02 v2

Quantitative analysis is impractical

► Quantitative analysis does NOT have to require a lot of research and data► Quick and dirty is often good enough► A lot of data is reusable across similar scenarios

▶ Effective use of ranges and distribution can faithfully represent the quality of your data

Page 18: Prof m02 v2

Infosec risk is different than other forms of risk

► Boiled down, risk is simple “exposure to loss”

► Exposure to loss is fundamentally the same in principle whether we’re dealing with armed conflict, personal injury, investments, or data breaches

NO^

Page 19: Prof m02 v2

Business people will always accept risk

► When presented with good quantitative analysis, I’ve found business leaders to be remarkably risk averse

► The key is that the information we provide them has to be rational and defensible

NOT

^

Page 20: Prof m02 v2

You can can’t do math on ordinal values

Qualitative Scale(Ordinal)

What does x equal?

What does + equal?

Very HighHighModerateLowVery Low

54321

Page 21: Prof m02 v2

Packaging and conveying our value proposition

Page 22: Prof m02 v2

What’s the purpose?

► The purpose is to support well-informed decisions

► Understand what decisions are at stake and focus on providing only what’s required to support those decisions

► This is also NOT about “convincing” executives to see things our way.

Page 23: Prof m02 v2

My criteria for communications:

► Clear - Simple terminology, no infosec/IT acronyms

► Concise - Less is more

► Accurate - Absent bias and hyperbole

► Useful - Meaningful and actionable

Page 24: Prof m02 v2

Keys to packaging and communicating

Above all, be able to defend what you present

Page 25: Prof m02 v2

Examples...

Page 26: Prof m02 v2

Spending decision example

!

Current State: Before additional controls

!

Future State: After additional controls

Page 27: Prof m02 v2

Prioritization example

$-

$5,000,000

$10,000,000

$15,000,000

$20,000,000

$25,000,000

$30,000,000

$35,000,000

$40,000,000

Per

sona

l Sys

tem

s

Mid

rang

e D

atab

ases

Cus

t Car

e In

fo A

pps

Tran

sact

iona

l Pha

rma

App

s

Inte

rnet

App

licat

ions

Win

dow

s D

atab

ases

Dat

a W

areh

ouse

s

Adj

udic

atio

n A

pplic

atio

ns

Mob

ile M

edia

Mai

nfra

me

Dat

abas

es

Inte

rnet

-faci

ng U

nix

Inte

rnet

-faci

ng W

indo

ws

iSer

ies

Sys

tem

s

Mai

nfra

me

Sys

tem

s

Bus

ines

s P

artn

er N

etw

ork

LDA

P S

tora

ge

Inte

rnet

-faci

ng N

etw

ork

Prin

t Dis

posa

l

Bac

kup

Tape

s

Ext

erna

l Tra

nsm

issi

on

Rem

ote

Acc

ess

Dev

ices

Ope

n V

MS

Uni

x In

trane

t Sys

tem

s

Intra

net N

etw

ork

Dev

ices

Win

dow

s In

trane

t Ser

vers

Cor

p Fi

nanc

ial A

pplic

atio

ns

Cre

dent

ial P

roce

ss

Loss Exposure by Asset Category

$2,588 $-

$10,000,000

$20,000,000

$30,000,000

$40,000,000

$50,000,000

$60,000,000

$70,000,000

Privileged Insiders

Cyber Criminals

Non-Privileged Insiders

Malware*

Exposure by Threat Community

The$most$recent$enterprise$risk$assessment$found$that$insiders$represent$the$most$significant$threat$community$(by$35%$over$cyber$criminals),$and$that$personal$systems$(desktops$&$laptops)$represent$the$most$significant$point$of$exposure.$

Page 28: Prof m02 v2

Multi-year strategy example

2009 Current EOY12 EOY13 EOY14 EOY15

Customer  Information  Compromise

Corporate  Information  Compromise

Online  Fraud

Denial  of  Service

Regulatory  Non-­‐Compliance

Loss Exposure  Perspective

Risk  Level

Timeframe

•  Improved)worksta/on)protec/on)and)malware)controls)account)for)the)significant)reduc/on)in)loss)exposure)between)2009)and))2013.)

•  Data)leakage))controls,)combined)with)worksta/on)and)malware)controls))men/oned)above)have)driven)the)reduc/on)in)loss)exposure)for)sensi/ve)corporate)informa/on.)

•  Implementa/on)of)advanced)an/Cfraud)measures)in)2010)and)2011)have))significantly)reduced)the)volume)of)online)fraud)losses.)

•  Denial)of)service)exposure)was)reduced)in)2010)thru)an)upgrade)in)the)network)architecture.))Future)loss)exposure)will)be)further)reduced)in)2013)with)a)change)in)Internet)service)providers.)

•  Regulatory)requirements)con/nue)to)s/ffen,)which)has)slowed)progress)in)reducing)this)exposure.))Plans)for)2012)and)2013)should)result)in)addi/onal)loss)exposure)reduc/on.)

Page 29: Prof m02 v2

Keys to packaging

Page 30: Prof m02 v2

Other suggestions:

► Match the form of your message to what your stakeholders are used to (PowerPoints? Text? Charts? Numbers? Colors?)

► Limit “eye candy”. The use of colors should be strategic and intentional. Don’t overdo it!

Page 31: Prof m02 v2

Be careful what you wish for...

Page 32: Prof m02 v2

Be careful what you wish for...

So, you’ve demonstrated that you deserve a seat at the table.

Now what?

Page 33: Prof m02 v2

Things to be prepared for...

► A thirst for more...

► Politics (oh joy)

► Decisions you don’t agree with

Page 34: Prof m02 v2

Wrapping up...

Page 35: Prof m02 v2

Summary► Infosec’s value proposition is its effect on the frequency

and magnitude of loss. We’re missing the target unless/until we articulate it in those terms

► Misconceptions about risk and quantitative analysis seriously impede our ability to represent our value proposition effectively

► Effectively packaging and conveying our value proposition requires focus, clarity, brevity, and controlling our personal biases

► Successfully representing our value proposition can put us at the “big person table” - with all that entails

Page 36: Prof m02 v2

Resources

► How to Measure Anything - by Douglas Hubbard

► The Failure of Risk Management - by Douglas Hubbard

► Introduction to Factor Analysis of Information Risk (FAIR) - by Jack Jones

► Coming soon - a series of updated resources to help prepare for the The Open Group FAIR certification exam

Page 37: Prof m02 v2

Questions

For more information:URL: www.cxoware.comE-mail: [email protected]: 866.936.0191