Top Banner
Security’s Role in Enterprise Risk Management Jeff Spivey, CRISC, CPP, PSP , ISACA International Board of Directors [email protected]
68

Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

May 27, 2018

Download

Documents

duongtuyen
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Security’s Role in Enterprise Risk Management

Jeff Spivey, CRISC, CPP, PSP , ISACA International Board of Directors [email protected]

Page 2: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Global debt hits all-time high of $152 trillion as IMF warns of world-wide economic stagnation

5 OCTOBER 2016 • 2:45PM

Page 3: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

ComprehensiveIdentify, prioritize, effectively manage critical risksIntegrated risk solutionsALL aspects of the business practices and decision-makingAlign Strategies with ObjectivesContinuously evaluated

Page 4: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Risk and Opportunity

Security’s ONLY Role is to

ENABLE the Organization

Page 5: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s
Page 6: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Is ERM here to stay ?

Page 7: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s
Page 8: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s
Page 9: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s
Page 10: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s
Page 11: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s
Page 12: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s
Page 13: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s
Page 14: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Business Impact of Security Incidents

http://www.pwc.com/us/en/view/issue-15/cybersecurity-business-priority.jhtml

Financial losses

Intellectual property theft

Brand/reputation compromised

Fraud

Legal Exposure

Loss of shareholder value

Extortion

Page 15: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Mature risk management drives financial results

*2011 YTD reported as of 18 November 2011.

(E&Y, 2012)

Page 16: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

“C-Suite Slipping on Information Security”

• Security’s responsibility to tell the story- NOT management’s to have to ask

• Continuously inform the C-Suite and ERM owners of Security Risk, Impact and Likelihood- in the same context as all other risk are reported- to allow apples to apples

• Speak the language of the C-Suite $$$

• Answer the “SO WHAT” question

CFO Magazine

Page 17: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

•“…if each part of a system is made to operate as efficiently as possible, the system as a whole will not operate as effectively as possible. The performance of a system depends more on how its parts interact than on how they act independently of each other“ •Russell Ackoff,

Page 18: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

© 2012 ISACA. All rights reserved. 18

COBIT 5 Enabling Processes

Page 19: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Risk Scenario Components

Page 20: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Threat intelligence is a key process to add to Risk Management

• Security teams must be able to rapidly and effectively translate large volumes of threat information into intelligence to help detect threats and protect the business.

• Organizational specific threat intelligence is a key process that needs to be managed

• Operationalized threat intelligence will benefit a broad set of internal consumers

• threat intelligence platform to harness the power of threat intelligence and translate threat intelligence into action.

• proactively protect the business from advanced threats,

Page 21: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Chief Information Security Officer

•Reporting Structure ?

Page 22: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s
Page 23: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

51% of respondents to a 2012

CITRIX survey believed that stormy

weather can interfere with cloud

computing

Myth #1:

We know what cloud computing

is.

Page 24: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Copyright © 2012 Cloud Security Alliance

Cloud Controls Matrix Tool

• Controls derived from guidance

• Mapped to familiar frameworks: ISO 27001, COBIT, PCI, HIPAA, FISMA, FedRAMP, Countries

Page 25: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Emerging technologies will change everything – how we work, how we live, how we communicate

• Mega Trends* are global, sustained and macro economic forces of development that impact business, economy, society, cultures and personal lives thereby defining our future world and its increasing pace of change

*Frost & Sullivan Top 10 Mega Trends 2012

Of the Top 10 Mega Trends* to 2020, 8 have significant emerging technology components

Page 26: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Emerging Trends Emerging Risks

Frost & Sullivan Top 10 Mega Trends 2012

• Urbanisation • Smart is the New Green • Social Trends• Economic Trends • Connectivity & Convergence • Innovating to Zero (Gates: Mega Vision of a zero concept world with zero emissions, zero accidents, zero fatalities, zero defects, and

zero breaches of security)

• New Business Models • Health, Wellness and Wellbeing• Homecentering• Tech Vision 2020

Page 27: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

• Emerging technologies will be the dominant driver of disruptive change for the foreseeable future, bringing significant opportunities and threats

• In the race to the future, organizations that manage risk for the right emerging technologies will better survive and prosper •– those that don’t, will NOT

So What?

Page 28: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Generic Approaches to Organization Security

Silos of Independence

Councils of Collaboration

Unified Organization

Little or no communication or coordination

Periodic, ad hoc and incident-focused

Formal, structured and aligned

Page 29: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Security RolesInformation Protection

Physical Security

Financial

• Protection of people,

property & tangible

assets from loss,

destruction, theft,

alteration or

unauthorized accessEnterprise Risk

Management

• Digital

asset

security

• Inspection

procedures

• Information security

• Disaster/business

continuity

• Risk assessments

• Security technology

• Investigations

• Independent controls &

assessments

• Internal/external

regulatory compliance

• Risk management

• Incident

response

Page 30: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Changes Ahead for Security Professionals

Training

Hands on Kits

Partnership

Cybercrime failures will result in major liability judgments.

The public & private sector will formally share infrastructure protection roles.

Certification & licensing will be required for security professionals.

CSOs will assume responsibility for all operational risks.

Security will be subsumed into ERM and Finance/CROs will predominate.

Page 31: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Traditional Security

Policy & Procedures

Pre-Employment Background Verification

Employee/Manager Security Awareness

Training & Education

Business Travel Advisories & Emergency Response

Key Executive Protection &

Expatriate Support

Workplace Violence Prevention, Training

& Support

Policy & Procedures

Risk Assessment & Physical Security

Standards

Protective Services & Guard Operations

Alarm Monitoring (Fire, Security & Critical Systems)

Security Technology Design,

Engineering, Integration &

Service

Vendor and Contractor Controls

Policy & Procedures

Business Practices

Team & Internal Administrative

Inquiries

M&A & Due Diligence Inquiries

Fraud, Waste & Abuse Prevention,

Detection, & Investigation

Security Incident Report Database & Investigation Case

Management

Policy & Procedures

IP Asset Evaluation

IP Classification Management

Employee & Trade or Process Partner

Disclosure Agreements

IP Protection Standards &

Methods

Competitive Intelligence &

Counter Intelligence

Policy & Procedures

Information Systems & Network Access

Management

Encryption & Key Management for

Voice, Data & Video

Information systems Firewall Monitoring & Virus Protection

Telecommunications Security for PBX,

Cellular & Voice Mail

Internet/Intranet, E-mail & Mobile

computing

Policy & Procedures

Business Impact Analysis of Key

Processes and Sites

Crisis Management Plan Development

& Team Coordination

Business Continuity Plan Development

& Maintenance

Disaster Recovery Plans for Data

Center & Distributed Systems

Site Emergency Response Team

Management

Personnel Security

Physical Security

Loss Prevention Investigation

Information Security

Computer Security

Business Continuity

Page 32: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Extended Enterprise Risks

“Organization (Risk)

Community”

Joint Ventures Contract

Manufacturing

Contract Design

Customers

Transportation

Services

Parts

UntrustworthyCyber

Page 33: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Complex Protection Systems

Network Access

Control Interception

and Enforcement

Facility

PKI

Manager

Centralized

Security

Policy

Manager

Digital

Signature

Interface

Other Security

Entity

Manager

Token Card

Manager

OS Security

Management

Tools

Certificate

Authority

Interface

Virus

Interception &

Correction

VPN Session

or Tunnel

Manager

Single

Sign-on

Tools

Security

Event Report

Writer(s)

Encryption

Facilities for

Network

Connections

Security

Policy

Distributor

Cyberwall/

Firewall

Rule Base

Connection

Manager and

Logging

Application

Proxy

Implementation

Security

Traffic Event

Analyzer

Application

Logging

Facility

VPN IPSec

and VPN

Connection

Manager

Stateful

Inspection

Intrusion

Logging

Intrusion

Prevention

Application

Inspection

Security

Event

Logging

Security

Integrity

Manager

Packet

Inspection

Frame

Inspection

Security

Filter

Engine

Real-time

Frame

Management

Intrusion

Detection

Network

Host-based

Application based

Authentication

Cryptography

Anti-Virus

Intrusion Detection

Auditing

Security Management

Too many pieces Few qualified personnel Lack of standards Lack of integrated

safeguards

Page 34: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

A Security Professional for All Seasons

Business acumen

- Professional training- Certifications

- Grounded in multiple protection disciplines

- Adept at framing risk issues for management

- Adaptable

- Passion for learning

Page 35: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s
Page 36: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Jeff Spivey, CRISC, CPP, PSP

President

Security Risk Management, Inc.

[email protected]

+1 704-521-8401

ISACAInternational Board of Directors

Page 37: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

Security Risk Management Framework

Page 38: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

38

Why focus on defining a risk management framework?

The Security team has created and implemented a structured methodology that lets us quantify risk, establish risk appetite/tolerance, identify and prioritize controls, and establish a system of record to meet a multitude of legal and compliance obligations for our companies systems and information assets.

Page 39: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

39

Linking CobiT’s 34 IT processes to our IS&C risk management framework (1/2)

Assessment

CobiT’s process

grouping

Planning and

organization

Acquisition and

implementation

Processes Framework component affected

1. Strategic plan definition Vision and principles

2. IT architecture design –

Definition of technological guidelines Vision & principles; security

practices and technologies

3.

Definition of IT operations and accountability schemes Security operations4.

IT investment management Business case5.

Internal communication of management guidelines Change management and BU

guidelines

6.

Organization design/Human resource management Organization and governance7.

Assurance of external IT requirements compliance Linkages to other enterprise

activities

8.

Risk management Various risk related components.

Sections 2A to 2D

9.

Project management –10

. –Data management/Quality management11.

IT solution design12

.

Security operations

Application s/w development1 13

. Acquisition and maintenance of IT infrastructure 14

. Development and maintenance of IT processes15

. IT system installation and accreditation16

. Change management17

.

1 Includes acquisition, personalization and maintenance

Page 40: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

40

Linking CobiT’s 34 IT processes to our IS&C risk management framework(2/2)

Assessment

CobiT’s process

grouping

Delivery and

support

Processes Framework component affected

Security operations

18

.

Service level definition and management

Third parties service management19

.Performance and capacity management20

.Assurance of continuity in IT processes21

.System security management22

.Cost accounting and allocation23

.End-user training and education24

.End-user support and advice25

.Management of IT assets/equipment26

.Problem management27

.IT operations monitoring/supervision Security operations; Compliance,

metrics and reporting

28

.

Compliance with physical and environmental

requirements

Compliance, metrics and reporting29

.

Operations managementSecurity operations

30

.IT process monitoring31

.Evaluation of controlling processes

Compliance, metrics and reporting

32

.Independent quality assurance33

.Independent operation auditing34

.

Monitoring

Page 41: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

41

Vision and Charter forRisk Management Framework

Details

▪ Deliver robust, efficient, proactive, adaptive and cost effective

security solutions for all stakeholders (i.e., employees, customers)

▪ Lead and guide industry thinking in cyber security and risk

management

▪ Align to business strategy, needs and goals

▪ Shape business strategy/environment

▪ Balance technical/ business/financial needs

▪ Create constructive relationships and effective communications

between business, security & partners

Vision statement

Emerge as cyber

security leader in

this industry

Become a stronger

business partner

Mature our security

capabilities

▪ Build capability and capacity; Grow a critical mass of security

technical/ management professionals

▪ Cascade security strategy into the company - Engender an

environment and culture of “security first”

▪ Measure performance

1

SOURCE: Team analysis

Page 42: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

42

Guiding principles “The Backbone of our Strategy”

Least privilege Users and system processes should be given the least authority and minimum access to resources

required to accomplish a given task

Accountability All significant system and process events should be traceable to the initiator

Minimum depen-

dence on secrecy

Controls should still be effective even if an opponent knows of their existence and mode of operation

Control automation Wherever possible, automatic controls should be used rather than controls that depend on human

vigilance and behavior

Resiliency Systems should be designed and managed so that in the event of breakdown or compromise only

least possible damage and inconvenience are caused

Defense in depth Controls should be layered such that if one layer of control fails, there is another different type of

control at the next layer that will prevent a security breach

Approved exception Policy exceptions should always have management approval

Secure emergency

override

Controls must be bypassed only in predetermined and secure ways. Systems are most vulnerable

when normal controls are removed for emergency maintenance or other similar reasons. There

should always be procedures and controls to minimize the level of risk in these circumstances

Auditability It must be possible for an independent expert to verify that the system conforms to the security

policy. A necessary but not totally sufficient condition for this is that the system must be able to

record security-related events in a tamper-resistant audit log

Practicality Security levels need to be commensurate with the level of risk

Privacy Employees should have no expectations of privacy related to internet and email usage

DescriptionPrinciple

SOURCE: ISO 17799 and 27001 serve as a baseline

Page 43: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

43

Framework for understanding and analyzing risk exposures

Risks highlighted by

metrics/dashboards

Proactive threat

profiling

Cross functional management involvement in

risk exposure analysisLong term trends and

implications for risk

profile

Real time threat

detection

Risk classification and

likelihood

Risk impact

assessment

Draft prioritization of

risk

Confirm and refresh

priorities with senior

management1

Risk identificationRisk levelling and

prioritizationRisk assessment

1 Conversation would likely include investment - risk trdeoffs

Page 44: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

44

Framework for understanding and

analyzing risk exposures (example)

Page 45: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

45

Security will continue to play a role in both emerging and existing standards and regulations

2A

NOT EXHAUSTIVE

Existing Emerging

Standards

Transmission

and distribution

NIST4 Smart gridsWISE3

GenerationNERC CIP4, NISTWISE

Customer careCalifornia SB 1386, SB 355, AB 19502 PCI4

EnterpriseNERC, CIP, ISO 17799, ISO 270011 CobiT 4.1

CorporateSarbanes-Oxley –

1 NERC is North American Electric Reliability Council; CIP is Critical Infrastructure Protection; ISO is International Organization for Standardization. 27001

is basically part 2 of 177799

2 SB 1356 is California Security Breach Information act; SB 355 is California Anti-Phishing Act of 2005; AB 1950 is California Assembly Bill 1950 that

requires organizations owning personal information to implement security measures

3. WISE is Water Infrastructure Security Enhancement. It has several processes for physical security that may have IT Security implications

4. PCI Is Payment Card Industry Data Security Standard

5. NIST is National Institutes of Standards and Technology

SOURCE: McKinsey Research

Page 46: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

46

Counter measure portfolio framework2D

PRELIMINARY

1 Includes remediation tracking

SOURCE: Team analysis

Portfolio Inputs

Risk exposure and

prioritization

Standards, legislation

and regulation

Security practices and

technologies

2A

2B

2C

Generation Selection Realization

▪ Create and compile

options – damage

potential vs.

investment

▪ Create portfolio view

▪ Make risk

exposure vs.

investment level at

the portfolio level

– Approve

actions

– Accept residual

risks

▪ Formulate and

coordinate risk-

mitigating actions

▪ Track realization of

recommended

actions and

escalation when

necessary1

– For example,

temporarily lock

down an IT

service to

address threat

▪ Mange exposure

Steps

Page 47: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

47

Vulnerability Dashboard in Development “Counter measure portfolio framework”

2D

Page 48: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

48

Security metrics will plugged into both the enterprise risk and the IT report cards

Enterprise risk score card IT score cards

Operating metrics (e.g., metrics

highlighting service readiness)

4

Change management and talent

development (i.e., key talent gaps)5

Financial6

Security metrics

Roadmap metrics (i.e., how we are

doing on from-to journey)

1

Risks uncovered and mitigated;

Residual risk2

Compliance and Audits (e.g., items

pending from SOX compliance)3

SOURCE: Team analysis

Page 49: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

49

Provisioning &

Implementation

Network

& System

Security

Secure

Builds &

Host

Hardening

Directory

Services

Remote &

Extranet

Connections

Secure

Network

Design

Perimeter

Security

Privacy

Confidentiality &

Segmentation

Contingency

/ Disaster

Planning

Product

Security

Application

Security

Secure

Development

Lifecycle

Secure

Design and

Coding

Authentication

& Authorization

Secure

Communication

Secure

Operations

Audit

Function

Information

Classification

Logging,

Monitoring,

& Reporting

Policy and

Regulatory

Compliance

Manage-

ment

Identity

Management

Threat/

Vulnerability

Awareness &

Manage-

ment

Media

Control &

Handling

Business

Continuity

Backup,

Recovery,

& Archiving

Partner &

Third Party

Integration

Configuration

and Patch

Management

Security

Policies &

Procedures

Security

Governance

& Definition

of Roles

Risk

Management

Security

Strategy

Executive

Sponsorship

Security

Awareness

Legal

Framework

Security

Program

Metrics &

Quality

Security

Architecture &

Planning

Asset

Management

Physical

Security

Incident

Handling &

Response

Security

Organization

Personnel

Security

Data

Integrity

Malicious Code

Protection

Data

Security

Encryption

Intrusion

Detection &

Prevention

Storage

Security

Clustering

and Data

Availability

Mobility &

Wireless

Symantec model is a report

card that will be generated by a

3rd party on a periodic basis

Report card touches all

components of the framework

SOURCE: Client interviews and team analysis

Page 50: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

50

IT Security investments will be driven by a comprehensiveinvestment case incorporating security and business factors

Counter

measures

portfolio

Management

burden

Operations

burden

Risk exposure and prioritization

Standards, legislation and regulation

Security practices and technologies

Business

drivers

▪ Case for IT

security

investments

▪ IT security

budget

– Link

investments to

risk tolerance

•$$$

SOURCE: Team analysis

Page 51: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

51

Business case for security investments will require technical as well as business expertise

3

EXAMPLE

▪ Estimating values for the

factors of the ROI formula is

not straightforward

▪ There is no standard method

for estimating risk exposure

and mitigation effectiveness of

investments in security

While the ROI formulas are straight forward … … they are not very easy to use

Risk mitigation ROI =

(Risk exposure × % risk mitigated) –

cost of security investment

Cost of security investment

▪ Security business cases draw heavily upon individual capabilities and domain expertise

▪ Leveraging expert knowledge (e.g., by using the Delphi method) has produced reliable results

Impact of risk ×

probability of risk

Number of incidents prevented by

investment

Number of incidents expected

without investment

SOURCE: McKinsey research

Page 52: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

52

We will continue to evaluate IS&C’s structure and ensure that it is in sync with IS&C risk management framework4

PRELIMINARY EXAMPLE

Governance

process programs

Architecture, and

standards, and

requirements

Security

engineeringSecurity operations Risk management

Business

engagement

▪ Policy

▪ Compliance

– ISO

– PCI DSS

▪ Audit

representative

▪ Metrics

▪ Develop

architecture

▪ Represent

security on

architecture

activities

▪ Develop and

publish standards

▪ Sign-off on

engineering

projects for comp-

liance with policy

▪ Security

engineering

design in

– Net

– Server

– Application

– Identity

▪ ID management

▪ Infrastructure

access

▪ Encryption key

management

▪ Firewall NIDS

▪ Application

assurance

▪ Vulnerability

management

▪ Threat

management

▪ Incident response

▪ Investigations

▪ E-discovery

▪ Monitoring state

of security controls

▪ Consulting to

business

▪ Training and

awareness

▪ Third-party

assessments

▪ Collection of

business

requirements

▪ Marketing/

promoting use of

security solutions

CSO#

A comprehensive study of the security organization would evaluate the following

▪ Size ( i.e., Do we have enough FTEs)

▪ Structure ( i.e., Is the structure in line with security strategy?)

▪ Security expertise ( i.e., both technical and management)

▪ Coverage ( i.e., gaps in services/functions)

▪ Interfaces ( i.e., with IT and non IT functions)

SOURCE: Team analysis

Page 53: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

53

Governance model has three major components and needs to be tailor made for the organization

Roles and

responsibilities1

Decision making

processes and

interfaces

2

Incentives3

Disguised client example: Business data policy definition and maintenance

Example title ResponsibilitiesRole

▪ Advocates, finances, and supervises all data

governance and security aspects

Chief information

security officerData management

sponsor

▪ Defines data governance strategy and processes,

coordinates domain interaction, and acts as escalation

point for interdomain issues

Data governance

steering committee

▪ Controls processes in a data subject areaFinance managerDomain

executive

Domain

executive…

▪ Manages the business data in a particular data domain

and defines rules for use

Accounts payable

manager…Business

data steward

Business

data steward

▪ Performs change, read, update, and/or delete actions

on the data object

Accounts payable

clerkProcess

owner/SME

▪ Defines the underlying architecture for the data domain

and ensures architecture meets business needs

Data architectData SME

▪ Performs day-to-day maintenance on the data,

including storage, backup, and disposal

▪ Requires data for business purposes

IT specialistFunctional IT SME

▪ Regular review of credentialing and policiesBusiness line

managerOther stakeholders

▪ Controls for auditing, monitoring and compliance

▪ Escalation of issues to business line owners and

steering committee

IT risk specialistMonitoring &

compliance

ILLUSTRATIVE

SOURCE: McKinsey research

Page 54: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

54

Change management

and BU integration

Linkages to other

enterprise activities

Linkages to Partners &

suppliers

Vision and principles

Understand risk expo-

sure and prioritization

Standards, legislation

and regulation

Security practices and

technologies

Counter measure

portfolio

Compliance, metrics and

reporting

Business case (i.e.,

investments and ROI)

Organization &

governance

Security operations

Current snapshot of high levelsecurity governance

PRELIMINARY

5

7

8

1

2A

2B

2C

2D

2E

3

4

6

Cyber security

team

N/A

Create

Create

Create

Create

Create

N/A

Inform

Inform

Create

Cyber

security lead

Create

Approve

Approve

Approve

Review

Approve

Create

Create

Create

Approve

Create

Create

Cyber security

steering

committee

Inform

Inform

Inform

Inform

Review

Review

Inform

Review

Approve

Inform

CIO

Approve

Inform

Inform

Approve

Approve

Review

Approve

Approve

Review

Inform

Approve

Approve

Architecture

board

Create

Inform

Create

Create

Create

Inform

Create

Inform

Inform

Create

Financial

group

Approve

N/A

Inform

ERM

Inform

Inform

Inform

Board

Inform

Inform

–’

SOURCE: Client interviews

Page 55: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

55

Maintain a robust talent managementstrategy to grow security capabilities!

SOURCE: McKinsey research

ILLUSTRATIVETaxonomy of talent management

Core topics

▪ Branding architecture and selection of key attributes

▪ Attraction and selection processes for new hires

▪ Target setting and consequence management

▪ Mid-year and target review

▪ Potential discussion with focus on development

▪ Individual development plan including follow-up

▪ Leadership-level-oriented training programs

▪ Overall training systematic with focus on on-the-job-

training

▪ Succession planning for critical jobs

▪ Job rotation as key development tools

▪ Mentoring

Elements

Develop-

ment

Leadership

System

Perfor-

mance

Manage-

ment

Performance &

Potential Review

(PPR)

Succession/

Changes

in Po-

sition

Recruiting

Strategy

▪ Top management groups

▪ Competency model/management

▪ Formal requirements (skills, competencies for

leadership level)

I II

III

VI

V

IV

Performance Management

Development

Succession/Changes in Position

Leadership System

Recruiting Strategy

II

IV

V

VI

I

Performance & Potential Review (PPR)III

Page 56: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

56

decision rights in a cross functional committee of senior partners to drive change

5

EXAMPLE

Firm technology committee

(decision body)

▪ CIO lead 10+, cross

functional senior leaders

including legal

▪ Committee has final decision

rights on IT security policy

Committee output

IT security policies

and decisions that

can be enforced by

technology

▪ Vest decision making rights in cross functional executive governance body (e.g., FTC)

– Allow/compel group to exercise rights

▪ Orchestrate initial FTC meetings to establish authority and bounds

▪ Ensure committee output takes meaningful steps forward

Decision

body

IT

Key success factors

Committee inputs

Security events

(e.g., breaches)

Security best

practices ( e.g.,

size of email

inboxes)

Technology

forecasts

(e.g., 3rd party

expert analysis)

Security

management

framework

▪ Establish clear guidelines on what is in scope for decision body

– For example, strategic decisions are in scope but budgets are not

▪ Limit organizational debate on pros and cons of security measures

– Decisions come from the governance body with explanation but limited feedback opportunity

▪ Be patient

– Security changes take place over a long time and involve steps

▪ Be opportunistic

– For example using an attack to rollout a new security solutions or policy

SOURCE: McKinsey research and Team analysis

Page 57: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

57

The Influence Model: Changelevers and lever categories

SOURCE: McKinsey

5

Developing talent and

skills

“I have the skills and

competencies to behave

in the new way”

Reinforcing with formal

mechanisms

“The structures,

processes and

systems reinforce the

change in behavior I

am being asked to

make”

Role-modeling

“I see superiors, peers

and subordinates

behaving in the

new way”

Fostering under-standing

and conviction

“I know what is expected of

me – I agree with it, and it

is meaningful”

▪ Story development

(includes all the key

elements, e.g., values,

strategy, case for

change)

▪ Story delivery (across

relevant levels, i.e.,

organizational,

employee, functional)

▪ Organization structure

▪ Targets and metrics

▪ Management processes

▪ Business processes

▪ Rewards, recognition

and consequences

▪ Information systems

▪ Leadership

actions

▪ Opinion

shapers

▪ Interactions

Talent

management

▪ Hiring

▪ Replacing

▪ Retaining

Learning

▪ On-the-job

development

▪ Training

▪ Action learning

Lever categoriesLever categories

Mindset &

behavior shifts

Page 58: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

58

Cyber security operational excellence is achieved by ensuring coverage of 4 key elements (1/3)

6

PRELIMINARY

SOURCE: Team analysis

6.1. Security

policy

management

6.4.

Technology,

equipment, ven-

dor manage-

ment

6.3. Core

processes

6.2.

Security

servicesSecurity operations

Page 59: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

59

Cyber security operational excellence is achievedby ensuring coverage of 4 key elements (2/3)

SOURCE: Team analysis

6

PRELIMINARY

Sub components

▪ Create detailed service catalogue to

satisfy business needs and strategy

– Customize services where needed

(e.g., Business unit specific

changes)

▪ Manage service lifecycle

– Definition

– Budgeting

– Test

– Deployment

▪ Define and enforce decision rights

(e.g., Which services are opt in and

which ones are compulsory)

– Operations

– Training

– Monitoring

and audit

Example services

▪ Access rights and control

▪ Identification and authentication

▪ Encryption

▪ Incident detection and management

▪ Audit

▪ Recovery

▪ Administration

▪ Standards compliance

6.1. Security

policy

management

6.3. Core

processes

6.2. Security

servicesSecurity operations

6.4.

Technology,

equipment, ven-

dor manage-

ment

Page 60: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

60

Appendix

Page 61: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

61

Cyber security operational excellence is achievedby ensuring coverage of 4 key elements (3/3) PRELIMINARY

SOURCE: Team analysis

▪ Setting and implementation

▪ Life cycle management

Sub components

▪ Define and implement processes for

– Policy development and review

– Service development and review

– Monitoring of common operations

– Audit and assessment

– Define linkages to other PG&E

processes

6.1. Security

policy

management

6.4.

Technology,

equipment, ven-

dor manage-

ment

6.3. Core

processes

6.2. Security

servicesSecurity operations

Sub components

Page 62: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

62

IT security services should map toit architecture layers PRELIMINARY

SOURCE: Team analysis

Application/

databases

▪ Applications

▪ Databases

IT a

rchitectu

re laye

rs

Centralized

infrastructure

▪ Severs

▪ Mainframes

Network

▪ Routers

▪ Switches

▪ Cables

End-user

computing

▪ Computers

▪ Notebooks

▪ Fax/phones

Encryption Audit Recovery

Authentica-

tion Detection

▪ Service 1

▪ Service 2

▪ …

▪ Service 1

▪ Service 2

▪ …

▪ Service 1

▪ Service 2

▪ …

▪ Service 1

▪ Service 2

▪ …

▪ Service 1

▪ Service 2

▪ …

▪ Service 1

▪ Service 2

▪ …

Security services

Admini-

stration Access

Standards

compliance

▪ Service 1

▪ Service 2

▪ …

▪ Service 1

▪ Service 2

▪ …

Page 63: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

63

We need to clearly define roles, responsibilities and interfaces in areas of overlapping accountability

SOURCE: Team analysis

ILLUSTRATIVE

Decreasing

level of IT

security

involvementOrchestrated

Owned

Expedited

No role

▪ Activity completely owned and

managed by the group

▪ For example, security audit

▪ Activity completely outside the

scope of IT security

▪ For example, non IT part of

enterprise audit

▪ Security orchestrates activity

and manages entire lifecycle

– Guides entries process

– Manages and ensures

quality of end product

▪ For example, ensure that we

have the right security insurance

▪ Security gets the activity started

but relies on partner

organization to execute

▪ For example, inform physical

security team of risk to data

center gathered by horizon scan

Page 64: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

64

Partner classification is the first step in determining how and when to apply framework

8

Inside firewall?

Extend framework to partner

Apply variant/subset of IT

security framework

Apply variant/subset of IT

security framework

Analyze partner framework

during selection/due-diligence

Access levels ?

Involvement level ?

Yes

No

Same as employees

Limited

High

Arms length

1 Includes those with frequent contacts or where non-public information may need to be exchanged. Often you will have confidentiality agreement with

such parties

SOURCE: Team analysis

Page 65: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

65

Example of risk assessment and leveling2A

ILLUSTRATIVE

SOURCE: Team analysis

Example framework considers 3 factors in

prioritizing risks

▪ Probability of occurrence

▪ Impact on business objective

▪ Investment needed to fix

Other factors that may be relevant include

▪ Frequency of occurrence

▪ Reactive vs. Preventive fixes

▪ Organizational capability

▪ Different time horizons (e.g., 6 months vs. 5 years)

Pro

babili

ty

Impact on business

objective

Circle size

represents

minimum

investment

needed to

prevent problem

Event impact

description

▪ Net income

shortfall

5 (worst case)

▪ >$150mn

3 (major)

▪ $25mn-$75mn▪ Financial

Business objectives

▪ <$5mn

▪ Negative media

attention

▪ International

media

▪ Provincial

media

▪ Reputation ▪ Letter to senior

management

▪ Outages ▪ >100,000

customers

▪ 10,000-40,000

customers

▪ System reliability ▪ <1,000

customers

1 (minor)

Score

5

4

3

2

1

Rating

Virtually certain

Very likely

Even odds

Unlikely

Remote

Probability of occurrence

Percent

95

75

50

25

5

Page 66: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s

66

Evaluate

Where do we stand?

Execute

Today6 months

24 months

▪ Get buy-into framework

▪ Create baseline

▪ Develop high level plan

Build strong capabilities on

strong foundations

▪ Complete baseline

▪ Finalize plan

▪ Get approval and budget

▪ Staff and start execution

Move forward and evolve

▪ Mature baselines and plan

▪ Execute at full pace and

refine

Security transformation shall progress in 3 distinct phases

Initialize

12 months

SOURCE: Client interviews and team analysis

Page 67: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s
Page 68: Security’s Role in Enterprise Risk Management November... · Security’s Role in Enterprise Risk Management Jeff ... •Organizational specific threat ... N e two rk A c c e s