Top Banner
The State of Risk-Based Security Management Katherine Brocklehurst RIM Renaissance Oct 25, 2013
38

The State of Risk-Based Security Management

May 29, 2015

Download

Technology

Tripwire

The State of Risk-Based Security Management is an in-depth study conducted by Ponemon Institute and sponsored by Tripwire. The study is designed to reveal how organizations are applying rigor­ous and systematic analytical techniques in order to quantify and evaluate the security risks that impact an organization’s information assets and IT infrastructure.

The full report can be found here: http://www.tripwire.com/register/the-state-of-risk-based-security-2013-full-report/
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The State of Risk-Based Security Management

The State of Risk-Based Security Management

Katherine BrocklehurstRIM Renaissance Oct 25, 2013

Page 2: The State of Risk-Based Security Management

The State of Risk-Based Security Management

Katherine Brocklehurst

TripwireRIM Renaissance Oct 25, 2013

Page 3: The State of Risk-Based Security Management

3

$150M+Annual Sales

400+Employees

$$$Profitable

7000+Customers

In 96 countries

The right size to be nimble, innovative; Large enough to be the long-term leader in the SVM market

Page 4: The State of Risk-Based Security Management

4

The State of Risk-Based Security ManagementSurveyed 1,320 security professionalsUS and UKCommissioned by TripwireConducted by Ponemon Institutewww.Tripwire.com

Page 5: The State of Risk-Based Security Management

RISK MANAGEMENT: ART OR SCIENCE?

MATURITY AND GOVERNANCE

RISK-BASED SECURITY METRICS

SECURITY CONTROLS AND SPENDING

COLLABORATION, COMMUNICATION AND CULTURE

METHODOLOGY

AGENDA

Page 6: The State of Risk-Based Security Management

RISK MANAGEMENT: ART OR SCIENCE?

MATURITY AND GOVERNANCE

RISK-BASED SECURITY METRICS

AGENDA

Page 7: The State of Risk-Based Security Management

7

Page 8: The State of Risk-Based Security Management

8

Art or Science?

Page 9: The State of Risk-Based Security Management

9

Art or Science?

Page 10: The State of Risk-Based Security Management

10

Art or Science?

Page 11: The State of Risk-Based Security Management

11

Art or Science?

Page 12: The State of Risk-Based Security Management

12

Art or Science?

ART¨ The higher up the

management chain you go Art¨ Retail¨ Financial Services¨ Tech &

Communications¨ Health & Pharma

SCIENCE¨ The more hands-on,

direct dealings with technology Science¨ Industry¨ Services¨ Public Sector¨ Education & Research

Page 13: The State of Risk-Based Security Management

2013 Risk-Based Security Management Metrics

Page 14: The State of Risk-Based Security Management

14

There is Hope: Maturity is Slowly Improving

47%

Page 15: The State of Risk-Based Security Management

15

The Use of Metrics is Related to Maturity

Page 16: The State of Risk-Based Security Management

GARTNER PREDICTS THAT BY 2014, 80% OF GLOBAL 2000 ORGANIZATIONS WILL

REPORT ON RISK AND SECURITY TO THEIR BOARDS OF DIRECTORS AT LEAST ANNUALLY.

-GARTNER, INC.“BUILDING AN EFFECTIVE IT RISK AND INFORMATION SECURITY

PRESENTATION FOR YOUR BOARD OF DIRECTORS” JUNE 2012

The CISO Challenge

Page 17: The State of Risk-Based Security Management

17

Aligning Security & Business Needs Improvement

62% 50%

Page 18: The State of Risk-Based Security Management

18

Page 19: The State of Risk-Based Security Management

19

Critical Business Objectives of RBSM

• IP• Compliance• Decreasing

Costs & Inefficiencies

Page 20: The State of Risk-Based Security Management

20

Page 21: The State of Risk-Based Security Management

“IN THIS RESTRICTIVE ECONOMIC ENVIRONMENT, CISOS HAVE AN OPPORTUNITY TO REFRAME THE RISK DISCUSSION [WITH MISSION

OWNERS] AND BUILD A STRATEGY…

…THIS MAY SEPARATE THE SUCCESSFUL SECURITY AND RISK PROFESSIONALS, WHO CAN ADAPT STRATEGICALLY TO THE

CURRENT CLIMATE, FROM THE UNSUCCESSFUL ONES, WHO STAY MIRED IN DAY-TO-DAY SECURITY FIREFIGHTING.”

-FORRESTER RESEARCH“UNDERSTANDING SECURITY AND RISK BUDGETING FOR 2013”

JANUARY 2013

The CISO Opportunity

Page 22: The State of Risk-Based Security Management

22

Why Metrics Are Not Created or Understood by Sr Execs

¨ Silos

¨ Too technical

¨ Comm @ too low level

¨ Negative facts are filtered

¨ Only when there’s an incident

¨ Too much time/resource

¨ Info ambiguous leading to poor decisions

¨ Senior execs not interested

Page 23: The State of Risk-Based Security Management

23

When Do You Communicate?

Page 24: The State of Risk-Based Security Management

24

Do We Communicate Effectively?

Reasons Why Metrics Are Not Understood:Information too technicalMore pressing issuesOnly communicate when incident happensTakes too much time

Page 25: The State of Risk-Based Security Management

25

The CISO needs what the CFO has….

Financial Reporting• Objective facts• Consistent definitions• Trending• Performance against goals• Performance against peers• Clear communication to

diverse audiences interally and externally

A way to describe a company’s security performance just like the CFO describes financial performance

Earnings Per Share

Revenues

Gross Margins

EBITDAOperating Income

Net Income

Current Assets

Accounts Receivable

Cash Flow

Current Liabilities

Page 26: The State of Risk-Based Security Management

26

Metrics for Security Efficiency - Cost

Page 27: The State of Risk-Based Security Management

27

Significant Barriers

¨ Lack of skilled personnel¨ Insufficient resources or

budget¨ Business lacks

understanding of the role and contribution of IT Security

¨ Insufficient risk assessment enforcement

Page 28: The State of Risk-Based Security Management

28

Page 29: The State of Risk-Based Security Management

29

Business/Security Metrics and Analytics

Objective and consistently measuredTrend and comparison that makes sense to non-technicalsPreferably automated (cheapest way to gather)Ideally paced to align with business reporting (M/Q2/1H/Yr)Typically expressed as a number or percentageHas business contextActionable

What makes a good security business metric?

Page 30: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION30

Communicate effectively how security enables the business

Page 31: The State of Risk-Based Security Management

IT SECURITY & COMPLIANCE AUTOMATION

Balance Security Risk with Business Demands

Page 32: The State of Risk-Based Security Management

32

Continuous

Page 33: The State of Risk-Based Security Management

33

Tripwire Pulse

Page 34: The State of Risk-Based Security Management

34

Page 35: The State of Risk-Based Security Management

35

Page 36: The State of Risk-Based Security Management

36

Measure, Communicate and Drive Action

SANS 5: Malware

Attack Surface Index (Summary)

Across Business Context

SANS Controls

Aggregated/Weighted

SANS 1: Asset Inventory SANS 3: VA

SANS 4: CA

Operational Reports

Page 37: The State of Risk-Based Security Management

37

Because Everyone Could Use a Laugh

Enjoy at: tripwire.com/powers @CISOpowers Twitter

Page 38: The State of Risk-Based Security Management

tripwire.com | @TripwireInc

THANK [email protected]

www.tripwire.com/state-of-security

@Kat_Brock