Field Research: Security Metrics Programs
|
|
|
- Jerome Reed
- 10 years ago
- Views:
Transcription
1 Ramon Krikken Analyst Security and Risk Management Strategies Burton Group Field Research: Security Metrics Programs All Contents 2009 Burton Group. All rights reserved.
2 Security Metrics Programs 2 Field Research: process, timeline, and demographics Focus on security governance and management topics In-depth interviews with senior-level security management Spanning 30 organizations; 25 in North America, 5 in Europe Private sector only; no government or educational institutions Interviews conducted between February and April 2009 Financial Services 7 Insurance 2 Computer HW/SW 4 Pharmaceuticals 2 Health Care 3 Transportation 2 Retail 3 Travel 1 Manufacturing 3 Media 1 Energy 2
3 Security Metrics Programs 3 Summary of findings Frameworks for metrics programs vary greatly Metrics programs are at varying levels of maturity A wide range of measurements is collected A limited range of metrics is reported to management Perceived success often related to business / culture Metrics programs are increasingly formalized
4 Security Metrics Programs 4 Most participants act on perceived utility Risk metrics measured at various levels, during projects and for existing processes and infrastructure Incident metrics measuring rates of occurrence, impact to the organization, and resolution efforts Operational metrics measuring a variety of processes and technologies on status, effectiveness, and efficiency Compliance metrics relating to performance in the previous categories Visible trend towards formal metrics programs and review boards, but maturity and the perceived success of the program wildly vary
5 Security Metrics Programs 5 Some participants speak about perceived futility No one has ever been able to measure security executives only care about the incidents that impact the business. Success is really binary it was prevented or not. If there's no impact, then no one cares that it was prevented. Quantitative measurements of security can't be done. Exhibited in two ways: what metrics are collected by whom, and how they are (or are not) communicated to executive management
6 Security Metrics Programs 6 Framework for Metrics Program Organizations vary in metrics program focus Some security groups focus on results/outputs Some groups focus on controls and compliance Technical metrics relate to exceptions and are generated by tools SLAs are used to set targets that are subsequently tracked Economic model may be used to assess effectiveness of controls Value of metrics can be hard to show in business context If the business continues to run then that s success Cannot always easily connect security success and failures with impact on the business goals (particularly in certain verticals) Showing ROI, other than cost savings, is still hard for many
7 Security Metrics Programs 7 Low-level security metrics and measurements Low level metrics are produced by security tools, such as SIEM, vulnerability management, DLP, etc: Number of laptops protected with full drive encryption Number of fully patched systems How quickly patches are deployed How long it takes to remediate a vulnerability Number of vulnerabilities per line of application code Audit finding mitigation in place Results of vulnerability scans Number of malware/virus incidents Percentage of systems with latest AV signatures Number of trouble tickets concerning security Number of DLP policy violations
8 Risk metrics Security Metrics Programs 8 Risk metrics tend to be subjective and hard to quantify Lack of formal risk metrics and process in some organizations Likelihood information is often inaccurate Relative risk is easier to work with than absolute risk Map to industry best practices whenever possible Metric thresholds and dashboards help to focus (red, yellow, green) Results of assessments and audits are important metrics Several organizations measure themselves by improvement Benchmarking is mentioned, but only by few organizations Exceptions to policies and standards are tracked As expected, interpretation of risk is highly contextual
9 Incident metrics Security Metrics Programs 9 Many organizations (as expected) track incidents Data breach metrics sometimes assigned a dollar cost No strong indications of benchmarking However, not all organizations view things the same way Definitions of what is an incident vary at the detail level Some definitions are text-book, others more contextualized Business context again determines what matters Several interviewees commented that management does not necessarily care about all incidents; only about business impact
10 Security Metrics Programs 10 Metrics and measurements reported to management Number of security assessments performed Exceptions to compliance policies Application risk scores Internal and external audit findings Security awareness attestations, surveys, and test results Incidents and related costs Satisfaction surveys Compliance with internal and external service level agreements (SLAs) such as for security operations requests Security group budget and accuracy of project cost estimates Status of active security projects Payment Card Industry Data Security Standard (PCI DSS) compliance status and dates met
11 Security Metrics Programs 11 Metrics reporting and use Tactical operational security metrics are reported on weekly/monthly basis Operational or technical security metrics are used within IT security organization and IT Operations, but are not useful to senior execs Several cases where CISO explicitly notes management is not interested in operational metrics or even security incident metrics Security status and security project status are often visible to senior management and board oversight groups Focus on how well policy and controls are implemented Results of awareness testing, assessments, and audit findings Identify compliance exceptions or important operational incidents
12 Security Metrics Programs 12 Relationship to Compensation Metrics that can show performance improvement are more visible and may impact compensation/bonus Personal and team objectives per role, but not tied to incident metrics Security organization objectives for improvement and team bonus may be tied to metrics/dashboard Several cases where this is tied to security operations efficiency Other cases where it is tied to security budget management In some cases CISO compensation is based both on hard numbers and assessment by peers In one case a survey was used to assess alignment with the business One CISO noted this relates to how others [business] feel about security
13 Security Metrics Programs 13 Reporting, tools, and dashboards Organizations are moving towards greater automation in their metrics programs Some examples where Archer s suite is used to aggregate metrics data from other sources Some use of dashboards that are based on internal spreadsheets Manually compiled from variety of sources, including security tools Spreadsheets are still at the top of data management for metrics! Scorecards that assess BUs or sites against a set of controls Track exceptions to policy and progress towards remediation One CISO notes to only gather the data you plan to use Indication of information overload?
14 Security Metrics Programs 14 Example of Operational Security and Compliance Dashboard
15 Conclusions Security Metrics Programs 15 Some organizations appear successful in creating and communicating metrics that connect with business goals A fair number of interviewees experience disconnects with management, and some doubt metrics are doable There is still a large gap between low-level operational metrics and mid-level program and management metrics Effective positioning/operation of the security team(s) appears vital to develop effective metrics programs
16 Security Metrics Programs 16 Related Burton Group Research and Recommended Reading Security Key Performance Indicators Security Metrics: Horses for Courses Introduction to Key Risk Indicators Thinking Strategically About Security Metrics Using Metrics Effectively: Proving and Improving the Business Value of IT You Manage What You Measure
2012 National BDPA Technology Conference. Defining Project and PMO Metrics
2012 National BDPA Technology Conference Defining Project and PMO Metrics Betty Hutchins, MBA, PMP August 1 4, 2012 Baltimore, MD Presentation Objectives Project Performance Determine the Process Defining
Leveraging Network and Vulnerability metrics Using RedSeal
SOLUTION BRIEF Transforming IT Security Management Via Outcome-Oriented Metrics Leveraging Network and Vulnerability metrics Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC
Information Risk Management Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC Agenda Data Breaches Required Capabilities of preventing Data Loss Information
Metrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Improving Residual Risk Management Through the Use of Security Metrics
Improving Residual Risk Management Through the Use of Security Metrics Every investment in security should be effective in reducing risk, but how do you measure it? Jonathan Pagett and Siaw-Lynn Ng introduce
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
STREAM Cyber Security
STREAM Cyber Security Management Software Governance, Risk Management & Compliance (GRC) Security Operations, Analytics & Reporting (SOAR) Fast, flexible, scalable, easy to use and affordable software
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were
Risk Management Frameworks
Effective Security Practices Series Driven by a wave of security legislation and regulations, many IT risk management frameworks have surfaced over the past few years. These frameworks attempt to help
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were
Benchmark Against Best Practice Service Delivery Metrics
Benchmark Against Best Practice Service Delivery Metrics Featuring: Julie Giera, Forrester Pierre Champigneulle, BearingPoint Host: Jason Schroedl, newscale Internal Service Delivery The average company
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]
Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance
2011 Forrester Research, Inc. Reproduction Prohibited
1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business
Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management
Prevent cyber attacks. SEE what you are missing. See Your Network MAPS. Prevent cyber attacks. [RedSeal] is meeting our expectations and is playing an integral role as it feeds right into our overall risk
How Boards of Directors Really Feel About Cyber Security Reports. Based on an Osterman Research survey
How Boards of Directors Really Feel About Cyber Security Reports Based on an Osterman Research survey Executive Summary 89% of board members said they are very involved in making cyber risk decisions Bay
Pragmatic Metrics for Building Security Dashboards
SESSION ID: GRC-W03 Pragmatic Metrics for Building Security Dashboards James Tarala Principal Consultant Enclave Security @isaudit Problem Statement What s measured improves. Peter Drucker In an era of
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
Improving Network Security Change Management Using RedSeal
SOLUTION BRIEF Mapping the Impact of Change on Today s Network Security Infrastructure Improving Network Security Change Management Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom
Audit of Project Management Governance. Audit Report
Audit of Project Management Governance Audit Report March 2015 TABLE OF CONTENTS Executive Summary... 3 What we examined... 3 Why it is important... 3 What we found... 3 Background... 5 Objective... 6
Best Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
Alliance Scorecarding and Performance Management at TechCo. A Vantage Partners Case Study
Alliance Scorecarding and Performance Management at TechCo A Vantage Partners Case Study With the assistance of Vantage Partners, TechCo, a microelectronics company based in California, developed and implemented
Leveraging a Maturity Model to Achieve Proactive Compliance
Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
DATA AUDIT: Scope and Content
DATA AUDIT: Scope and Content The schedule below defines the scope of a review that will assist the FSA in its assessment of whether a firm s data management complies with the standards set out in the
A Practical Guide to Improving PCI Compliance Posture
A Practical Guide to Improving PCI Compliance Posture To improve PCI compliance, determine where your cardholder data is and monitor where it s going. On October 28, 2010, the PCI Security Standards Council
ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists
Incident ITSM Maturity Model 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident process exists Incident policies governing incident Incident urgency, impact and priority
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively Arrow ECS DLP workshop, Beograd September 2011 Marko Pust [email protected] 1 Agenda DLP in general What to expect from
Regulatory Compliance Management for Energy and Utilities
Regulatory Compliance Management for Energy and Utilities The Energy and Utility (E&U) sector is transforming as enterprises are looking for ways to replace aging infrastructure and create clean, sustainable
Enabling Security Operations with RSA envision. August, 2009
Enabling Security Operations with RSA envision August, 2009 Agenda What is security operations? How does RSA envision help with security operations? How does RSA envision fit with other EMC products? If
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
Building a Data Quality Scorecard for Operational Data Governance
Building a Data Quality Scorecard for Operational Data Governance A White Paper by David Loshin WHITE PAPER Table of Contents Introduction.... 1 Establishing Business Objectives.... 1 Business Drivers...
Project Management and ITIL Transitions
Project Management and ITIL Transitions April 30 th 2012 Linda Budiman Director CSC 1 Agenda Thought Leadership: Linda Budiman What is ITIL & Project Management: Applied to Transitions Challenges & Successes:
Best Practices to Improve Breach Readiness
Best Practices to Improve Breach Readiness Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC http://blog.emc2.de/trust-security @RobtWesGriffin 1 Security Breaches 2 Security
FIVE PRACTICAL STEPS
WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND
A proven 5-step framework for managing supplier performance
IBM Software Industry Solutions Industry/Product Identifier A proven 5-step framework for managing supplier performance Achieving proven 5-step spend framework visibility: benefits, for managing barriers,
CISOs Discuss Best Ways to Gain Budget and Buy-in for Security
CISOs Discuss Best Ways to Gain Budget and Buy-in for Security Learn how veteran security leaders strategically manage budgets and sell leadership on the importance of security WISEGATE COMMUNITY VIEWPOINTS
IT Risk & Security Specialist Position Description
Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015
NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps
IT Governance. What is it and how to audit it. 21 April 2009
What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures
Trend Micro Healthcare Compliance Solutions
How Trend Micro s innovative security solutions help healthcare organizations address risk and compliance challenges WHITE Worry-Free Business Security Fast, effective, and simple protection against viruses
Measuring The Value of Information Security. Maninder Bharadwaj [email protected] 23 th July 2011
Measuring The Value of Information Security Maninder Bharadwaj [email protected] 23 th July 2011 Current Challenges Organisations are facing In many service organizations, clients realize that
Risk & Innovation in Cybersecurity Investments. Sponsored by Lockheed Martin
Risk & Innovation in Cybersecurity Investments Sponsored by Lockheed Martin Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report Part 1. Introduction
NEC Managed Security Services
NEC Managed Security Services www.necam.com/managedsecurity How do you know your company is protected? Are you keeping up with emerging threats? Are security incident investigations holding you back? Is
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
Enhancing Outsourcing Relationship Management Capabilities: Driving Greater Value from AllianceBernstein s Global Operations
Enhancing Outsourcing Relationship Management Capabilities: Driving Greater Value from AllianceBernstein s Global Operations A Vantage Partners Case Study 2011 Vantage Partners, LLC. All rights reserved.
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma Governance, Risk, Compliance (GRC) Automation Siamak Razmazma [email protected] September 2009 Agenda Introduction to
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
B U Y E R C A S E S T U D Y U. S. B a n k i n g I n s t i t u t i o n I m p l e m e n t s V a r o n i s t o G a i n C o n t r o l o f U n s t r u c t u r e d F i l e S e r v e r D a t a Laura DuBois I
Discover what the power of one service provider can do for your bank.
N C R T O TA L AT M S E RV I C E S Discover what the power of one service provider can do for your bank. NCR TOTAL ATM SERVICES As the most touched point of interaction with customers, your ATM network
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
ANALYTICS. Acxiom Marketing Maturity Model CheckPoint. Are you where you want to be? Or do you need to advance your analytics capabilities?
ANALYTICS Analytics defined Analytics is the process of studying data to identify potential trends, evaluate decisions, or assess the performance of a tool, event, or scenario. The process should include
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
ITIL V3 Foundation Certification - Sample Exam 1
ITIL V3 Foundation Certification - Sample Exam 1 The new version of ITIL (Information Technology Infrastructure Library) was launched in June 2007. ITIL V3 primarily describes the Service Lifecycle of
Blending Corporate Governance with. Information Security
Blending Corporate Governance with Information Security WHAT IS CORPORATE GOVERNANCE? Governance has proved an issue since people began to organise themselves for a common purpose. How to ensure the power
RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT
Document K23 RESEARCH NOTE CYBER-ARK FOR PRIVILEGED ACCOUNT MANAGEMENT THE BOTTOM LINE Managing privileged accounts requires balancing accessibility and control while ensuring audit capabilities. Cyber-Ark
Symantec Control Compliance Suite Standards Manager
Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance
Managed Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
Establish Collaborative Strategies to Better Manage a Global Vendor Network Devise a Proper Float Plan
Establish Collaborative Strategies to Better Manage a Global Vendor Network Devise a Proper Float Plan CBI s Biopharmaceutical Forum on Clinical and Commercial Global Supply Chain Excellence Sandy Onorato
Symantec DLP Overview. Jonathan Jesse ITS Partners
Symantec DLP Overview Jonathan Jesse ITS Partners Today s Agenda What are the challenges? What is Data Loss Prevention (DLP)? How does DLP address key challenges? Why Symantec DLP and how does it work?
10 Best-Selling Modules For Home Information Technology Professionals
Integriertes Risk und Compliance Management als Elemente einer umfassenden IT-Governance Strategie Ing. Martin Pscheidl, MBA, MSc cert. IT Service Manager Manager, Technical Sales CA Software Österreich
Tying It All Together: Practical ERM Integration. Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation
Tying It All Together: Practical ERM Integration Richard Scanlon Vice President Enterprise Risk Management CIGNA Corporation November 16, 2007 1 Agenda Basis for ERM Integration ERM Objectives ERM Focus
Security Operations Metrics Definitions for Management and Operations Teams
Whitepaper Security Operations Metrics Definitions for Management and Operations Teams Measuring Performance across Business Imperatives, Operational Goals, Analytical Processes and SIEM Technologies Research
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015
Office of the Auditor General AUDIT OF IT GOVERNANCE Tabled at Audit Committee March 12, 2015 This page has intentionally been left blank Table of Contents Executive Summary... 1 Introduction... 1 Background...
White paper. Creating an Effective Security Operations Function
White paper Creating an Effective Security Operations Function Awareness of security issues is fundamental to an effective policy. When we think of a security operations center (SOC), we often have an
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Planning for and implementing security logging
Life flows better with Visa Visa Europe Planning for and implementing security logging Introduction Most data security breaches have something in common; they are not overly technical, and in most cases
Intelligence Driven Security
Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings
CloudCheck Compliance Certification Program
CloudCheck Compliance Certification Program Ensure Your Cloud Computing Environment is Secure with CloudCheck Certification Organizations today are increasingly relying on a combination of private and/or
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. Session Objectives. Introduction Tom Walsh
Effectively Completing and Documenting a Risk Analysis Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS Session Objectives Identify the difference between risk analysis and risk assessment
