Economics of Information Security - A Review

Size: px
Start display at page:

Download "Economics of Information Security - A Review"

Transcription

1 Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi assistant professor CrySyS Lab. BME Department of Telecommunications (Híradástechnikai Tanszék) mfelegyhazi(atat)crysys(dot)hu

2 Information security investment trends information security awareness increased companies are confident in their investment major obstacles CEO insufficient funding CISO lack of strategy, understanding and integration more security tools applied IPS/IDS, web security tools, malicious code detection incidents are detected PricewaterhouseCoopers, 2012 Global State of Information Security Survey,

3 Information security investment trends security spending increased in prevention detection web technologies biggest risks advanced persistent threat (APT) mobile devices partners are a security problem (more in Chapter 5) security spending decreased in identity management disaster recovery dedicated personnel people background check, inventory check privacy policies PricewaterhouseCoopers, 2012 Global State of Information Security Survey,

4 Risk management phases risk governance (RG) risk mgmt context define criteria - profile definition - requirements resources risk assessment (RA) risk analysis - identification - estimation risk evaluation risk monitoring and review (RM) monitoring communication awareness risk treatment (RT) prevent mitigate transfer accept 4

5 5 Budget constraints risks impact and priorities security budget calculate benefits decide which defenses to implement questions: How much to invest in security? Where to invest the best? issues knowing options and controls measure effectiveness (ROSI)

6 6 Modeling security investments What is the optimal security investment? risk-neutral firm single stage single threat Gordon, L.A. and Loeb, M.P., The economics of information security investment, ACM Transactions on Information and System Security (TISSEC), vol 5 nr 4, 2002

7 7 Modeling security investments λ, loss due to a security breach Assumption: λ is fixed λ is not critical (risk-neutrality changes) 0 < t < 1, threat probability 0 < v < 1, vulnerability of information vulnerability vs. availability abstracted L=v*t*λ, expected loss (no investment) firms control v (but not t) Gordon, L.A. and Loeb, M.P., The economics of information security investment, ACM Transactions on Information and System Security (TISSEC), vol 5 nr 4, 2002

8 8 Modeling security investments (cont d) z security investment S(z,v), sec. investment function - in reality, discrete function - marginal productivity decreases assumptions on S(z,v) A1: S(z, 0) = 0 for all z A2: S(0, v) = 0 for all v A3: For all v (0, 1), and all z, S(z,v) is a convex function of z Gordon, L.A. and Loeb, M.P., The economics of information security investment, ACM Transactions on Information and System Security (TISSEC), vol 5 nr 4, 2002

9 9 Analysis Utility function L = (v-s(z,v))tλ, expected loss (with sec. investment) U = (v-s(z,v))tλ z optimal investment, z*(v) =? two classes of security breach functions S1(z,v) = v/(αz + 1) β where α > 0, β 1 are measures of the productivity of information security (i.e., for a given (v, z), the probability of a security breach is decreasing in both α and β) S2(z,v) = v αz+1 where α > 0, is a measure of the productivity of information security Gordon, L.A. and Loeb, M.P., The economics of information security investment, ACM Transactions on Information and System Security (TISSEC), vol 5 nr 4, 2002

10 10 Results S1 Gordon, L.A. and Loeb, M.P., The economics of information security investment, ACM Transactions on Information and System Security (TISSEC), vol 5 nr 4, 2002

11 11 Results S1 invest in high-risk vulnerabilities Gordon, L.A. and Loeb, M.P., The economics of information security investment, ACM Transactions on Information and System Security (TISSEC), vol 5 nr 4, 2002

12 12 Results S2 Gordon, L.A. and Loeb, M.P., The economics of information security investment, ACM Transactions on Information and System Security (TISSEC), vol 5 nr 4, 2002

13 13 Results S2 invest in mid-range vulnerabilities Gordon, L.A. and Loeb, M.P., The economics of information security investment, ACM Transactions on Information and System Security (TISSEC), vol 5 nr 4, 2002

14 14 Results summary Main result: For S1 and S2, the optimal security investment is less than 37% of the expected loss z*(v) < (1/e) vl forget vulnerabilities key is to expected benefit depends on the productivity of security investments Critiques? comments? Gordon, L.A. and Loeb, M.P., The economics of information security investment, ACM Transactions on Information and System Security (TISSEC), vol 5 nr 4, 2002

15 G&L extensions original model 37% maximum investment is incorrect other security investment functions logistic function and more 340 Inf Syst Front (2006) 8: Fig. 1 Six classes of security breach probability functions S(z, v) when v=1/2 Fig. 2 Expected net benefit of investment in security for the six classes when v=1/2 Hausken, K., Returns to information security investment: The effect of alternative case is z=0. information 2 For comparative purposes, the first (boxes) for classes I and II first increases toward a maximum, and security breach functions on optimal investment and sensitivity to vulnerability, and second (stars) curves show the classes I and II when thereafter decreases. Information Systems Frontiers, vol. 8 nr. 5, 2006 α=1/2, β=1. These decrease convexly in Fig. 1, and approach zero asymptotically. Figure 2 shows how ENBIS class III The maximization III ðz; vþ=@z ¼ 0 for gives 15

16 positive investment that causes ENBIS>0. Inserting +=0.02, φ=1, L=16 into v ¼ 41 ð + Þ=Lφ gives v= Solving ENBIS III (z III* (v))=0 numerically with respect to v, to determine when the two lines in Eq. 4 G&L extensions more investment is needed Fig. 4 Optimal investment z*(v) for the six classes the first curv when v>0.41 increases to decreases for since it give when z=0. T Dividing z exceeds 1/e. The decrease seen from Eq pression wher sarily decreas Proposition 2 S(z, v) is of c isfying A1, A tion of the ex satisfy z III* ðþ v Hausken, K., Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability, Information Systems Frontiers, vol. 8 nr. 5,

17 Timing investments security investments according to the value (previous model) uncertainty estimating probabilities is hard defer investments until breach happens wait-and-see approach analogous to real options in business investment decisions empirical study some claim: easiest way to get top management s approval not need to be real, pentesting/audits are sufficient correlation between breach severity and approved budget Gordon, L.A. and Loeb, M.P. and Lucyshyn, W., Information Security Expenditures and Real Options: A Wait-and-See Approach, Computer Security Journal, vol. 19 nr. 2,

18 Timing investments Gordon, L.A. and Loeb, M.P. and Lucyshyn, W., Information Security Expenditures and Real Options: A Wait-and-See Approach, Computer Security Journal, vol. 19 nr. 2,

19 Iterated security investments security is a dynamic process formal model of security investment timing How much to spend? Where to invest and when? Böhme, R. and Moore, T., The iterated weakest link, IEEE Security and Privacy vol 8 nr 1,

20 Security investment with uncertainty perfect info true cost of attacks uncertainty true cost of attacks Böhme, R. and Moore, T., The iterated weakest link, IEEE Security and Privacy vol 8 nr 1,

21 Iterated Weakest Link (IWL) model true cost of attack expected cost of attack Böhme, R. and Moore, T., The iterated weakest link, IEEE Security and Privacy vol 8 nr 1,

22 Iterated Weakest Link (IWL) model proactive defense (k 1 ) Böhme, R. and Moore, T., The iterated weakest link, IEEE Security and Privacy vol 8 nr 1,

23 Iterated Weakest Link (IWL) model proactive defense (k 1 ) reactive defense Böhme, R. and Moore, T., The iterated weakest link, IEEE Security and Privacy vol 8 nr 1,

24 Iterated Weakest Link (IWL) model defense variable: - proactive defense proactive defense (k 1 ) reactive defense Böhme, R. and Moore, T., The iterated weakest link, IEEE Security and Privacy vol 8 nr 1,

25 IWL Total profit a asset r return if no attack [0,1] z loss due to attack [0,1] σ attack cost uncertainty 1 unit defense cost proactive defense (k 1 ) reactive defense t benefit a(r-z) a(r-z) a(r-z) ar ar ar cost Böhme, R. and Moore, T., The iterated weakest link, IEEE Security and Privacy vol 8 nr 1,

26 Reactive defense summary attack intensity security spending ROSI reactive defense compared to proactive Böhme, R. and Moore, T., The iterated weakest link, IEEE Security and Privacy vol 8 nr 1,

27 Pentesting model true cost of attack expected cost of attack Böhme, R. and Felegyhazi, M., Optimal information security investment with penetration testing, GameSec

28 Pentesting model proactive defense (k 1 ) Böhme, R. and Felegyhazi, M., Optimal information security investment with penetration testing, GameSec

29 Pentesting model proactive defense (k 1 ) reactive defense Böhme, R. and Felegyhazi, M., Optimal information security investment with penetration testing, GameSec

30 Pentesting model defense variables: - proactive defense - penetration testing proactive defense (k 1 ) reactive defense Böhme, R. and Felegyhazi, M., Optimal information security investment with penetration testing, GameSec

31 yes no nature Extensive form solution 1. commission pentest? 2. test successful? 3. attacked? 4. defend? T 2 T 1 T 2 T 1 1. pente Extended Decision... Tree T 2 T 1 T 2 T 1 T 2 T 1 T 2 T 1 T 2 T 1 Model penetration testing as cost of information gathering. T. 2 T 1 Security Metrics and Security Investment Models 2. succe attack 4. defen 1. p 2. s Böhme, R. and Felegyhazi, M., Optimal information... security investment with penetration testing, GameSec

32 Pentesting model a asset r return if no attack [0,1] z loss due to attack [0,1] σ attack cost uncertainty 1 unit defense cost c cost of pentesting proactive defense (k 1 ) reactive defense t benefit a(r-z) ar ar ar ar ar cost 4+c 6+c Böhme, R. and Felegyhazi, M., Optimal information security investment with penetration testing, GameSec 2010

33 Pentesting helps - costs k k k a z a z a z K K p =1 K p = 1 /2 k k k 0 t 0 c t 0 c t Fig. 3. Comparison of costs in scenario without (left) and with pentesting (p = 1, center) for infinitesimally manyböhme, rounds; R. and costs Felegyhazi, are proportional M., Optimal toinformation areas; thesecurity success probability p defines the slopeinvestment of the gradient with penetration towardstesting, reaching GameSec the secure 2010 level K (center versus right); note that K is amark random Felegyhazi, CrySyS variable Lab, unknown to the decision maker 33

34 Pentesting helps total profit Solution with Penetration Testing optimal k 1 with pentest profit optimal k 1 without pentest m 1 initial defense k 1 Security Metrics and Security Investment Mark Models Felegyhazi, CrySyS Lab, 34

35 Return on pentesting (ROPT) ROPT = loss (security + no pentesting) loss (security + pentesting) avg. security investment ROPT [%-pts. of security investment] uncertainty σ c =0.5 c =5 c =10 Fig. 5. Profile of return on penetration testing (ROPT) as uncertainty increases for varying cost of pentesting (c =0.5 is half Mark of Felegyhazi, the cost per CrySyS protection Lab, measure and round) 35

36 Pentesting summary reactive defense compared to proactive penetration testing compared to reactive w/o pentesting attack intensity security spending ROSI ROPT Böhme, R. and Felegyhazi, M., Optimal information security investment with penetration testing, GameSec

37 Reading for next time R Bohme, G Schwartz, Modeling cyber-insurance: Towards a unifying framework, WEIS 2010 optional: Gordon and Loeb, A framework for using insurance for cyber-risk management, Communications of the ACM 2003 R Bohme, G Kataria, Models and measures for correlation in cyber-insurance, WEIS 2005 Ogut, H. and Menon, N. and Raghunathan, S., Cyber insurance and IT security investment: Impact of interdependent risk, WEIS 2005 Intermediaries and regulation 37

INVESTING IN CYBERSECURITY:

INVESTING IN CYBERSECURITY: INVESTING IN CYBERSECURITY: Insights from the Gordon-Loeb Model Lawrence A. Gordon EY Alumni Professor of Managerial Accounting & Information Assurance Affiliate Professor in University of Maryland Institute

More information

Optimal Information Security Investment with Penetration Testing

Optimal Information Security Investment with Penetration Testing Optimal Information Security Investment with Penetration Testing Rainer Böhme and Márk Félegyházi International Computer Science Institute, Berkeley, California {rainer.boehme mark}@icsi.berkeley.edu Abstract.

More information

Reducing the Challenges to Making Cybersecurity Investments in the Private Sector

Reducing the Challenges to Making Cybersecurity Investments in the Private Sector Cyber Security Division 2012 Principal Investigators Meeting TTA: Cyber Economics PI - Dr. Lawrence A. Gordon* (lgordon@rhsmith.umd.edu), (301) 405-4072 Co-PI Dr. Martin P. Loeb* (mloeb@rhsmith.umd.edu),

More information

BME Department of Telecommunications (Híradástechnikai Tanszék) Mark Felegyhazi, CrySyS Lab,

BME Department of Telecommunications (Híradástechnikai Tanszék) Mark Felegyhazi, CrySyS Lab, Security is risk management IT risk management IT risk management Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi assistant professor CrySyS Lab. risk: Merriam-Webster (1): possibility

More information

ECONOMIC ASPECTS OF CYBER/INFORMATION SECURITY

ECONOMIC ASPECTS OF CYBER/INFORMATION SECURITY ECONOMIC ASPECTS OF CYBER/INFORMATION SECURITY Lawrence A. Gordon Ernst & Young Alumni Professor of Managerial Accounting & Information Assurance The Robert H. Smith School of Business University of Maryland

More information

Competitive Cyber-Insurance and Internet Security

Competitive Cyber-Insurance and Internet Security Competitive Cyber-Insurance and Internet Security Nikhil Shetty Galina Schwartz Mark Felegyhazi Jean Walrand {nikhils@eecs, schwartz@eecs, mark@icsi, wlr@eecs}.berkeley.edu Abstract This paper investigates

More information

Information Security and Risk Management

Information Security and Risk Management Information Security and Risk Management by Lawrence D. Bodin Professor Emeritus of Decision and Information Technology Robert H. Smith School of Business University of Maryland College Park, MD 20742

More information

Competitive Cyber-Insurance and Internet Security

Competitive Cyber-Insurance and Internet Security Competitive Cyber-Insurance and Internet Security Nikhil Shetty Galina Schwartz Mark Felegyhazi Jean Walrand {nikhils@eecs, schwartz@eecs, mark@icsi, wlr@eecs}.berkeley.edu Abstract This paper investigates

More information

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Competitive Cyber-Insurance and Internet Security

Competitive Cyber-Insurance and Internet Security Competitive Cyber-Insurance and Internet Security Nikhil Shetty, Galina Schwartz, Mark Felegyhazi, and Jean Walrand Abstract This paper investigates how competitive cyber-insurers affect network security

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

Security Camp Conference Fine Art of Balancing Security & Privacy

Security Camp Conference Fine Art of Balancing Security & Privacy Security Camp Conference Fine Art of Balancing Security & Privacy Kim Bilderback AT&T Director GovEd Cybersecurity Services kb7459@att.com August 21, 2014 Cybersecurity - The Threats Increase AT&T DDoS

More information

Training Employees to Recognise & Avoid Advanced Threats

Training Employees to Recognise & Avoid Advanced Threats Training Employees to Recognise & Avoid Advanced Threats Joe Ferrara, President & CEO, Wombat Security Technologies Rashmi Knowles, Chief Security Architect EMEA, RSA The Security Division of EMC Session

More information

The Value Proposition for Cyber Security: Does it exist and how can we create it? Larry Clinton, ISAlliance Chief Operating Officer

The Value Proposition for Cyber Security: Does it exist and how can we create it? Larry Clinton, ISAlliance Chief Operating Officer The Value Proposition for Cyber Security: Does it exist and how can we create it? Larry Clinton, ISAlliance Chief Operating Officer Who We Are What we believe n The World has Changed n Globalization n

More information

Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION

Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION 1 Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION Background 2 Technology has become the central component of business operations Businesses have become more vulnerable to risks associated

More information

Information Security in Business: Issues and Solutions

Information Security in Business: Issues and Solutions Covenant University Town & Gown Seminar 2015 Information Security in Business: Issues and Solutions A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Financial Sector Cybersecurity: who s in charge? Aquiles A. Almansi Lead Financial Sector Specialist WBG-Finance & Markets

Financial Sector Cybersecurity: who s in charge? Aquiles A. Almansi Lead Financial Sector Specialist WBG-Finance & Markets Financial Sector Cybersecurity: who s in charge? Aquiles A. Almansi Lead Financial Sector Specialist WBG-Finance & Markets Issues in the Governance of Central Banks (BIS 2009) Financial Sector Cybersecurity:

More information

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc. Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets

More information

Increasing cybersecurity investments in private sector firms

Increasing cybersecurity investments in private sector firms Journal of Cybersecurity, 1(1), 2015, 3 17 doi: 10.1093/cybsec/tyv011 Advance Access Publication Date: 27 November 2015 Research Article Research Article Increasing cybersecurity investments in private

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

How Many Down? Toward Understanding Systematic Risk in Networks

How Many Down? Toward Understanding Systematic Risk in Networks How Many Down? Toward Understanding Systematic Risk in Networks Benjamin Johnson University of California, Berkeley Aron Laszka Budapest University of Technology and Economics Jens Grossklags The Pennsylvania

More information

Confidence Intervals for the Difference Between Two Means

Confidence Intervals for the Difference Between Two Means Chapter 47 Confidence Intervals for the Difference Between Two Means Introduction This procedure calculates the sample size necessary to achieve a specified distance from the difference in sample means

More information

ESKISP6055.01 Manage security testing

ESKISP6055.01 Manage security testing Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting

More information

Building a Global Network Reputation System: Metrics, Data Analysis, and Risk Prediction

Building a Global Network Reputation System: Metrics, Data Analysis, and Risk Prediction Building a Global Network Reputation System: Metrics, Data Analysis, and Risk Prediction Manish Karir CTO QuadMetrics Background To what extent can we quantify and assess the security posture of a network/organization?

More information

A A Survey of Interdependent Information Security Games

A A Survey of Interdependent Information Security Games A A Survey of Interdependent Information Security Games ARON LASZKA 1, MARK FELEGYHAZI 1, LEVENTE BUTTYAN 1,2 1 Laboratory of Cryptography and System Security (CrySyS Lab), Department of Networked Systems

More information

Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D.

Principle of Information Security. Asst. Prof. Kemathat Vibhatavanij Ph.D. Principle of Information Security Asst. Prof. Kemathat Vibhatavanij Ph.D. Security Challenges Evolution of technology focused on ease of use Compliance to government laws and regulations Direct impact

More information

α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =

More information

Service Availability Metrics

Service Availability Metrics 2014 Service Availability Benchmark Survey Published by Executive Summary This benchmark survey presents service availability metrics that allow IT infrastructure, business continuity, and disaster recovery

More information

Defending yesterday. Power & Utilities. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Power & Utilities. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business. S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in

More information

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

ECONOMIC ASPECTS OF CYBERSECURITY. Cybersecurity Breaches are a Key Concern to Private and Public Sector Organizations

ECONOMIC ASPECTS OF CYBERSECURITY. Cybersecurity Breaches are a Key Concern to Private and Public Sector Organizations ECONOMIC ASPECTS OF CYBERSECURITY Objecive: Provide an overview of sream of research by Gordon and Loeb on he economics of cybersecury. Marin P. Loeb Professor of Accouning & Informaion Assurance, and

More information

Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls

Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls ABSTRACT Stefan Laube Department of Information Systems University of Münster Münster Germany StefanLaube@uni-muensterde

More information

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 HP Enterprise Security 林 傳 凱 (C. K. Lin) Senior Channel PreSales, North Asia HP ArcSight, Enterprise Security 1 Rise Of The Cyber Threat Enterprises and Governments are experiencing

More information

Aegis A Novel Cyber-Insurance Model

Aegis A Novel Cyber-Insurance Model Aegis A Novel Cyber-Insurance Model Ranjan Pal Department of Computer Science University of Southern California Joint Work with Leana Golubchik and Kostas Psounis University of Southern California Presentation

More information

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire Compliance, Security and Risk Management Relationship Advice Andrew Hicks, Director Coalfire Housekeeping You may submit questions throughout the webinar using the question area in the control panel on

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

Cyber Risk to Help Shape Industry Trends in 2014

Cyber Risk to Help Shape Industry Trends in 2014 Cyber Risk to Help Shape Industry Trends in 2014 Rigzone Staff 12/18/2013 URL: http://www.rigzone.com/news/oil_gas/a/130621/cyber_risk_to_help_shape_industry_trends_i n_2014 The oil and gas industry s

More information

GENERATING VALUE WITH CONTINUOUS SECURITY TESTING

GENERATING VALUE WITH CONTINUOUS SECURITY TESTING GENERATING VALUE WITH CONTINUOUS SECURITY TESTING AND MEASUREMENT A Spire Research Report Sponsored by Core Security Technologies 2010-2011 Spire Security, LLC. All rights reserved. The Value of Continuous

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

ITAR Compliance Best Practices Guide

ITAR Compliance Best Practices Guide ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations

More information

AFM 472. Midterm Examination. Monday Oct. 24, 2011. A. Huang

AFM 472. Midterm Examination. Monday Oct. 24, 2011. A. Huang AFM 472 Midterm Examination Monday Oct. 24, 2011 A. Huang Name: Answer Key Student Number: Section (circle one): 10:00am 1:00pm 2:30pm Instructions: 1. Answer all questions in the space provided. If space

More information

Defending yesterday. Retail & Consumer. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Retail & Consumer. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. rok.bojanc@zzi.si Abstract: The paper presents a mathematical model to improve our knowledge of information security and

More information

Managed Security Monitoring Quick Guide 5/26/15. 2014 EarthLink. Trademarks are property of their respective owners. All rights reserved.

Managed Security Monitoring Quick Guide 5/26/15. 2014 EarthLink. Trademarks are property of their respective owners. All rights reserved. Managed Security Monitoring Quick Guide 5/26/15 2014 EarthLink. Trademarks are property of their respective owners. All rights reserved. 2 Managed Security Monitoring - Overview Service Positioning EarthLink

More information

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security

More information

Supply Chain Analysis Tools

Supply Chain Analysis Tools Supply Chain Analysis Tools MS&E 262 Supply Chain Management April 14, 2004 Inventory/Service Trade-off Curve Motivation High Inventory Low Poor Service Good Analytical tools help lower the curve! 1 Outline

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

Coordination in Network Security Games

Coordination in Network Security Games Coordination in Network Security Games Marc Lelarge INRIA - ENS Paris, France Email: marc.lelarge@ens.fr Abstract Malicious softwares or malwares for short have become a major security threat. While originating

More information

Voluntary Participation in Cyber-insurance Markets

Voluntary Participation in Cyber-insurance Markets Voluntary Participation in Cyber-insurance Markets Parinaz aghizadeh and Mingyan Liu Abstract The study of cyber-insurance, both as a method for transferring residual cyber-security risks, and as an incentive

More information

Incentives for Improving Cybersecurity in the Private Sector: A Cost-Benefit Perspective

Incentives for Improving Cybersecurity in the Private Sector: A Cost-Benefit Perspective Incentives for Improving Cybersecurity in the Private Sector: A Cost-Benefit Perspective Testimony for the House Committee on Homeland Security s Subcommittee on Emerging Threats, Cybersecurity, and Science

More information

Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com

Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

Microsoft Services Premier Support. Security Services Catalogue

Microsoft Services Premier Support. Security Services Catalogue Microsoft Services Premier Support Security Services Catalogue 2014 Microsoft Services Microsoft Services helps you get the most out of your Microsoft Information Technology (IT) investment with integrated

More information

State of South Carolina Policy Guidance and Training

State of South Carolina Policy Guidance and Training State of South Carolina Policy Guidance and Training Policy Workshop Small Agency Threat and Vulnerability Management Policy May 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy

More information

Adopting a Cybersecurity Framework for Governance and Risk Management

Adopting a Cybersecurity Framework for Governance and Risk Management The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance

More information

Cyber Security solutions

Cyber Security solutions Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside

More information

DTEC 6823. Kelly Lucas. Network Administrator. Morgan Stanley. Economic Evaluation of a Company s Information Security Expenditures.

DTEC 6823. Kelly Lucas. Network Administrator. Morgan Stanley. Economic Evaluation of a Company s Information Security Expenditures. Economic Evaluation of Infosec Expenditures 1 DTEC 6823 Kelly Lucas Network Administrator Morgan Stanley Economic Evaluation of a Company s Information Security Expenditures Abstract The paper will address

More information

Cyber Security Survey

Cyber Security Survey Cyber Security Survey SELF ASSESSMENTS AQUILES A. ALMANSI THE WORLD BANK Objective and Scope The objective of the World Bank Group s Vienna Center for Financial Sector Advisory Services (FinSAC) survey

More information

Security Games with Market Insurance

Security Games with Market Insurance Security Games with Market Insurance Benjamin Johnson a, Rainer Böhme b, and Jens Grossklags c a Department of Mathematics, UC Berkeley b Department of Information Systems, University of Münster c College

More information

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015 Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact February 10, 2015 Overview 1 The Legal Risks And Issues/The Role Of Legal Counsel: The Breach Coach The Slippery

More information

Voluntary Participation in Cyber-insurance Markets

Voluntary Participation in Cyber-insurance Markets 1 Voluntary Participation in Cyber-insurance Markets Parinaz aghizadeh, Mingyan Liu Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, Michigan, 4819-1 Email:

More information

Healthcare in the Crosshairs for Data Breaches. April 22, 2015. Deborah Hiser (512) 703-5718 deborah.hiser@huschblackwell.com

Healthcare in the Crosshairs for Data Breaches. April 22, 2015. Deborah Hiser (512) 703-5718 deborah.hiser@huschblackwell.com Healthcare in the Crosshairs for Data Breaches April 22, 2015 1 Presenters Deborah Hiser (512) 703-5718 deborah.hiser@huschblackwell.com Ana Cowan (512) 703-5791 ana.cowan@huschblackwell.com Debbie Juhnke,

More information

Exploring the potential for a CDC for Cyber Informal Davos Follow up Meeting

Exploring the potential for a CDC for Cyber Informal Davos Follow up Meeting Exploring the potential for a CDC for Cyber Informal Davos Follow up Meeting Key Issues on the Agenda May 2013, San Francisco What are the key barriers and how are incentives currently misaligned? Constraints

More information

Happy First Anniversary NIST Cyber Security Framework:

Happy First Anniversary NIST Cyber Security Framework: Happy First Anniversary NIST Cyber Security Framework: We ve Hardly Known Ya Chad Stowe, CISSP, CISA, MBA Problem Statement Management has not been given the correct information to understand and act upon

More information

Business Continuity Planning for Risk Reduction

Business Continuity Planning for Risk Reduction Business Continuity Planning for Risk Reduction Ion PLUMB ionplumb@yahoo.com Andreea ZAMFIR zamfir_andreea_ileana@yahoo.com Delia TUDOR tudordelia@yahoo.com Faculty of Management Academy of Economic Studies

More information

Defending yesterday. Telecommunications. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Telecommunications. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

A Detailed Strategy for Managing Corporation Cyber War Security

A Detailed Strategy for Managing Corporation Cyber War Security A Detailed Strategy for Managing Corporation Cyber War Security Walid Al-Ahmad Department of Computer Science, Gulf University for Science & Technology Kuwait alahmed.w@gust.edu.kw ABSTRACT Modern corporations

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

The Five Most Common Cyber-Attack Myths Debunked

The Five Most Common Cyber-Attack Myths Debunked cybereason The Five Most Common Cyber-Attack Myths Debunked 2016 Cybereason. All rights reserved. 1 Cyber attacks show no sign of decreasing any time soon. If anything, hackers have expanded the type of

More information

Building a Security Operations Center. Randy Marchany VA Tech IT Security Office and Lab marchany@vt.edu

Building a Security Operations Center. Randy Marchany VA Tech IT Security Office and Lab marchany@vt.edu Building a Security Operations Center Randy Marchany VA Tech IT Security Office and Lab marchany@vt.edu CyberSecurity Operations Center Security Operations Center (SOC) term is being taken over by physical

More information

Another Element for Security Improvement Approach in Web Development Application

Another Element for Security Improvement Approach in Web Development Application International Journal of Advanced Science ce and Technology Vol. 24, November,, 2010 Another Element for Security Improvement Approach in Web Development Application Rajiv Mahajan 1*, Surjit Singh 2 and

More information

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC Threat Intelligence: An Essential Component of Cyber Incident Response Jeanie M Larson, CISSP-ISSMP, CISM, CRISC What are we going to cover? Setting the Stage Why is Incident Response Critical? Cyber Threat

More information

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture

More information

Train Like You Will Fight

Train Like You Will Fight Train Like You Will Fight Reliability First Workshop 1 October 2015 Dr. Joe Adams Disclaimer 2 The content of this presentation is based on personal and professional experience of the speaker. The content

More information

Measurement Systems Correlation MSC for Suppliers

Measurement Systems Correlation MSC for Suppliers Measurement Systems Correlation MSC for Suppliers Copyright 2003-2007 Raytheon Company. All rights reserved. R6σ is a Raytheon trademark registered in the United States and Europe. Raytheon Six Sigma is

More information

State Governments at Risk: The Data Breach Reality

State Governments at Risk: The Data Breach Reality State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO

More information

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents

More information

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle

More information

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai

More information

Security Risk Management Strategy in a Mobile and Consumerised World

Security Risk Management Strategy in a Mobile and Consumerised World Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key

More information

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS An overview of how the Shared Assessments Program SIG 2014

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

TOP 10 Security Questions Introduction Breaches and other privacy and security incidents in healthcare are on the rise due to the vast size of the industry and the oneoffs of protected health information

More information

Threat Management: Incident Handling. Incident Response Plan

Threat Management: Incident Handling. Incident Response Plan In order to meet the requirements of VCCS Security Standards 13.1 Reporting Information Security Events, and 13.2 Management of Information Security Incidents, SVCC drafted an (IRP). Incident handling

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

Things To Do After You ve Been Hacked

Things To Do After You ve Been Hacked Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise

More information

Identifying Tipping Points in a Decision-Theoretic Model of Network Security

Identifying Tipping Points in a Decision-Theoretic Model of Network Security Identifying Tipping Points in a Decision-Theoretic Model of Network Security C. F. Larry Heimann, Alan Nochenson Carnegie Mellon University Information Systems Pittsburgh, PA 15213 {profh, anochenson}@cmu.edu

More information

AB 1149 Compliance: Data Security Best Practices

AB 1149 Compliance: Data Security Best Practices AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California

More information

Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance

Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance Principles of Information Security, Fourth Edition Chapter 12 Information Security Maintenance Learning Objectives Upon completion of this material, you should be able to: Discuss the need for ongoing

More information

Session 3: IT Infrastructure Security Track ThreatExchange Winning through collaboration. Tomas Sander HP Labs

Session 3: IT Infrastructure Security Track ThreatExchange Winning through collaboration. Tomas Sander HP Labs Session 3: IT Infrastructure Security Track ThreatExchange Winning through collaboration Tomas Sander HP Labs Forward Looking Statements Rolling roadmap up to three years and is subject to change without

More information

The economics of IT risk and reputation

The economics of IT risk and reputation Global Technology Services Research Report Risk Management The economics of IT risk and reputation What business continuity and IT security really mean to your organization Findings from the IBM Global

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Information Security Attack Tree Modeling for Enhancing Student Learning

Information Security Attack Tree Modeling for Enhancing Student Learning Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department

More information

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Future Threat Landscape - How will technology evolve and what does it mean for cyber security? James Hanlon CISSP, CISM Security Strategist Office of the CTO EMEA Future Threat Landscape - How will technology evolve and what does it mean for cyber security? Think > What does the future of technology

More information