Cybersecurity: You re Doing IT Wrong
|
|
|
- Howard Hood
- 10 years ago
- Views:
Transcription
1 SESSION ID: CXO-F01 Cybersecurity: You re Doing IT Wrong Jared Carstensen Chief Information Security Officer (CISO), CRH
2 Introduction My Journey Every kid has dream jobs growing up Baby Firefighter Policeman Leader / Politician CISO 2
3 Perceptions vs. Reality Before & After Before Breach 3 During & Post Breach
4 Why Are We Doing IT Wrong?
5 Keeping it Simple! All of it everything, make it secure! Applications apps and more apps Awareness constant challenge Audit multiple synergies & often forgotten 5
6 Keeping it Simple! Business vs. security purpose and function Burning bridges & long term strategy working with people Bring Your Own Device (BYOD) & Bring Your Own Cloud (BYOC) = bring your own problems & increase risks 6
7 Keeping it Simple! Context all about risk! Communication we stink at it! Consumerization who are the biggest challenges / risks? Cloud Computing what is going on? Compliance we don t engage enough! 7
8 Keeping it Simple! Data we apply security wrong! boxes vs. assets Disruptive we tend to approach things in the wrong way Dissecting what is needed vs. what matters? Develop cybersecurity aware culture & workforce 8
9 Keeping it Simple! Endorsement why we do what we do? Engagement who should we be working with? Efficiency duplication everywhere! Environmental / situational awareness knowing the business Evolving from no to let s work together 9
10 Keeping it Simple! Finding the champions who supports our objectives? Failure to manage expectations security cannot prevent all attacks and breaches! Fetching quick wins not everything needs a major project! Fashion industry rate of change & trends! 10
11 Applying Effective Security - A to Z
12 Getting it Right Applying in Reality! Awareness is often the best return on investment Business enablement and engagement will define your success Culture can make or break security efforts find out what has worked vs. has not Do not try do it all! Prioritize, plan & deliver Engage with sponsors & be the solution not the no or barrier! Focus on what really matters people will forget non-essentials Give options & practical solutions Help others achieve their goals & objectives Inform, interact and involve others in the decision process Justify your role and the need for security Know your strengths & weaknesses play to strengths, build around weaknesses 12
13 Getting it Right Applying in Reality! (cont) Learn from other mistakes & real world events Manage expectations you cannot stop every attack New technologies do not necessarily fix age old problems Outline key objectives, challenges and requirements to stakeholders Provide metrics if it cannot be measured, it cannot be managed Question yourself and how things are currently being done (understand, not challenge) Response capabilities may well save your company and your career response never goes out of style So what? Ask yourself what will happen if we do, and what will happen if we don t Technology is one component, people and processes will always be the front and center for security Validate ideas and approaches internally prior to executing 13
14 Getting it Right Applying in Reality! (cont 2) What is the worst thing you could say to your stakeholders at 3AM? This will help understand what matters most to them and what you will need to focus on XaaS can you deliver the same value to the business using different models or approaches? Yesterday s threats and attacks are still the big headache Zero in on the things that matter most to your business stakeholders Reality Check: Our mission and objective should be to enable more secure and resilient services, while protecting our organization s brand, it s customers and employees. We will never stop all attacks, but our success should be determined by our ability to respond and stop the bleeding, while continuing to deliver services to customers and users. 14
15 Sanity Check
16 In Summary & Final Thoughts! Car Accidents vs. Security Breaches Rules of road to protect drivers and pedestrians Regulations and standards to protect businesses and consumers Speed limits depending on the type of road Regulations depending on the type of industry and sector Wide choice of cars available depending on your needs Wide choice of solutions and providers depending on your requirements By not adhering to rules and laws of the road, you put your own and others lives at risk By not adhering to security rules, standards, frameworks and best practice, thousands of incidents are happening every days putting your organization and its customers at risk Despite all road safety guidelines, laws and awareness there are countless road accidents and fatalities every day Despite all the standards, guidance, frameworks, regulations and more solutions and services than ever before; countless incidents, breaches and non-compliance continue Is your organization driving recklessly, or are they simply asleep at the wheel? 16
17 Thank You! If you talk to a man in a language he understands, that goes to his head. If you talk to him in his language, that goes to his heart. ~ Nelson Mandela Jared Carstensen Chief Information Security Officer, CRH / LinkedIn / etc. 17
Candidate Tips and Tricks
Candidate Tips and Tricks Energize your IT Security career www.infosecpeople.co.uk Our business is based on building long-term relationships with people like you. That s why we want you to have the very
Don t Get Left in the Dust: How to Evolve from CISO to CIRO
SESSION ID: CXO-W04 Don t Get Left in the Dust: How to Evolve from CISO to CIRO JC-JC James Christiansen VP Information Risk Management Accuvant [email protected] Bradley J. Schaufenbuel, CISSP
Why You Need to Test All Your Cloud, Mobile and Web Applications
Why You Need to Test All Your Cloud, Introduction In a recent survey of security executives, more than 70 percent of respondents acknowledged that they are performing vulnerability tests on fewer than
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
Digital Strategy. How to create a successful business strategy for the digital world.
Digital Strategy How to create a successful business strategy for the digital world. Digital Strategy Overview Every business today needs a digital strategy. Products and services need to be digitally
Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015
Breaking Down the Silos: A 21st Century Approach to Information Governance May 2015 Introduction With the spotlight on data breaches and privacy, organizations are increasing their focus on information
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
Assessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices
ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices The Landscape of IT Services Provision is Changing! Customers and users are demanding a higher level of customer service
SITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Securing your Mobile Workforce with Okta and Espion
Securing your Mobile Workforce with Okta and Espion Executive Summary Distributed workforces and mobile devices are disrupting business as usual. End-users are frequently accessing applications and data
Business Continuity Planning in IT
Introduction: Business Continuity Planning in IT The more your business relies on its IT systems, the more you need to consider how unexpected disruptions might affect your business. These disruptions
Applied Security Metrics
Applied Security Metrics Planning, design and implementation of security metrics Doug Streit, ODU Dan Han, VCU Designing a Security Metrics Framework Doug Streit, ODU Metrics Program Getting Started 1.
Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent
SESSION ID: PNG-R04 States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent MODERATOR: Christopher Ipsen CIO Nevada Desert Research Institute PANELISTS: Tim Hastings Chief Information
Connected Intelligence and the 21 st Century Digital Enterprise
Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015 By 2025 we will become a deeply connected, digital world Digital everything everywhere,
Shadow IT: data protection and cloud security
Shadow IT: data protection and cloud security George Crump November 17, 2014 This report is underwritten by CipherCloud. TABLE OF CONTENTS Executive summary... 3 Views on shadow IT and data security from
Cyber resilience and IT service management (ITSM) working together to secure the information your business relies on. Stuart Rance. AXELOS.
Cyber resilience and IT service management (ITSM) working together to secure the information your business relies on Stuart Rance AXELOS.com White Paper June 2015 Contents Introduction 3 What s it all
THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust
THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX How to create a thriving business through email trust FORWARD Today the role of the CISO is evolving rapidly. Gone are the days of the CISO as primarily
Risks and uncertainties
Risks and uncertainties Our risk management approach We have a well-established risk management methodology which we use throughout the business to allow us to identify and manage the principal risks that
Managing the Unpredictable Human Element of Cybersecurity
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
Process Intelligence: An Exciting New Frontier for Business Intelligence
February/2014 Process Intelligence: An Exciting New Frontier for Business Intelligence Claudia Imhoff, Ph.D. Sponsored by Altosoft, A Kofax Company Table of Contents Introduction... 1 Use Cases... 2 Business
Break the network innovation gridlock
Break the network innovation gridlock HP Network Transformation Consulting Services Build next-generation networking You ve seen the demand for applications and services grow instantly. Your network is
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
The Pitfalls of DIY Approaches to Disaster Recovery
Business Continuity & Resiliency Services The Pitfalls of DIY Approaches to Disaster Recovery Interactivity Tips 1. Ask A Question 2. Download a PDF copy of today s presentation 3. Social Networking Tools
OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.
OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)
Strategic Plan FY 2015 - FY 2019. July 10, 2014
Strategic Plan FY 2015 - FY 2019 July 10, 2014 Michigan Department of Technology, Management and Budget A great strategy meeting is a meeting of minds. Max McKeown Page 2 Strategic Plan FY 2015-2019 A
Click to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
Is your business secure in a hosted world?
Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer
Managing Mobility in the BYOD Era:
Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services [email protected] BYOD is Accelerating 350 million employee-owned devices in
10 Hidden IT Risks That Might Threaten Your Business
(Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
How to Justify Your Security Assessment Budget
2BWhite Paper How to Justify Your Security Assessment Budget Building a Business Case For Penetration Testing WHITE PAPER Introduction Penetration testing has been established as a standard security practice
The economics of IT risk and reputation
Global Technology Services Research Report Risk Management The economics of IT risk and reputation What business continuity and IT security really mean to your organization Findings from the IBM Global
The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T
The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next:
11 Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next: 1. Why the Conversation has shifted. 2. How Boards are reacting. 3. What
HIPAA Reality Check: The Gap Between Execs and IT March 1, 2016
HIPAA Reality Check: The Gap Between Execs and IT March 1, 2016 Brand Barney, Security Assessor Conflict of Interest Has no real or apparent conflicts of interest to report. Agenda Healthcare status HIPAA
Building an effective stay back team to gain maximum value from an outsourcing agreement
WHITE PAPER Building an effective stay back team to gain maximum value from an outsourcing agreement How to define its role, determine its size and assess the skills required 1 cgi.com 2015 CGI GROUP INC.
KEY SUCCESS FACTORS IMPLEMENTING A CUSTOMER EXPERIENCE STRATEGY. Sara Sillén
KEY SUCCESS FACTORS IMPLEMENTING A CUSTOMER EXPERIENCE STRATEGY Sara Sillén In the age of the customer, you need your customers more than they need you. 2 What is Customer Experience? Your customers' perception
Data Security: Fight Insider Threats & Protect Your Sensitive Data
Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Level 2 Award in Safe Driving at Work
Level 2 Award in Safe Driving at Work Student notes (sample) www.britsafe.org Membership Training Qualifications Audit and Consultancy Audit and Policy Consultancy and Opinion Policy Awards and Opinion
Customer Experience Audit
SOLUTION OVERVIEW Customer Experience Audit Understanding customer experience is vital Developed in partnership with Customer Experience Foundation The Customer Experience Audit provides a fast, independent
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
Feature. Developing an Information Security and Risk Management Strategy
Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide
How To Manage Risk On A Scada System
Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document
Boost BCM Program Maturity: Arm Your Team with the Right Tools. Jason Zimmerman Vice President Operations
Boost BCM Program Maturity: Arm Your Team with the Right Tools Jason Zimmerman Vice President Operations Gartner Rates Incident Management Systems Benefit High In their 2014 Hype Cycle Report, Gartner
10 Hidden IT Risks That Threaten Your Practice
(Plus 1 Fast Way to Find Them) Your practice depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
Is it Time to Trust the Cloud? Unpacking the Notorious Nine
Is it Time to Trust the Cloud? Unpacking the Notorious Nine Jonathan C. Trull, CISO, Qualys Cloud Security Alliance Agenda Cloud Security Model Background on the Notorious Nine Unpacking the Notorious
DATA BREACH RISK INTELLIGENCE FOR HIGHER ED. Financial prioritization of data breach risk in the language of the C-suite
DATA BREACH RISK INTELLIGENCE FOR HIGHER ED Financial prioritization of data breach risk in the language of the C-suite WHY? Slow, disruptive to students & staff Almost 1 million records were False positives,
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
