Think like an MBA not a CISSP



Similar documents
BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

The Value of Vulnerability Management*

Digi Device Cloud: Security You Can Trust

Scalability in Log Management

HOW SECURE IS YOUR PAYMENT CARD DATA?

IT Security & Compliance. On Time. On Budget. On Demand.

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Enterprise Security Solutions

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

Achieving Compliance with the PCI Data Security Standard

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

The Evolution of Application Monitoring

Critical Controls for Cyber Security.

Information Security and Risk Management

CYBER SECURITY SERVICES PWNED

ISE Northeast Executive Forum and Awards

Symantec Consulting Services

Uncover security risks on your enterprise network

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

Defending the Database Techniques and best practices

Auditing Data Access Without Bringing Your Database To Its Knees

How To Protect Yourself From A Hacker Attack

Vulnerability Management Policy

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

<Insert Picture Here> How to protect sensitive data, challenges & risks

SECURITY. Risk & Compliance Services

John Essner, CISO Office of Information Technology State of New Jersey

PCI Compliance for Cloud Applications

Dr. Anton Security Warrior Consulting

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Two Approaches to PCI-DSS Compliance

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach

Security Controls What Works. Southside Virginia Community College: Security Awareness

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Three Critical Success Factors for PCI Assessment. Seth Peter NetSPI April 21, 2010

Network Security Administrator

Secure360. Measuring the Maturity of your Information Security Program Impossible? Presented by: Mark Carney, VP of Strategic Services

Report Book: Retina Network Security Scanner Unlimited

I n f o r m a t i o n S e c u r i t y

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

How To Protect Your Cloud From Attack

IBM QRadar Security Intelligence April 2013

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

How To Secure Your Store Data With Fortinet

Securing your Corporate Infrastructure What is really needed to keep your assets protected

Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN, GCFA. Tristan Lawson CISSP, C EH, E CSA, GISP, GSEC, MCSA, A+, Net+, Server+, Security+

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Client Security Risk Assessment Questionnaire

Cyber Education triangle clarifying the fog of cyber security through targeted training

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

SANS Top 20 Critical Controls for Effective Cyber Defense

Security for a Smarter Planet IBM Corporation All Rights Reserved.

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

PCI DATA SECURITY STANDARD OVERVIEW

Top Ten Technology Risks Facing Colleges and Universities

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Chapter 1 The Principles of Auditing 1

Secure Cloud Computing

SOC & HIPAA Compliance

Security aspects of e-tailing. Chapter 7

Network Segmentation

National Railroad Passenger Corp. (AMTRAK) Session 1 Threats and Constraints. Continuous. - Continuous Monitoring. - Continuous Assessment

SECURITY 2.0 LUNCHEON

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

QRadar SIEM 6.3 Datasheet

SecureVue Product Brochure

Next. CDS 2015 Survey Module 7 Information Security Survey Errata

Next. CDS 2015 Survey Module 7 Information Security Survey Errata

CONTENTS. PCI DSS Compliance Guide

March

Governance Simplified

Defending Against Data Beaches: Internal Controls for Cybersecurity

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

Payment Card Industry Data Security Standard

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Professional Services Overview

Transcription:

Think like an MBA not a CISSP Embracing University Culture to Achieve Security Initiatives' Matt Malone Security Services Director 512-650-0179 Matt.Malone@SLAITconsulting.com

Goals Security is a business problem not a IT support issue. Utilize business tools Provide metrics / track progress Provide analysis not argument Act like an MBA not a CISSP

Pop Quiz: When asked Who is in charge of security? Who do people think of?

Security is about Communication Policy Awareness Training / Education Roles and Responsibilities Reports / Risk GAP Assessments

Speaking the Language

Speaking the same language SWOT Top Down Approach Security Process Framework Change the culture by proving your value

The Business of Security Fund security initiatives Better serve your customers Provide metrics / track progress Act like an MBA not a CISSP Provide analysis not argument

SWOT

SWOT Strengths: Weakness: Opportunities: Threats: Resources, great access to researchers, interns, information, resources, students Conferences, share information, external organizations, etc. Decentralized authority Difficult to create governance Amount of resources Government funding Professors who want to get published Highly regulated- Use the Reg as a driver Classify the most important system: pick the most important regulation and use the regulation to format across all of the schools in the university, but first classify the data Unique; backbone of the internet and everyone s target Very little of filtering of internet Volume of traffic and attacks

How does SWOT impact you? Short on resources, but big on brain power and connections Leverage and share with other universities and get government funding Lead by examples and success Pick an example department and implement your security program, do it by the book. Start with policy, assess controls, perform risk assessment and then write a case study on it.

Top down vs. Bottom Up Strategic - Executive Sponsorship (Highly Effective) Strategic Risk and Compliance Services Risk / GAP assessments Addresses deficiencies and organizational risk Demonstrate compliance Justification of spend via risk Driven by business Tactical Assessment Services Vulnerability scans Social Eng. Web App testing Testing for adherence Technical controls testing Does not calculate risk Implementation and vulnerability mgmt. Tactical / Operational Technology Solutions Security Software and Products implementing technical and some non technical controls in accordance with organizational policy Regulations Governing Industry or Organizations (PCI, HIPAA, FISMA, FERPA, ETC) Security Framework COBIT, NIST, ISO 17799, 27001, NIST 800-53, Etc. Network Perimeter Security Security Policy Standards Guidelines, Policies Procedures Strong Authentication Wireless end Network Data Encryption and Loss Prevention End Point Security SIEM and Log Mgmt. Network Infrastructure

Balanced Scorecard

Balanced Scorecard Finance: Security Spending vs. fines paid? Damage to brand Internal Process: How efficient are you? Using metrics: If I ask you to find an IP address, how long would it take to find it? How long would it take to harden a server?

Balanced Scorecard Customer: Who is the customer of you serve? Students Alumni Government How satisfied are they? FISMA FERPA Records Learning and Growth: What kind of information security knowledge does the security staff have? What is their ability to innovate new tools and methods.

Project Oriented

Conclusions CISO / ISO Roles Management vs. Technical Educational focused Utilize business tools to better serve your customers: Achieve your security goals Track your progress Report progress to management Better serve your customer Initiatives / goals

Questions? Think like an MBA not a CISSP Embracing University Culture to Achieve Security Initiatives' Matt Malone Security Services Director 512-650-0179 Matt.Malone@SLAITconsulting.com