Security Metrics: Can They Be Effectively Measured Across The Enterprise?



Similar documents
Client Security Risk Assessment Questionnaire

Security Operations Metrics Definitions for Management and Operations Teams

Defending Against Data Beaches: Internal Controls for Cybersecurity

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Achieving SOX Compliance with Masergy Security Professional Services

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Uncover security risks on your enterprise network

End-user Security Analytics Strengthens Protection with ArcSight

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

University of Pittsburgh Security Assessment Questionnaire (v1.5)

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

System Security Policy Management: Advanced Audit Tasks

Applied Security Metrics

Cybersecurity Health Check At A Glance

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Developing National Frameworks & Engaging the Private Sector

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Data Security and Healthcare

Ecom Infotech. Page 1 of 6

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

Achieving Compliance with the PCI Data Security Standard

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Agenda. Agenda. Security Testing: The Easiest Part of PCI Certification. Core Security Technologies September 6, 2007

PCI Compliance. Top 10 Questions & Answers

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Computer and Network Security Policy

Cloud Security and Managing Use Risks

Automate PCI Compliance Monitoring, Investigation & Reporting

PATCH MANAGEMENT POLICY IT-P-016

The Business Case for Security Information Management

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Global Partner Management Notice

GFI White Paper PCI-DSS compliance and GFI Software products

Cybersecurity: What CFO s Need to Know

PCI Compliance Top 10 Questions and Answers

Security Metrics to Manage Change: Which Matter, Which Can Be Measured?

MAXIMUM PROTECTION, MINIMUM DOWNTIME

White Paper. PCI Guidance: Microsoft Windows Logging

How To Protect Your Data From Being Stolen

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Fortinet Solutions for Compliance Requirements

DBC 999 Incident Reporting Procedure

The Value of Vulnerability Management*

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Automation Suite for. 201 CMR Compliance

74% 96 Action Items. Compliance

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Department of Management Services. Request for Information

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Overcoming PCI Compliance Challenges

The Cyber Security Leap: From Laggard to Leader. April 2015

PREPARING FOR THE NEW PCI DATA SECURITY STANDARDS

Modular Network Security. Tyler Carter, McAfee Network Security

How do I share a file with a friend or trusted associate?

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Are All High-Risk Transactions Created Equal?

Ed McMurray, CISA, CISSP, CTGA CoNetrix

SECURITY. Risk & Compliance Services

Defining, building, and making use cases work

Compliance Guide: PCI DSS

Introduction. PCI DSS Overview

This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

Italy. EY s Global Information Security Survey 2013

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Project Title slide Project: PCI. Are You At Risk?

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

2011 Forrester Research, Inc. Reproduction Prohibited

Data Stored on a Windows Server Connected to a Network

Remote Access Procedure. e-governance

PCI Requirements Coverage Summary Table

Nine Steps to Smart Security for Small Businesses

Extreme Networks Security Analytics G2 Vulnerability Manager

Best Practices for PCI DSS V3.0 Network Security Compliance

The Education Fellowship Finance Centralisation IT Security Strategy

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

IT Security Strategy and Priorities. Stefan Lager CTO Services

How To Secure Your Store Data With Fortinet

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Do You Know What You Don t Know?

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

LogRhythm and PCI Compliance

Through the Security Looking Glass. Presented by Steve Meek, CISSP

Policy Title: HIPAA Security Awareness and Training

PCI Compliance for Healthcare

Central Agency for Information Technology

SECURITY IN THE CLOUD

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

How To Handle A Threat From A Corporate Computer System

PCI Requirements Coverage Summary Table

Intelligent Vulnerability Management The Art of Prioritizing Remediation. Phone Conference

Transcription:

Security Metrics: Can They Be Effectively Measured Across The Enterprise? SESSION ID: CISO-W01 Moderator: Panelists: Alan Shimel Managing Partner, The CISO Group CEO, DevOps.com Jody Brazil President, CTO Firemon Ivana Cojbasic VP Security FIS Andrew McCullough ESS Expert Hewlett Packard Enterprise Security Services

Lies, Damn Lies and Metrics We can measure just about anything that we seek to. We can use resulting metrics to show us many different things. Just because we can measure something doesn t mean we should! So, which metrics are truly meaningful and to whom should we show them? 2

3 What Metrics to Measure

Meaningful Security Metrics? The Value of Good Metrics Convey a Clear Picture (Point-in-Time or Historically) Signify Valuable & Actionable Information Provide Support for Business Objective(s)

The Usual Suspects The Hard Questions How can Security Effectively Communicate to the Company and Executive Stakeholders? Where does Security have a Real relation and potential to Impact the Business Objectives? Are we aligning the Information Security Program Objectives to the Business Needs? The Easy Answers. Demonstrate Effective Management of Prioritized Risks Provide a picture of how Business Critical Assets are Impacted Provide Accountability for Decisions and help to Justify Security Spend

Metrics that Matter 6

What Metrics Matter to Others

C-Levels and Board Members Current State of Security Current Risk Posture and Changes Over Time (Previous 4 Quarters at Minimum) Security Initiative Performance Regulatory Compliance Reports/Updates (PCI DSS, SSAE16, FFIEC, HIPPA, FISMA) Benchmark Reports Budget Performance

Management Metrics Trend Analysis Data (Periodic), Security Posture Trends Vulnerability Management/Patch Reporting, Vulnerabilities By Severity Levels (High, Medium, Low, Informational), Emerging Network Threats Incident Response Times, Associates/Contractors That Have Completed Information Security Policy Training, Asset Criticality & Sensitivity, Total $ Invested in Security Initiatives and Current Status, Audit Compliance and Findings Total % of Systems Patched, % Compliance with Security Policies (Patch/Password/Vulnerability), % of Risk Accepted Threats

Engineers/Support Teams Detail info on Threats, Top/Emerging Exploits, Top Present Top 4 Devices by Log Activity, Vulnerability External Vulnerabilities, Top Source Attackers (Egress -> Ingress), Top (Highs/Mediums/Lows), Vulnerability Internal (Highs/Mediums/Lows), Destinations Attacked (Egress -> Ingress), Top Source Attackers # Potential Malware Infected Clients (IPs), # Requests to Malware sites, (Ingress -> Egress), Top Destinations Attacked (Ingress -> Egress) # Blocked Requests to Known Malware Sites, % Servers Patched to Potential Virus Outbreaks, # Accounts Created (Unix and Windows), Current Patch Level, % Servers Patched w/all Service Packs, AntiVirus Accounts Deleted (Unix and Windows), # Successful / Failed Workstation, AntiVirus Server, Availability Security Hardware/Services Logins, # Incidents Investigated, # Failed Use of Privilege, # Files # Accounts Inactive ( >= 90 <120), # Accounts w/passwords That Can't Accessed on Servers, # Security Event Logs, # Severe Security Be Changed, # Accounts Inactive ( > 120), # Accounts w/non-expiring Events, % Time Devices Were Actively Logging by Day, Type and Passwords, # Locked Out Accounts, # Disable Accounts, # Rogue Aps, Severity of Security Incidents, Analyzed vs. Validated Incidents, SPAM Email 10

What Matters to Jody as President and a Security Person 11

What s wrong with security metrics? There is No Industry Agreement on What to Measure Where is the MBA of Security? We Measure the Wrong Things We tend to Measure Our Successes. Drop logs, IPS Block Events, Failed Logins We Measure What We Can t Control Threats Vulnerabilities

New Ponemon Metrics Survey Initial Results Over half of all organizations surveyed only report to senior management on security risk when there is serious issue, or never at all! > 50% feel that current metrics provide limited value for: Security change IT risk Threat prevention Effectiveness of people/process/tech 69% feel current metrics do not align with business objectives

Measure Security Posture Don t just measure what s happening or has happened. Measure current security posture of what you can control. 14

Measure Your Failures Measure incidents. By Severity, Policy and Category. Trend your incidents. 15

16 What You Should Take Away

As Soon As You Get Back (0-3 Months) Like Ivana did, decide which things you want to measure and report and to which audience (just because you can, doesn t mean you should) Meet with various constituents and understand what intelligence is most important to them Assess what your current capabilities to measure are What tools, services and solutions are you lacking to measure what you need?

Where You Should Be In 6-12 Months Practical security metrics program in place Delivering whatever intelligence you can now Budgeting and implementation approved for solutions Quarterly feedback from various teams on metrics Meaningful enough for them? What else they need? What they don t need. 18

19 Questions?

Metrics Can Be Your Best Friend Contact: ashimmy@devops.com