Cisco Unified Security Metrics: Measuring Your Organization s Security Health



Similar documents
BYOD(evice) without BYOI(nsecurity)

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Cybersecurity in the States 2012: Priorities, Issues and Trends

Applied Security Metrics

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Vulnerability Management

How To Monitor Your Entire It Environment

Application Security Center overview

Automating the IT Operations to Business Connection

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Delivering Cost Effective IT Services

Accelerate Your Enterprise Private Cloud Initiative

Data Governance Maturity Model Guiding Questions for each Component-Dimension

Submitted to: Service Definition Document for BI / MI Data Services

Leveraging SANS and NIST to Evaluate New Security Tools

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

Data2Diamonds Turning Information into a Competitive Asset

White Paper. Software Development Best Practices: Enterprise Code Portal

Explore the Possibilities

Information Technology Risk Management

What is Security Intelligence?

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Agenda. What is Service Level Agreement (SLA)? Why using ONE tool for SLA management? What s New on the Market? Oblicore Guarantee.

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

How to Secure Your SharePoint Deployment

Determining Best Fit. for ITIL Implementations

Italy. EY s Global Information Security Survey 2013

IT AS A SERVICE BROKER

112 BSIMM Activities at a Glance

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

<Insert Picture Here> How to protect sensitive data, challenges & risks

Discussion Overview. Company Background. IAM Inertia. IAM at Chase. IAM Program Progress. IAM Tools Integration. Program Lessons Learned

IS Strategic Plan Q Board presentation 6/9/14

AirWatch Solution Overview

Appendix A-2 Generic Job Titles for respective categories

How a CMS is Delivering Sustainable Business Value Within a Leading Health Care Insurance Provider

Overcoming PCI Compliance Challenges

Portfolio Company Performance Analysis and Reporting Automation

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

BMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER

The Importance of Information Delivery in IT Operations

Master Data Management Architecture

Q1 Labs Corporate Overview

"Service Lifecycle Management strategies for CIOs"

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

QA Engagement Models. Managed / Integrated Test Center A Case Study

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose

Metrics that Matter Security Risk Analytics

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

The Future of the Advanced SOC

Accenture Cyber Security Transformation. October 2015

Iowa State University Proposal for HR-01 ISU HR Operating Model

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Better Data is Everyone s Job! Using Data Governance to Accelerate the Data Driven Organization

Symantec Control Compliance Suite. Overview

IT Transformation. Moving Beyond Service Management to a Strategic Business Role. August kpmg.com

SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture

Cisco Partner Field Guide Leading Practices for Partner Profitability

Enterprise Data Governance

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

Trends In Data Quality And Business Process Alignment

Risk Analytics for Cyber Security

Goals. Understanding security testing

The Integration of Strategic Planning and Portfolio Management

WHITE PAPER. Leveraging a LEAN model of catalogbased performance testing for quality, efficiency and cost effectiveness

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

I D C M A R K E T S P O T L I G H T. P r i va t e a n d H yb r i d C l o u d s E n a b l e New L e ve l s o f B u s i n e s s and IT Collaboration

WHAT IS LOG CORRELATION? Understanding the most powerful feature of SIEM

BI STRATEGY FRAMEWORK

Asset management guidelines

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

Service Management Foundation

G-Cloud IV Framework Service Definition Accenture Web Application Security Scanning as a Service

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives

Adopting a Continuous Integration / Continuous Delivery Model to Improve Software Delivery

Confidence in the Cloud Five Ways to Capitalize with Symantec

Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014!

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Service Automation to implement and operate your Cloud initiatives

Oracle s Cloud Computing Strategy

Simply Sophisticated. Information Security and Compliance

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Accenture Human Capital Management Solutions. Transforming people and process to achieve high performance

D6.1: Service management tools implementation and maturity baseline assessment framework

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

CIO SUMMIT l LAS VEGAS

WEB Penetration Testing

Transcription:

Cisco Unified Security Metrics: Measuring Your Organization s Security Health SESSION ID: SEC-W05 Hessel Heerebout Manager, Application Security and Governance Cisco @InfoSec_Metrics

You will take away a framework to set up a Security Metrics program for your organization 2

Topics for Today s Discussion The Cisco IT Environment and Historical Security Issues Unified Security Metrics: How We Improved Cisco s Security Posture Some Practical Examples Early Success and Lessons Learned Q+A 3

IT Environment at Cisco Service- Driven Organization Service & Application Portfolios Quarterly Risk Reviews Dedicated InfoSec team IT Security Primes & IT Partner Security Architects 4

Why? A Historical Problem Inconsistent security analysis, metrics and communication Passive, ad hoc approach to security from Business and IT A focused, accelerated security initiative led to the creation of Unified Security Metrics (USM) What is my security posture today and what should I do to improve it? IT Service Owner 5

How Cisco Executed the Plan 6

Unified Security Metrics Framework Improve Security & Best Practices Metrics/Data Analysis Operationalize Reporting Influencing & Accountability 7

Assessing the Landscape Performed a Feasibility Analysis of Existing Data Sources and Ranking Data Availability Data Quality Scalability PoC Candidate? 8

Feasibility Analysis Data Availability Data Quality Scalability PoC Candidate? Questions Type Measure Feasibility: Data Availability Feasibility: Data Quality Feasibility: Scalability Feasible for PoC? Does the service have a risk rating and data classification captured in service catalog? Process Actual risk rating, data classification 70% 70% Manual Yes OS vulnerability / Patching compliance - Periodic OS vulnerability scanning? Technical # and severity of OS vulnerabilities 100% 100% Partly Automated Yes What percentage of app developers and/or administrators trained on appropriate security topics? People total # of administrators, % of administrators trained 65% 50% Manual Yes 9

Focused on Technical Measurements (5) Areas with Identifiable Vulnerabilities Process Technical People Service/Data Criticality, Business process controls, Incidence Response Architecture planning, Service Catalog, customer audits, Incidents Self-service application scan Infrastructure (Stack) compliance Anti-virus compliance Penetration Testing Exceptions Awareness, skills, Actions, Stewardship, Ease of Use Risk Assessments and Audits, Training, Entitlement mgmt., Support 10

The Metrics Defined We focused on two metrics: Vulnerability metric On-time Closure metric Metrics summarized at the service-level SQC 2 out of 5 11

Linking the Data Service Mapping App Scans Data Extraction of Measures Pen Testing Stack Anti-virus Exceptions Service Portfolio File System DB File System DB DB Application Portfolio ETL Interface CMDB Central Repository Note: All data sources manually extracted initially and then automated during the scaling and optimization processes. 12

Scaling Up USM Security Maturity Requires structured data Manual Data collection, analysis and communication of results is a manual process Resource intensive (push) Requires Selfservice metrics Portal Semi automated Data collection, DB and storage is automated and data is structured. Analysis and communication is manual and though optimized is still resource critical (push) Automated Data Collection, DB, Storage n Analysis and Reporting is automated. Consumers of the security metrics can pull information at any time. 0 to 1 yr. 1 to 1.5 yr. 1.5 to 2 years 9.5 Avg. Hours per service (5) 7.0 Avg. hours per service (20) 5.0 Avg. Hours per service (40) 2.5 Avg. Hours per service (90) 1.5 Avg. hours per service (200) 13

Lessons Learned What worked Focused on security hygiene and not Risk Automation and optimization Started small and built confidence & trust across stakeholders Consistent stakeholder communications and follow-up interactions The new Security Prime role* 99% of all Compromises required moderate-to-little sophistication. 2013 Verizon Breach Report Challenges to overcome Stakeholders understanding the Vulnerability Metric Correlating un-structured data required cap investment (API s, etc.) Overloaded certain downstream processes 14

New and Expanded Roles New Role Expanded Role CSO of the Service Single point of accountability Increase communication and awareness around security Security SMEs Security architecture reviews Manager or director-level Security Prime Partner Security Architect Trusted advisors 1 or more Primes Service Executive Service Owner InfoSec Team Establishes security technology baselines Formal approval for exceptions Establishes corporate security policies and guidelines 15

Governance & Accountability 16

Leverage Existing Quarterly Reporting Unified Service Metrics Vulnerabilities & Performance CIO Service Execs Score Cards Service Owner Security Prime 17

USM Program Integration and Reporting Timelines New Services Q 1 Early Pull Q 2 Dry run Full Program Integration Preview Q 3 Ongoing Service Delivery SO Prime Review Service Exec Report Out CIO Service Review Baselining the Service Report-Outs 18

Program Success Before USM: Ad hoc approach to security across the service portfolio Unable to manage and assess security vulnerabilities due to lack of measures Marginal executive attention on internal security vulnerabilities Since USM: Shared Accountability: driving the conversation with service owners & other key stakeholders USM measures in place, we are able to quantify Cisco s security health: 65% reduction in vulnerabilities and On-time closure improvement from 15% to 80% within one year Increased Security investment (+50%) and support of the next phase of USM development 19

Final Thoughts Done right, it works! Get buy-in from upper management Build the partner teams creating security synergy and governance Embrace talent outside your immediate security/it organization Use measurements that are meaningful, accessible, quantifiable, and actionable Start small and build trust across stakeholders Leverage IT As a Service building blocks Score results and score them objectively Report results using existing reporting structures wherever possible 20

Thank You! Q&A 21