SlideShare uma empresa Scribd logo
1 de 23
a step by step approach


METRICS, RISK MANAGEMENT & DLP
Rob Kloots Vice-President ISSA-BE ; Webmaster ISSA-BE
           Owner CSF b.v. - GRC Consulting
           Rob.Kloots@csf.nl
DISCUSSION ITEMS
   Professionalise, Organise
   Compliance Security Framework
       Objectives
       Metrics
       Measures
       Achieveable Markerpoints
   Risk Management
   Data Loss Prevention System
       External Standards
       Action list
       Controls


                        Conferencias ISSA de Seguridad 2010   15-04-2010   3
DATA LOSS PREVENTION
   Data Loss Prevention (DLP) is a computer security term
    referring to systems that identify, monitor, and protect data in use
    (e.g., endpoint actions), data in motion (e.g., network actions),
    and data at rest (e.g., data storage) through deep content
    inspection, contextual security analysis of transaction (attributes
    of originator, data object, medium, timing, recipient/destination,
    etc.), and with a centralized management framework. The
    systems are designed to detect and prevent the unauthorized use
    and transmission of confidential information.
   It is also referred to by various vendors as Data Leak
    Prevention, Information Leak Detection and Prevention
    (ILDP), Information Leak Prevention (ILP), Content
    Monitoring and Filtering (CMF) or Extrusion Prevention
    System by analogy to Intrusion-prevention system.



                                                                             4
                          Conferencias ISSA de Seguridad 2010   15-04-2010
FIREFIGHTING DLP INCIDENTS
   Data breach causes
   According to a Verizon 2009 report
     •   74% from external sources
     •   20% by insiders
     •   32% implicated business partners
     •   39% involved multiple parties

   What damage can be done?
•   Loss of trust
•   Reputation damage
•   Loss of clients Conferencias ISSA de Seguridad 2010   15-04-2010

•   Repair costs

                                                                       5
FIREFIGHTING DLP INCIDENTS
   DLP more then a Gartner-hype
                                   DLP
   DLP key to GRC

   European Commission
    enforces DLP in the 2008
    Telecom Directive

 DLP incidents are a given
  fact of operations
 If or When?

                                         6
ADAPT, ADOPT, IMPROVE

 Firefighting
 Maturity level
                           Adopt
 What steps?

 Learning Management System
     Metrics,

     Measures, and                Improve                       Adapt
     Markerpoints.




                                                                         7
                  Conferencias ISSA de Seguridad 2010   15-04-2010
MATURITYLEVELS
o Predefined business process
o Clear goals/performance req’s
o Quantitative/qualitative measures
                                                                           Quantitatively
                                                                           Managed
                                                    Managed

                                 Defined


                  Repeatable



     Incomplete




                                                                                            8
                        Conferencias ISSA de Seguridad 2010   15-04-2010
Conferencias ISSA de Seguridad 2010    15-04-2010



COMPLIANCE SECURITY FRAMEWORK

 A Compliance Security Framework should
  allow for team-effort for both
 Mgt (2) and operators(3) to enter into a
  learning system
 with respect to Compliance & Risk based
                                1
  security measures (1).
                                           CS
                                           F
                              2                             3


                                                                       9 9
                 Conferencias ISSA de Seguridad 2010     15-04-2010
COMPLIANCE DEFINED

   Compliance is either a state of being in
    accordance with established standards,
    specifications or legislation or the process of
    becoming so.




                                                                      10
                   Conferencias ISSA de Seguridad 2010   15-04-2010
COMPLIANCE CAN PROVIDE OPPORTUNITIES

 Compliance   within Organisation can provide a
  positive Roi.
 Investment
     Compliance Management, based on an efficient
      control set (e.g. ISO27001/9001/20000) and audit
      methodology.
 Return;   by being compliant, Org.:
   has a strong quality statement for existing
    customers and prospects;
   mitigates risks;
   improves quality of service delivery processes.


                                                                       11
                    Conferencias ISSA de Seguridad 2010   15-04-2010
COMPLIANCE; AGAINST WHAT?

 Company internal
  policies &
  standards
 External rules and
  regulations
 Industry standards
 Customer (security)
  requirements
…

                                                                  12
               Conferencias ISSA de Seguridad 2010   15-04-2010
WELL-CONTROLLED ORGANIZATIONS

Key attributes of a well-controlled
 organization include :
# 1. Leadership of Board
# 2. Translation of strategic vision to day-to-day management
# 3. Communication of objectives & values to all levels
# 4. Individual accountability
# 5. Risk management system
# 6. Human resources reinforcement
# 7. Independent, objective and competent oversight
                                                                          13
                       Conferencias ISSA de Seguridad 2010   15-04-2010
14

pwc
  RISK & CONTROL : SYMBIOTIC SYSTEMS
                                          • Define strategic risk
                                          • Articulate risk philosophy
               Objective                  • Define values and behavioral expectations


                                           • Assess risk
                 Risk                      • Manage risk


                                           • Assess existing controls
               Control                     • Select control model
                                           • Continuous communication

                                           • Continuous program for ORC
              Alignment
                                           • Develop a control improvement plan


      … Operations are dynamic and evolving...

                         Conferencias ISSA de Seguridad 2010   15-04-2010               14
METRICS - 1

 Metrics are simply a standard or system of
  measurement
 Metric - A quantitative measure of the
  degree to which a system, component, or
  process possesses a given attribute [2]. A
  calculated or composite indicator based upon
  two or more measures. A quantified measure
  of the degree to which a system, component,
  or process possesses a given attribute [3].

                                                                   15
                Conferencias ISSA de Seguridad 2010   15-04-2010
METRICS - 2

 Characteristics & Classification
 Process metrics
       CSFs, KGIs and KPIs
   Asset related vulnerability metrics
       What value has Data, when static, dynamic, owned,
        stored, lost
   Monetary value of Reputation
     ? Market Capitalisation
     ! Value of assets in Euro
     ! Total asset value at Risk



                                                                          16
                       Conferencias ISSA de Seguridad 2010   15-04-2010
MEASURES
   Measure - To ascertain or appraise by
    comparing to a standard [1]. A standard or unit
    of measurement; the extent, dimensions,
    capacity, etc., of anything, especially as
    determined by a standard; an act or process of
    measuring; a result of measurement [3]. A
    related term is Measurement - The act or
    process of measuring. A figure, extent, or
    amount obtained by measuring [1]. The act or
    process of measuring something. Also a result,
    such as a figure expressing the extent or value
    that is obtained by measuring [3].

                                                                      17
                   Conferencias ISSA de Seguridad 2010   15-04-2010
ACHIEVEABLE MARKERPOINTS

 How to set
 Where to use

 Purpose




                                                                    18
                 Conferencias ISSA de Seguridad 2010   15-04-2010
RISK MANAGEMENT - 1



                                Qualitative
          Quantitative




                           RM
                         mechanics




                Mgt info
                                                                 19
              Conferencias ISSA de Seguridad 2010   15-04-2010
RISK MANAGEMENT - 2




              Conferencias ISSA de Seguridad 2010   15-04-2010   20
WHAT STANDARDS?




 DLP




             Conferencias ISSA de Seguridad 2010   15-04-2010   21
DATA LOSS PREVENTION SYSTEM
   1. Introduction to the DLPS 10%
   2. Creating the Asset Inventory 8%
   3. Establishing Information Risk Management process 8%
   4. Establish a Continual Improvement process 10%
   5. Developing Documentation 5%
   6. Establishing a Legal Registry process 8%
   7. Establishing a Compliance Management process 5%
   8. Establishing an Audit process 10%
   9. Establishing a Governance process 10%
   10. Establishing Security & Privacy testing process 8%
   11. Establishing the Incident Response process 8%
   12. Establishing Training & Awareness process 10%



                        Conferencias ISSA de Seguridad 2010   15-04-2010   22
DATA LOSS PREVENTION
   SANS Critical Security Controls
     1: Inventory of Authorized and Unauthorized Devices
     2: Inventory of Authorized and Unauthorized Software
     3: Secure Configurations for Hardware and Software on Laptops,
      WorkstationsCritical, and Servers
Control 15 Metric
     4: Secure Configurations for Network Devices such as Firewalls, Routers,
      and Switches
  The5: Boundary Defense capable of identifying unauthorized data
      system must be
  leaving the organization'sand Analysis whether via network file
     6: Maintenance, Monitoring, systems of Audit Logs
     7: Application Software Security
  transfers or removable media. Privileges
     8: Controlled Use of Administrative
      9: Controlled Access Based on Need to Know
Control 15Test
   
     10: Continuous Vulnerability Assessment and Remediation
     11: Account Monitoring and Control
     12: Malware Defenses
     13: Limitation and Control of Network Ports, Protocols, and Services
Associated NIST SP 800-53 Rev 3 Priority 1
     14: Wireless Device Control
      15: Data Loss Prevention
Controls:
   


  AC-4, MP-2 (2), MP-4 (1), SC-7 (6, 10), SC-9, SC-13, SC-28 (1),
  SI-4 (4, 11), PM-7
                              Conferencias ISSA de Seguridad 2010   15-04-2010   23
QUESTIONS, PLEASE!




             Conferencias ISSA de Seguridad 2010   15-04-2010   24

Mais conteúdo relacionado

Mais procurados

Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostGuardEra Access Solutions, Inc.
 
DSS ITSEC Conference 2012 - RISK & COMPLIANCE
DSS ITSEC Conference 2012 - RISK & COMPLIANCEDSS ITSEC Conference 2012 - RISK & COMPLIANCE
DSS ITSEC Conference 2012 - RISK & COMPLIANCEAndris Soroka
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaJames McDonald
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Plan de Calidad para el SNS
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Marc-Andre Heroux
 
HML Risk Transformation
HML Risk TransformationHML Risk Transformation
HML Risk TransformationAndrew Smart
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trendswardell henley
 
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid ThemSasha Nunke
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
Techserv Brochure
Techserv BrochureTechserv Brochure
Techserv Brochureguest8a430d
 

Mais procurados (11)

Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & Cost
 
DSS ITSEC Conference 2012 - RISK & COMPLIANCE
DSS ITSEC Conference 2012 - RISK & COMPLIANCEDSS ITSEC Conference 2012 - RISK & COMPLIANCE
DSS ITSEC Conference 2012 - RISK & COMPLIANCE
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed Proba
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...
 
ICAM Our Vision
ICAM Our VisionICAM Our Vision
ICAM Our Vision
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0
 
HML Risk Transformation
HML Risk TransformationHML Risk Transformation
HML Risk Transformation
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
 
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Techserv Brochure
Techserv BrochureTechserv Brochure
Techserv Brochure
 

Semelhante a Rob kloots presentation_issa_spain

Rob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRobert Kloots
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLPRobert Kloots
 
Ta Security
Ta SecurityTa Security
Ta Securityjothsna
 
TA security
TA securityTA security
TA securitykesavars
 
Integrating Internal Controls
Integrating Internal Controls Integrating Internal Controls
Integrating Internal Controls InnoTech
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictabilitytlknecht
 
Third party independent test audit.
Third party independent test audit.Third party independent test audit.
Third party independent test audit.Mindtree Ltd.
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S proaxissolutions
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramGoogleNewsSubmit
 

Semelhante a Rob kloots presentation_issa_spain (20)

Rob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcm
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
Ta Security
Ta SecurityTa Security
Ta Security
 
TA security
TA securityTA security
TA security
 
Integrating Internal Controls
Integrating Internal Controls Integrating Internal Controls
Integrating Internal Controls
 
MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
GRCAlert Capabilities Deck - 2018
GRCAlert Capabilities Deck - 2018GRCAlert Capabilities Deck - 2018
GRCAlert Capabilities Deck - 2018
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictability
 
Third party independent test audit.
Third party independent test audit.Third party independent test audit.
Third party independent test audit.
 
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 

Último

HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 

Último (20)

HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 

Rob kloots presentation_issa_spain

  • 1. a step by step approach METRICS, RISK MANAGEMENT & DLP Rob Kloots Vice-President ISSA-BE ; Webmaster ISSA-BE Owner CSF b.v. - GRC Consulting Rob.Kloots@csf.nl
  • 2. DISCUSSION ITEMS  Professionalise, Organise  Compliance Security Framework  Objectives  Metrics  Measures  Achieveable Markerpoints  Risk Management  Data Loss Prevention System  External Standards  Action list  Controls Conferencias ISSA de Seguridad 2010 15-04-2010 3
  • 3. DATA LOSS PREVENTION  Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use (e.g., endpoint actions), data in motion (e.g., network actions), and data at rest (e.g., data storage) through deep content inspection, contextual security analysis of transaction (attributes of originator, data object, medium, timing, recipient/destination, etc.), and with a centralized management framework. The systems are designed to detect and prevent the unauthorized use and transmission of confidential information.  It is also referred to by various vendors as Data Leak Prevention, Information Leak Detection and Prevention (ILDP), Information Leak Prevention (ILP), Content Monitoring and Filtering (CMF) or Extrusion Prevention System by analogy to Intrusion-prevention system. 4 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 4. FIREFIGHTING DLP INCIDENTS  Data breach causes  According to a Verizon 2009 report • 74% from external sources • 20% by insiders • 32% implicated business partners • 39% involved multiple parties  What damage can be done? • Loss of trust • Reputation damage • Loss of clients Conferencias ISSA de Seguridad 2010 15-04-2010 • Repair costs 5
  • 5. FIREFIGHTING DLP INCIDENTS  DLP more then a Gartner-hype DLP  DLP key to GRC  European Commission enforces DLP in the 2008 Telecom Directive  DLP incidents are a given fact of operations  If or When? 6
  • 6. ADAPT, ADOPT, IMPROVE  Firefighting  Maturity level Adopt  What steps?  Learning Management System  Metrics,  Measures, and Improve Adapt  Markerpoints. 7 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 7. MATURITYLEVELS o Predefined business process o Clear goals/performance req’s o Quantitative/qualitative measures Quantitatively Managed Managed Defined Repeatable Incomplete 8 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 8. Conferencias ISSA de Seguridad 2010 15-04-2010 COMPLIANCE SECURITY FRAMEWORK  A Compliance Security Framework should allow for team-effort for both  Mgt (2) and operators(3) to enter into a learning system  with respect to Compliance & Risk based 1 security measures (1). CS F 2 3 9 9 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 9. COMPLIANCE DEFINED  Compliance is either a state of being in accordance with established standards, specifications or legislation or the process of becoming so. 10 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 10. COMPLIANCE CAN PROVIDE OPPORTUNITIES  Compliance within Organisation can provide a positive Roi.  Investment  Compliance Management, based on an efficient control set (e.g. ISO27001/9001/20000) and audit methodology.  Return; by being compliant, Org.:  has a strong quality statement for existing customers and prospects;  mitigates risks;  improves quality of service delivery processes. 11 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 11. COMPLIANCE; AGAINST WHAT?  Company internal policies & standards  External rules and regulations  Industry standards  Customer (security) requirements … 12 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 12. WELL-CONTROLLED ORGANIZATIONS Key attributes of a well-controlled organization include : # 1. Leadership of Board # 2. Translation of strategic vision to day-to-day management # 3. Communication of objectives & values to all levels # 4. Individual accountability # 5. Risk management system # 6. Human resources reinforcement # 7. Independent, objective and competent oversight 13 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 13. 14 pwc RISK & CONTROL : SYMBIOTIC SYSTEMS • Define strategic risk • Articulate risk philosophy Objective • Define values and behavioral expectations • Assess risk Risk • Manage risk • Assess existing controls Control • Select control model • Continuous communication • Continuous program for ORC Alignment • Develop a control improvement plan … Operations are dynamic and evolving... Conferencias ISSA de Seguridad 2010 15-04-2010 14
  • 14. METRICS - 1  Metrics are simply a standard or system of measurement  Metric - A quantitative measure of the degree to which a system, component, or process possesses a given attribute [2]. A calculated or composite indicator based upon two or more measures. A quantified measure of the degree to which a system, component, or process possesses a given attribute [3]. 15 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 15. METRICS - 2  Characteristics & Classification  Process metrics  CSFs, KGIs and KPIs  Asset related vulnerability metrics  What value has Data, when static, dynamic, owned, stored, lost  Monetary value of Reputation  ? Market Capitalisation  ! Value of assets in Euro  ! Total asset value at Risk 16 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 16. MEASURES  Measure - To ascertain or appraise by comparing to a standard [1]. A standard or unit of measurement; the extent, dimensions, capacity, etc., of anything, especially as determined by a standard; an act or process of measuring; a result of measurement [3]. A related term is Measurement - The act or process of measuring. A figure, extent, or amount obtained by measuring [1]. The act or process of measuring something. Also a result, such as a figure expressing the extent or value that is obtained by measuring [3]. 17 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 17. ACHIEVEABLE MARKERPOINTS  How to set  Where to use  Purpose 18 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 18. RISK MANAGEMENT - 1 Qualitative Quantitative RM mechanics Mgt info 19 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 19. RISK MANAGEMENT - 2 Conferencias ISSA de Seguridad 2010 15-04-2010 20
  • 20. WHAT STANDARDS? DLP Conferencias ISSA de Seguridad 2010 15-04-2010 21
  • 21. DATA LOSS PREVENTION SYSTEM  1. Introduction to the DLPS 10%  2. Creating the Asset Inventory 8%  3. Establishing Information Risk Management process 8%  4. Establish a Continual Improvement process 10%  5. Developing Documentation 5%  6. Establishing a Legal Registry process 8%  7. Establishing a Compliance Management process 5%  8. Establishing an Audit process 10%  9. Establishing a Governance process 10%  10. Establishing Security & Privacy testing process 8%  11. Establishing the Incident Response process 8%  12. Establishing Training & Awareness process 10% Conferencias ISSA de Seguridad 2010 15-04-2010 22
  • 22. DATA LOSS PREVENTION SANS Critical Security Controls  1: Inventory of Authorized and Unauthorized Devices  2: Inventory of Authorized and Unauthorized Software  3: Secure Configurations for Hardware and Software on Laptops, WorkstationsCritical, and Servers Control 15 Metric  4: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches The5: Boundary Defense capable of identifying unauthorized data  system must be leaving the organization'sand Analysis whether via network file  6: Maintenance, Monitoring, systems of Audit Logs  7: Application Software Security transfers or removable media. Privileges  8: Controlled Use of Administrative 9: Controlled Access Based on Need to Know Control 15Test   10: Continuous Vulnerability Assessment and Remediation  11: Account Monitoring and Control  12: Malware Defenses  13: Limitation and Control of Network Ports, Protocols, and Services Associated NIST SP 800-53 Rev 3 Priority 1  14: Wireless Device Control 15: Data Loss Prevention Controls:  AC-4, MP-2 (2), MP-4 (1), SC-7 (6, 10), SC-9, SC-13, SC-28 (1), SI-4 (4, 11), PM-7 Conferencias ISSA de Seguridad 2010 15-04-2010 23
  • 23. QUESTIONS, PLEASE! Conferencias ISSA de Seguridad 2010 15-04-2010 24