SlideShare uma empresa Scribd logo
1 de 11
Technology Executives Club
Roundtable / SIG
Cyber Security & Risk Management
“How to Leverage Security Assessments to
Identify & Control Risk”
Meeting Summary
November 6, 2015
W. Capra Consulting Group
Topic Overview
1
Leverage security assessments to identify and control risk;
assessments can be used to:
 Increase organizational visibility of identified risks
 Define a baseline standard to measure organization
readiness against established framework(s)
 Conduct assessments with the end in mind
 Provide a basis for a security roadmap and budget
 Leverage third parties to provide credibility to initiatives
to business, senior management and boards
 Integrate into security/risk governance structure
W. Capra Consulting Group
Discussion Points (1)
2
What comes to mind when you hear the words “security
assessment”? What does it mean to you?
Predominant View – Security assessments should focus on managing risk
rather than checking the box. Emphasis should be placed on understanding
risk associated with valuable data assets.
Leadership Feedback
1. Assessments can be different based on what you are trying to achieve
2. Understand the valuable data assets that need protecting before
starting an assessment
3. Think about what you want to get out of the assessment
4. Security assessment should include vulnerability assessment,
penetration testing, and compromise investigations
5. BIA (Business Impact Analysis) is needed to put findings in context
W. Capra Consulting Group
Discussion Points (2)
3
How do you use assessments in your organization?
Prioritize gaps? Independent perspective on threats
(current and future) and existing vulnerabilities? Input to
security roadmap and budget?
Predominant View – Assessments are used to obtain an independent view
of gaps and provide input to prioritized roadmap. The independent view
helps to justify budget.
Leadership Feedback
1. All of the above apply to each organization
2. Independent gives more validity to findings when meeting with
stakeholders – that’s what they are good at
3. Use assessment to slow the business down – third party risk
assessment to manage shadow IT
4. Assessment findings help to justify innovative solutions and
transformative initiatives (e.g., network re-architecture)
W. Capra Consulting Group
Discussion Points (3)
4
Do you leverage a security framework to guide security
within your environment? ISO27k, SANS, NIST, etc.? Does
the framework influence how you approach the security
assessment?
Predominant View – Frameworks are helpful in security and serve as a
good reference. Organizations must understand how to ask the right
questions and verify existing controls match the responses.
Leadership Feedback
1. Each organization used/referenced a security framework to guide risk
management
2. Frameworks are good and you also need to ensure the right questions
are asked
3. Assessments must verify responses – obtain evidence controls are in
place
4. Approach includes obtaining stakeholder sign-off on the findings
and remediation plan
5. Assessments should be performed using tools to detect gaps and
conducting interviews with the right personnel
W. Capra Consulting Group
Discussion Points (4)
5
How far do you go to get a good perspective on your risks?
Technology (app – storage), security controls, architecture
review, processes (e.g., Service Desk) susceptible to social
engineering attacks?
Predominant View – Assessments must extend beyond technology to be
effective. Investigation of security awareness and physical security practices are
critical. Threat modeling is important to understand what’s relevant.
Leadership Feedback
1. Focus on user/employee security awareness programs and education that
helps them in their personal life (e.g., safe at home program)
2. Physical assessments becoming more important
3. Push ownership of data to business stakeholders
4. Get past OWASP to using Red Teams and threat modeling
5. Follow up to measure social engineering risk (e.g., phishme)
6. Identify an approach to hold users accountable for poor decisions
(e.g., tie to compensation)
W. Capra Consulting Group
Discussion Points (5)
6
What is the right interval to perform assessments?
Annual? Semi-annual?
Predominant View – The consensus view is an annual assessment.
Organizations should perform activities throughout the year to understand
changes to risk profile.
Leadership Feedback
1. Interval is aligned with compliance requirements – annual assessment
2. Objective is to perform formal assessment annually and maintain
updated view throughout the year
3. Annual assessment with monthly follow up and continual external
scans
4. Assessment followed up with monthly CIO, CISO meeting to review
progress
W. Capra Consulting Group
Discussion Points (6)
7
Do you include Cloud Service Providers (CSPs) in the scope
of security assessments? Why or why not?
Predominant View – Assessing all partners is critical in today’s IT
environment. IT must work with these partners to ensure they have
the right controls in place – don’t accept generic responses.
Leadership Feedback
1. Question should include ALL providers and business partners
2. Big issue – assessment of partners is critical
3. Include all service providers as this is a potential high risk source
4. Don’t accept partner generic responses to assessment – hold them
accountable to demonstrate effective security
5. Need to include important points that hold partners accountable in the
contract
W. Capra Consulting Group
Discussion Points (7)
What are you not getting out of security assessments?
What’s missing? How do you plug the gaps? Technologies?
Processes?
Predominant View - Assessments must be more comprehensive and
forward looking. Peer comparison would be helpful when communicating
with business leadership.
Leadership Feedback
 Good perspective on how risk is evolving (e.g., emerging threats)
 Accurate view of risk in third party assessments
 A good perspective on class comparison – how do you compare with
other organizations in your industry (e.g., gaps, level of risk)
8
W. Capra Consulting Group
Questions We Didn’t Get
To Ask…
1. How do you know the security assessment was effective? What
gives you that comfort level? Is it possible to get that comfort
level?
2. Do you use security assessments to manage/address business
leadership/Board perceptions? For example, Target breach
raised Board interest in security.
3. In general, what’s missing in security today? What should we
pay more attention to?
9
W. Capra Consulting Group
221 N. LaSalle, Suite 1325
Chicago, Illinois 60601
Security SIG Chairperson:
Matt Beale, Associate Partner, W. Capra mbeale@wcapra.com
(312)972-2433
Technology Executive Club Reference:
www.technologyexecutivesclub.com
www.technologyexecutivesclub.com/securitychicago

Mais conteúdo relacionado

Mais procurados

The Security Practitioner of the Future
The Security Practitioner of the FutureThe Security Practitioner of the Future
The Security Practitioner of the FutureResolver Inc.
 
Allgress High Level Presentation
Allgress High Level PresentationAllgress High Level Presentation
Allgress High Level Presentatione9128
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementRand W. Hirt
 
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerPlatformSecurityManagement
 
Globals - Too Big to Govern?
Globals - Too Big to Govern?Globals - Too Big to Govern?
Globals - Too Big to Govern?Resolver Inc.
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?IANS
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive ActionMighty Guides, Inc.
 
Dell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting PresentationDell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting PresentationErwin Carrow
 
Risk Management Case Study - Applied Concepts
Risk Management Case Study - Applied ConceptsRisk Management Case Study - Applied Concepts
Risk Management Case Study - Applied ConceptsResolver Inc.
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability Resolver Inc.
 
App Showcase: Internal Audit
App Showcase: Internal AuditApp Showcase: Internal Audit
App Showcase: Internal AuditResolver Inc.
 
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...PECB
 
ISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisPECB
 
Integrated Risk Management
Integrated Risk ManagementIntegrated Risk Management
Integrated Risk ManagementOmicron Systems
 
A balanced scorecard approach to safety metrics in aviation
A balanced scorecard approach to safety metrics in aviationA balanced scorecard approach to safety metrics in aviation
A balanced scorecard approach to safety metrics in aviationwalk_the_safety_talk
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 

Mais procurados (20)

The Security Practitioner of the Future
The Security Practitioner of the FutureThe Security Practitioner of the Future
The Security Practitioner of the Future
 
Allgress High Level Presentation
Allgress High Level PresentationAllgress High Level Presentation
Allgress High Level Presentation
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartnerASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
ASMC 2017 - Rudy Neefs - Van bedrijfspolitieman naar kritieke businesspartner
 
Globals - Too Big to Govern?
Globals - Too Big to Govern?Globals - Too Big to Govern?
Globals - Too Big to Govern?
 
It risk assessment
It risk assessmentIt risk assessment
It risk assessment
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive Action
 
Dell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting PresentationDell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting Presentation
 
Risk Management Case Study - Applied Concepts
Risk Management Case Study - Applied ConceptsRisk Management Case Study - Applied Concepts
Risk Management Case Study - Applied Concepts
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
App Showcase: Internal Audit
App Showcase: Internal AuditApp Showcase: Internal Audit
App Showcase: Internal Audit
 
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
 
ISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field AnalysisISO 27001 Implementation using Force Field Analysis
ISO 27001 Implementation using Force Field Analysis
 
Integrated Risk Management
Integrated Risk ManagementIntegrated Risk Management
Integrated Risk Management
 
A balanced scorecard approach to safety metrics in aviation
A balanced scorecard approach to safety metrics in aviationA balanced scorecard approach to safety metrics in aviation
A balanced scorecard approach to safety metrics in aviation
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Integrated risk management
Integrated risk managementIntegrated risk management
Integrated risk management
 

Destaque

Ideal business factors to consider
Ideal business   factors to considerIdeal business   factors to consider
Ideal business factors to considerZiya-B
 
Star Marketing_Feb 2015
Star Marketing_Feb 2015Star Marketing_Feb 2015
Star Marketing_Feb 2015Priyanka Singh
 
FPL'2014 - FlexTiles Workshop - 8 - FlexTiles Demo
FPL'2014 - FlexTiles Workshop - 8 - FlexTiles DemoFPL'2014 - FlexTiles Workshop - 8 - FlexTiles Demo
FPL'2014 - FlexTiles Workshop - 8 - FlexTiles DemoFlexTiles Team
 
Search01 /certified fixed orthodontic courses by Indian dental academy
Search01 /certified fixed orthodontic courses by Indian dental academy Search01 /certified fixed orthodontic courses by Indian dental academy
Search01 /certified fixed orthodontic courses by Indian dental academy Indian dental academy
 
Edited photos for the final piece
Edited photos for the final pieceEdited photos for the final piece
Edited photos for the final pieceOliviaWigglesworth
 
Shady Side Academy Parenting with Identity in Mind
Shady Side Academy Parenting with Identity in MindShady Side Academy Parenting with Identity in Mind
Shady Side Academy Parenting with Identity in MindRosetta Eun Ryong Lee
 
Els Drets Dela Infants. Article
Els Drets Dela Infants. ArticleEls Drets Dela Infants. Article
Els Drets Dela Infants. ArticleAula Oberta
 

Destaque (14)

Ideal business factors to consider
Ideal business   factors to considerIdeal business   factors to consider
Ideal business factors to consider
 
Star Marketing_Feb 2015
Star Marketing_Feb 2015Star Marketing_Feb 2015
Star Marketing_Feb 2015
 
2catalogue
2catalogue2catalogue
2catalogue
 
FPL'2014 - FlexTiles Workshop - 8 - FlexTiles Demo
FPL'2014 - FlexTiles Workshop - 8 - FlexTiles DemoFPL'2014 - FlexTiles Workshop - 8 - FlexTiles Demo
FPL'2014 - FlexTiles Workshop - 8 - FlexTiles Demo
 
Search01 /certified fixed orthodontic courses by Indian dental academy
Search01 /certified fixed orthodontic courses by Indian dental academy Search01 /certified fixed orthodontic courses by Indian dental academy
Search01 /certified fixed orthodontic courses by Indian dental academy
 
G42054044
G42054044G42054044
G42054044
 
Edited photos for the final piece
Edited photos for the final pieceEdited photos for the final piece
Edited photos for the final piece
 
Unisef
UnisefUnisef
Unisef
 
Shady Side Academy Parenting with Identity in Mind
Shady Side Academy Parenting with Identity in MindShady Side Academy Parenting with Identity in Mind
Shady Side Academy Parenting with Identity in Mind
 
Copy (4) of tags 1
Copy (4) of tags 1Copy (4) of tags 1
Copy (4) of tags 1
 
Iphone case
Iphone caseIphone case
Iphone case
 
Alimentación saludable
Alimentación saludableAlimentación saludable
Alimentación saludable
 
Els Drets Dela Infants. Article
Els Drets Dela Infants. ArticleEls Drets Dela Infants. Article
Els Drets Dela Infants. Article
 
Elan Fall 2013
Elan Fall 2013Elan Fall 2013
Elan Fall 2013
 

Semelhante a Technology Executives Club Roundtable SIG - Nov 6 Session Summary

TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Sum...
TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Sum...TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Sum...
TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Sum...WCapra
 
Benchmarking Basic.pdf
Benchmarking Basic.pdfBenchmarking Basic.pdf
Benchmarking Basic.pdfR Borres
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk managementInfosys
 
Security risk management
Security risk managementSecurity risk management
Security risk managementbrijesh singh
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docxchristiandean12115
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
COSP Safety Accountability
COSP Safety Accountability COSP Safety Accountability
COSP Safety Accountability Heatherawarens
 
NEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdfNEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdfMohamed Ghonema
 
Risk management
Risk managementRisk management
Risk managementLepipi
 
Understanding the Roles and Responsibilities of ISMS Auditor.docx
Understanding the Roles and Responsibilities of ISMS Auditor.docxUnderstanding the Roles and Responsibilities of ISMS Auditor.docx
Understanding the Roles and Responsibilities of ISMS Auditor.docxINTERCERT
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Lanate Drummond
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamJohn D. Johnson
 
Risk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniquesRisk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniquesILRI
 
Chapter 7 Management Concultancy by Cabrera
Chapter 7 Management Concultancy by CabreraChapter 7 Management Concultancy by Cabrera
Chapter 7 Management Concultancy by CabreraKriza Matro
 
#Contract Risk Audit# By SN panigrahi
#Contract Risk Audit# By SN panigrahi#Contract Risk Audit# By SN panigrahi
#Contract Risk Audit# By SN panigrahiSN Panigrahi, PMP
 
Chapter 13 An evaluation framework
Chapter 13 An evaluation frameworkChapter 13 An evaluation framework
Chapter 13 An evaluation frameworkvuongdq93
 

Semelhante a Technology Executives Club Roundtable SIG - Nov 6 Session Summary (20)

TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Sum...
TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Sum...TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Sum...
TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Sum...
 
Benchmarking Basic.pdf
Benchmarking Basic.pdfBenchmarking Basic.pdf
Benchmarking Basic.pdf
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk management
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docx
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
COSP Safety Accountability
COSP Safety Accountability COSP Safety Accountability
COSP Safety Accountability
 
NEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdfNEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdf
 
Risk management
Risk managementRisk management
Risk management
 
Exploring Common Paths in Risk Management by Jan Mattingly
Exploring Common Paths in Risk Management by Jan MattinglyExploring Common Paths in Risk Management by Jan Mattingly
Exploring Common Paths in Risk Management by Jan Mattingly
 
Understanding the Roles and Responsibilities of ISMS Auditor.docx
Understanding the Roles and Responsibilities of ISMS Auditor.docxUnderstanding the Roles and Responsibilities of ISMS Auditor.docx
Understanding the Roles and Responsibilities of ISMS Auditor.docx
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive Team
 
Risk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniquesRisk management: Principles, methodologies and techniques
Risk management: Principles, methodologies and techniques
 
Chapter 7 Management Concultancy by Cabrera
Chapter 7 Management Concultancy by CabreraChapter 7 Management Concultancy by Cabrera
Chapter 7 Management Concultancy by Cabrera
 
#Contract Risk Audit# By SN panigrahi
#Contract Risk Audit# By SN panigrahi#Contract Risk Audit# By SN panigrahi
#Contract Risk Audit# By SN panigrahi
 
Chapter 13 An evaluation framework
Chapter 13 An evaluation frameworkChapter 13 An evaluation framework
Chapter 13 An evaluation framework
 
OECD Due Diligence Alignment Assessment Tool for responsible supply chains in...
OECD Due Diligence Alignment Assessment Tool for responsible supply chains in...OECD Due Diligence Alignment Assessment Tool for responsible supply chains in...
OECD Due Diligence Alignment Assessment Tool for responsible supply chains in...
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Technology Executives Club Roundtable SIG - Nov 6 Session Summary

  • 1. Technology Executives Club Roundtable / SIG Cyber Security & Risk Management “How to Leverage Security Assessments to Identify & Control Risk” Meeting Summary November 6, 2015
  • 2. W. Capra Consulting Group Topic Overview 1 Leverage security assessments to identify and control risk; assessments can be used to:  Increase organizational visibility of identified risks  Define a baseline standard to measure organization readiness against established framework(s)  Conduct assessments with the end in mind  Provide a basis for a security roadmap and budget  Leverage third parties to provide credibility to initiatives to business, senior management and boards  Integrate into security/risk governance structure
  • 3. W. Capra Consulting Group Discussion Points (1) 2 What comes to mind when you hear the words “security assessment”? What does it mean to you? Predominant View – Security assessments should focus on managing risk rather than checking the box. Emphasis should be placed on understanding risk associated with valuable data assets. Leadership Feedback 1. Assessments can be different based on what you are trying to achieve 2. Understand the valuable data assets that need protecting before starting an assessment 3. Think about what you want to get out of the assessment 4. Security assessment should include vulnerability assessment, penetration testing, and compromise investigations 5. BIA (Business Impact Analysis) is needed to put findings in context
  • 4. W. Capra Consulting Group Discussion Points (2) 3 How do you use assessments in your organization? Prioritize gaps? Independent perspective on threats (current and future) and existing vulnerabilities? Input to security roadmap and budget? Predominant View – Assessments are used to obtain an independent view of gaps and provide input to prioritized roadmap. The independent view helps to justify budget. Leadership Feedback 1. All of the above apply to each organization 2. Independent gives more validity to findings when meeting with stakeholders – that’s what they are good at 3. Use assessment to slow the business down – third party risk assessment to manage shadow IT 4. Assessment findings help to justify innovative solutions and transformative initiatives (e.g., network re-architecture)
  • 5. W. Capra Consulting Group Discussion Points (3) 4 Do you leverage a security framework to guide security within your environment? ISO27k, SANS, NIST, etc.? Does the framework influence how you approach the security assessment? Predominant View – Frameworks are helpful in security and serve as a good reference. Organizations must understand how to ask the right questions and verify existing controls match the responses. Leadership Feedback 1. Each organization used/referenced a security framework to guide risk management 2. Frameworks are good and you also need to ensure the right questions are asked 3. Assessments must verify responses – obtain evidence controls are in place 4. Approach includes obtaining stakeholder sign-off on the findings and remediation plan 5. Assessments should be performed using tools to detect gaps and conducting interviews with the right personnel
  • 6. W. Capra Consulting Group Discussion Points (4) 5 How far do you go to get a good perspective on your risks? Technology (app – storage), security controls, architecture review, processes (e.g., Service Desk) susceptible to social engineering attacks? Predominant View – Assessments must extend beyond technology to be effective. Investigation of security awareness and physical security practices are critical. Threat modeling is important to understand what’s relevant. Leadership Feedback 1. Focus on user/employee security awareness programs and education that helps them in their personal life (e.g., safe at home program) 2. Physical assessments becoming more important 3. Push ownership of data to business stakeholders 4. Get past OWASP to using Red Teams and threat modeling 5. Follow up to measure social engineering risk (e.g., phishme) 6. Identify an approach to hold users accountable for poor decisions (e.g., tie to compensation)
  • 7. W. Capra Consulting Group Discussion Points (5) 6 What is the right interval to perform assessments? Annual? Semi-annual? Predominant View – The consensus view is an annual assessment. Organizations should perform activities throughout the year to understand changes to risk profile. Leadership Feedback 1. Interval is aligned with compliance requirements – annual assessment 2. Objective is to perform formal assessment annually and maintain updated view throughout the year 3. Annual assessment with monthly follow up and continual external scans 4. Assessment followed up with monthly CIO, CISO meeting to review progress
  • 8. W. Capra Consulting Group Discussion Points (6) 7 Do you include Cloud Service Providers (CSPs) in the scope of security assessments? Why or why not? Predominant View – Assessing all partners is critical in today’s IT environment. IT must work with these partners to ensure they have the right controls in place – don’t accept generic responses. Leadership Feedback 1. Question should include ALL providers and business partners 2. Big issue – assessment of partners is critical 3. Include all service providers as this is a potential high risk source 4. Don’t accept partner generic responses to assessment – hold them accountable to demonstrate effective security 5. Need to include important points that hold partners accountable in the contract
  • 9. W. Capra Consulting Group Discussion Points (7) What are you not getting out of security assessments? What’s missing? How do you plug the gaps? Technologies? Processes? Predominant View - Assessments must be more comprehensive and forward looking. Peer comparison would be helpful when communicating with business leadership. Leadership Feedback  Good perspective on how risk is evolving (e.g., emerging threats)  Accurate view of risk in third party assessments  A good perspective on class comparison – how do you compare with other organizations in your industry (e.g., gaps, level of risk) 8
  • 10. W. Capra Consulting Group Questions We Didn’t Get To Ask… 1. How do you know the security assessment was effective? What gives you that comfort level? Is it possible to get that comfort level? 2. Do you use security assessments to manage/address business leadership/Board perceptions? For example, Target breach raised Board interest in security. 3. In general, what’s missing in security today? What should we pay more attention to? 9
  • 11. W. Capra Consulting Group 221 N. LaSalle, Suite 1325 Chicago, Illinois 60601 Security SIG Chairperson: Matt Beale, Associate Partner, W. Capra mbeale@wcapra.com (312)972-2433 Technology Executive Club Reference: www.technologyexecutivesclub.com www.technologyexecutivesclub.com/securitychicago