SlideShare uma empresa Scribd logo
1 de 16
Reimagining risk management: How
restorative practices can transform
information security programs
Michele Chubirka
• Michele Chubirka, 20+ year
technologist working as a cloud
security advocate at Google.
• Creator of the Healthy Paranoia
Security Podcast.
• Analyst, architect, researcher, writer
for Dark Reading, Information Week,
Network Computing, and Tech Target
• Focus on security architecture and
“best practices.”
• Views are my own.
http://postmodernsecurity.com
@MrsYisWhy
Who Am I?
Who Am
I?
Why risk management?
Worldwide
information
security services
spending from
2017 to 2022
(in billion U.S.
dollars)
What is risk management?
RISK =Threat x vulnerability x impact
According to the National Institute of
Standards andTechnology (NIST) SP
800-37 Rev. 2, Risk Management is
“The program and supporting
processes to manage risk to agency
operations (including mission,
functions, image, reputation), agency
assets, individuals, other organizations,
and the Nation, and includes:
establishing the context for risk-related
activities; assessing risk; responding to
risk once determined; and monitoring
risk over time.”
The Risk Process
From Enterprise Risk Management, 2nd Edition
Risk management in the
context of Restorative
Practices
What is the risk
management
relationship?
What is the
organizational
impact?
Responses
from
stakeholder
s
Restorative opportunities
Compliance as
Property
• In technology and software engineering, a
common approach to security is to address
requirements after delivery.
• This approach fails to consider how the
requirement(s) can be integrated during
development, which avoids reengineering later.
• Disempowers engineering teams by
outsourcing compliance and the
understanding of the requirements to another
group.
• To proactively address security concerns, a
team must see these requirements as their
“property” to address them efficiently during
the design and development phases.
Security is a
social problem
Most practitioners treat risk
management as a technical problem
It’s really a social problem.
Diverse groups are involved in the risk
management process. To be effective,
we need to cultivate relational skills to
support collaboration.
Thank you
• Michele Chubirka
• Chubirka@google.com
References
• https://www.statista.com/statistics/217362/worldwide-it-
security-spending-since-
2010/#:~:text=In%202022%2C%20the%20security%20service,over
%20150%20billion%20U.S.%20dollars.
• https://www.migso-pcubed.com/blog/pmo-project-
delivery/four-step-risk-management-
process/#:~:text=The%204%20essential%20steps%20of,and%20Re
port%20on%20the%20risk.
• https://www.360factors.com/blog/five-steps-of-risk-
management-process/
• https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.8
00-37r2.pdf
• Enterprise Risk Management, 2nd Edition, Fraser, Quail and
Simkins
• https://www.tandfonline.com/doi/abs/10.5235/20504721.1.3.3
11?journalCode=rrej20
• https://postmodernsecurity.com/2021/11/29/compliance-as-
property/

Mais conteúdo relacionado

Semelhante a Reimagining Risk Management: How Restorative Practices Can Transform Information Security Programs

Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Angel Rodriguez
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
greendigital
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
Daren Dunkel
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
360 BSI
 

Semelhante a Reimagining Risk Management: How Restorative Practices Can Transform Information Security Programs (20)

Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting International
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
 
REDUCING CYBER EXPOSURE From Cloud to Containers
REDUCING CYBER EXPOSURE From Cloud to ContainersREDUCING CYBER EXPOSURE From Cloud to Containers
REDUCING CYBER EXPOSURE From Cloud to Containers
 
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Disarm vanguards 2022-02-25 (3)
Disarm vanguards 2022-02-25 (3)Disarm vanguards 2022-02-25 (3)
Disarm vanguards 2022-02-25 (3)
 
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats" Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Enterprise risk & risk management - I
Enterprise risk & risk management - IEnterprise risk & risk management - I
Enterprise risk & risk management - I
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Project risk management (1)
Project risk management (1)Project risk management (1)
Project risk management (1)
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 

Último

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Reimagining Risk Management: How Restorative Practices Can Transform Information Security Programs

Notas do Editor

  1. We spend Billions of dollars on security products and at the end of the day, the weakest link is people Even with training, people often make the wrong choices. Everything is at stake for us, but too often behavior is siloed and people don’t work together. Security is a social problem.
  2. Something isn’t working. What is a data breach? A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an unauthorized fashion. Data breaches can occur in any size organization, from small businesses to major corporations. They may involve personal health information (PHI), personally identifiable information (PII), trade secrets or other confidential information.
  3. We spend Billions of dollars on security products and at the end of the day, the weakest link is people Even with training, people often make the wrong choices. What if the problem isn’t about the user at all, but security practitioners? Everything is at stake for us, but too often behavior is siloed and people don’t work together. Security is a social problem.
  4. Proactive planning and response. Identify the Risk – what’s the type of risk? Assess and measure the Risk – use formula, identify impact Manage or Rank the Risk – use risk tiers and score (qualitative or quantitative). Will you accept, transfer, reduce risk? What are the mitigators/controls in place? Reduce the risk, can’t eliminate. Monitor and report– how are you managing the risk over time? track over time. Audit controls.
  5. Typically, the relationship between risk management professionals or security practitioners and technical staff (software developers, systems administrators) is authoritarian and adversarial as illustrated by the Social Discipline Window. There is a technical shortfall that increases organizational risk and a report is provided to a team and their leadership that calls out the gap. There is a defect management service level agreement (SLA) which mandates a deadline for remediation and there isn’t much of a discussion. It is rare to see empathy and understanding. While it’s important to address security vulnerabilities to protect an organization and its customers, the standard approach is coercive, unidirectional and grounded in punishment and professional shame.
  6. This approach results in the interruption of positive affect or shame, embarrassment and humiliation.
  7. Now you have an entire organization stuck in a shame response. The security and risk practitioners don’t understand why they aren’t making progress in burning down security issues, because they think it’s just a technical issue and that the technical staff is being intentionally obstructive.
  8. What techniques from the restorative continuum could we use in risk management? Affective statements with technical staff to discuss the issues and the impact to ourselves and the organization. We could use affective questions to understand the impact to a technical team’s workload and priorities. We could use impromptu conferences to resolve conflict or proactively build relationship. We can use circles to develop collaborative approaches, for problem solving or to facilitate creative solutions. Most importantly you can integrate the three ”E’s” of fair process, engagement, explanation and expectation clarity.l
  9. With apologies to Nils Christie, I’ve borrowed and repackaged his original idea of conflict as property for information security.