55
SECURITY VISION A NITIAN INSPIRING A CULTURE OF SECURITY

Security Vision - Inspiring People to Embrace Security

  • Upload
    anitian

  • View
    821

  • Download
    3

Embed Size (px)

Citation preview

Page 1: Security Vision - Inspiring People to Embrace Security

SECURITY VISION

ANITIAN

INSPIRING A CULTURE OF SECURITY

Page 2: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

OUR VIS ION

WE BELIEVE

SECURITY IS ESSENTIAL FOR

GROWTH, INNOVATION, AND

PROSPERITY

Page 3: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

programs

controls

practices

policies

in the cloud

leaders

OUR MISSION

Build great security…

Page 4: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

OUR SERVICES

• Enterprise risk assessments

• HIPAA risk assessment

• Third party risk assessment

• PCI-DSS

• HIPAA / HITRUST

• ISO 27001:2013

• SOC2

• FFIEC / GLBA

• FISMA / NIST

• NERC-CIP

• EI3PA

• Cloud compliance

• Penetration testing

• Application security

• Code review

• Configuration analysis

• Firewall policy review

• Cloud architecture

• Social engineering

• Red team testing

• Managed security (MSSP)

• NGFW

• SIEM

• Endpoint

• Vulnerability Management

• Web Gateway

• DLP

• Behavior Analytics

• Managed detection & response

(MDR)

• Digital forensics & incident

response (DFIR)

• Leadership as a Service

• On-Demand advisory

• Industry & market research

• Staff augmentation

Page 5: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

OUR SPEAKER

• President / CEO of Anitian

• Principal at TrueBit CyberPartners

• 20+ years of experience in security

• Discovered SQL injection in 1995

• Helped develop first in-line IPS engine

(BlackICE)

Page 6: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

OVERVIEW

Intent

• Help you build a more effective security program

• Discuss the value of creating Security Vision

• Demonstrate Anitian’s value

Outline

1. The Challenge

2. Defining Security Vision

3. Implementing Security Vision

4. Qualities of Great Security Leaders

Page 7: Security Vision - Inspiring People to Embrace Security

Logic clearly dictates that the needs of the many, outweigh the needs of the few…or the one.

- Spock Star Trek II The Wrath of Khan

Page 8: Security Vision - Inspiring People to Embrace Security

THE CHALLENGE

Page 9: Security Vision - Inspiring People to Embrace Security

DO WE HAVE A SECURITY

PROGRAM EFFECTIVENESS

PROBLEM?

YES

Page 10: Security Vision - Inspiring People to Embrace Security

PEOPLERESOURCE

ARE THE MOST IMPORTANT: THREAT

CHALLENGE

Page 11: Security Vision - Inspiring People to Embrace Security

I just want to do the right things

Page 12: Security Vision - Inspiring People to Embrace Security

…but I can’t

Page 13: Security Vision - Inspiring People to Embrace Security

Security is a top priority…

…that does not apply to me

SCHIZOID SECURITY

Page 14: Security Vision - Inspiring People to Embrace Security
Page 15: Security Vision - Inspiring People to Embrace Security

CHECKBOX SECURITY

DESTROYS TRUST

Page 16: Security Vision - Inspiring People to Embrace Security

GOOD ENOUGH

ISN’T GOOD ENOUGH

Page 17: Security Vision - Inspiring People to Embrace Security

Weakness is endemic...

…exploitation is epidemic

Page 18: Security Vision - Inspiring People to Embrace Security

Alerts are a hacker’s way of saying goodbye

PASSIVE SECURITY

Page 19: Security Vision - Inspiring People to Embrace Security

Apps, cloud, access…

…the back door is wide open.

Page 20: Security Vision - Inspiring People to Embrace Security
Page 21: Security Vision - Inspiring People to Embrace Security
Page 22: Security Vision - Inspiring People to Embrace Security
Page 23: Security Vision - Inspiring People to Embrace Security

IS THERE ANY

HOPE?

Page 24: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

YES

WITH

SECURITY

VISION

Page 25: Security Vision - Inspiring People to Embrace Security

MEANING

Page 26: Security Vision - Inspiring People to Embrace Security

FOCUS

Page 27: Security Vision - Inspiring People to Embrace Security

RELEVANCE

Page 28: Security Vision - Inspiring People to Embrace Security

ACTION

Page 29: Security Vision - Inspiring People to Embrace Security

DEFININGSECURITY VISION

Page 30: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

WH

Y

HO

W

WH

AT

WH

ER

E

WH

O

AC

TIO

N

SECURITY OPERATIONS

PROJECTS

METR

ICS

SECURITY

PROGRAM

Page 31: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

BUSINESS RISK VISION COMPONENTS

•Vision and Mission StatementsWHY

• Core ValuesHOW

• Risk ManagementWHAT

• ProjectsWHERE

• Roles and responsibilitiesWHO

• SimplicityACTION

Page 32: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

START WITH WHY

Simon Sinek: www.startwithwhy.com

Page 33: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

VISION & MISSION STATEMENTS

• Vision

• Make the world a better place

• Improve quality of life for everybody

• Preserve our heritage

• A world free of evil (pain, misery, loss, disease, etc.)

• Mission

• Care for the sick

• Defend (Enable, Cultivate) prosperity and innovation

• Bring (service) to everybody

• Build great security leaders

• Manage risk to promote prosperity

Page 34: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

INWARD VS OUTWARD VISION

• FedEx

FedEx will produce superior financial returns for shareowners

by providing high value-added supply chain, transportation,

business and related information services through focused

operating company.

• Raytheon

One global team creating trusted, innovative solutions to

make the world a safer place.

Customer success is our mission.

Page 35: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

HOW: SAMPLE CORE VALUES - RAYTHEON

• Trust

• Respect

• Collaboration

• Innovation

• Accountability

Page 36: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

WHY/HOW: ANSWER THE BIG QUESTIONS

Communicate

1. Why we are here? <- Vision

2. Why do what we do? <- Mission

3. How do we do it? <- Core Values

4. What do we do? <- Security Program

Execute:

• Encourage care

• Bring people to the table

• Focus people on the right things

• Inspire decision making

Page 37: Security Vision - Inspiring People to Embrace Security

IMPLEMENTINGSECURITY VISION

Page 38: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

WHAT: IS THE THREAT?

• Your program must be based in risk management

• Communicate

• What can damage the business?

• How could it happen?

• What would be the outcome?

• What weaknesses

• Execute

• Conduct a comprehensive, organizational risk assessment

• Share the top 10 threats with the organization

• Define projects based on those top 10

• Focus staff on those threats

Page 39: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

SAMPLE THREAT INTELLIGENCE BRIEFING

# Threat Vulnerabilities Recommendations Imp

act

Pro

bab

ility

Ris

k

1. Attacker

successfully

tricks user

to perform

unsafe

action

No formal security

awareness training

program for employees.

Insufficient personnel for

execution of security

awareness training.

Users have been the target

of multiple sophisticated

spear-phishing email fraud

campaigns.

Implement a formal

security awareness

training program for all

employees.

Conduct regular

internal phishing

campaigns to help raise

awareness of potential

security issues.

H E H

Page 40: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

SAMPLE RISK INTELLIGENCE BRIEFING

Page 41: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

WHERE: IS THE ANSWER?

• Establish projects that target threat and support the

business

• Communicate

• Focus on the strategic goals of the company

• Align projects to those goals, and the vision, mission, and

core values

• Have clearly defined business, security, and cost

requirements

• Execute

• Select projects to improve:

1. People

2. Technologies

3. Procedures/Policies

In that order

Page 42: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

WHO: REALLY MATTERS?

• People are not assets

• Communicate

• Each team member’s value

• Trust, collaboration, and togetherness

• Read Speed of Trust

• Be a Servant Leader

• Execute

• Follow the 13 Behaviors of Trust

• Hire on cultural fit, not technical skill

• Fire toxic employees quickly

• Spend every day engaged, working with your team

• Serve the needs of the many AND the few

Page 43: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

ACTION: AFFECT CHANGE

Communicate

• Favor action over reaction

• Push people to learn, grow, and become more

• What is the total cost of ownership (time, money, effort)?

Execute

• Control vendor engagement closely

• Ask people to commit to deadlines and milestones, hold

them accountable.

• Reward action that protects the business

• Establish metrics that measure result, not effort

Page 44: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

ACTION PLAN EXAMPLE

• Define exactly what must be done to reduce/eliminate risk

• Be specific; no vague hopes

• Define the effort to implement the fix

# Action Description Estimate Effort

A1 Integrate all

critical devices

with SIEM

Complete the SIEM deployment,

aggregating system- and application-level

logs for all critical application and security

monitoring devices.

Tune event correlation, incident thresholds

and alerting.

Integrate alerting with incident response

plan.

This work is critical because currently little

to no automated review or alerting for

unauthorized access to PHI occurs.

200-280

hours

$100,000

High

Page 45: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

KEY GOVERNANCE METRICS

Metric Definition

Dwell time How long can an intruder linger before being

detected?

Patch latency How long does it take you to distribute a security

patch?

Velocity of change How quickly are changes implemented, averaged

over time?

Control strength Aggressively test controls

Regulatory coverage Compliance state, progress toward completion

Risk Trend YOY how is your total risk trending

Page 46: Security Vision - Inspiring People to Embrace Security

intelligent information securityA N I T I AN

SECURITY VISION ENABLES

AGILE AUTHENTIC

ALIGNED ACTIONABLE

SECURITY PROGRAM

Page 47: Security Vision - Inspiring People to Embrace Security

QUALITIES OF GREAT SECURITY LEADERS

Page 48: Security Vision - Inspiring People to Embrace Security

TRUSTWORTHY

ABRAHAM LINCOLN

Page 49: Security Vision - Inspiring People to Embrace Security

ANALYTICAL

NIKOLA TESLA

Page 50: Security Vision - Inspiring People to Embrace Security

VISIONARY

STEVE JOBS

Page 51: Security Vision - Inspiring People to Embrace Security

INSPIRATIONAL

VINCE LOMBARDI

Page 52: Security Vision - Inspiring People to Embrace Security

INCLUSIVE

DR. MARTIN LUTHER KING JR.

Page 53: Security Vision - Inspiring People to Embrace Security

HUMBLE

MAHATMA GANDHI

Page 54: Security Vision - Inspiring People to Embrace Security

FEARLESS

AUNG SAN SUU KYI

Page 55: Security Vision - Inspiring People to Embrace Security

THANK YOU

EMAIL: [email protected]

TWITTER: @andrewplato

@AnitianSecurity

WEB: www.anitian.com

BLOG: blog.anitian.com

SLIDES: bit.ly/anitian

CALL: 888-ANITIAN