To protect the confidential and proprietary information included in this material, it may not be disclosed or provided to any third parties without the.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 17 – Risk Management
Advertisements

Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
1 1 Risk Management: How to Comply with Everything July 11, 2013.
Lecture 19 Page 1 CS 111 Online Protecting Operating Systems Resources How do we use these various tools to protect actual OS resources? Memory? Files?
Chapter 4.3 Choose the legal form of your Business
Carl Johnson Financial Literacy Jenks High School.
1.3 Control of Information In this section you must be able to: Describe the legal rights and obligations on holders of personal data to permit access.
Budgeting Basics WHPE. The goals of this chapter: To give you an understanding of how common your situation is. To outline benefits and process for creating.
 At least 5 years experience as a worker  Must pass the state exam.
Chapter 2 Modern Private Security
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
ROLE OF THE IT FUNCTION: COSTS, ANALYSIS, DEVELOPMENT Based on materials by David Schuff.
Presented by J. David Hesson, Jr. Vice President Aspen Health Care Metrics A MedAssets Company.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Data Protection in Financial Services Are you Seeing the Bigger Picture? 17 September 2008.
An Important Message About Your Taxes You could get more money back this year if you were affected by the economy or a natural disaster. We’ll make it.
Overview of Cybercrime
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
 Business Recovery Services TMA Meeting – Brighton 7 th March 2007.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
RSL Consulting Building partnerships, to protect and supply security advice and support to commerce and industry!
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The State of Computer & Data Security in Corporations Independent Survey.
BUSINESS ORGANIZATIONS. SOLE PROPRIETORSHIPS What is the most common form of business? Sole Proprietorship, which is a business run by one person; smallest.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
7 tips to do secure online shopping. Shopping Online? How literate are you with online buying? Do you know to differentiate real and fake stuff? Do you.
DIGITAL FOOTPRINT Everything you do is online. How you can protect yourself and your info.
©Donna Fitzgerald. Business Case Analysis: Tips and Techniques for Project Managers Donna Fitzgerald.
Computer security By Isabelle Cooper.
My Digital Footprint Gracyn K. WHAT’S A DIGITAL FOOTPRINT? You may not know what a digital footprint is, but you probably already have one yourself. A.
Entrepreneurship Business Plan Utilizing Financial Documents.
Staying ahead of the storm: know your role in information security before a crisis hits Jason Testart, IST Karen Jack, Secretariat.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
The Business Profitability TOTALSOLUTION Program Business Profitability Solutions Like The Fortune 500 Use For The ABC Company August 19, 2014 Presented.
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Why Do You Need Legal Expenses Cover?.  In our daily activities, at times we find ourselves on the wrong side of the law. This is rather serious since.
Business Ownership Structures
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
© 2015 albert-learning.com How to talk to your boss How to talk to your boss!!
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
Few Tips To Buy Homeowners Insurance Leads. The lead generation market is constantly developing with the increasingly developing new lead generation models.
Chapter Saving 2. Commercial Bank 3. Savings Bank 4. Credit Union 5. Savings Account 6. Certificate of Deposit 7. Money Market Account 8. Annual.
Risk Assessment and Risk Management James Taylor COSC 316 Spring 2008.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Legal Forms of Business Sole Proprietorship Partnerships Corporations.
The real reason why physicians must comply with HIPAA. What the government does not tell you? © CureMD Healthcare.
The Six Secrets to Going from Employee to Business Owner in 12 Months.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
Bookkeeping Gold Coast 101 – How Outsourcing Help Your Business.
Welcome to the ICT Department Unit 3_5 Security Policies.
Chapter 2 Modern Private Security
Regulatory Compliance
Chapter 3: IRS and FTC Data Security Rules
Information Security: Risk Management or Business Enablement?
Ransomware and Data breaches in public libraries
How to address security, cost, IT and migration concerns
Protecting Business Assets While Enabling Performance
Presentation transcript:

To protect the confidential and proprietary information included in this material, it may not be disclosed or provided to any third parties without the approval of Hewitt Associates LLC. Selling security How to talk to the business that feeds you

2[MM/DD/YYYY] Cost and benefit in security Risk analysis Risk = Asset Cost X Threat Probability Controls to prevent risks Cost of controls Not only direct cost of roll-out (license, installation) Employee’s burden to use control is also Cost Control Cost > Asset Cost doesn’t make much sense Pretty obvious for Business folks Not so obvious for Security folks

3[MM/DD/YYYY] Security as a cost? This is how it’s often seen by Bussiness Security = Necessary evil, required by Regulators, waste of our hardly earned money Security folks know the truth here Often they can’t properly express it Security is not a cost Security is an investment to prevent losses Spend $100k to prevent losing $1m = 10x benefit It’s not: „Security spent $100k” It’s: „Security helped saving $1m for just $100k”

4[MM/DD/YYYY] Two ways to enable security Enforcement model You have powers to enforce any control Law, public administration, some corporate environments (financial, military) If Asset Cost is HUGE, Security might take priority YOU set the rules, and THEY must obey them Soft model You have little powers to enforce controls Most private companies, most corporate environment If Sales makes $5m revenue and Security makes $500k „loss” quarterly, you have to be very careful before trying to put a stick in their wheels Your arms are: talk and listen – YOU must fit THEIR needs

5[MM/DD/YYYY] Kids with guns If you have powers to enforce any control... You will be tempted to enforce even the dumbest ones – Security vendors are good in overrating risks to sell stuff Common approach among some regulators and governments Example: qualified electronic signature for e-invoice in Poland – 5% usage since 2005 (mostly EDI) – Compare to Denmark’s 60% (mostly OCES)

6[MM/DD/YYYY] Don’t turn shepherd into a policeman So even if you have powers... Try to understand your client needs as much as possible – Client = your Sales dept, Citizens, National business Perform as much real life risk analysis (including cost & benefit) Make sure your controls help things instead of breaking things Periodically perform a reality check – how does my security help business? Otherwise you may destroy your organisation’s flexibility and competitive advantage – And lose your job – and make hundreds other people lose job as well

7[MM/DD/YYYY] Most important control from ISO „Obtain management support” Everything starts here If you won’t, business will ignore you, your controls or try to work around them How to obtain management support? Talk to business Talk to management – It’s the best reality check you can think of – To convince old sharks you must have really good arguments – Don’t get tempted to grab some scary number from vendor ordered „independent reports”

8[MM/DD/YYYY] If you failed to obtain management support You may be wrong Make sure you REALLY understand where does your salary come from Management may be wrong You might be right but used wrong arguments – again, your fault Management may already have selected controls using arguments other than rational risk analysis – you can’t do much about it

9[MM/DD/YYYY] „Talking to Bussiness HOWTO” Avoid „weasel talk” and buzzwords Blacklist wording like: „some attacks exist that migh pose a risk” Use as much facts and numbers as possible Do use industry reports But always filter them through your company’s context Learn from historic incidents in YOUR organisation – Single such incident is worth 10 industry reports Perform periodic reality checks on your arguments If necessary drill down to a single specific incident Build cause-reason trees Make sure at the end the threat is still there!

10[MM/DD/YYYY] Some examples - Ponemon Report (2006) Direct cost to handle data breach incidents On average 4,8 milion USD – from 226’000 to 22’000’000 Cost of controls implemented after the breach On average 180’000 USD for one incident Data loss caused by organization internal factors 70% cases caused by lack of data ownership, ignoring procedures and negligence Data loss during electronic data processing 90% incidents caused by loss of laptop or electronic media

11[MM/DD/YYYY] Threat analysis – case study Real life incident from 2005 Financial industry, event still remembered by some management people One stolen laptop resulted in ~5000 affected clients Handling of every record costed ~115 USD It pretty much fits Ponemon’s estimate from 2008 ($ per record) Even if no actual loss was caused to the clients (laptop was lost without trace) How much this single incident costed organisation at the end of the day? $500k

12[MM/DD/YYYY] Threat analysis – case study #2 FSA fined HSBC Group for £3m, June 2009 Public report on FSA website Detailed list of issues found How many of these you recognize in your organisation? How close was the hit to your industry?

13[MM/DD/YYYY] Control analysis – last example Company deployed full-disk encryption (FDE) All laptops covered, cost $100k Office break-in happens in laptops stolen 2 contained sensitive client’s records Cost for organisation at the end of the day – close to ZERO Hardware was covered by insurance Data was backed up Whole operating system was encrypted You can prove this to client, because all laptops are encrypted

14[MM/DD/YYYY] Questions? Questions, comments