SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Can Information
Security Prevail?
NOT WITHOUT A
Cyber-Security Strategy!
Does your company have a cyber-threat strategy?


In a recent survey…

     only 53% of respondents have a documented
     security strategy,

                and only 47%           indicated that their
                current strategy adequately addresses the risks.
                              - Ernst & Young's Global Information Security Survey




                               Does your company have a
                               documented strategy with a
                               realistic and comprehensive
                               cyber-security plan?
Thinking you have a plan when
you do not, is dangerous




  If system administrators and management believe they
  have a cyber-security strategy, they are less likely to
  actively allocate and focus resources.

  It becomes easy to be complacent and ignore risks, hoping
  the status quo is sufficient and then be surprised when it is
  not.



               The next five key questions can help you
                         assess your company’s strategy.
1. Does your strategy identify threat agents who will be
attacking your organization over the next 3 to 5 years?



                  A defense posture can only be
                  evaluated in relation to threats.
                  Without knowing the
                  attackers, defenders remain in the dark
                  and are forced to protect from risks both
                  real and imagined.

                  The first step to any realistic strategy
                  is to know who the opposition is, both
                  today and in the future, thereby
                  understanding their capabilities,
                  objectives, and likely methods.


  McAfee's 2012 Threat Predictions report is a
    great document to start your analysis.
2. Does your strategy articulate how you will
likely be attacked by those threat agents?



                Understanding your IT environment,
                where it is less secure, and how
                specific threat agents will attack over
                time, is imperative to a strategy.

                Does the strategy talk about generic worms
                viruses, and system patching? Or does it
                take into account likely exploits paths….the
                ones which align to the common methods of
                pervasive threat agents?



For more on Intel IT’s cyber-security strategy,
read our Threat Agent Risk Assessment paper.
3. What impacts and losses are estimated from
       these attacks, given the expected defenses?



                      Strategy is about planning. Planning
                      security is about finding the right balance
                      between spending for controls, versus the
                      residual losses of an attack that are
                      acceptable. Without knowing the likely
                      losses, even at a generic level, it is
                      impossible to plan forward.




You can learn more about Intel IT’s new enterprise security
  strategy, in our Rethinking Information Security paper.
4. How do your security budget and
         efforts align to acceptable levels of loss?



                       Impervious security, where no losses
                       occur, either do not exist or are far
                       too costly to employ.

                       Some losses are inevitable and knowing
                       the range that is acceptable to
                       management and/or shareholders is
                       essential. If your company is outside the
                       range, it should trigger plans to increase
                       or contract your security spending.



Intel’s model for measuring the value of security investments
  paper includes prioritization against a variety of threats.
5. Who is responsible for the care and maintenance
      of your company’s security strategy?



                      Given the rapid and unpredictable
                      nature of security
                      threats, vulnerabilities, and impacts, a
                      strategy must be continually assessed and
                      adapt accordingly.

                      Without clear ownership, most strategies
                      quickly become stale and worthless. Without
                      a person entrusted and empowered to
                      actively plan and manage the cyber-threat
                      security strategy, your answers to questions
                      1 thru 4 become irrelevant.

    Malcolm Harkins, Intel’s Chief Information Security
Officer, talks about balancing business growth versus risk
  in this "Can Information Security Survive?" webcast.
Don’t become discouraged if your company does
  not have a robust cyber-security strategy…
      it is the norm, not the exception.


                 Collectively, we are still at the
                 beginning of this endeavor and
                 have much to learn. Rushing to
                 claim maturity is not the prudent
                 path. Be realistic and recognize
                 where you company is and
                 where it needs to be.
Intel IT is passionate about driving business
value through innovation and sharing IT best
              practices with our industry peers.


        Learn more about Intel IT’s information
             security initiatives at: Intel.com/IT
Legal Notices

This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR
IMPLIED, IN THIS SUMMARY.

Intel, Intel logo, are trademarks of Intel Corporation in the U.S. and other countries.

* Other names and brands may be claimed as the property of others

Copyright © 2012 Intel Corporation. All rights reserved.




                                       Copyright © 2012, Intel Corporation. All rights reserved.
Verify Your Cyber Threat Strategy

Weitere ähnliche Inhalte

Mehr von IT@Intel

Intel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformationIntel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformationIT@Intel
 
IT@Intel: Introducing IT on the Go
IT@Intel:   Introducing IT on the GoIT@Intel:   Introducing IT on the Go
IT@Intel: Introducing IT on the GoIT@Intel
 
Enterprise Video Hosting: Introducing the Intel Video Portal
Enterprise Video Hosting:  Introducing the Intel Video PortalEnterprise Video Hosting:  Introducing the Intel Video Portal
Enterprise Video Hosting: Introducing the Intel Video PortalIT@Intel
 
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
How to Self-Provision over WLAN with Intel(R) vPro(TM) TechnologyHow to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
How to Self-Provision over WLAN with Intel(R) vPro(TM) TechnologyIT@Intel
 
Jamming on Collaboration
Jamming on CollaborationJamming on Collaboration
Jamming on CollaborationIT@Intel
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsIT@Intel
 
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at IntelDeploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at IntelIT@Intel
 
Nurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through MindfulnessNurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through MindfulnessIT@Intel
 
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture TabletsEvaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture TabletsIT@Intel
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud SecurityIT@Intel
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecurityIT@Intel
 
It tools slideshare
It tools slideshareIt tools slideshare
It tools slideshareIT@Intel
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security SurviveIT@Intel
 

Mehr von IT@Intel (13)

Intel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformationIntel and IT- key industry trends driving business transformation
Intel and IT- key industry trends driving business transformation
 
IT@Intel: Introducing IT on the Go
IT@Intel:   Introducing IT on the GoIT@Intel:   Introducing IT on the Go
IT@Intel: Introducing IT on the Go
 
Enterprise Video Hosting: Introducing the Intel Video Portal
Enterprise Video Hosting:  Introducing the Intel Video PortalEnterprise Video Hosting:  Introducing the Intel Video Portal
Enterprise Video Hosting: Introducing the Intel Video Portal
 
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
How to Self-Provision over WLAN with Intel(R) vPro(TM) TechnologyHow to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
How to Self-Provision over WLAN with Intel(R) vPro(TM) Technology
 
Jamming on Collaboration
Jamming on CollaborationJamming on Collaboration
Jamming on Collaboration
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform Benefits
 
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at IntelDeploying Intel Architecture-based Tablets with Windows* 8 at Intel
Deploying Intel Architecture-based Tablets with Windows* 8 at Intel
 
Nurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through MindfulnessNurturing Innovation at Intel through Mindfulness
Nurturing Innovation at Intel through Mindfulness
 
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture TabletsEvaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information Security
 
It tools slideshare
It tools slideshareIt tools slideshare
It tools slideshare
 
Can Information Security Survive
Can Information Security SurviveCan Information Security Survive
Can Information Security Survive
 

Kürzlich hochgeladen

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 

Kürzlich hochgeladen (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Verify Your Cyber Threat Strategy

  • 3. Does your company have a cyber-threat strategy? In a recent survey… only 53% of respondents have a documented security strategy, and only 47% indicated that their current strategy adequately addresses the risks. - Ernst & Young's Global Information Security Survey Does your company have a documented strategy with a realistic and comprehensive cyber-security plan?
  • 4. Thinking you have a plan when you do not, is dangerous If system administrators and management believe they have a cyber-security strategy, they are less likely to actively allocate and focus resources. It becomes easy to be complacent and ignore risks, hoping the status quo is sufficient and then be surprised when it is not. The next five key questions can help you assess your company’s strategy.
  • 5. 1. Does your strategy identify threat agents who will be attacking your organization over the next 3 to 5 years? A defense posture can only be evaluated in relation to threats. Without knowing the attackers, defenders remain in the dark and are forced to protect from risks both real and imagined. The first step to any realistic strategy is to know who the opposition is, both today and in the future, thereby understanding their capabilities, objectives, and likely methods. McAfee's 2012 Threat Predictions report is a great document to start your analysis.
  • 6. 2. Does your strategy articulate how you will likely be attacked by those threat agents? Understanding your IT environment, where it is less secure, and how specific threat agents will attack over time, is imperative to a strategy. Does the strategy talk about generic worms viruses, and system patching? Or does it take into account likely exploits paths….the ones which align to the common methods of pervasive threat agents? For more on Intel IT’s cyber-security strategy, read our Threat Agent Risk Assessment paper.
  • 7. 3. What impacts and losses are estimated from these attacks, given the expected defenses? Strategy is about planning. Planning security is about finding the right balance between spending for controls, versus the residual losses of an attack that are acceptable. Without knowing the likely losses, even at a generic level, it is impossible to plan forward. You can learn more about Intel IT’s new enterprise security strategy, in our Rethinking Information Security paper.
  • 8. 4. How do your security budget and efforts align to acceptable levels of loss? Impervious security, where no losses occur, either do not exist or are far too costly to employ. Some losses are inevitable and knowing the range that is acceptable to management and/or shareholders is essential. If your company is outside the range, it should trigger plans to increase or contract your security spending. Intel’s model for measuring the value of security investments paper includes prioritization against a variety of threats.
  • 9. 5. Who is responsible for the care and maintenance of your company’s security strategy? Given the rapid and unpredictable nature of security threats, vulnerabilities, and impacts, a strategy must be continually assessed and adapt accordingly. Without clear ownership, most strategies quickly become stale and worthless. Without a person entrusted and empowered to actively plan and manage the cyber-threat security strategy, your answers to questions 1 thru 4 become irrelevant. Malcolm Harkins, Intel’s Chief Information Security Officer, talks about balancing business growth versus risk in this "Can Information Security Survive?" webcast.
  • 10. Don’t become discouraged if your company does not have a robust cyber-security strategy… it is the norm, not the exception. Collectively, we are still at the beginning of this endeavor and have much to learn. Rushing to claim maturity is not the prudent path. Be realistic and recognize where you company is and where it needs to be.
  • 11. Intel IT is passionate about driving business value through innovation and sharing IT best practices with our industry peers. Learn more about Intel IT’s information security initiatives at: Intel.com/IT
  • 12. Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel, Intel logo, are trademarks of Intel Corporation in the U.S. and other countries. * Other names and brands may be claimed as the property of others Copyright © 2012 Intel Corporation. All rights reserved. Copyright © 2012, Intel Corporation. All rights reserved.