SlideShare a Scribd company logo
1 of 58
“We a r e n o t
                      j u s t
                  s e c u r i t y
                 a wa r e , b u t
                  s e c u r i t y
                c o mp e t e n t
A model for reducing security risks due to human error
                   a s we l l ”
                 Anup Narayanan, CISA, CISSP
                     Founder & CEO, ISQ            1
Focus of the talk
                        Don’t tell anyone,
  Security
                        my password is…..
   Policy

 Never share
 passwords




 Addressing the human factor
 using security “awareness” and
 “competence” management
                        (C) ISQ. All Rights Reserved   2
The difference between “Awareness” and “Behaviour
                   (Competence)”




         I know the traffic rules….

                   (C) ISQ. All Rights Reserved     3
Does it guarantee that I am a good driver?

                 (C) ISQ. All Rights Reserved   4
Awareness >> Behaviour >> Culture



   Awareness           Behaviour                      Culture
                       (Competence)

      • I know              • I do                       • We know
                                                           and do




An organization must aim for a responsible security culture


                       (C) ISQ. All Rights Reserved                  5
The problem (Mistakes that organizations are making)



                             I have an amazing security
                             awareness program but people
                             still make security mistakes!




                                         The focus is only on
                                         awareness, not behaviour
                                         (competence) and culture




                       (C) ISQ. All Rights Reserved                 6
What organizations need?

 A system that periodically
 shows the current Awareness
 and Competence Levels
                                            Organization’s awareness score is 87%




      LOW AWARENESS       MEDIUM AWARENESS               HIGH AWARENESS



                       Organization’s competence score is 65%


                                 MEDIUM
      LOW COMPETENCE           COMPETENCE
                                                         HIGH COMPETENCE


                          (C) ISQ. All Rights Reserved                      7
The power of perception

Why do people make security mistakes?




             (C) ISQ. All Rights Reserved   8
Imagine…

      Nelson Mandela walks into this room
      right now and offers you this glass of
                    water….




                Will you accept it?
                       (C) ISQ. All Rights Reserved   9
Now, imagine this…

        This man walks into this room right
         now and offers you this glass of
                    water….




               Will you accept it?

                      (C) ISQ. All Rights Reserved   10
Question


                              Which water did you
                                    accept?

                                          Why?




           (C) ISQ. All Rights Reserved             11
Analysis
  Were you checking the water or the person serving
                     the water?




 People decide what is good and what is bad based on
                        “trust”
         Perception is influenced by Trust
                      (C) ISQ. All Rights Reserved   12
Why must we address the human
           factor?

                     (or)
    Is the human factor worth addressing?




                 (C) ISQ. All Rights Reserved   13
Reason 1: Security is both a “Reality” and “Feeling”



                                     For security practitioners security is
                                     a “Reality” based on the
                                     mathematical probability of risks

                                     For the end user (common man)
                                     security is a feeling


                                     Influencing the feeling of security
                                     (what is safe and what is not safe while
                                     handling information) makes a user
                                     make the right security decisions and
                                     apply it




   8/8/2012             (C) ISQ. All Rights Reserved                       14
Reason 2: Not every attack(er) is that smart
          People exaggerate risks that are spectacular or uncommon:
                        So what? RSA was hacked
                                                                  Technology & Processes

                                                                 Awareness & Competence

                                                              The very smart attacker
                 4

                                                    Human – Recognizing a zero day attack,
                 3                                   Phishing mails, Not posting business
Risk severity/
   Attacker                                               information in social media
 Smartness/
    Attack
  Efficiency     2                      Technology + Human – Firewall configuration,
                                                  Choosing a secure Wifi



                 1                 Automatic security controls – AV, Updates




                             Control All Rights Reserved
                              (C) ISQ. efficiency                                    15
Reason 3: How much of a trade-off are we willing to make?

                                             The best way to stop people
                                             from making information
                                             security mistakes is to deny
                                             them access to information.


                                             Are you willing to make that trade-
                                             off?

                                             Security awareness and
                                             competence management is a
                                             trade-off that is affordable and
                                             effective




                        (C) ISQ. All Rights Reserved                            16
Reason 4: The human factor is important…


               Aircrafts have become more advanced, but does it
              mean that pilot training requirements have reduced?




                Cars have become more advanced, but does it
                 mean that driving tests have become easier?



               Medical technology has become more advanced,
               but will you choose a hospital for it’s machines or
                                  the doctors?



                    (C) ISQ. All Rights Reserved             17
The Solution Model

Security Awareness and Competence
           Management




           (C) ISQ. All Rights Reserved   18
The solution is based on HIMIS



 • HIMIS – Human Impact
   Management for
   Information Security
 • Released under Creative
   Commons License
 • Free for Non-Commercial
   Use



                                             http://www.isqworld.com/himis


                      (C) ISQ. All Rights Reserved                           19
ESP

                                                  Awareness
                                                                                    Assess,
Security Risk           Identify the                                              Improve, Re-
  analysis             human factor                                                 assess
                                                  Behaviour
                                                (Competence)




                                                        Identify information security awareness
                                            Define
                                                        and competence needs of the business.


 Check change in awareness                                                 Create the strategy for
  and competence. Improve.                                               awareness and competence
                               Verify                  Strategize
                                                                               management




                                           Deliver


                                    Execute the awareness plan
                                                 (C) ISQ. All Rights Reserved                        20
Strategy - Use ESP (Expected Security Practices)

          ESP               Awareness                         Competence
                            Component                         Component

      Information            Information                   Demonstrates correct
     Classification     classification criterion              classification



                        Classification labels




                                                           Detects and reports a
   Incident reporting    Types of incidents
                                                            simulated incident


                          Incident reporting
                        procedures/ channels


                            (C) ISQ. All Rights Reserved                           21
Phase 1

                            Identify information security awareness
                            and competence needs of the business.


                                             Define



Check change in awareness                                                 Create the strategy for
 and competence. Improve.                                               awareness and competence
                             Verify                        Strategize
                                                                              management




                                             Deliver



                                           Execute the plan




                                      (C) ISQ. All Rights Reserved                            22
Case Study: Client Profile

 • Type of industry: Retail
 • No: of employees 5000+
 • Position: Market Leader
 • Type of Information handled: Customer data, Intellectual
   Property
 • Spending on Information Security Awareness: US$ 75,000




                        (C) ISQ. All Rights Reserved     23
Awareness Vs. Behaviour

         Awareness                             Competence/ Behaviour

 • Sharing of                             • Customer records were
   company/customer                         leaked to competitor
   information is wrong                   • Salary information of top
 • Sensitive Information                    executive was given to
   must be protected                        head hunter
 • Access Control Cards                   • Printouts lying
   must be protected                        unattended
                                          • Visitors can enter the
                                            facility without informing
                                            security guard


                           (C) ISQ. All Rights Reserved                24
Problem Analysis - Visibility & Clarity



                              When you have too many
                              rules ….it gets complicated




            Visibility - The degree to which one can see
        Clarity - Free from obscurity and easy to understand

                           (C) ISQ. All Rights Reserved        25
D o n ’t                             Which password? Network,
                                      desktop, ERP….?
s h a r e
p a s s w
 o r d s




            (C) ISQ. All Rights Reserved                         26
Output of Phase 1

                                          Organization’s awareness score is 87%




     LOW AWARENESS       MEDIUM AWARENESS                 HIGH AWARENESS



                      Organization’s competence score is 65%


                               MEDIUM
     LOW COMPETENCE          COMPETENCE
                                                          HIGH COMPETENCE




                           (C) ISQ. All Rights Reserved                     27
Detailed Scorecard

  100
                                               Score per ESP
                                                       90
                                             89
   90
          82
   80                                                                               76                                        78

                                                                                                                         70
   70                       67   67                67

   60                                                                                                 56

   50

   40
                                                                                                            33
   30

   20

   10
                 0                                                     0                  0
    0
        Clear Policies   Email Security   Info Disclosure    Password Security Physical Security Incident Reporting Social Networking/
                                                                                                                        Blogging

                                                     Awareness       Competence




                                                        (C) ISQ. All Rights Reserved                                               28
Audit strategies - Awareness

  • For auditing information security awareness component
    of the ESP:
     –   Interviews
     –   Surveys
     –   Quizzes
     –   Mind-map sessions




                             (C) ISQ. All Rights Reserved   29
Auditing Strategies - Behaviour

  • For auditing competence
     – Social Engineering

     – Observations: Observe for tailgating, observe how many meeting
       rooms still have sensitive information on the board after the meeting

     – Log review: Browsing and email patterns can be observed through
       log reviews of corresponding systems

     – Data mining : Mine through internet search engines to see how
       much sensitive information about the company is available online

     – Incident report review: Review of incident reports may show how
       many laptops were lost and a further investigation may reveal the
       cause as carelessness (poor behaviour) or not (may be the user
       was physically attacked).



                              (C) ISQ. All Rights Reserved                 30
Phase 2 - Strategize



                                                           Identify information security awareness
                                            Define
                                                           and competence needs of the business.


 Check change in awareness                                                 Create the strategy for
  and competence. Improve.                                               awareness and competence
                             Verify                        Strategize
                                                                               management




                                            Deliver



                                         Execute the plan




                                      (C) ISQ. All Rights Reserved                               31
Quality of content – Impact visualization




Show the impact of poor security awareness and competence to
           the “non-information security” professional


                       (C) ISQ. All Rights Reserved     32
Quality of content – Business relevance

                  Oops! My business is
                   held responsible if I
                 install pirated software
                        on my PC?




Show the impact of poor security awareness and competence to
           the “non-information security” professional

                          (C) ISQ. All Rights Reserved   33
Quality of content – Clarity and Ease
  So..the email                              Email security
  security policy                            – 5 quick tips.
   is …6 pages                                Wow, that’s
       long.                                      cool!




                    Keep it very simple


                      (C) ISQ. All Rights Reserved             34
Quality of content - Cultural factors
                 Sorry, that
               information is
                 classified.                              Let me explain the
                                                          basics of password
                                                               security




 Language or terms used, color and design, character representation


                                (C) ISQ. All Rights Reserved                   35
Retention measurement
                                                Well…my emails have
                                             disappeared. Which number
                                                      do I call?


 • How much have they
   understood
 • How long do they
   remember?
    • Immediately
    • 30 days later
    • 60 days later




                        (C) ISQ. All Rights Reserved                     36
Coverage

  • Identify the target workforce
  • Tolerable deviation – How much
    percentage of the workforce must
    receive the training
  • Set realistic expectations
  • E.g. – Refer the visibility meter




                        (C) ISQ. All Rights Reserved   37
Format and visibility

  • Format – Different types of information security
    awareness content
  • Visibility – Channels through which the content is
    delivered

        Format                             Visibility

    Verbal       Live training sessions, Video conferences

    Electronic   Email
                 Intranet
                 Posters
                 Social media
    Paper        Posters, cards, quizzes or surveys




                           (C) ISQ. All Rights Reserved      38
Frequency
   • Gap between 2 awareness deliveries
   • Critical – Gap should be minimal




 Which is more effective – Drip irrigation or spraying a lot of water once a day?



                                (C) ISQ. All Rights Reserved                 39
Competence management/ Behaviour
            Change

           A case study




            (C) ISQ. All Rights Reserved   40
Creating the right environment


                Motivational
                Strategies



                         Disciplinary
                         strategies



                  (C) ISQ. All Rights Reserved   41
Case Study : IT Business

  • Company
     – Offshore Development, 3
       Centers in India
     – Young workforce: Majority
       between 22-27
  • Security Rules
     – Don’t forwards emails with
       unofficial attachments
     – No downloads of
       videos, music, freeware
     – No storage of personal
       content in official systems




                            (C) ISQ. All Rights Reserved   42
Case Study : IT Business
 • What we did?
   – Quarterly “End-User
     Desktop Audits”
   – Findings were
     immediately “Signed
     and Agreed by Auditee”
   – Disputes were noted
     and “Signed”
   – Audit findings were
     submitted to InfoSec
     Team




                          (C) ISQ. All Rights Reserved   43
Case Study : IT Business – The result


               % of Non-Compliance
        90
        80
        70
        60
        50
        40
        30
        20        ?                              % of Non-
                                                 Compliance
        10
         0




                  (C) ISQ. All Rights Reserved                44
Learning




 (C) ISQ. All Rights Reserved   45
Security Tradeoff Vs. Inconvenience




          Security
         Trade-Off




                            Personal
                       In-convenience



                     (C) ISQ. All Rights Reserved   46
Security Tradeoff Vs. Cost



                                                     Enforcement or Cost
                                                         •Quality of Life
        Security                                         •Career
       Trade-Off                                         •Money
                                                         •Time




                   Cost (Enforcement)




                      (C) ISQ. All Rights Reserved                          47
Phase 3 - Deliver



                                                           Identify information security awareness
                                            Define
                                                           and competence needs of the business.


 Check change in awareness                                                 Create the strategy for
  and competence. Improve.                                               awareness and competence
                             Verify                        Strategize
                                                                               management




                                            Deliver



                                         Execute the plan




                                      (C) ISQ. All Rights Reserved                               48
Define tolerable deviation

  • It is almost impossible to
    get 100% participation
  • Define a number that is
    reasonable
     – 80% participation in the first
       6 months
     – 85% in the next 6




                              (C) ISQ. All Rights Reserved   49
Efficiency

• Efficiency of channels in
  delivering the program
   – Emails must reach the target
     workforce, not go to SPAM
   – Videos must stream at an
     optimum speed
   – Training sessions
      • Trainer must knowledgeable
      • Able to articulate the topics
        well
      • Use tools and examples
      • Encourage discussion




                               (C) ISQ. All Rights Reserved   50
Collection of feedback

• Not to be confused with
  “retention measurement”
  1. The clarity of the content in
     conveying the intended
     message
  2. The business relevance of the
     content
  3. Impact visualization
  4. The quality of the trainer or
     the efficiency of the delivery
     channel
  5. Other factors




                            (C) ISQ. All Rights Reserved   51
Phase 4 - Verify



                                                           Identify information security awareness
                                            Define
                                                           and competence needs of the business.


 Check change in awareness                                                 Create the strategy for
  and competence. Improve.                                               awareness and competence
                             Verify                        Strategize
                                                                               management




                                            Deliver



                                         Execute the plan




                                      (C) ISQ. All Rights Reserved                               52
Audit strategies - Awareness

  • For auditing information security awareness component
    of the ESP:
     –   Interviews
     –   Surveys
     –   Quizzes
     –   Mind-map sessions




                             (C) ISQ. All Rights Reserved   53
Auditing Strategies - Behaviour

  • For auditing competence
     – Social Engineering

     – Observations: Observe for tailgating, observe how many meeting
       rooms still have sensitive information on the board after the meeting

     – Log review: Browsing and email patterns can be observed through
       log reviews of corresponding systems

     – Data mining : Mine through internet search engines to see how
       much sensitive information about the company is available online

     – Incident report review: Review of incident reports may show how
       many laptops were lost and a further investigation may reveal the
       cause as carelessness (poor behaviour) or not (may be the user
       was physically attacked).



                              (C) ISQ. All Rights Reserved                 54
Output of Verify phase

                    Organization’s awareness score was 87%
                                                                        ?


      LOW AWARENESS        MEDIUM AWARENESS                 HIGH AWARENESS



   Organization’s competence score was 65%                          ?

                                 MEDIUM
     LOW COMPETENCE            COMPETENCE
                                                            HIGH COMPETENCE




                             (C) ISQ. All Rights Reserved                     55
Summary


                      Technology
                       (Firewall)


                       Information

                People                      Process




Technology and processes are only as good as the people that
                        use them
                       (C) ISQ. All Rights Reserved      56
Free resources

  • Free security awareness video –
    http://isqworld.com/security-awareness-training-samples
  • The Psychology of Security, Bruce Schneier -
    http://www.schneier.com/essay-155.html




                        (C) ISQ. All Rights Reserved      57
Let’s switch ON the Human
Layer of Information Security
Defence




                     Thank You
                   Anup Narayanan
            @ CoCon 2012, Trivandrum, Kerala
                      (C) ISQ. All Rights Reserved   58

More Related Content

What's hot

Knowledge Management and Knowledge Sharing at DISA
Knowledge Management and Knowledge Sharing at DISAKnowledge Management and Knowledge Sharing at DISA
Knowledge Management and Knowledge Sharing at DISADee Moone
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksIBM
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...DFLABS SRL
 
Paradigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk AssessmentsParadigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk AssessmentsFernando Reiser
 
7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information SecurityCindy Kim
 
Return on Security Investment
Return on Security InvestmentReturn on Security Investment
Return on Security InvestmentConferencias FIST
 
Security For Free
Security For FreeSecurity For Free
Security For Freegwarden
 
The Perils that PCI brings to Security
The Perils that PCI brings to SecurityThe Perils that PCI brings to Security
The Perils that PCI brings to SecurityTripwire
 
CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape WebinarJoseph Schorr
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...TEO LT, AB
 
“The impact of digital technologies on human wellbeing.”
“The impact of digital technologies on human wellbeing.” “The impact of digital technologies on human wellbeing.”
“The impact of digital technologies on human wellbeing.” Timothy Bosworth
 
Wall street journal 22 sept 10 - perspectives on risk it
Wall street journal 22 sept 10  - perspectives on risk itWall street journal 22 sept 10  - perspectives on risk it
Wall street journal 22 sept 10 - perspectives on risk itMessiernl
 
Taming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paperTaming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paperIBM India Smarter Computing
 
Triangle InfoSecon Conference program 2011
Triangle InfoSecon Conference program   2011Triangle InfoSecon Conference program   2011
Triangle InfoSecon Conference program 2011Travis Barnes
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your UsersMike Murray
 

What's hot (20)

Knowledge Management and Knowledge Sharing at DISA
Knowledge Management and Knowledge Sharing at DISAKnowledge Management and Knowledge Sharing at DISA
Knowledge Management and Knowledge Sharing at DISA
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
Paradigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk AssessmentsParadigm Shift! - Customer Information Centric IT Risk Assessments
Paradigm Shift! - Customer Information Centric IT Risk Assessments
 
7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security7 Things Every Ceo Should Know About Information Security
7 Things Every Ceo Should Know About Information Security
 
Return on Security Investment
Return on Security InvestmentReturn on Security Investment
Return on Security Investment
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
The Perils that PCI brings to Security
The Perils that PCI brings to SecurityThe Perils that PCI brings to Security
The Perils that PCI brings to Security
 
CBI Threat Landscape Webinar
CBI Threat Landscape WebinarCBI Threat Landscape Webinar
CBI Threat Landscape Webinar
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
Dr. Uwe Jendricke. Kibernetinis saugumas Vokietijos Federacinėje Respublikoje...
 
“The impact of digital technologies on human wellbeing.”
“The impact of digital technologies on human wellbeing.” “The impact of digital technologies on human wellbeing.”
“The impact of digital technologies on human wellbeing.”
 
Wall street journal 22 sept 10 - perspectives on risk it
Wall street journal 22 sept 10  - perspectives on risk itWall street journal 22 sept 10  - perspectives on risk it
Wall street journal 22 sept 10 - perspectives on risk it
 
Taming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paperTaming the data demons: leveraging information in the age of risk white paper
Taming the data demons: leveraging information in the age of risk white paper
 
Triangle InfoSecon Conference program 2011
Triangle InfoSecon Conference program   2011Triangle InfoSecon Conference program   2011
Triangle InfoSecon Conference program 2011
 
Convergence of Security Risks
Convergence of Security RisksConvergence of Security Risks
Convergence of Security Risks
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
 

Similar to A model for reducing information security risks due to human error

The difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of SecurityThe difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of SecurityAnup Narayanan
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianClubHack
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligenceguest08b1e6
 
Integrated Security, Safety and Surveillance Solution i3S
Integrated Security, Safety and Surveillance Solution  i3SIntegrated Security, Safety and Surveillance Solution  i3S
Integrated Security, Safety and Surveillance Solution i3SEdgevalue
 
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Capgemini
 
CONCEPTUALIZING AI RISK
CONCEPTUALIZING AI RISKCONCEPTUALIZING AI RISK
CONCEPTUALIZING AI RISKcscpconf
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecurityIT@Intel
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
Artificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptxArtificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptxKarthik Sarma
 
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AIDataScienceConferenc1
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Inno Eroraha [NetSecurity]
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security BreachAlienVault
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 servicesCade Zvavanjanja
 
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...JoAnna Cheshire
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 

Similar to A model for reducing information security risks due to human error (20)

The difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of SecurityThe difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of Security
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas Kurian
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
 
Integrated Security, Safety and Surveillance Solution i3S
Integrated Security, Safety and Surveillance Solution  i3SIntegrated Security, Safety and Surveillance Solution  i3S
Integrated Security, Safety and Surveillance Solution i3S
 
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
 
CONCEPTUALIZING AI RISK
CONCEPTUALIZING AI RISKCONCEPTUALIZING AI RISK
CONCEPTUALIZING AI RISK
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information Security
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
#AI: In Whose Image?
#AI: In Whose Image?#AI: In Whose Image?
#AI: In Whose Image?
 
Artificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptxArtificial-Intelligence-in-Cyber-Security.pptx
Artificial-Intelligence-in-Cyber-Security.pptx
 
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security Breach
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 services
 
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Main Menu
Main MenuMain Menu
Main Menu
 
Top Ten Challenges of Securing Smart Infrastructure
Top Ten Challenges of Securing Smart InfrastructureTop Ten Challenges of Securing Smart Infrastructure
Top Ten Challenges of Securing Smart Infrastructure
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

A model for reducing information security risks due to human error

  • 1. “We a r e n o t j u s t s e c u r i t y a wa r e , b u t s e c u r i t y c o mp e t e n t A model for reducing security risks due to human error a s we l l ” Anup Narayanan, CISA, CISSP Founder & CEO, ISQ 1
  • 2. Focus of the talk Don’t tell anyone, Security my password is….. Policy Never share passwords Addressing the human factor using security “awareness” and “competence” management (C) ISQ. All Rights Reserved 2
  • 3. The difference between “Awareness” and “Behaviour (Competence)” I know the traffic rules…. (C) ISQ. All Rights Reserved 3
  • 4. Does it guarantee that I am a good driver? (C) ISQ. All Rights Reserved 4
  • 5. Awareness >> Behaviour >> Culture Awareness Behaviour Culture (Competence) • I know • I do • We know and do An organization must aim for a responsible security culture (C) ISQ. All Rights Reserved 5
  • 6. The problem (Mistakes that organizations are making) I have an amazing security awareness program but people still make security mistakes! The focus is only on awareness, not behaviour (competence) and culture (C) ISQ. All Rights Reserved 6
  • 7. What organizations need? A system that periodically shows the current Awareness and Competence Levels Organization’s awareness score is 87% LOW AWARENESS MEDIUM AWARENESS HIGH AWARENESS Organization’s competence score is 65% MEDIUM LOW COMPETENCE COMPETENCE HIGH COMPETENCE (C) ISQ. All Rights Reserved 7
  • 8. The power of perception Why do people make security mistakes? (C) ISQ. All Rights Reserved 8
  • 9. Imagine… Nelson Mandela walks into this room right now and offers you this glass of water…. Will you accept it? (C) ISQ. All Rights Reserved 9
  • 10. Now, imagine this… This man walks into this room right now and offers you this glass of water…. Will you accept it? (C) ISQ. All Rights Reserved 10
  • 11. Question Which water did you accept? Why? (C) ISQ. All Rights Reserved 11
  • 12. Analysis Were you checking the water or the person serving the water? People decide what is good and what is bad based on “trust” Perception is influenced by Trust (C) ISQ. All Rights Reserved 12
  • 13. Why must we address the human factor? (or) Is the human factor worth addressing? (C) ISQ. All Rights Reserved 13
  • 14. Reason 1: Security is both a “Reality” and “Feeling” For security practitioners security is a “Reality” based on the mathematical probability of risks For the end user (common man) security is a feeling Influencing the feeling of security (what is safe and what is not safe while handling information) makes a user make the right security decisions and apply it 8/8/2012 (C) ISQ. All Rights Reserved 14
  • 15. Reason 2: Not every attack(er) is that smart People exaggerate risks that are spectacular or uncommon: So what? RSA was hacked Technology & Processes Awareness & Competence The very smart attacker 4 Human – Recognizing a zero day attack, 3 Phishing mails, Not posting business Risk severity/ Attacker information in social media Smartness/ Attack Efficiency 2 Technology + Human – Firewall configuration, Choosing a secure Wifi 1 Automatic security controls – AV, Updates Control All Rights Reserved (C) ISQ. efficiency 15
  • 16. Reason 3: How much of a trade-off are we willing to make? The best way to stop people from making information security mistakes is to deny them access to information. Are you willing to make that trade- off? Security awareness and competence management is a trade-off that is affordable and effective (C) ISQ. All Rights Reserved 16
  • 17. Reason 4: The human factor is important… Aircrafts have become more advanced, but does it mean that pilot training requirements have reduced? Cars have become more advanced, but does it mean that driving tests have become easier? Medical technology has become more advanced, but will you choose a hospital for it’s machines or the doctors? (C) ISQ. All Rights Reserved 17
  • 18. The Solution Model Security Awareness and Competence Management (C) ISQ. All Rights Reserved 18
  • 19. The solution is based on HIMIS • HIMIS – Human Impact Management for Information Security • Released under Creative Commons License • Free for Non-Commercial Use http://www.isqworld.com/himis (C) ISQ. All Rights Reserved 19
  • 20. ESP Awareness Assess, Security Risk Identify the Improve, Re- analysis human factor assess Behaviour (Competence) Identify information security awareness Define and competence needs of the business. Check change in awareness Create the strategy for and competence. Improve. awareness and competence Verify Strategize management Deliver Execute the awareness plan (C) ISQ. All Rights Reserved 20
  • 21. Strategy - Use ESP (Expected Security Practices) ESP Awareness Competence Component Component Information Information Demonstrates correct Classification classification criterion classification Classification labels Detects and reports a Incident reporting Types of incidents simulated incident Incident reporting procedures/ channels (C) ISQ. All Rights Reserved 21
  • 22. Phase 1 Identify information security awareness and competence needs of the business. Define Check change in awareness Create the strategy for and competence. Improve. awareness and competence Verify Strategize management Deliver Execute the plan (C) ISQ. All Rights Reserved 22
  • 23. Case Study: Client Profile • Type of industry: Retail • No: of employees 5000+ • Position: Market Leader • Type of Information handled: Customer data, Intellectual Property • Spending on Information Security Awareness: US$ 75,000 (C) ISQ. All Rights Reserved 23
  • 24. Awareness Vs. Behaviour Awareness Competence/ Behaviour • Sharing of • Customer records were company/customer leaked to competitor information is wrong • Salary information of top • Sensitive Information executive was given to must be protected head hunter • Access Control Cards • Printouts lying must be protected unattended • Visitors can enter the facility without informing security guard (C) ISQ. All Rights Reserved 24
  • 25. Problem Analysis - Visibility & Clarity When you have too many rules ….it gets complicated Visibility - The degree to which one can see Clarity - Free from obscurity and easy to understand (C) ISQ. All Rights Reserved 25
  • 26. D o n ’t Which password? Network, desktop, ERP….? s h a r e p a s s w o r d s (C) ISQ. All Rights Reserved 26
  • 27. Output of Phase 1 Organization’s awareness score is 87% LOW AWARENESS MEDIUM AWARENESS HIGH AWARENESS Organization’s competence score is 65% MEDIUM LOW COMPETENCE COMPETENCE HIGH COMPETENCE (C) ISQ. All Rights Reserved 27
  • 28. Detailed Scorecard 100 Score per ESP 90 89 90 82 80 76 78 70 70 67 67 67 60 56 50 40 33 30 20 10 0 0 0 0 Clear Policies Email Security Info Disclosure Password Security Physical Security Incident Reporting Social Networking/ Blogging Awareness Competence (C) ISQ. All Rights Reserved 28
  • 29. Audit strategies - Awareness • For auditing information security awareness component of the ESP: – Interviews – Surveys – Quizzes – Mind-map sessions (C) ISQ. All Rights Reserved 29
  • 30. Auditing Strategies - Behaviour • For auditing competence – Social Engineering – Observations: Observe for tailgating, observe how many meeting rooms still have sensitive information on the board after the meeting – Log review: Browsing and email patterns can be observed through log reviews of corresponding systems – Data mining : Mine through internet search engines to see how much sensitive information about the company is available online – Incident report review: Review of incident reports may show how many laptops were lost and a further investigation may reveal the cause as carelessness (poor behaviour) or not (may be the user was physically attacked). (C) ISQ. All Rights Reserved 30
  • 31. Phase 2 - Strategize Identify information security awareness Define and competence needs of the business. Check change in awareness Create the strategy for and competence. Improve. awareness and competence Verify Strategize management Deliver Execute the plan (C) ISQ. All Rights Reserved 31
  • 32. Quality of content – Impact visualization Show the impact of poor security awareness and competence to the “non-information security” professional (C) ISQ. All Rights Reserved 32
  • 33. Quality of content – Business relevance Oops! My business is held responsible if I install pirated software on my PC? Show the impact of poor security awareness and competence to the “non-information security” professional (C) ISQ. All Rights Reserved 33
  • 34. Quality of content – Clarity and Ease So..the email Email security security policy – 5 quick tips. is …6 pages Wow, that’s long. cool! Keep it very simple (C) ISQ. All Rights Reserved 34
  • 35. Quality of content - Cultural factors Sorry, that information is classified. Let me explain the basics of password security Language or terms used, color and design, character representation (C) ISQ. All Rights Reserved 35
  • 36. Retention measurement Well…my emails have disappeared. Which number do I call? • How much have they understood • How long do they remember? • Immediately • 30 days later • 60 days later (C) ISQ. All Rights Reserved 36
  • 37. Coverage • Identify the target workforce • Tolerable deviation – How much percentage of the workforce must receive the training • Set realistic expectations • E.g. – Refer the visibility meter (C) ISQ. All Rights Reserved 37
  • 38. Format and visibility • Format – Different types of information security awareness content • Visibility – Channels through which the content is delivered Format Visibility Verbal Live training sessions, Video conferences Electronic Email Intranet Posters Social media Paper Posters, cards, quizzes or surveys (C) ISQ. All Rights Reserved 38
  • 39. Frequency • Gap between 2 awareness deliveries • Critical – Gap should be minimal Which is more effective – Drip irrigation or spraying a lot of water once a day? (C) ISQ. All Rights Reserved 39
  • 40. Competence management/ Behaviour Change A case study (C) ISQ. All Rights Reserved 40
  • 41. Creating the right environment Motivational Strategies Disciplinary strategies (C) ISQ. All Rights Reserved 41
  • 42. Case Study : IT Business • Company – Offshore Development, 3 Centers in India – Young workforce: Majority between 22-27 • Security Rules – Don’t forwards emails with unofficial attachments – No downloads of videos, music, freeware – No storage of personal content in official systems (C) ISQ. All Rights Reserved 42
  • 43. Case Study : IT Business • What we did? – Quarterly “End-User Desktop Audits” – Findings were immediately “Signed and Agreed by Auditee” – Disputes were noted and “Signed” – Audit findings were submitted to InfoSec Team (C) ISQ. All Rights Reserved 43
  • 44. Case Study : IT Business – The result % of Non-Compliance 90 80 70 60 50 40 30 20 ? % of Non- Compliance 10 0 (C) ISQ. All Rights Reserved 44
  • 45. Learning (C) ISQ. All Rights Reserved 45
  • 46. Security Tradeoff Vs. Inconvenience Security Trade-Off Personal In-convenience (C) ISQ. All Rights Reserved 46
  • 47. Security Tradeoff Vs. Cost Enforcement or Cost •Quality of Life Security •Career Trade-Off •Money •Time Cost (Enforcement) (C) ISQ. All Rights Reserved 47
  • 48. Phase 3 - Deliver Identify information security awareness Define and competence needs of the business. Check change in awareness Create the strategy for and competence. Improve. awareness and competence Verify Strategize management Deliver Execute the plan (C) ISQ. All Rights Reserved 48
  • 49. Define tolerable deviation • It is almost impossible to get 100% participation • Define a number that is reasonable – 80% participation in the first 6 months – 85% in the next 6 (C) ISQ. All Rights Reserved 49
  • 50. Efficiency • Efficiency of channels in delivering the program – Emails must reach the target workforce, not go to SPAM – Videos must stream at an optimum speed – Training sessions • Trainer must knowledgeable • Able to articulate the topics well • Use tools and examples • Encourage discussion (C) ISQ. All Rights Reserved 50
  • 51. Collection of feedback • Not to be confused with “retention measurement” 1. The clarity of the content in conveying the intended message 2. The business relevance of the content 3. Impact visualization 4. The quality of the trainer or the efficiency of the delivery channel 5. Other factors (C) ISQ. All Rights Reserved 51
  • 52. Phase 4 - Verify Identify information security awareness Define and competence needs of the business. Check change in awareness Create the strategy for and competence. Improve. awareness and competence Verify Strategize management Deliver Execute the plan (C) ISQ. All Rights Reserved 52
  • 53. Audit strategies - Awareness • For auditing information security awareness component of the ESP: – Interviews – Surveys – Quizzes – Mind-map sessions (C) ISQ. All Rights Reserved 53
  • 54. Auditing Strategies - Behaviour • For auditing competence – Social Engineering – Observations: Observe for tailgating, observe how many meeting rooms still have sensitive information on the board after the meeting – Log review: Browsing and email patterns can be observed through log reviews of corresponding systems – Data mining : Mine through internet search engines to see how much sensitive information about the company is available online – Incident report review: Review of incident reports may show how many laptops were lost and a further investigation may reveal the cause as carelessness (poor behaviour) or not (may be the user was physically attacked). (C) ISQ. All Rights Reserved 54
  • 55. Output of Verify phase Organization’s awareness score was 87% ? LOW AWARENESS MEDIUM AWARENESS HIGH AWARENESS Organization’s competence score was 65% ? MEDIUM LOW COMPETENCE COMPETENCE HIGH COMPETENCE (C) ISQ. All Rights Reserved 55
  • 56. Summary Technology (Firewall) Information People Process Technology and processes are only as good as the people that use them (C) ISQ. All Rights Reserved 56
  • 57. Free resources • Free security awareness video – http://isqworld.com/security-awareness-training-samples • The Psychology of Security, Bruce Schneier - http://www.schneier.com/essay-155.html (C) ISQ. All Rights Reserved 57
  • 58. Let’s switch ON the Human Layer of Information Security Defence Thank You Anup Narayanan @ CoCon 2012, Trivandrum, Kerala (C) ISQ. All Rights Reserved 58