SlideShare ist ein Scribd-Unternehmen logo
1 von 23
a step by step approach


METRICS, RISK MANAGEMENT & DLP
Rob Kloots Vice-President ISSA-BE ; Webmaster ISSA-BE
           Owner CSF b.v. - GRC Consulting
           Rob.Kloots@csf.nl
DISCUSSION ITEMS
   Professionalise, Organise
   Compliance Security Framework
       Objectives
       Metrics
       Measures
       Achieveable Markerpoints
   Risk Management
   Data Loss Prevention System
       External Standards
       Action list
       Controls


                        Conferencias ISSA de Seguridad 2010   15-04-2010   3
DATA LOSS PREVENTION
   Data Loss Prevention (DLP) is a computer security term
    referring to systems that identify, monitor, and protect data in use
    (e.g., endpoint actions), data in motion (e.g., network actions),
    and data at rest (e.g., data storage) through deep content
    inspection, contextual security analysis of transaction (attributes
    of originator, data object, medium, timing, recipient/destination,
    etc.), and with a centralized management framework. The
    systems are designed to detect and prevent the unauthorized use
    and transmission of confidential information.
   It is also referred to by various vendors as Data Leak
    Prevention, Information Leak Detection and Prevention
    (ILDP), Information Leak Prevention (ILP), Content
    Monitoring and Filtering (CMF) or Extrusion Prevention
    System by analogy to Intrusion-prevention system.



                                                                             4
                          Conferencias ISSA de Seguridad 2010   15-04-2010
FIREFIGHTING DLP INCIDENTS
   Data breach causes
   According to a Verizon 2009 report
     •   74% from external sources
     •   20% by insiders
     •   32% implicated business partners
     •   39% involved multiple parties

   What damage can be done?
•   Loss of trust
•   Reputation damage
•   Loss of clients Conferencias ISSA de Seguridad 2010   15-04-2010

•   Repair costs

                                                                       5
FIREFIGHTING DLP INCIDENTS
   DLP more then a Gartner-hype
                                   DLP
   DLP key to GRC

   European Commission
    enforces DLP in the 2008
    Telecom Directive

 DLP incidents are a given
  fact of operations
 If or When?

                                         6
ADAPT, ADOPT, IMPROVE

 Firefighting
 Maturity level
                           Adopt
 What steps?

 Learning Management System
     Metrics,

     Measures, and                Improve                       Adapt
     Markerpoints.




                                                                         7
                  Conferencias ISSA de Seguridad 2010   15-04-2010
MATURITYLEVELS
o Predefined business process
o Clear goals/performance req’s
o Quantitative/qualitative measures
                                                                           Quantitatively
                                                                           Managed
                                                    Managed

                                 Defined


                  Repeatable



     Incomplete




                                                                                            8
                        Conferencias ISSA de Seguridad 2010   15-04-2010
Conferencias ISSA de Seguridad 2010    15-04-2010



COMPLIANCE SECURITY FRAMEWORK

 A Compliance Security Framework should
  allow for team-effort for both
 Mgt (2) and operators(3) to enter into a
  learning system
 with respect to Compliance & Risk based
                                1
  security measures (1).
                                           CS
                                           F
                              2                             3


                                                                       9 9
                 Conferencias ISSA de Seguridad 2010     15-04-2010
COMPLIANCE DEFINED

   Compliance is either a state of being in
    accordance with established standards,
    specifications or legislation or the process of
    becoming so.




                                                                      10
                   Conferencias ISSA de Seguridad 2010   15-04-2010
COMPLIANCE CAN PROVIDE OPPORTUNITIES

 Compliance   within Organisation can provide a
  positive Roi.
 Investment
     Compliance Management, based on an efficient
      control set (e.g. ISO27001/9001/20000) and audit
      methodology.
 Return;   by being compliant, Org.:
   has a strong quality statement for existing
    customers and prospects;
   mitigates risks;
   improves quality of service delivery processes.


                                                                       11
                    Conferencias ISSA de Seguridad 2010   15-04-2010
COMPLIANCE; AGAINST WHAT?

 Company internal
  policies &
  standards
 External rules and
  regulations
 Industry standards
 Customer (security)
  requirements
…

                                                                  12
               Conferencias ISSA de Seguridad 2010   15-04-2010
WELL-CONTROLLED ORGANIZATIONS

Key attributes of a well-controlled
 organization include :
# 1. Leadership of Board
# 2. Translation of strategic vision to day-to-day management
# 3. Communication of objectives & values to all levels
# 4. Individual accountability
# 5. Risk management system
# 6. Human resources reinforcement
# 7. Independent, objective and competent oversight
                                                                          13
                       Conferencias ISSA de Seguridad 2010   15-04-2010
14

pwc
  RISK & CONTROL : SYMBIOTIC SYSTEMS
                                          • Define strategic risk
                                          • Articulate risk philosophy
               Objective                  • Define values and behavioral expectations


                                           • Assess risk
                 Risk                      • Manage risk


                                           • Assess existing controls
               Control                     • Select control model
                                           • Continuous communication

                                           • Continuous program for ORC
              Alignment
                                           • Develop a control improvement plan


      … Operations are dynamic and evolving...

                         Conferencias ISSA de Seguridad 2010   15-04-2010               14
METRICS - 1

 Metrics are simply a standard or system of
  measurement
 Metric - A quantitative measure of the
  degree to which a system, component, or
  process possesses a given attribute [2]. A
  calculated or composite indicator based upon
  two or more measures. A quantified measure
  of the degree to which a system, component,
  or process possesses a given attribute [3].

                                                                   15
                Conferencias ISSA de Seguridad 2010   15-04-2010
METRICS - 2

 Characteristics & Classification
 Process metrics
       CSFs, KGIs and KPIs
   Asset related vulnerability metrics
       What value has Data, when static, dynamic, owned,
        stored, lost
   Monetary value of Reputation
     ? Market Capitalisation
     ! Value of assets in Euro
     ! Total asset value at Risk



                                                                          16
                       Conferencias ISSA de Seguridad 2010   15-04-2010
MEASURES
   Measure - To ascertain or appraise by
    comparing to a standard [1]. A standard or unit
    of measurement; the extent, dimensions,
    capacity, etc., of anything, especially as
    determined by a standard; an act or process of
    measuring; a result of measurement [3]. A
    related term is Measurement - The act or
    process of measuring. A figure, extent, or
    amount obtained by measuring [1]. The act or
    process of measuring something. Also a result,
    such as a figure expressing the extent or value
    that is obtained by measuring [3].

                                                                      17
                   Conferencias ISSA de Seguridad 2010   15-04-2010
ACHIEVEABLE MARKERPOINTS

 How to set
 Where to use

 Purpose




                                                                    18
                 Conferencias ISSA de Seguridad 2010   15-04-2010
RISK MANAGEMENT - 1



                                Qualitative
          Quantitative




                           RM
                         mechanics




                Mgt info
                                                                 19
              Conferencias ISSA de Seguridad 2010   15-04-2010
RISK MANAGEMENT - 2




              Conferencias ISSA de Seguridad 2010   15-04-2010   20
WHAT STANDARDS?




 DLP




             Conferencias ISSA de Seguridad 2010   15-04-2010   21
DATA LOSS PREVENTION SYSTEM
   1. Introduction to the DLPS 10%
   2. Creating the Asset Inventory 8%
   3. Establishing Information Risk Management process 8%
   4. Establish a Continual Improvement process 10%
   5. Developing Documentation 5%
   6. Establishing a Legal Registry process 8%
   7. Establishing a Compliance Management process 5%
   8. Establishing an Audit process 10%
   9. Establishing a Governance process 10%
   10. Establishing Security & Privacy testing process 8%
   11. Establishing the Incident Response process 8%
   12. Establishing Training & Awareness process 10%



                        Conferencias ISSA de Seguridad 2010   15-04-2010   22
DATA LOSS PREVENTION
   SANS Critical Security Controls
     1: Inventory of Authorized and Unauthorized Devices
     2: Inventory of Authorized and Unauthorized Software
     3: Secure Configurations for Hardware and Software on Laptops,
      WorkstationsCritical, and Servers
Control 15 Metric
     4: Secure Configurations for Network Devices such as Firewalls, Routers,
      and Switches
  The5: Boundary Defense capable of identifying unauthorized data
      system must be
  leaving the organization'sand Analysis whether via network file
     6: Maintenance, Monitoring, systems of Audit Logs
     7: Application Software Security
  transfers or removable media. Privileges
     8: Controlled Use of Administrative
      9: Controlled Access Based on Need to Know
Control 15Test
   
     10: Continuous Vulnerability Assessment and Remediation
     11: Account Monitoring and Control
     12: Malware Defenses
     13: Limitation and Control of Network Ports, Protocols, and Services
Associated NIST SP 800-53 Rev 3 Priority 1
     14: Wireless Device Control
      15: Data Loss Prevention
Controls:
   


  AC-4, MP-2 (2), MP-4 (1), SC-7 (6, 10), SC-9, SC-13, SC-28 (1),
  SI-4 (4, 11), PM-7
                              Conferencias ISSA de Seguridad 2010   15-04-2010   23
QUESTIONS, PLEASE!




             Conferencias ISSA de Seguridad 2010   15-04-2010   24

Weitere ähnliche Inhalte

Was ist angesagt?

Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostGuardEra Access Solutions, Inc.
 
DSS ITSEC Conference 2012 - RISK & COMPLIANCE
DSS ITSEC Conference 2012 - RISK & COMPLIANCEDSS ITSEC Conference 2012 - RISK & COMPLIANCE
DSS ITSEC Conference 2012 - RISK & COMPLIANCEAndris Soroka
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaJames McDonald
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Plan de Calidad para el SNS
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Marc-Andre Heroux
 
HML Risk Transformation
HML Risk TransformationHML Risk Transformation
HML Risk TransformationAndrew Smart
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trendswardell henley
 
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid ThemSasha Nunke
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
Techserv Brochure
Techserv BrochureTechserv Brochure
Techserv Brochureguest8a430d
 

Was ist angesagt? (11)

Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & Cost
 
DSS ITSEC Conference 2012 - RISK & COMPLIANCE
DSS ITSEC Conference 2012 - RISK & COMPLIANCEDSS ITSEC Conference 2012 - RISK & COMPLIANCE
DSS ITSEC Conference 2012 - RISK & COMPLIANCE
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed Proba
 
Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...Health Informatics – Application of Clinical Risk Management to the Manufactu...
Health Informatics – Application of Clinical Risk Management to the Manufactu...
 
ICAM Our Vision
ICAM Our VisionICAM Our Vision
ICAM Our Vision
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0
 
HML Risk Transformation
HML Risk TransformationHML Risk Transformation
HML Risk Transformation
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
 
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them7 Mistakes of IT Security Compliance - and Steps to Avoid Them
7 Mistakes of IT Security Compliance - and Steps to Avoid Them
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Techserv Brochure
Techserv BrochureTechserv Brochure
Techserv Brochure
 

Ähnlich wie Rob kloots presentation_issa_spain

Rob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRobert Kloots
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLPRobert Kloots
 
Ta Security
Ta SecurityTa Security
Ta Securityjothsna
 
TA security
TA securityTA security
TA securitykesavars
 
Integrating Internal Controls
Integrating Internal Controls Integrating Internal Controls
Integrating Internal Controls InnoTech
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictabilitytlknecht
 
Third party independent test audit.
Third party independent test audit.Third party independent test audit.
Third party independent test audit.Mindtree Ltd.
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S proaxissolutions
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramGoogleNewsSubmit
 

Ähnlich wie Rob kloots presentation_issa_spain (20)

Rob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcmRob kloots auditingforscyandbcm
Rob kloots auditingforscyandbcm
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
Ta Security
Ta SecurityTa Security
Ta Security
 
TA security
TA securityTA security
TA security
 
Integrating Internal Controls
Integrating Internal Controls Integrating Internal Controls
Integrating Internal Controls
 
MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1MAPPING_ISO27001_TO_COBIT4.1
MAPPING_ISO27001_TO_COBIT4.1
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
GRCAlert Capabilities Deck - 2018
GRCAlert Capabilities Deck - 2018GRCAlert Capabilities Deck - 2018
GRCAlert Capabilities Deck - 2018
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictability
 
Third party independent test audit.
Third party independent test audit.Third party independent test audit.
Third party independent test audit.
 
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 

Kürzlich hochgeladen

Aptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdfAptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdfprchbhandari
 
How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?Alejandro Cremades
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionAlejandro Cremades
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future worldChris Skinner
 
ch 2 asset classes and financial instrument.ppt
ch 2 asset classes and financial instrument.pptch 2 asset classes and financial instrument.ppt
ch 2 asset classes and financial instrument.pptZawadAmin2
 
stock price prediction using machine learning
stock price prediction using machine learningstock price prediction using machine learning
stock price prediction using machine learninggauravwankar27
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowMiriam Robeson
 
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...Rahul Bedi
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesHaseebBashir5
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corp.
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsStefan Wolpers
 
Engagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideEngagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideCharleston Alexander
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsAlejandro Cremades
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdfAgusHalim9
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)linciy03
 
FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfomnme1
 
Chapter 2ppt Entrepreneurship freshman course.pptx
Chapter 2ppt Entrepreneurship freshman course.pptxChapter 2ppt Entrepreneurship freshman course.pptx
Chapter 2ppt Entrepreneurship freshman course.pptxtekalignpawulose09
 

Kürzlich hochgeladen (20)

Aptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdfAptar Closures segment - Corporate Overview-India.pdf
Aptar Closures segment - Corporate Overview-India.pdf
 
How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future world
 
ch 2 asset classes and financial instrument.ppt
ch 2 asset classes and financial instrument.pptch 2 asset classes and financial instrument.ppt
ch 2 asset classes and financial instrument.ppt
 
stock price prediction using machine learning
stock price prediction using machine learningstock price prediction using machine learning
stock price prediction using machine learning
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO Services
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & Transformations
 
Engagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideEngagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed Guide
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for Startups
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)
 
FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service Lightning
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
 
Chapter 2ppt Entrepreneurship freshman course.pptx
Chapter 2ppt Entrepreneurship freshman course.pptxChapter 2ppt Entrepreneurship freshman course.pptx
Chapter 2ppt Entrepreneurship freshman course.pptx
 

Rob kloots presentation_issa_spain

  • 1. a step by step approach METRICS, RISK MANAGEMENT & DLP Rob Kloots Vice-President ISSA-BE ; Webmaster ISSA-BE Owner CSF b.v. - GRC Consulting Rob.Kloots@csf.nl
  • 2. DISCUSSION ITEMS  Professionalise, Organise  Compliance Security Framework  Objectives  Metrics  Measures  Achieveable Markerpoints  Risk Management  Data Loss Prevention System  External Standards  Action list  Controls Conferencias ISSA de Seguridad 2010 15-04-2010 3
  • 3. DATA LOSS PREVENTION  Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use (e.g., endpoint actions), data in motion (e.g., network actions), and data at rest (e.g., data storage) through deep content inspection, contextual security analysis of transaction (attributes of originator, data object, medium, timing, recipient/destination, etc.), and with a centralized management framework. The systems are designed to detect and prevent the unauthorized use and transmission of confidential information.  It is also referred to by various vendors as Data Leak Prevention, Information Leak Detection and Prevention (ILDP), Information Leak Prevention (ILP), Content Monitoring and Filtering (CMF) or Extrusion Prevention System by analogy to Intrusion-prevention system. 4 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 4. FIREFIGHTING DLP INCIDENTS  Data breach causes  According to a Verizon 2009 report • 74% from external sources • 20% by insiders • 32% implicated business partners • 39% involved multiple parties  What damage can be done? • Loss of trust • Reputation damage • Loss of clients Conferencias ISSA de Seguridad 2010 15-04-2010 • Repair costs 5
  • 5. FIREFIGHTING DLP INCIDENTS  DLP more then a Gartner-hype DLP  DLP key to GRC  European Commission enforces DLP in the 2008 Telecom Directive  DLP incidents are a given fact of operations  If or When? 6
  • 6. ADAPT, ADOPT, IMPROVE  Firefighting  Maturity level Adopt  What steps?  Learning Management System  Metrics,  Measures, and Improve Adapt  Markerpoints. 7 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 7. MATURITYLEVELS o Predefined business process o Clear goals/performance req’s o Quantitative/qualitative measures Quantitatively Managed Managed Defined Repeatable Incomplete 8 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 8. Conferencias ISSA de Seguridad 2010 15-04-2010 COMPLIANCE SECURITY FRAMEWORK  A Compliance Security Framework should allow for team-effort for both  Mgt (2) and operators(3) to enter into a learning system  with respect to Compliance & Risk based 1 security measures (1). CS F 2 3 9 9 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 9. COMPLIANCE DEFINED  Compliance is either a state of being in accordance with established standards, specifications or legislation or the process of becoming so. 10 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 10. COMPLIANCE CAN PROVIDE OPPORTUNITIES  Compliance within Organisation can provide a positive Roi.  Investment  Compliance Management, based on an efficient control set (e.g. ISO27001/9001/20000) and audit methodology.  Return; by being compliant, Org.:  has a strong quality statement for existing customers and prospects;  mitigates risks;  improves quality of service delivery processes. 11 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 11. COMPLIANCE; AGAINST WHAT?  Company internal policies & standards  External rules and regulations  Industry standards  Customer (security) requirements … 12 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 12. WELL-CONTROLLED ORGANIZATIONS Key attributes of a well-controlled organization include : # 1. Leadership of Board # 2. Translation of strategic vision to day-to-day management # 3. Communication of objectives & values to all levels # 4. Individual accountability # 5. Risk management system # 6. Human resources reinforcement # 7. Independent, objective and competent oversight 13 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 13. 14 pwc RISK & CONTROL : SYMBIOTIC SYSTEMS • Define strategic risk • Articulate risk philosophy Objective • Define values and behavioral expectations • Assess risk Risk • Manage risk • Assess existing controls Control • Select control model • Continuous communication • Continuous program for ORC Alignment • Develop a control improvement plan … Operations are dynamic and evolving... Conferencias ISSA de Seguridad 2010 15-04-2010 14
  • 14. METRICS - 1  Metrics are simply a standard or system of measurement  Metric - A quantitative measure of the degree to which a system, component, or process possesses a given attribute [2]. A calculated or composite indicator based upon two or more measures. A quantified measure of the degree to which a system, component, or process possesses a given attribute [3]. 15 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 15. METRICS - 2  Characteristics & Classification  Process metrics  CSFs, KGIs and KPIs  Asset related vulnerability metrics  What value has Data, when static, dynamic, owned, stored, lost  Monetary value of Reputation  ? Market Capitalisation  ! Value of assets in Euro  ! Total asset value at Risk 16 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 16. MEASURES  Measure - To ascertain or appraise by comparing to a standard [1]. A standard or unit of measurement; the extent, dimensions, capacity, etc., of anything, especially as determined by a standard; an act or process of measuring; a result of measurement [3]. A related term is Measurement - The act or process of measuring. A figure, extent, or amount obtained by measuring [1]. The act or process of measuring something. Also a result, such as a figure expressing the extent or value that is obtained by measuring [3]. 17 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 17. ACHIEVEABLE MARKERPOINTS  How to set  Where to use  Purpose 18 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 18. RISK MANAGEMENT - 1 Qualitative Quantitative RM mechanics Mgt info 19 Conferencias ISSA de Seguridad 2010 15-04-2010
  • 19. RISK MANAGEMENT - 2 Conferencias ISSA de Seguridad 2010 15-04-2010 20
  • 20. WHAT STANDARDS? DLP Conferencias ISSA de Seguridad 2010 15-04-2010 21
  • 21. DATA LOSS PREVENTION SYSTEM  1. Introduction to the DLPS 10%  2. Creating the Asset Inventory 8%  3. Establishing Information Risk Management process 8%  4. Establish a Continual Improvement process 10%  5. Developing Documentation 5%  6. Establishing a Legal Registry process 8%  7. Establishing a Compliance Management process 5%  8. Establishing an Audit process 10%  9. Establishing a Governance process 10%  10. Establishing Security & Privacy testing process 8%  11. Establishing the Incident Response process 8%  12. Establishing Training & Awareness process 10% Conferencias ISSA de Seguridad 2010 15-04-2010 22
  • 22. DATA LOSS PREVENTION SANS Critical Security Controls  1: Inventory of Authorized and Unauthorized Devices  2: Inventory of Authorized and Unauthorized Software  3: Secure Configurations for Hardware and Software on Laptops, WorkstationsCritical, and Servers Control 15 Metric  4: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches The5: Boundary Defense capable of identifying unauthorized data  system must be leaving the organization'sand Analysis whether via network file  6: Maintenance, Monitoring, systems of Audit Logs  7: Application Software Security transfers or removable media. Privileges  8: Controlled Use of Administrative 9: Controlled Access Based on Need to Know Control 15Test   10: Continuous Vulnerability Assessment and Remediation  11: Account Monitoring and Control  12: Malware Defenses  13: Limitation and Control of Network Ports, Protocols, and Services Associated NIST SP 800-53 Rev 3 Priority 1  14: Wireless Device Control 15: Data Loss Prevention Controls:  AC-4, MP-2 (2), MP-4 (1), SC-7 (6, 10), SC-9, SC-13, SC-28 (1), SI-4 (4, 11), PM-7 Conferencias ISSA de Seguridad 2010 15-04-2010 23
  • 23. QUESTIONS, PLEASE! Conferencias ISSA de Seguridad 2010 15-04-2010 24