27
1 13-06-2018 Cyber Risk Quantification: Translating technical risks into business terms Jesper Sachmann RSA Denmark

Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

1

13-06-2018

Cyber Risk Quantification: Translating technical risks into business terms

Jesper Sachmann

RSA Denmark

Page 2: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

2

CYBER RISK QUANTIFICATION: TRANSLATING TECHNICAL RISKS INTO BUSINESS TERMS Jesper Sachmann GRCP GRCA

Atos Cyber Security Day

June 13, 2018

Page 3: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

3

IF YOUR CEO ASKED YOU…

How much risk do we have?

How much less risk will we have if…?

How would you answer?

3

Page 4: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

4

THE COMMUNICATION CHALLENGE

4

CISO

“Eχουμε πάνω από δέκα

χιλιάδες τρωτά σημεία , είναι

συμβατό

με το ογδόντα

τοις εκατό”

CFO

“How much risk do we have? Are we

spending too little or too much on

mitigation?” CIO

“Are we spending our

cybersecurity budget on the

right things? What is the ROI?”

AUDIT

“Did you fix those high

priority issues?”

BOARD/CEO

“We don’t want to be the next news

headline cybercrime victims. Are we

doing enough to minimize risk?”

Page 5: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

5

BALD TIRE

How much risk?

Page 6: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

6

THERE WILL ALWAYS BE

ASSUMPTIONS IN ANY ANALYSIS.

THE KEY IS TO SURFACE THEM.

Page 7: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

7

COMPLIANT… BUT STILL IN THE DARK

The way most cybersecurity

professionals measure risk

today fails to quantify cyber

risk in terms the business can

understand and use

Qualitative Checklists & Excel

Governance, Risk & Compliance Tools

Very Low

Low

Moderate

High

Very High

1

2

3

4

5

= =

1

2

No embedded risk analytics capabilities

in most GRC tools

Page 8: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

8

W H I C H O N E D E S E RV E S M O R E AT TE N T I O N ?

SIDE EFFECT OF THE QUALITATIVE APPROACH

Can you compare them? How can you take a decision based on this report?

Page 9: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

9

THE RISK LANDSCAPE IN A NUTSHELL…

Complex

Dynamic

Limited Resources

Which means…

Page 10: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

10

ORGANIZATIONS MUST EXCEL AT PRIORITIZING

THEIR CYBER RISK PROBLEMS AND

SOLUTIONS.

Page 11: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

11

PRIORITIZATION REQUIRES…

Comparing their various concerns and solution options, which requires…

Measurement

Page 12: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

12

THE RISK MANAGEMENT STACK

Effective Risk

Management

Well informed

decisions

enabled by

Comparisons

require

Measurements

require

Risk Model

require

Page 13: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

13

TH E TO P 1 0 O P E R ATI O N AL R I S K R AN K I N G F O R 2 0 1 8 O F

CYBER RISK RELEVANCE IS ON THE RISE

New Entry

Page 14: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

14

IN A TYPICAL ORGANIZATION, 70% TO 90% OF

“HIGH RISK” ISSUES, AREN’T

Why?

Page 15: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

15

RISK MODELS MATTER

POINT OF SALE

ATTACKS

CLOUD COMPUTING

INSIDER THREAT(S)

CYBER CRIMINALS

APPLICATION

VULNERABILITIES

HACKTIVISTS

PHISHING / SOCIAL

ENGINEERING

MOBILE MALWARE

BUSINESS

CONTINUITY

THIRD-PARTY RISK

Typical

Top 10 Risk List

Which Of These Are Risks?

Page 16: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

16

NONE OF THESE ARE RISKS!

APPLICATION VULNERABILITIES

CLOUD COMPUTING

INSIDER THREAT(S)

PHISHING / SOCIAL

ENGINEERING

CONTROL DEFIC.

ASSET

THREAT

METHOD

“THEFT OF CUSTOMER PII DATA THROUGH APPLICATION ATTACKS”

“LOSS OF AVAILABILITY OF SYSTEMS DUE TO MALICIOUS INSIDER”

APPLICATION

VULNERABILITIES

INSIDER THREAT(S)

WE CAN ONLY ASSESS THE RISK OF LOSS EVENTS

Page 17: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

17

FACTOR ANALYSIS OF INFORMATION RISK (FAIR) OVERVIEW

1

7

Page 18: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

18

FAI R – FAC TO R AN A LY S I S F O R I N F O R M ATI O N R I S K

A "FAIR DEFINITION" OF RISK

(*) associated with a specific event

The RISK is

the probable frequency and probable magnitude of future loss (*)

Risk is a derived (calculated) value

To address the inherent uncertainty of risk, probabilistic distributions are used

The risk is defined in terms of "financial loss exposure"

Page 19: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

19

FAIR: THE ANALYTICS MODEL

Accredited as an

Industry Standard by

Complementary to

Risk Frameworks

Supported by a Fast

Growing Community

FAIR Book Inducted

in Cybersecurity Canon

Page 20: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

20

FAIR: THE METHODOLOGY

Scope the

scenarios 1 Risk Scenario

Controls

Threat Effect Assets

Gather Data: use available data or

estimate the ranges for the risk factors

SCALE: chose the level to work at 2

Run the FAIR model:

apply the calculations

Manual or Automatic (more efficient) 3

Reporting 4

Page 21: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

21

C Y B E R R I S K I S E X P R E S S E D I N F I N AN C I A L TE R M S :

THE OUTCOME: WHAT YOU GET

Now you can answer

many more questions!

Page 22: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

22

RSA ARCHER CYBER RISK QUANTIFICATION

Key Features • Built-in risk calibration and analysis engine for cyber

risk calculation

• Templated workflow for easy scenario modeling

• On-demand risk analytics for answers to questions on the fly

• Mathematical simulations to build your risk profile with limited data

• Existing loss tables based on industry data

• Easy-to-use SaaS application

• User-friendly interface

Page 23: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

23

• IT and Security Policy Program Management

• IT Controls Assurance

• IT Risk Management

Cyber Risk Quantification

• Cyber Incident & Breach Response

• IT Security Vulnerabilities Program

• IT Regulatory Management

• PCI Management

• Information Security Management System (ISMS)

RSA ARCHER CYBER RISK QUANTIFICATION A N E W U S E C AS E W I T H I N R S A AR C H E R I T & S E C U R I T Y R I S K

NOTE: the "Cyber Risk Quantification" use case is

powered in the backend by the tool

which is a (SaaS) product integrated with RSA Archer.

Page 24: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

24

RSA PORTFOLIO

RSA CYBER ANALYTICS PLATFORM

Page 25: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

26

30,000+ customers

50+ million identities

97%

94%

Consumer product

Financial institutions

Healthcare institutions

Transportation

Manufacturing

19 of the

TOP 20

20 of the

TOP 20 18 of the TOP 20 Telecom

16 of the TOP 20 Energy

All branches of US Military

13 of the 15 Executive Departments

of U.S. Government

10 of the TOP 10 Technology

1 billion consumers

RSA CUSTOMER LEADERSHIP

Page 26: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

27

Fraud detection rates

400,000+ Malware samples analyzed per week

Phishing attack identified every 30 seconds

$60+ billion Value of transactions protected per year

$8+ billion Value of fraudulent losses prevented per year

95%~

Of malicious

sites blocked

in less than

30 minutes

97%

1+ million Advanced

attacks

detected and

stopped

Leaders quadrants

6

Technology Awards

2016, 2015, 2014, 2013, 2012

GSN Homeland Security

Award 2015

~510 issued patents

~240 pending patents across current product portfolio

Indicators of compromise

actively maintained in RSA Live Threat Intelligence

4M

RSA INDUSTRY LEADERSHIP

Page 27: Cyber Risk Quantification: Translating technical risks ... · 22 RSA ARCHER CYBER RISK QUANTIFICATION Key Features • Built-in risk calibration and analysis engine for cyber risk

28

THANK YOU C O N TA C T S : A N D E R S G R E V E , T L F : 3 0 9 6 4 9 9 9 , E M A I L : A N D E R S . G R E V E @ R S A . C O M J E S P E R S A C H M A N N , T L F : 6 1 2 0 7 0 2 2 , E M A I L : J E S P E R . S A C H M A N N @ R S A . C O M