100
8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454) http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 1/100 EDUCAUSE SECURITY PROFESSIONALS CONFERENCE MAY 6-8, 2014 Using Information Security Metrics To Demonstrate Value and Drive Improvements S HIRLEY C. P AYNE AVP FOR I NFORMATION S ECURITY , P OLICY , & RECORDS U NIVERSITY OFV IRGINIA

SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

Embed Size (px)

Citation preview

Page 1: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 1/100

E D U C A U S E S E C U R I T Y P R O F E S S I O N A L S C O N F E R E N C EM AY 6 - 8 , 2 0 1 4

Using Information SecurityMetrics To Demonstrate Valueand Drive Improvements

SHIRLEYC. PAYNE

AVP FOR INFORMATION SECURITY, POLICY, & RECORDS

UNIVERSITY OFVIRGINIA

Page 2: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 2/100

Copyright Shirley C. Payne 2014.

This presentation leaves copyright of the content to the presenter.Unless otherwise noted in the materials, uploaded content carries theCreative Commons Attribution-NonCommercial-ShareAlike license,

which grants usage to the general public with the stipulated criteria.

Page 3: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 3/100

Seminar Will Answer…

DemonstrateValue & DriveImprovements

What makesa metriceffective?

What are thechallenges?

Where do Istart?

How should I

communicatemetrics?

Where can Ilearn more?

a nd provide lots of examples…

Page 4: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 4/100

DemonstrateValue & Drive

Improvements

What makes a

metric effective?

Page 5: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 5/100

Provide single-point-in-

time views of specific,discrete factors

Generated by counting

Objective raw data

Derived by comparing

two+ measurementstaken over time to apredetermined baseline

Generated by analysis

Objective or subjectivehuman interpretations ofthose data

Measurements and Metrics – same thing?

Page 6: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 6/100

The Mark of Good Metrics

Metrics should be SMART

Specific Well-defined, using unambiguous wording

Measurable Quantitative when feasible

A ttainable Within budgetary and technical limitations

Repeatable Measurements from which metric is derived donot vary depending on the person taking them.

T ime-dependent Takes into consideration measurements frommultiple time slices

George Jelen, “SSE -CMM Security Metrics”

Page 7: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 7/100

Albert Einstein

Everything thatcan be counted

does notnecessarily count;

everything that

counts cannotnecessarily becounted.

Page 8: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 8/100

Truly Effective Metrics…

Indicate the degree to whichsecurity goals are being met

Show linkage between securityand institutional goals

Drive actions taken to improvethe overall security program

Page 9: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 9/100

Rate This Metric

% of servers that are secure has increased fourfold since 2010

S

M

A

R

T

Page 10: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 10/100

Rate This Metric

% of servers that are secure has increased fourfold since 2010

% of servers with patched operating systemsincreased fourfold since 2010

Page 11: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 11/100

Rate This Metric

% of employees who are aware of security threats doubled lastyear

S

M

A

R

T

Page 12: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 12/100

Rate This Metric

% of employees who are aware of security threats doubled lastyear

% of employees completing annual securityawareness training doubled last year

Page 13: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 13/100

Rate This Metric

Level of faculty frustration w/2-factor authentication comparedto reduced risk of unauthorized data access

Page 14: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 14/100

Rate This Metric

Level of faculty frustration w/2-factor authentication comparedto reduced risk of unauthorized data access

% of faculty issued UVa’s hardware identity tokenscompared to faculty use of tokens for email login

Page 15: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 15/100

Rate This Metric

Web application vulnerabilities found during January 2014penetration test

S

M

A

R

T

Page 16: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 16/100

Page 17: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 17/100

Page 18: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 18/100

Page 19: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 19/100

Rate This Metric

In 2013 there were 98 reported Higher Education breachesnationwide compared to 5 at this institution.

S

M

A

R

T

Page 20: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 20/100

Rate This Metric

In 2013 there were 98 reported Higher Education breachesnationwide compared to 5 at this institution.

In 2013 there were 5 reported breaches, 4 of which were discovered by internal controls (versus

reported by outsiders)

Page 21: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 21/100

The Value of “Truly Effective” Security Metrics(internal focus)

Discern effectiveness of particular security programcomponent

Indicate security of specific system, product, or process

Identify risk in not taking a given action and, thereby, helpprioritize corrective actions

Provide evidence of regulatory compliance

Demonstrate ability of security staff and departments toaddress security issues for which they are responsible

Page 22: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 22/100

Value of “Truly Effective” Security Metrics(external focus)

Provide basis for answering tough questions, such as Are we more secure today than we were before?How do we compare to others in this regard?

Are we secure enough?

Raise security awareness among executives and otherstakeholders

Clearly convey value of overall security program relative tobusiness objectives

Page 23: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 23/100

What makes a metric effective?

Characteristics ofeffective metrics:

SMARTIndicate % to whichsecurity goals are met

Link security toinstitutional goals

Drive improvements

EffectiveMetric

Specific

Measurable

AttainableRepeatable

Time-dependent

Page 24: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 24/100

What makes a metric effective? A metric is effective if it can:

Provide insight into IS program effectiveness,regulatory compliance, and ability to address securityconcerns

Help identify risks of not taking certain actions,providing guidance for future investments.

Provide concrete facts for raising security awareness

Provide credible answers to hard questions aboutstatus and value of IS program

Page 25: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 25/100

DemonstrateValue & Drive

Improvements

What are thechallenges?

a nd provide lots of examples…

Page 26: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 26/100

The State of Security Metrics

Other disciplines, such as the field of finance, have provenquantitative methods for determining risk, along withdecision-making frameworks based on establishedmeasures and metrics.

[These] are just emerging for information security, however,and as in any discipline, require realistic assumptions andinputs to attain reliable results.

Wayne Jansen, “Directions in Security Metrics Research,” NISTIR 7564; April 2009

Page 27: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 27/100

75%CISOs say…

Page 28: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 28/100

Page 29: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 29/100

51%CISOs say their…

Page 30: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 30/100

WhyNot?

%

Page 31: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 31/100

18

35

40

48

59

0 10 20 30 40 50 60 70

EXECS NOT INTERESTED

TIME/RESOURCES TO PREP REPORTS FOR EXECS

ONLY COMMUNICATE W/ EXECS ON INCIDENTS

HIGHER PRIORITIES

INFO TOO TECHNICAL FOR EXECS

%

%

Page 32: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 32/100

Page 33: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 33/100

Let’s Look At The Challenges

Measuring Risk

Determining ROSI

Limited Guidance and Practical Examples

Page 34: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 34/100

How To Measure Risk?

Risk = Asset Value x Threat x Vulnerability

Asset Value – easiest to measure in some cases, buthow to quantify assets like institutional reputation?

Threat – very hard to measure the potential for harm,although information from external sources may be

useful.Vulnerability – sources of good information available,but not all vulnerabilities can be quantified.

Page 35: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 35/100

Determining ROSI?

“It’s a good idea in theory, but it’smostly bunk in practice… Securityis not an investment that providesa return… It is an expense that,hopefully, pays for itself in costsavings…Security is about lossprevention, not about earnings. “

Bruce Schneier – September 2, 2008https://www.schneier.com/blog/srchives/2008/09/security_roi_1.html

Page 36: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 36/100

Guatemala Sinkholehttp://news.nationalgeographic.com

Page 37: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 37/100

“We’re here to suggest not only

that you can use ROSI to sell

security internally, but you must.”

Scott Berinato, “Calculated Risk: Return on Security Investment,www.csoonline.com

An Alternate View!

Page 38: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 38/100

Challenge industry assumptions and culturalbiases

Rethink YourAssumptions

Find and use data that’s out there

Do theLegwork

Subtract cost from benefits

Do the Math

Scott Berinato, “Calculated Risk: Return on Security Investment, www.csoonline.com

Page 39: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 39/100

Challenge industry assumptions andcultural biases

Rethink YourAssumptions

• Precision is not the goal• Think in stochastic, not binary, terms

Fire extinguisher ROI: $3 return for every $1 investedNOT

Fire extinguisher ROI: $3.14 return for every $2.97 invested

Page 40: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 40/100

Find and use data that’s out there

Do theLegwork

• Actuarial information, e.g., CERT, Poneman• Annual data breach reports, e.g., Verizon, privacyrights.org• Threat trends, e.g., IBM X-Force, Mandiant• Talk to business managers, e.g., Risk Management Officers,

Financial Managers

Page 41: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 41/100

Subtract cost from benefits

Do the Math

• Annual Loss Expectancy• Modified ALE• Other methods

Page 42: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 42/100

Cost Examples

Lost staff productivityLoss/compromise of dataRecovery costs

Reputational lossFines and lawsuitsLoss of future research grants/contracts

Etc.

Informed by Julia Allen – March 10, 2003 “Making the BusinessCase for Information Security: Selling to Senior Managements”

Page 43: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 43/100

Scenario: Need to determine ROSI on acquisition ofweb app vulnerability scanning service

Page 44: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 44/100

Subtract cost from benefits

Do the Math

• Annual Loss Expectancy: how much $$ lost per year due tosecurity incident

ALE =average cost of data breach X probability of web app breach next year

A L E = $3.2M X .22 = $704,000

Poneman Study Verizon Study

Page 45: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 45/100

Page 46: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 46/100

Subtract cost from benefits

Do the Math

• Annual Loss Expectancy: how much $$ lost per year due tosecurity incident

• Modified ALE: ALE w/effect of mitigation measure incorporated

COST SAVINGS = ALE – mALE

COST SAVINGS = $704,000 - $352,000 = $352,000

Page 47: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 47/100

Subtract cost from benefits

Do the Math

• Annual Loss Expectancy: how much $$ lost per year due tosecurity incident

• Modified ALE: ALE w/effect of mitigation measure incorporated

ROSI = BENEFITS - COST

Cost per year of xyz web app service = $80,000

ROSI = $352,000 - $80,000 = $281,600

Page 48: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 48/100

Let’s Look At The Challenges

Limited Guidance and Practical Examples

Page 49: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 49/100

Limited Guidance and Practical Examples?Good News!

ISO 27004

NIST SP 800-55 Rev. 1

CIS Consensus Information Security MetricsTop 20 Critical Security Controls

Page 50: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 50/100

ISO/IEC 27004

Published December 2009 (new version planned)Guidance for developing metrics for evaluatinginformation security programsKey sections:

Information security measurement overview;Management responsibilities;Measures and measurement development;Measurement operation;

Data analysis and measurement results reporting;Program evaluation and improvement.

http://www.iso.org/iso/catalogue_detail?csnumber=42106

Page 51: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 51/100

NIST SP 800-55 Rev. 1

Published July 2008Specific advice for developing, selecting, and implementingperformance measures

Security controls tied to overall missionPractical examples

http://csrc.nist.gov/publications/PubsSPs.html

Page 52: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 52/100

CIS Consensus Information Security Metrics

V1.1.0 published November 2010Metrics on security outcomes and process performance.

Common definitions for data collection and analysis

Metrics grouped by purpose and audience: management,operational, technical

Twenty metrics defined in six functions: incident management,vulnerability management, patch management, application security, configurationmanagement, financial metrics

https://benchmarks.cisecurity.org/downloads/browse/?category=metrics

Page 53: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 53/100

Top 20 Critical Security Controls

V5.0 published February 2014Identifies controls having greatest positive impact on riskposture

Includes suggested metrics for most controls

http://www.councilonc ybersecurity.org

Page 54: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 54/100

Page 55: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 55/100

Also, check out these conference sessions…

Page 56: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 56/100

What are the challenges?

Lack of common vocabulary and definitions

We don’t speak the language of executives:Institutional goalsRisksROI

Finally, practical guidance and examples!

Page 57: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 57/100

DemonstrateValue & Drive

Improvements

Where do Istart?

a nd provide lots of examples…

Page 58: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 58/100

Seven-Step Methodology

Review and refine

Create action plan

Determine how to report

Establish benchmarks and targets

Develop strategies for generation

Decide what metrics to generate

Define goal(s) and objectives

Page 59: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 59/100

Step 1Define the metricsprogram goal(s) andobjectives

Clearly state the end toward whichall metrics and measurements shouldbe directed

Indicate high level actions that mustbe collectively accomplished to meetthe goal(s)

Page 60: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 60/100

Step 2Decide what metrics togenerate

Use existing process improvementframework to determine metrics

Page 61: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 61/100

Framework Examples

Six Sigma Breakthrough StrategyBalanced ScorecardEnterprise Risk Management

Enterprise-level Compliance TrackingStrong Focus Within Institution On:

ROIOn time/on schedule project completion

National rankingsBond ratingsEtc.

Page 62: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 62/100

Step 2Decide what metricsto generate

Use existing process improvementframework to determine metrics

In the absence of pre-existing

framework, use top-down orbottom-up approach for determiningwhat metrics might be desirable

Page 63: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 63/100

Top-down Approach

S TEPS E XAMPLES

a. Define/list objectives of the overallsecurity program

To reduce the number of virus infectionswithin the institution by 30% by 2015

b. Identify metrics that would indicate progress toward each objective

Current ratio of virus alerts to actualinfections as compared to the baseline2012 figure

c. Determine measurements needed foreach metric

Number of virus alerts issued to theorganization by month

Number of virus infections reported

Page 64: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 64/100

Bottom-up Approach

S TEPS E XAMPLES

a. Identify measurements that are/could be collected for this process

Average number of criticalvulnerabilities detected monthly in

servers using xyz scanning tool

b. Determine metrics that could begenerated from the measurements

Change in number of criticalvulnerabilities detected in servers since

xyz scanning tool implemented

c. Determine the association between thederived metrics and establishedobjectives of the overall security program

To reduce the number of detectablevulnerabilities on servers by 95% by2015.

Page 65: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 65/100

Step 3Develop strategies forgenerating the metrics

Identify trustworthy sources of dataInternal, e.g., IT operations, Audit, Risk Management,Finance, Compliance, etc.External, e.g., actuarial data, annual breach stats, etc.

Decide on frequency of data collectionAssign responsibility for assuringaccuracy of raw data

Develop methods for compiling data intomeasurements and generating metrics

Page 66: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 66/100

Page 67: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 67/100

Step 5Determine how themetrics will bereported

Effective communication of metrics isobviously key. Don’t over -simplify, butpresent clearly.

Vary what is reported and howdepending upon audience

Determine context, format,frequency, distribution method, and

reporting responsibility

Page 68: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 68/100

Step 6Create an action planand act on it

Plan and conduct actions needed togenerate metrics; test, verify,investigate anomalies; implementDocument!

Field Data

Page 69: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 69/100

Measure ID ISPA-1

Goal Identify levels of serious network-based threats of the kind monitored by the FireEye scanner bynetwork

Measure Since implementation of FireEye monitoring, number of high severity level infections detected on eachnetwork

Type Implementation

Formula Number of critical issues identified by FireEye on each network

Target Baseline; comparison

Definition of Measures

Contributing to Metrics

•“Critical” is defined by FireEye based on its risk analysis; it represents items receiving a score of 5-7 on

a 7 point scale; UVa does not have input on this definition•The networks are defined by the UVa network architecture; the number of devices on each networkwill vary over time as devices are added and migrated between networks; additional networks may beadded to the list of those scanned over time

Frequency Data are collected daily; they will be reported, as appropriate, on a daily, weekly, monthly, quarterlyand/or fiscal year basis

Responsible Parties •Information Owner: AVP ISPRO•Information Collector: ISPA team•Information Customer: VP/CIO, AVP ISPRO, Director ISPA

Data Source FireEye console

Reporting Format Bar graph; spreadsheet

Page 70: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 70/100

Step 7Establish a formalprogram review andrefinement cycle

Doubt about metric accuracy?

Value worth effort to generate?

New metric best practices/guidanceto consider?

Most important: did metrics guideimprovements to overall securityprogram?

Page 71: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 71/100

Adjust for Maturity of Security Program

Page 72: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 72/100

Usefulness of a Given Metric Varies Depending Upon

Page 73: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 73/100

Maturity of the Security Program

PoliciesDeveloped

ProceduresDeveloped

Procedures &Controls

Implemented

Procedures &ControlsTested

Procedures& ControlsIntegrated

Useful metrics difficult to produce at this early

stage; limited availability of data and collectionmay be difficult

Usefulness of a Given Metric Varies Depending Upon

Page 74: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 74/100

Maturity of the Security Program

PoliciesDeveloped

ProceduresDeveloped

Procedures &Controls

Implemented

Procedures &ControlsTested

Procedures& ControlsIntegrated

Primary focus on implementationmetrics• Ex: Increase in # of departments that have

mission continuity plans

Usefulness of a Given Metric Varies Depending Upon

Page 75: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 75/100

Maturity of the Security Program

PoliciesDeveloped

ProceduresDeveloped

Procedures &Controls

Implemented

Procedures &ControlsTested

Procedures& ControlsIntegrated

Primary focus on efficiency andeffectiveness metrics• Ex: % of total departments with updated, tested

mission continuity plans

Usefulness of a Given Metric Varies Depending Upon

Page 76: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 76/100

Maturity of the Security Program

PoliciesDeveloped

ProceduresDeveloped

Procedures &Controls

Implemented

Procedures &ControlsTested

Procedures& ControlsIntegrated

Primary focus on impact metrics

• Ex: Outcome of 48-hour power outage inadministration bldg.

Usefulness of a Given Metric Varies Depending Upon

Page 77: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 77/100

Maturity of the Security Program

PoliciesDeveloped

ProceduresDeveloped

Procedures &Controls

Implemented

Procedures &ControlsTested

Procedures& ControlsIntegrated

Primary focus on implementationmetrics• Ex: Sensitive data scanning tool deployed on all

individual desktops/laptops

Usefulness of a Given Metric Varies Depending Upon

Page 78: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 78/100

Maturity of the Security Program

PoliciesDeveloped

ProceduresDeveloped

Procedures &Controls

Implemented

Procedures &ControlsTested

Procedures& ControlsIntegrated

Primary focus on efficiency and

effectiveness metrics• Ex: # of unapproved storage of sensitive data found

on desktops/laptops

Usefulness of a Given Metric Varies Depending Upon

Page 79: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 79/100

Maturity of the Security Program

PoliciesDeveloped

ProceduresDeveloped

Procedures &Controls

Implemented

Procedures &ControlsTested

Procedures& ControlsIntegrated

Primary focus on impact metrics

• Ex: Reduction in sensitive data exposures dueto stolen or vulnerable desktops/laptops

Page 80: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 80/100

Where do I start?

Leverage existing frameworks for expressing: progresstoward goals, value propositions, process improvements,etc.

Use systematic approach for defining effective metricsAdjust metric types as security program matures

ImplementationMetrics

Efficiency andEffectivenessMetrics

Impact Metrics

Page 81: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 81/100

DemonstrateValue & DriveImprovements

How should Icommunicate

metrics?

a nd provide lots of examples…

G d N It’ N A H tT i

Page 82: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 82/100

Good News: It’s Now A Hot Topic

Page 83: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 83/100

Page 84: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 84/100

84

But, how to make your message heard?

Page 85: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 85/100

Albert Einstein

Things shouldbe made assimple aspossible, but notany simpler

Page 86: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 86/100

Tip…

Customize yourmetrics-basedinformation forthe audience

Customize for Security Engineers

Page 87: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 87/100

Customize for Security Engineers

• Change in #malwareinfections overtime

• # web app

vulnerabilitiesdetected sincescan toolimplemented

• Mean timebetween phishreport andblocked malicioussites

Customize for CISO/CIO

Page 88: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 88/100

Customize for CISO/CIO

• Change in # ofproactive securityconsultationscompared to FY13baseline.

• Sinceimplementing webapplicationsecurity scanningservice, # highseverity levelvulnerabilitiesdetected declined90%.

Customize for Executives

Page 89: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 89/100

Customize for Executives

• % of IT budgetspent on securitycompared to peerinstitutions

• Since institution-

wide SSNremediationproject initiated,change in ratio ofdata securitybreaches to totalsecurity incidentsinvestigated

Page 90: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 90/100

Tip…

Use effectivevisuals

Page 91: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 91/100

Page 92: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 92/100

Page 93: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 93/100

AdditionalTips for Communication

Page 94: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 94/100

Additional Tips for Communication

Provide right metrics for issue at hand

Provide brief interpretation and analysis

Use specific audience’s language

Link to business goals and objectives

Page 95: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 95/100

How should I communicate metrics?

Take heart. You now have a receptive audience.

Tailor for the audience

Delivery method is as important as what you have to say

Right metric clearly conveyed=

Right conclusion & decision

Page 96: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 96/100

References

Page 97: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 97/100

References

Allen, Julia. “Making the Business Case for Information Security: Selling to Senior Managements.” Carnegie

Mellon University at InfoSec World, 2003, March 10, 2003

Allen, Julia and Stephani Losi. “The ROI of Security.” Software Engineering Institute, Carnegie MellonUniversity, October 1, 2006. http://resources.sei.cmu.edu/asset_files/podcast/2006_016_100_47182.pdf

Berinato , Scott, “Calculated Risk: Return on Security Investment,” CSOonline.com, December 9, 2002,http://www.csoonline.com/article/2113094/metrics-budgets/calculated-risk--return-on-security-investment.html

Center for Internet Security. “CIS Consensus Information Security Metrics,” November 2010.https://benchmarks.cisecurity.org/downloads/browse/?category=metrics

Council on Cybersecurity . “Top 20 Information Security Controls,” http://www.counciloncybersecurity.org

Cullinane, Dave. “Security Awareness and Communication in the C -Suite,” EDUCAUSE e -Live Webinar,October 4, 2012. http://www.educause.edu/library/resources/security-awareness-and-communication-c-

suiteEDUCAUSE: 7 Things You Should Know About Security Metrics,http://www.educause.edu/library/resources/7-things-you-should-know-about-information-security-metrics

References

Page 98: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 98/100

References

EDUCAUSE: Guide To Effective Security Metrics,

https://wiki.internet2.edu/confluence/display/2014infosecurityguide/Effective+Security+Metrics

EDUCAUSE: Security Metrics Resource Library, http://www.educause.edu/library/security-metrics

EDUCAUSE Core Data Service, http://www.educause.edu/research-and-publications/research/core-data-service

Hinson , Dr. Gary, “Seven Myths About Security Metrics,” ISSA Journal, July 2006.

http://www.noticebored.com/html/metrics.html

ISO/IEC 27004 http://www.iso.org/iso/catalogue_detail?csnumber=42106

Jansen, Wayne. “Directions in Security Metrics Research,” NISTIR 7564; April 2009.http://csrc.nist.gov/publications/nistir/ir7564/nistir-7564_metrics-research.pdf

Jelen, George. “SSE -CMM Security Metrics.” NIST and CSSPAB Workshop, Washington, D.C., 13 -14 June

2000. URL: http://csrc.nist.gov/csspab/june13-15/jelen.pdf (10 July 2001).

Payne , Shirley C., “A Guide To Security Metrics,” SANS Reading Room, July 11, 2001, updated June 19,2006. http://www.sans.org/reading-room/whitepapers/auditing/guide-security-metrics-55

References

Page 99: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 99/100

References

“Performance Measurement Guide for Information Security,” NIST SP 800 -55 Revision 1 – http://csrc.nist.gov/publications/PubsSPs.html

Poneman Institute. “The 2013 Cost of a Data Breach: Global Analysis,” May 28, 2013.http://www.ponemon.org/library/2013-cost-of-data-breach-global-analysis

Ponemon Institute. “The State of Risk -based Security Management 2013,”http://www.tripwire.com/ponemon/2013/

Schneier, Bruce. “Security ROI,” September 2, 2008https://www.schneier.com/blog/archives/2008/09/security_roi_1.html

Slater, Derek, “Security Metrics: Critical Issues,” CSOonline.com, Nov 12, 2012,http://www.csoonline.com/article/2123361/metrics-budgets/security-metrics--critical-issues.html

Stafford, Eugene and Christina Torode. “A bleak picture of IT security metrics and fighting maliciousattacks,” ISSA conference, Nashville, Tenn., December 11, 2013http://searchcompliance.techtarget.com/video/A-bleak-picture-of-IT-security-metrics-and-fighting-malicious-attacks

Most Of All…

Page 100: SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

8/11/2019 SEM01A-Using Information Security Metrics to Demonstrate Value and Drive Improvements (separate registration required) (236663454)

http://slidepdf.com/reader/full/sem01a-using-information-security-metrics-to-demonstrate-value-and-drive-improvements 100/100

Most Of All…

Keep your eyes on the forest, not the trees!