32
Intel & McAfee Confidential Strategic Leadership for Managing Evolving Cybersecurity Risks NSF Cybersecurity Summit 2014 August 28 th 2014, Arlington Virginia Matthew Rosenquist Cybersecurity Strategist, Intel Corp

Strategic Leadership for Managing Evolving Cybersecurity Risks

Embed Size (px)

DESCRIPTION

2014 NSF Cybersecurity Summit keynote presentation from Matthew Rosenquist, Cybersecurity Strategist for Intel Corp. Cybersecurity is difficult. It is a serious endeavor which strives to find a balance in managing the security of computing capabilities to protect the technology which connects and enriches the lives of everyone. Characteristics of cyber risk have matured and expanded on the successes of technology innovation, integration, and adoption. It is no longer a game of tactics, but rather a professional discipline, continuous in nature, where to be effective strategic leadership must establish effective and efficient structures for evolving controls to sustain an optimal level of security. This presentation will discuss the challenges, organizational opportunities, and explore best practices to align investments in security to the risk appetite of an organization.

Citation preview

Page 1: Strategic Leadership for Managing Evolving Cybersecurity Risks

Intel amp McAfee Confidential

Strategic Leadership for Managing Evolving Cybersecurity Risks

NSF Cybersecurity Summit 2014August 28th 2014 Arlington Virginia

Matthew RosenquistCybersecurity Strategist Intel Corp

Opportunity and Challenges

Working together to address

bull Burning challenges of today

bull Opportunities for a better tomorrow

bull Many roles and uncertainty

bull Embracing the best practices across the industry

bull What does success look like

Technology connects and enriches the lives of every

person on earth

Security is critical to protect computing technology

from threats which undermine the health of

the industry

ldquoIf security breaks down technology breaks downrdquo

Brian KrebsNoted Cybersecurity Reporter

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Changing Landscape Drives Security

6

Security issues undermine the continued growth innovation and adoption of technology

Amount amp Aggregation of Valuable

Data

Number of Connected

People

Leading Metrics amp Trends

~300k New Malwareday 220m+ Total

25m+ Totallsquosignedrsquo Samples

Increase of lsquosignedrsquo

malware

~50

40 Increasein Data Breaches

Organizations suffering

a data breach in 2013

93

1M+ Adults Victims each day (12 per second)

Online adults victims of

cybercrime or negative

situations

50

~20-30 of overall technology spending1

Source McAfee Cost of Cybercrime report 2014Source McAfee Threat Report Q1 2014 Source McAfee Threat Report Q3 2013

Global Infection Rates

Worldwide computers

infected in 2012

~32

Source Panda Labs Source UK Government BIS SurveySource Symantec 2013 Norton Report

$400bAnnual cost of

global cybercrime

TOTAL MALWARE

8Source Gartner IDC Strategy Analytics Machina Research company filings BII estimates

Global Internet Device Installed Base Forecast

9

~$3 Trillion

Aggregate economic impact of cybersecurity on technology trends

through 20201

1Risk and Responsibility in a Hyperconnected World - 2014 World Economic Forum httpwwwmckinseycominsightsbusiness_technologyrisk_and_responsibility_in_a_hyperconnected_world_implications_for_enterprises

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Leadership is key in organizing resources to achieve and maintain an

optimal level of security value

Resource Constraints and Decisions

11

ldquoInfinite Resources =

Infinite Possibilitiesrdquo

Smart Decisions are Key

Balancing Security Value Aspects

Optimal security is the right balance of cost

user experienceand risk tradeoffs

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 2: Strategic Leadership for Managing Evolving Cybersecurity Risks

Opportunity and Challenges

Working together to address

bull Burning challenges of today

bull Opportunities for a better tomorrow

bull Many roles and uncertainty

bull Embracing the best practices across the industry

bull What does success look like

Technology connects and enriches the lives of every

person on earth

Security is critical to protect computing technology

from threats which undermine the health of

the industry

ldquoIf security breaks down technology breaks downrdquo

Brian KrebsNoted Cybersecurity Reporter

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Changing Landscape Drives Security

6

Security issues undermine the continued growth innovation and adoption of technology

Amount amp Aggregation of Valuable

Data

Number of Connected

People

Leading Metrics amp Trends

~300k New Malwareday 220m+ Total

25m+ Totallsquosignedrsquo Samples

Increase of lsquosignedrsquo

malware

~50

40 Increasein Data Breaches

Organizations suffering

a data breach in 2013

93

1M+ Adults Victims each day (12 per second)

Online adults victims of

cybercrime or negative

situations

50

~20-30 of overall technology spending1

Source McAfee Cost of Cybercrime report 2014Source McAfee Threat Report Q1 2014 Source McAfee Threat Report Q3 2013

Global Infection Rates

Worldwide computers

infected in 2012

~32

Source Panda Labs Source UK Government BIS SurveySource Symantec 2013 Norton Report

$400bAnnual cost of

global cybercrime

TOTAL MALWARE

8Source Gartner IDC Strategy Analytics Machina Research company filings BII estimates

Global Internet Device Installed Base Forecast

9

~$3 Trillion

Aggregate economic impact of cybersecurity on technology trends

through 20201

1Risk and Responsibility in a Hyperconnected World - 2014 World Economic Forum httpwwwmckinseycominsightsbusiness_technologyrisk_and_responsibility_in_a_hyperconnected_world_implications_for_enterprises

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Leadership is key in organizing resources to achieve and maintain an

optimal level of security value

Resource Constraints and Decisions

11

ldquoInfinite Resources =

Infinite Possibilitiesrdquo

Smart Decisions are Key

Balancing Security Value Aspects

Optimal security is the right balance of cost

user experienceand risk tradeoffs

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 3: Strategic Leadership for Managing Evolving Cybersecurity Risks

Technology connects and enriches the lives of every

person on earth

Security is critical to protect computing technology

from threats which undermine the health of

the industry

ldquoIf security breaks down technology breaks downrdquo

Brian KrebsNoted Cybersecurity Reporter

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Changing Landscape Drives Security

6

Security issues undermine the continued growth innovation and adoption of technology

Amount amp Aggregation of Valuable

Data

Number of Connected

People

Leading Metrics amp Trends

~300k New Malwareday 220m+ Total

25m+ Totallsquosignedrsquo Samples

Increase of lsquosignedrsquo

malware

~50

40 Increasein Data Breaches

Organizations suffering

a data breach in 2013

93

1M+ Adults Victims each day (12 per second)

Online adults victims of

cybercrime or negative

situations

50

~20-30 of overall technology spending1

Source McAfee Cost of Cybercrime report 2014Source McAfee Threat Report Q1 2014 Source McAfee Threat Report Q3 2013

Global Infection Rates

Worldwide computers

infected in 2012

~32

Source Panda Labs Source UK Government BIS SurveySource Symantec 2013 Norton Report

$400bAnnual cost of

global cybercrime

TOTAL MALWARE

8Source Gartner IDC Strategy Analytics Machina Research company filings BII estimates

Global Internet Device Installed Base Forecast

9

~$3 Trillion

Aggregate economic impact of cybersecurity on technology trends

through 20201

1Risk and Responsibility in a Hyperconnected World - 2014 World Economic Forum httpwwwmckinseycominsightsbusiness_technologyrisk_and_responsibility_in_a_hyperconnected_world_implications_for_enterprises

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Leadership is key in organizing resources to achieve and maintain an

optimal level of security value

Resource Constraints and Decisions

11

ldquoInfinite Resources =

Infinite Possibilitiesrdquo

Smart Decisions are Key

Balancing Security Value Aspects

Optimal security is the right balance of cost

user experienceand risk tradeoffs

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 4: Strategic Leadership for Managing Evolving Cybersecurity Risks

ldquoIf security breaks down technology breaks downrdquo

Brian KrebsNoted Cybersecurity Reporter

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Changing Landscape Drives Security

6

Security issues undermine the continued growth innovation and adoption of technology

Amount amp Aggregation of Valuable

Data

Number of Connected

People

Leading Metrics amp Trends

~300k New Malwareday 220m+ Total

25m+ Totallsquosignedrsquo Samples

Increase of lsquosignedrsquo

malware

~50

40 Increasein Data Breaches

Organizations suffering

a data breach in 2013

93

1M+ Adults Victims each day (12 per second)

Online adults victims of

cybercrime or negative

situations

50

~20-30 of overall technology spending1

Source McAfee Cost of Cybercrime report 2014Source McAfee Threat Report Q1 2014 Source McAfee Threat Report Q3 2013

Global Infection Rates

Worldwide computers

infected in 2012

~32

Source Panda Labs Source UK Government BIS SurveySource Symantec 2013 Norton Report

$400bAnnual cost of

global cybercrime

TOTAL MALWARE

8Source Gartner IDC Strategy Analytics Machina Research company filings BII estimates

Global Internet Device Installed Base Forecast

9

~$3 Trillion

Aggregate economic impact of cybersecurity on technology trends

through 20201

1Risk and Responsibility in a Hyperconnected World - 2014 World Economic Forum httpwwwmckinseycominsightsbusiness_technologyrisk_and_responsibility_in_a_hyperconnected_world_implications_for_enterprises

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Leadership is key in organizing resources to achieve and maintain an

optimal level of security value

Resource Constraints and Decisions

11

ldquoInfinite Resources =

Infinite Possibilitiesrdquo

Smart Decisions are Key

Balancing Security Value Aspects

Optimal security is the right balance of cost

user experienceand risk tradeoffs

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 5: Strategic Leadership for Managing Evolving Cybersecurity Risks

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Changing Landscape Drives Security

6

Security issues undermine the continued growth innovation and adoption of technology

Amount amp Aggregation of Valuable

Data

Number of Connected

People

Leading Metrics amp Trends

~300k New Malwareday 220m+ Total

25m+ Totallsquosignedrsquo Samples

Increase of lsquosignedrsquo

malware

~50

40 Increasein Data Breaches

Organizations suffering

a data breach in 2013

93

1M+ Adults Victims each day (12 per second)

Online adults victims of

cybercrime or negative

situations

50

~20-30 of overall technology spending1

Source McAfee Cost of Cybercrime report 2014Source McAfee Threat Report Q1 2014 Source McAfee Threat Report Q3 2013

Global Infection Rates

Worldwide computers

infected in 2012

~32

Source Panda Labs Source UK Government BIS SurveySource Symantec 2013 Norton Report

$400bAnnual cost of

global cybercrime

TOTAL MALWARE

8Source Gartner IDC Strategy Analytics Machina Research company filings BII estimates

Global Internet Device Installed Base Forecast

9

~$3 Trillion

Aggregate economic impact of cybersecurity on technology trends

through 20201

1Risk and Responsibility in a Hyperconnected World - 2014 World Economic Forum httpwwwmckinseycominsightsbusiness_technologyrisk_and_responsibility_in_a_hyperconnected_world_implications_for_enterprises

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Leadership is key in organizing resources to achieve and maintain an

optimal level of security value

Resource Constraints and Decisions

11

ldquoInfinite Resources =

Infinite Possibilitiesrdquo

Smart Decisions are Key

Balancing Security Value Aspects

Optimal security is the right balance of cost

user experienceand risk tradeoffs

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 6: Strategic Leadership for Managing Evolving Cybersecurity Risks

Changing Landscape Drives Security

6

Security issues undermine the continued growth innovation and adoption of technology

Amount amp Aggregation of Valuable

Data

Number of Connected

People

Leading Metrics amp Trends

~300k New Malwareday 220m+ Total

25m+ Totallsquosignedrsquo Samples

Increase of lsquosignedrsquo

malware

~50

40 Increasein Data Breaches

Organizations suffering

a data breach in 2013

93

1M+ Adults Victims each day (12 per second)

Online adults victims of

cybercrime or negative

situations

50

~20-30 of overall technology spending1

Source McAfee Cost of Cybercrime report 2014Source McAfee Threat Report Q1 2014 Source McAfee Threat Report Q3 2013

Global Infection Rates

Worldwide computers

infected in 2012

~32

Source Panda Labs Source UK Government BIS SurveySource Symantec 2013 Norton Report

$400bAnnual cost of

global cybercrime

TOTAL MALWARE

8Source Gartner IDC Strategy Analytics Machina Research company filings BII estimates

Global Internet Device Installed Base Forecast

9

~$3 Trillion

Aggregate economic impact of cybersecurity on technology trends

through 20201

1Risk and Responsibility in a Hyperconnected World - 2014 World Economic Forum httpwwwmckinseycominsightsbusiness_technologyrisk_and_responsibility_in_a_hyperconnected_world_implications_for_enterprises

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Leadership is key in organizing resources to achieve and maintain an

optimal level of security value

Resource Constraints and Decisions

11

ldquoInfinite Resources =

Infinite Possibilitiesrdquo

Smart Decisions are Key

Balancing Security Value Aspects

Optimal security is the right balance of cost

user experienceand risk tradeoffs

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 7: Strategic Leadership for Managing Evolving Cybersecurity Risks

Leading Metrics amp Trends

~300k New Malwareday 220m+ Total

25m+ Totallsquosignedrsquo Samples

Increase of lsquosignedrsquo

malware

~50

40 Increasein Data Breaches

Organizations suffering

a data breach in 2013

93

1M+ Adults Victims each day (12 per second)

Online adults victims of

cybercrime or negative

situations

50

~20-30 of overall technology spending1

Source McAfee Cost of Cybercrime report 2014Source McAfee Threat Report Q1 2014 Source McAfee Threat Report Q3 2013

Global Infection Rates

Worldwide computers

infected in 2012

~32

Source Panda Labs Source UK Government BIS SurveySource Symantec 2013 Norton Report

$400bAnnual cost of

global cybercrime

TOTAL MALWARE

8Source Gartner IDC Strategy Analytics Machina Research company filings BII estimates

Global Internet Device Installed Base Forecast

9

~$3 Trillion

Aggregate economic impact of cybersecurity on technology trends

through 20201

1Risk and Responsibility in a Hyperconnected World - 2014 World Economic Forum httpwwwmckinseycominsightsbusiness_technologyrisk_and_responsibility_in_a_hyperconnected_world_implications_for_enterprises

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Leadership is key in organizing resources to achieve and maintain an

optimal level of security value

Resource Constraints and Decisions

11

ldquoInfinite Resources =

Infinite Possibilitiesrdquo

Smart Decisions are Key

Balancing Security Value Aspects

Optimal security is the right balance of cost

user experienceand risk tradeoffs

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 8: Strategic Leadership for Managing Evolving Cybersecurity Risks

8Source Gartner IDC Strategy Analytics Machina Research company filings BII estimates

Global Internet Device Installed Base Forecast

9

~$3 Trillion

Aggregate economic impact of cybersecurity on technology trends

through 20201

1Risk and Responsibility in a Hyperconnected World - 2014 World Economic Forum httpwwwmckinseycominsightsbusiness_technologyrisk_and_responsibility_in_a_hyperconnected_world_implications_for_enterprises

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Leadership is key in organizing resources to achieve and maintain an

optimal level of security value

Resource Constraints and Decisions

11

ldquoInfinite Resources =

Infinite Possibilitiesrdquo

Smart Decisions are Key

Balancing Security Value Aspects

Optimal security is the right balance of cost

user experienceand risk tradeoffs

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 9: Strategic Leadership for Managing Evolving Cybersecurity Risks

9

~$3 Trillion

Aggregate economic impact of cybersecurity on technology trends

through 20201

1Risk and Responsibility in a Hyperconnected World - 2014 World Economic Forum httpwwwmckinseycominsightsbusiness_technologyrisk_and_responsibility_in_a_hyperconnected_world_implications_for_enterprises

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Leadership is key in organizing resources to achieve and maintain an

optimal level of security value

Resource Constraints and Decisions

11

ldquoInfinite Resources =

Infinite Possibilitiesrdquo

Smart Decisions are Key

Balancing Security Value Aspects

Optimal security is the right balance of cost

user experienceand risk tradeoffs

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 10: Strategic Leadership for Managing Evolving Cybersecurity Risks

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Leadership is key in organizing resources to achieve and maintain an

optimal level of security value

Resource Constraints and Decisions

11

ldquoInfinite Resources =

Infinite Possibilitiesrdquo

Smart Decisions are Key

Balancing Security Value Aspects

Optimal security is the right balance of cost

user experienceand risk tradeoffs

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 11: Strategic Leadership for Managing Evolving Cybersecurity Risks

Resource Constraints and Decisions

11

ldquoInfinite Resources =

Infinite Possibilitiesrdquo

Smart Decisions are Key

Balancing Security Value Aspects

Optimal security is the right balance of cost

user experienceand risk tradeoffs

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 12: Strategic Leadership for Managing Evolving Cybersecurity Risks

Balancing Security Value Aspects

Optimal security is the right balance of cost

user experienceand risk tradeoffs

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 13: Strategic Leadership for Managing Evolving Cybersecurity Risks

13

Obstacles

versus

Opposition

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 14: Strategic Leadership for Managing Evolving Cybersecurity Risks

Technical amp Behavioral

14

Security is

comprised of both

Technology and

People

Intertwined and

inseparable

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 15: Strategic Leadership for Managing Evolving Cybersecurity Risks

15

Threat agents

include

Insiders amp

Outsiders

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 16: Strategic Leadership for Managing Evolving Cybersecurity Risks

UsersIncreasing numbers

use cases and expectations

Sensitive Data

Massive increase in data and value

IT ModelsRapid growth

changing architecture new

services

Threats

Infrastructure

amp Business

Processes

Trusted

Users

Sensitive

Data

ThreatsRise in

sophistication numbers and

resources

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 17: Strategic Leadership for Managing Evolving Cybersecurity Risks

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

An effective strategy enables operational flexibility while driving

cost efficiency and risk manageability

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 18: Strategic Leadership for Managing Evolving Cybersecurity Risks

Reasonable and Rational Vulnerability Management

Operating Systems

Applications

Virtual MachinesClouds

Data Formats

PhysicalAccessBehavioral

Weaknesses Network Devices

Transport Protocols

Vulnerable

Business Processes

Weak Authentication

amp Authorization

Vulnerable

Hardware

AdvancedPersistent

Threats

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 19: Strategic Leadership for Managing Evolving Cybersecurity Risks

Process Defense-in-Depth Continual Security

DETECTIdentify attacks not prevented to

allow for rapid thorough response

Monitor key areas and activities for attacks which evade

prevention Identifies issues breaches and attacks

RESPONDRapidly address incidents to

minimize loss amp return to normal

Efficient management of efforts to contain repair and

recover as needed returning the environment to normal

operations

PREDICTPredict the most likely attacks

targets amp methods

Proactive measures to identify attackers their objectives

and methods prior to materialization of viable attacks

PREVENTPrevent or deter attacks so no

loss is experienced

Secure the computing environment with current tools

patches updates and best-known methods in a timely

manner Educating and reinforcing good user behaviors

Cyber

Security

Strategy

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 20: Strategic Leadership for Managing Evolving Cybersecurity Risks

Layered Security Technology Integration

Security must persist at multiple layers to insure consistency

and comprehensiveness

NETWORK

bull Firewalls demilitarized zones data loss prevention ID

management traffic amp content filters

PLATFORM

bull Antivirus software patching minimum

security specifications for systems

APPLICATION

bull Secure coding testing

security specifications

FILE AND DATA

bull File and data

encryption

enterprise rights

management

CLOUD

USER

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 21: Strategic Leadership for Managing Evolving Cybersecurity Risks

Know your enemy and know yourself and you can

fight a thousand battles without disaster ndash Sun Tsu

21

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 22: Strategic Leadership for Managing Evolving Cybersecurity Risks

Threat Agent Risk Assessment

22

Threat Agent

Methods Objective

bull Identify the most likely attackers targets and methods

bull Consider accepted levels of risk and current controls

bull Determine the most critical exposures

bull Complementary to traditional ways of analyzing security risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 23: Strategic Leadership for Managing Evolving Cybersecurity Risks

lsquoInterestingrsquo Threat Agents

RISK

High

Low

MOTIVATED CAPABLEto Cause

Loss

of Causing

Loss

INT

EN

SIT

Y

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 24: Strategic Leadership for Managing Evolving Cybersecurity Risks

Example Threat Agent Library

The Intel Threat Agent Library example is available at communitiesintelcom

Threat

Archetypes

Relevant

Attributes

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 25: Strategic Leadership for Managing Evolving Cybersecurity Risks

Threat Agent MethodologyDistilling the Threats

Attack Methods

Attacker Objectives

Threat Agents

Vulnerabilities without Controls for these attacks are likely Exposures

Areas of

highest

Exposure

All possible Threats Objectives and Methods

Highest risk Threats Objectives and Methods

Objectives

Threat Agents

Attack Method

s

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 26: Strategic Leadership for Managing Evolving Cybersecurity Risks

Communicating Risks of Threat Agents

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 27: Strategic Leadership for Managing Evolving Cybersecurity Risks

We manage security through either leadership or crisis

In the absence of leadership we are left with crisis

Two types of victims exist those with something of value and those who are

easy targets

Therefore Donrsquot be an easy target and protect your valuables

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 28: Strategic Leadership for Managing Evolving Cybersecurity Risks

28

Bad Assumptions

I am not a target for attack -gt

Security is an ITusersecurityproductother-guy problem -gt

Closed environments -gt

Insiders arenrsquot a major problem -gt

Where there is value there is risk hellip(the Willie Sutton principle)

It is everyonersquos problem and requires everyone to contribute

helliparenrsquot really as closed as you think

Insiders are a significant risk but largely hidden until something big goes wrong

Bad Assumptions amp Good Practices

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 29: Strategic Leadership for Managing Evolving Cybersecurity Risks

Bad Assumptions amp Good Practices

29

Good Practices

Understand primary threats (most relevant agents their objectives amp likely methods)

Value and grow security savvy usersemployees

Plan across the Defense-in-Depth (predict prevent detect respond)

Disrupt the attack cycle (threat agent -gt methods -gt objectives)

Think ahead but never forsake security fundamentals

Gauge investments with Security Aspects (innovative hardened trusted ubiquitous)

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 30: Strategic Leadership for Managing Evolving Cybersecurity Risks

Smart Innovation to deliver more capable solutions to keep pace with threats

Ubiquitous Security benefitting all users and devices across the compute landscape

TrustedWell designed built and tested solutions backed by commitment reputation and expertise

Strong Hardened embedded and faster technology resistant to compromise

Criteria for Good Choices in Technology and Security

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 31: Strategic Leadership for Managing Evolving Cybersecurity Risks

Conclusion

31

Leadership is crucial

Leverage home-field advantage implement industry best-known-methods

Know your threats assets controls and exposures

Treat security as a continuous cycle

Seek an optimal level of security

Stay positive keep learning and share with the community

32

Page 32: Strategic Leadership for Managing Evolving Cybersecurity Risks

32