View
43
Download
2
Category
Tags:
Preview:
Citation preview
Are You Well Positioned?Using Threat Information to Build Your
Cyber Risk Intelligence Program
2
• The CISO mission: show how ongoing operational costs and investments support business activities
• CISO’s need to think more about the Boardroom and not the Server Room
• Protecting everything equally leads to trouble as NOT ALL RISKS ARE CREATED EQUAL
• Regulators, insurers & risk committees expect due diligence and due care in mitigating threats that create risk
Setting the Stage
“We believed we were doing things ahead of the industry. We thought we were well-positioned.”
- Frank Blake, Chairman of Home Depot
3
How Did Audit Play?
• Home Depot said they assembled an ‘incident response team’ and went through a 5 hour audit committee review– Audit was relied on to understand status at the time of the attack – Measuring cyber risk was not a recurring effort from an operations
resilience view – Was it treated as …
• an internal control?• a benchmark review?• a check box?
“Assessments of the nature of the threat weren’t sufficient.”
- Frank Blake
4
How Audit Should Play
• Audit should measure your proficiency against a particular benchmark:– Business Resilience?– Risk Intelligence?– Defining Well Positioned?– Assessing Digital Harm?
(How a business unit’s goals could be impacted by a cyber event)
5
My Favorite Definition of Risk Intelligence
“The organizational ability to think holistically about risk and uncertainty, speak a common risk language, and
effectively use forward-looking risk concepts and tools in
making better decisions, alleviating threats, capitalizing on opportunities,
and creating lasting value.”
- Leo Tilman
6
The Fabric of Cyber• Cyber is tied to the fabric of
everything necessary to run a business, connecting/enabling your: – Supply chain– Customer base– Business support applications– Financials– IT Infrastructure– Marketing and Sales– Communications
7
Our Approach to Cyber is Not Working
Too many organizations rely on tools alone to solve
their problems
8
ToolsTools have outputs
ProgramsPrograms have
outcomes
The Question
“Are we well-positioned for cyber risk in our
organization and how do we compare to our
competitors?”
9
What Kind of Program Do You Want to Create?
IT Security Program?
Cyber Security Program?
Risk Management Program?
I would propose it is none of those terms, rather a Cyber Risk Intelligence Program…
10
But Why a Cyber Risk Intelligence Program?
• Cyber risk intelligence overlays and aligns data of who you are as a company on top of cyber threat data and is used to focus on making decisions and taking the right action. – How you are positioned?
– How do you compare to others in your industry?
– What people, process and technology is needed in order to reduce your risk exposure throughout all levels of the organization?
11
Create a Mission Statement
“Be well-positioned for cyber risk in our organization”
12
You Can Likely Start Now
Your organization already likely collects intelligence on:
Yet “cyber” continues to have little visibility!
13
• Sales
• Marketing
• Customers
• Financials
• Logistics
• Competitors
Stop Talking Techno-Dork
14
Cyber risk intelligence IS NOT:
Cyber risk intelligence IS:
About what new threat signatures
you can pump into your SIEM
Understanding cyber risk intelligence as it relates to your business and supply chain
Only about what you're SOC Analysts can see
Understanding what you are getting out of your cyber spend and if you are well positioned
Just an Information Technology problem
• A brand and reputation problem• A resilience problem• A financial problem
Don’t be an Actionable Actionating Actionator
You are an Actionable Actionating Actionator if:• You perform actionable actioning
on threat intelligence actions
• You’re not able to influence the decisions of the decision makers
• You seem to be really busy assessing information. i.e. whack a mole
15
16
Intelligence needs to
focus your organization on
Making Decisions and
Taking Action
How is Your Intelligence Used?
17
1. Align tactical and strategic cyber intelligence resources as well as high and low level data sets
- You need a 360 degree view
- Create a capability for total situational awareness – Tactical, Strategic, Internal and External
2. Shape resource allocation around measurable and observed threats
- Apply the proper resources to the proper threat
Best Practices
18
3. Map cyber risk to your organization’s Key Business Areas
- How does the threat program affect the decisions of the business unit?
- Is the organization “Well Positioned” against observed threats?
4. Mind the gap – Cyber Risk Intelligence is a program and not a tool
- Tools have outputs, programs have outcomes
Best Practices… Continued
Measuring Cyber Risk Intel
• Start Simple– Good business managers run things on a foundation of the
evaluated intelligence – it’s the thing you know.
• Make Risks Learnable– Learnable risks are the ones we could make less uncertain if
we took the time and resources to learn more about them.
– Random risks are defined as those that had no analysis.
– Separating learnable risks from random ones in business decisions for causes or drivers can make them less uncertain.
– Tie Learnable risks to anything that makes you “you”.
19
Use Cyber Risk Intelligence to Drive Better Security Decisions
20
21
Thank You!
www.surfwatchlabs.com
Recommended