Aligning IT Security Solutions with Business JustificationChaiyakorn ApiwathanokulCISSP,GCFA,IRCA:ISMSChief Security Officer, PTT ICT Solutions
Aligning IT Security Solutions with Business JustificationRisk-base security investment (ROSI: Return on Security Investment)Global PerspectiveBeside security solutions, investing in human resource is essential KEY to successYour user: need awarenessYour IT staff: need educationYour management: need understanding
Risk-base Security InvestmentThe ChallengesOrganization using IT has associated RISKVendors want to sell new stuff Organization doesn’t want to be outdatedSecurity solution is expensiveLimited budgetTechnology moves fast forwardSecurity prof. is too techy(no business language)Where enough is enough?Requirement base vs. Technology base
Sun Tzu – The Art of War“If you know your enemies and know yourself, you will not be imperiled in a hundred battles; if you do not know your enemies but do know yourself, you will win one and lose one; if you do not know your enemies nor yourself, you will be imperiled in every single battle.”, Sun Tzu – The Art of War  6th century BCUnderstand your business - YourselfUnderstand the surrounding THREATs – Your ENEMYUnderstand the PROTECTION requirement, limitation and readiness – Your STRATEGY
Risk-base = Requirement-baseRisk AssessmentQuantify – money figureRisk-base Security Investment
Recent Standards/GuidelinesBy A. Chaiyakorn Apiwathanokul
Identifying assetsTangiblesComputers, communications equipment, wiringDataSoftwareAudit records, books, documentsIntangiblesPrivacyEmployee safety & healthPasswordsImage & reputationAvailabilityEmployee morale
1Identify Asset ValueCost to acquire or develop the asset Cost to maintain and protect the asset Value of the asset to owners and users Value of the asset to adversaries Value of intellectual property that went into developing the information Price others are willing to pay for the asset Cost to replace the asset if lost Operational and production activities that are affected if the asset is unavailable Liability issues if the asset is compromised Usefulness and role of the asset in the organization
Identifying threatsEarthquake, flood, hurricane, lighteningStructural failure, asbestosUtility loss, i.e., water, power, telecommunicationsTheft of hardware, software, dataTerrorists, both political and informationSoftware bugs, virii, malicious code, SPAM, mail bombsStrikes, labor & union problemsHackers, internal/externalInflammatory usenet, Internet & web postingsEmployee illness, death Outbreak, epidemic, pandemic
1Calculating (quantifying) RisksSingle Loss Expectancy (SLE)		SLE = Asset Value x EFAnnual Lose Expectancy		ALE = SLE x AROSingle Lose Expectancy (SLE)Amount of lose occur once the threat is realizedExposure Factor (EF)A measure of the magnitude of loss or impact on the value of an assetAnnualized rate of occurrence (ARO)On an annualized basis, the frequency with which a threat is expected to occurAnnualized loss expectancy (ALE)Single loss expectance x annualized rate of occurrence = ALE
Cost/benefit Analysis forCountermeasure ValuationCost of a lossOften hard to determine accuratelyCost of preventionLong term/short termRefer as Safeguard Cost(ALEno.SG) – (ALEwith.SG) – (Cost of SG) = Value of SG to the companyThis value is always referred to when determining Security ROI or ROSI
Global Perspective
From Global Workforce Study by (ISC)2
Chaiyakorn
Chaiyakorn
Chaiyakorn
Information Technology (IT) SecurityEssential Body of Knowledge (EBK)A Competency and Functional Frameworkfor IT Security Workforce DevelopmentSeptember 2008United States Department of Homeland Security
DoD 8570.01-MInformation Assurance Workforce Improvement ProgramDecember 19, 2005
DoD 8570.01-MInformation Assurance Workforce Improvement ProgramMay 15, 2008
Why was the EBK established?Rapid evolution of technologyVarious aspects and expertise are increasingly requiredStandard or common guideline in recruiting, training and retaining of workforceKnowledge and skill baselineLinkage between competencies and job functionsFor public and private sectors
Key Divisions4 functional perspectives14 competency areas10 roles
Functional PerspectivesManageDesignImplementEvaluate
IT Security RolesChief Information OfficerDigital Forensics ProfessionalInformation Security OfficerIT Security Compliance OfficerIT Security EngineerIT Security ProfessionalIT Systems Operations and Maintenance ProfessionalPhysical Security ProfessionalPrivacy ProfessionalProcurement Professional
Competency Areas (MDIE in each)Data SecurityDigital ForensicsEnterprise ContinuityIncident ManagementIT Security Training and AwarenessIT System Operations and MaintenanceNetwork and Telecommunication SecurityPersonnel SecurityPhysical and Environmental SecurityProcurementRegulatory and Standards ComplianceSecurity Risk ManagementStrategic Security ManagementSystem and Application Security
Chaiyakorn
TISA EBK AnalysisEntry LevelProfessional LevelManagerial Level
Your Competency Scorecard
Enterprise Infosec Competency ProfileEnterpriseCapabilityEBKTrainingProvider
http://www.TISA.or.th
0-30
Thank You

More Related Content

PPTX
Pre-PostBreach_Are_Your_Ready
PDF
Chapter 12 iso 27001 awareness
PDF
Trustwave Cybersecurity Education Catalog
PDF
Security Testing for Testing Professionals
PPTX
PPT
Security and personnel bp11521
PPTX
International Conference on Cyber Security, Hide and Go Seek
PDF
Robert beggs incident response teams - atlseccon2011
Pre-PostBreach_Are_Your_Ready
Chapter 12 iso 27001 awareness
Trustwave Cybersecurity Education Catalog
Security Testing for Testing Professionals
Security and personnel bp11521
International Conference on Cyber Security, Hide and Go Seek
Robert beggs incident response teams - atlseccon2011

What's hot (20)

PPTX
PDF
Corporate security pdf
PDF
Selex Es main conference brief for Kingdom Cyber Security Forum
PDF
Key Challenges Facing IT/OT: Hear From The Experts
PPT
Security solutions for a smarter planet
PPTX
Understanding the Cyber Security Vendor Landscape
PPT
Business RISKS From IT
PDF
Security Testing for Testing Professionals
PDF
PPTX
NZISF Talk: Six essential security services
PDF
IT Position of Trust Designation
PDF
Mergers and Acquisition Security - Areas of Interest
PPT
knowthyself : Internal IT Security in SA
PDF
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
PPTX
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
PDF
Source 44 sc congress canada 2011-06
PDF
Trustwave Cybersecurity Education Catalog 2019
PDF
Threat Modeling for the Internet of Things
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
PDF
Trustwave Cybersecurity Education Catalog 2018
Corporate security pdf
Selex Es main conference brief for Kingdom Cyber Security Forum
Key Challenges Facing IT/OT: Hear From The Experts
Security solutions for a smarter planet
Understanding the Cyber Security Vendor Landscape
Business RISKS From IT
Security Testing for Testing Professionals
NZISF Talk: Six essential security services
IT Position of Trust Designation
Mergers and Acquisition Security - Areas of Interest
knowthyself : Internal IT Security in SA
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Source 44 sc congress canada 2011-06
Trustwave Cybersecurity Education Catalog 2019
Threat Modeling for the Internet of Things
BSIDES DETROIT 2015: Data breaches cost of doing business
Trustwave Cybersecurity Education Catalog 2018
Ad

Similar to Chaiyakorn (20)

PDF
Information Security in the Gaming World
PPT
Risk Assessment And Management
PPT
The Business Of Information Security V2.0
PDF
Information Security Strategic Management
PPTX
Justifying Security Investment
PPTX
The Gathering Storm
PPTX
INFRAGARD 2014: Back to basics security
PPT
1. security management practices
PPT
ERM Presentation
PPT
The Perspective of Today's Information Security Leader
PPT
Ignorance Is Risk
PPTX
3- Security Risk Analysis and Management.pptx
PPTX
Info sec 2011 julen c mohanty
PPTX
Info sec 2011 julen c mohanty
PPTX
crisc_wk_2a.pptx
PDF
IT Optimization & Risk Management
PPTX
Dancyrityshy 1foundatioieh
PPTX
"I am Certified, but am I Safe?" - Information Security Summit, Kuala Lumpur,...
PPTX
Business value of Enterprise Security Architecture
PDF
Enterprise Architecture - Information Security
Information Security in the Gaming World
Risk Assessment And Management
The Business Of Information Security V2.0
Information Security Strategic Management
Justifying Security Investment
The Gathering Storm
INFRAGARD 2014: Back to basics security
1. security management practices
ERM Presentation
The Perspective of Today's Information Security Leader
Ignorance Is Risk
3- Security Risk Analysis and Management.pptx
Info sec 2011 julen c mohanty
Info sec 2011 julen c mohanty
crisc_wk_2a.pptx
IT Optimization & Risk Management
Dancyrityshy 1foundatioieh
"I am Certified, but am I Safe?" - Information Security Summit, Kuala Lumpur,...
Business value of Enterprise Security Architecture
Enterprise Architecture - Information Security
Ad

More from Narinrit Prem-apiwathanokul (14)

PDF
How to address C-Level properly?
PDF
IMC: risk base security
PDF
Cloud Security by CK
PDF
U S Embassy Event - Today’S Cyber Threats
PDF
Introduction to INFOSEC Professional
PDF
Infosec Workforce Development Framework For Thailand
PDF
Improving SCADA Security
PDF
PPTX
SCADA Security in CDIC 2009
PDF
S C A D A Security Keynote C K
PPTX
SecurityExchange2009-Key Note
PPT
CCA Preparation for Organization
PPT
IT Security EBK2008 Summary
How to address C-Level properly?
IMC: risk base security
Cloud Security by CK
U S Embassy Event - Today’S Cyber Threats
Introduction to INFOSEC Professional
Infosec Workforce Development Framework For Thailand
Improving SCADA Security
SCADA Security in CDIC 2009
S C A D A Security Keynote C K
SecurityExchange2009-Key Note
CCA Preparation for Organization
IT Security EBK2008 Summary

Chaiyakorn

  • 1. Aligning IT Security Solutions with Business JustificationChaiyakorn ApiwathanokulCISSP,GCFA,IRCA:ISMSChief Security Officer, PTT ICT Solutions
  • 2. Aligning IT Security Solutions with Business JustificationRisk-base security investment (ROSI: Return on Security Investment)Global PerspectiveBeside security solutions, investing in human resource is essential KEY to successYour user: need awarenessYour IT staff: need educationYour management: need understanding
  • 3. Risk-base Security InvestmentThe ChallengesOrganization using IT has associated RISKVendors want to sell new stuff Organization doesn’t want to be outdatedSecurity solution is expensiveLimited budgetTechnology moves fast forwardSecurity prof. is too techy(no business language)Where enough is enough?Requirement base vs. Technology base
  • 4. Sun Tzu – The Art of War“If you know your enemies and know yourself, you will not be imperiled in a hundred battles; if you do not know your enemies but do know yourself, you will win one and lose one; if you do not know your enemies nor yourself, you will be imperiled in every single battle.”, Sun Tzu – The Art of War 6th century BCUnderstand your business - YourselfUnderstand the surrounding THREATs – Your ENEMYUnderstand the PROTECTION requirement, limitation and readiness – Your STRATEGY
  • 5. Risk-base = Requirement-baseRisk AssessmentQuantify – money figureRisk-base Security Investment
  • 6. Recent Standards/GuidelinesBy A. Chaiyakorn Apiwathanokul
  • 7. Identifying assetsTangiblesComputers, communications equipment, wiringDataSoftwareAudit records, books, documentsIntangiblesPrivacyEmployee safety & healthPasswordsImage & reputationAvailabilityEmployee morale
  • 8. 1Identify Asset ValueCost to acquire or develop the asset Cost to maintain and protect the asset Value of the asset to owners and users Value of the asset to adversaries Value of intellectual property that went into developing the information Price others are willing to pay for the asset Cost to replace the asset if lost Operational and production activities that are affected if the asset is unavailable Liability issues if the asset is compromised Usefulness and role of the asset in the organization
  • 9. Identifying threatsEarthquake, flood, hurricane, lighteningStructural failure, asbestosUtility loss, i.e., water, power, telecommunicationsTheft of hardware, software, dataTerrorists, both political and informationSoftware bugs, virii, malicious code, SPAM, mail bombsStrikes, labor & union problemsHackers, internal/externalInflammatory usenet, Internet & web postingsEmployee illness, death Outbreak, epidemic, pandemic
  • 10. 1Calculating (quantifying) RisksSingle Loss Expectancy (SLE) SLE = Asset Value x EFAnnual Lose Expectancy ALE = SLE x AROSingle Lose Expectancy (SLE)Amount of lose occur once the threat is realizedExposure Factor (EF)A measure of the magnitude of loss or impact on the value of an assetAnnualized rate of occurrence (ARO)On an annualized basis, the frequency with which a threat is expected to occurAnnualized loss expectancy (ALE)Single loss expectance x annualized rate of occurrence = ALE
  • 11. Cost/benefit Analysis forCountermeasure ValuationCost of a lossOften hard to determine accuratelyCost of preventionLong term/short termRefer as Safeguard Cost(ALEno.SG) – (ALEwith.SG) – (Cost of SG) = Value of SG to the companyThis value is always referred to when determining Security ROI or ROSI
  • 13. From Global Workforce Study by (ISC)2
  • 17. Information Technology (IT) SecurityEssential Body of Knowledge (EBK)A Competency and Functional Frameworkfor IT Security Workforce DevelopmentSeptember 2008United States Department of Homeland Security
  • 18. DoD 8570.01-MInformation Assurance Workforce Improvement ProgramDecember 19, 2005
  • 19. DoD 8570.01-MInformation Assurance Workforce Improvement ProgramMay 15, 2008
  • 20. Why was the EBK established?Rapid evolution of technologyVarious aspects and expertise are increasingly requiredStandard or common guideline in recruiting, training and retaining of workforceKnowledge and skill baselineLinkage between competencies and job functionsFor public and private sectors
  • 21. Key Divisions4 functional perspectives14 competency areas10 roles
  • 23. IT Security RolesChief Information OfficerDigital Forensics ProfessionalInformation Security OfficerIT Security Compliance OfficerIT Security EngineerIT Security ProfessionalIT Systems Operations and Maintenance ProfessionalPhysical Security ProfessionalPrivacy ProfessionalProcurement Professional
  • 24. Competency Areas (MDIE in each)Data SecurityDigital ForensicsEnterprise ContinuityIncident ManagementIT Security Training and AwarenessIT System Operations and MaintenanceNetwork and Telecommunication SecurityPersonnel SecurityPhysical and Environmental SecurityProcurementRegulatory and Standards ComplianceSecurity Risk ManagementStrategic Security ManagementSystem and Application Security
  • 26. TISA EBK AnalysisEntry LevelProfessional LevelManagerial Level
  • 28. Enterprise Infosec Competency ProfileEnterpriseCapabilityEBKTrainingProvider
  • 30. 0-30

Editor's Notes

  • #7: ISO has published the first internationally ratified benchmark document addressing incident preparedness and continuity management for organizations in both public and private sectors.The Publicly Available Specification ISO/PAS 22399:2007, Societal security – Guideline for incident preparedness and operational continuity management, is based on best practice from five national standards from Australia, Israel, Japan, the United Kingdom and the United States.Natural disasters, acts of terror, technology-related accidents and environmental incidents have clearly demonstrated that neither public nor private sectors are immune from crises, either intentionally or unintentionally provoked. This has lead to a global awareness that organizations in the public and private sectors must know how to prepare for and respond to unexpected and potentially devastating incidents. ISO/PAS 22399 is the first deliverable from ISO technical committee ISO/TC 223, Societal security, which is charged with developing standards in the area of crisis and continuity management. http://www.continuityforum.org/news/1120/ISO22399