SlideShare a Scribd company logo
Copyright © 2010-2011 IANS. The contents of this presentation are confidential . All rights reserved.
Confirmation Bias
How to Stop Doing the Things in
Security That Don't Work
November 2011
2Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Who am I?
» Michael A. Davis
– CEO of Savid Technologies
• IT Security, Risk Assessment, Penetration Testing
– Speaker
• Blackhat, Defcon, CanSecWest, Toorcon, Hack In The Box
– Open Source Software Developer
• Snort
• Nmap
• Dsniff
» Savid Technologies
– Risk Assessments, IT Security Consulting, Audit and
Compliance
3Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Author
4Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
The Issue
“Single biggest security related
problem is a lack of Senior
Level commitment to enterprise
wide security policies.“
Source: 2011 InformationWeek Strategic Security Survey, June 2011
5Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Execs Are Paying Attention
0%
5%
10%
15%
20%
25%
30%
35%
40%
Exec Involvement Budget Constraints
2010
2011
Source: Information Week Data Survey, 2011
6Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
We Protect, They Are Criticized
According to Bloomberg News, Sony has been subpoenaed by New
York attorney general Eric Schneiderman, who is "seeking information
on what Sony told customers about the security of their networks, as
part of a consumer protection inquiry." (Source: informationweek.com)
Rep. Mary Bono Mack (R-Calif.), the subcommittee chair, said that
Sony should have informed its consumers of the breach earlier and
said its efforts were “half-hearted, half-baked.” She was particularly
critical of Sony’s decision to first notify customers of the attack via its
company blog, leaving it up to customers to search for information on
the breach. (Source: washingtonpost.com)
7Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
We All Do Them
Source: 2011 InformationWeek Analytics Strategic Security Survey
0%
10%
20%
30%
40%
50%
60%
70%
80%
Yes No Don't Know
% that perform Risk Assessments
2011
2010
8Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
The Reality
Source: 2011 InformationWeek Analytics Strategic Security Survey
Very
30%
Somewhat
67%
Not At All
3%
Risk Assessment
Effectiveness
9Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Complex IT Projects Fail - A lot
Out Of 200 Multi-nationals:
67% Failed To Terminate Unsuccessful
Projects
61% Reported Major Conflicts
34% Of Projects Were Not Aligned With
Strategy
32% Performed Redundant Work
1 In 6 Projects Had A Cost Overrun Of 200%!
Source: 2011 Harvard Business Review – Berlin Univ Technical survey
10Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
T-Mobile CISO On Metrics
“Security experts can't measure their success
without security metrics, and what can't be
measured can't be effectively managed.”
~ Bill Boni, VP of IS, T-Mobile USA
11Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Why Do We Care?
Management Asks:
–“Are We Secure?”
Without Metrics:
–“Depends How You Look At It”
With Metrics:
–“Look At Our Risk Score Before This
Project, It Dropped 15%. We Are More
Secure Today Than Yesterday”
12Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Metrics, We need metrics!
13Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Where/What to measure
Strategy/Governance
Code Reviews, Project Risk
Assessments,
Exceptions/Waivers
Tactical/Sec Ops
Vuln Management, Patch Management,
Incidents, etc.
IS Budget
Spending/employee
Policy gaps in existence
Industry Standards Adopted
Awareness Plan
% projects going through assessment process
# of policy exceptions
# of risk acceptances
% project doing code reviews
Error rates
Freq of vuln assessment
# outstanding vulns
Rate of fixing
Trend of incident response losses
14Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Who are you?
TCO
Patch
Latency
SPAM/AV Stats
15Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Examples of metrics
Baseline Defenses Coverage (AV, FW, etc)
– Measurement of how well you are protecting your enterprise
against the most basic information security threats.
– 94% to 98%; less than 90% cause for concern
Patch Latency
– Time between a patch’s release and your successful
deployment of that patch.
– Express as averages and criticality
Platform Security Scores
– Measures your hardening guidelines
Compliance
– Measure departments against security standards
– Number of Linux servers at least 90% compliant with the Linux
platform security standard
16Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Phishing Still Works
17Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Stop With The Confirmation Bias
Risk Perception Is Bad
–Tornado V. Kitchen Fire
–Less Familiar Are Perceived As Greater Risk
Favor Info That Match Preconceptions
Cause And Effect Processing
Correlation Does Not Equal Causation
We Manage Risk Using Metrics That Don’t
Matter
18Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
19Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
The Formula Of Successful Risk Management
PBL = λ1 x p1 + λ2 x p2 + λ3 x p3
20Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Hazard vs. Speculative Risk
21Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Linking to Business Goals
Copyright Carnegie Mellon SETI MOSAIC Whitepaper
22Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Outcome Management
Copyright Carnegie Mellon SETI MOSAIC Whitepaper
23Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
It Is About Risk MANAGEMENT
Effective Metrics Catalog Define:
Category
Metric
How To Measure
Purpose Of This Metric
Target Audience
Reporting Frequency/Period
24Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
5 Signs You Have a Confirmation Bias
Using Quantitative Risk Scores To
Make Decisions
Look At Security Events Instead Of
Probability Of Vulnerabilities
Talk About Risk In Terms Of
“Industry Data”
Lack Of Risk Management
Inability To Communicate Risk
25Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Security Metric Gotchas
Not Tracking Visibility
–What % is the metric representing?
–Develop baseline for acceptance
Not Trending
–Provide at least 4 previous periods and trend
line
Not Providing Forward Guidance
–Red, Green, Yellow (Worse, Better, Same)
Not Mapping To A Business goal
Focusing on Hazard Risk
Not Using Qualitative Metrics
26Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
Contact Information
Michael A. Davis
mdavis@savidtech.com
708-532-2843
Twitter: @mdavisceo

More Related Content

PDF
2015-advanced-persistent-threat-awareness_whp_eng_1015
PDF
WhiteHat’s 12th Website Security Statistics [Full Report]
PDF
WhiteHat 2014 Website Security Statistics Report
PDF
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
PDF
Symantec Intelligence Report - October 2014
PDF
edgescan vulnerability stats report (2019)
PDF
Shift Toward Dynamic Cyber Resilience
PDF
Future of Cybersecurity 2016 - M.Rosenquist
2015-advanced-persistent-threat-awareness_whp_eng_1015
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat 2014 Website Security Statistics Report
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Symantec Intelligence Report - October 2014
edgescan vulnerability stats report (2019)
Shift Toward Dynamic Cyber Resilience
Future of Cybersecurity 2016 - M.Rosenquist

What's hot (19)

PDF
Strategic Leadership for Managing Evolving Cybersecurity Risks
PDF
Web Application Security Statistics Report 2016
PDF
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
PPTX
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
PDF
OSB50: Operational Security: State of the Union
PDF
Cybersecurity: Perceptions & Practices
PPT
Shaping Your Future in Banking Cybersecurity
PDF
2013 Incident Response Survey
PPTX
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
PDF
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PDF
Hpe security research cyber risk report 2016
ODP
Cyber Security for Financial Institutions
PDF
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
PDF
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
PDF
Symantec cyber-resilience
PDF
Application Security: Safeguarding Data, Protecting Reputations
Strategic Leadership for Managing Evolving Cybersecurity Risks
Web Application Security Statistics Report 2016
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
OSB50: Operational Security: State of the Union
Cybersecurity: Perceptions & Practices
Shaping Your Future in Banking Cybersecurity
2013 Incident Response Survey
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Cyber Risk Management in 2017: Challenges & Recommendations
Hpe security research cyber risk report 2016
Cyber Security for Financial Institutions
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Symantec cyber-resilience
Application Security: Safeguarding Data, Protecting Reputations
Ad

Viewers also liked (11)

DOCX
Confirmation bias
PDF
Project 2 : Confirmation Bias
PPTX
Confirmation Bias & its applications in Marketing
PPTX
Confirmation bias
PPTX
Social Psychology Presentation- Confirmation Bias
PPT
SXSW 2016: Confirmation Bias: Innovation's Blind Eye
PPTX
PPTX
Top gun binary opposites
PPT
Sense Perception
PPT
The Avengers - Building up a perfect team
PPTX
Alternative Facts, Fake News, Confirmation Bias & the Post-Truth World
Confirmation bias
Project 2 : Confirmation Bias
Confirmation Bias & its applications in Marketing
Confirmation bias
Social Psychology Presentation- Confirmation Bias
SXSW 2016: Confirmation Bias: Innovation's Blind Eye
Top gun binary opposites
Sense Perception
The Avengers - Building up a perfect team
Alternative Facts, Fake News, Confirmation Bias & the Post-Truth World
Ad

Similar to Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work (20)

PDF
COVID-19 free penetration tests by Pentest-Tools.com
PDF
SBIC Enterprise Information Security Strategic Technologies
 
PDF
Mobile Security: Preparing for the 2017 Threat Landscape
PPTX
Clinton- Cyber IRT Balto 10_2012
PDF
GR - Security Economics in IoT 150817- Rel.1
PDF
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
PDF
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
PDF
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
PDF
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
PPTX
11 19-2015 - iasaca membership conference - the state of security
PPTX
15 Years of Web Security: The Rebellious Teenage Years
PPTX
Netwatcher Credit Union Tech Talk
PPTX
Beyond the Phish with GTRI and Wombat Security Technologies
PPT
Dr K Subramanian
PDF
The State of Cyber
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PPTX
Finjan_Investor_Presentation_May2014
PDF
ISF Congress 2016 - Session 7.2_Kukreja
PPTX
Risk Management Practices for PCI DSS 2.0
PDF
An Identity Crisis at the Center of Every IoT Product
COVID-19 free penetration tests by Pentest-Tools.com
SBIC Enterprise Information Security Strategic Technologies
 
Mobile Security: Preparing for the 2017 Threat Landscape
Clinton- Cyber IRT Balto 10_2012
GR - Security Economics in IoT 150817- Rel.1
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
11 19-2015 - iasaca membership conference - the state of security
15 Years of Web Security: The Rebellious Teenage Years
Netwatcher Credit Union Tech Talk
Beyond the Phish with GTRI and Wombat Security Technologies
Dr K Subramanian
The State of Cyber
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Finjan_Investor_Presentation_May2014
ISF Congress 2016 - Session 7.2_Kukreja
Risk Management Practices for PCI DSS 2.0
An Identity Crisis at the Center of Every IoT Product

More from Michael Davis (8)

PDF
Can You Steal From Me Now? Mobile and BYOD Security Risks
PDF
Make Mobilization Work - Properly Implementing Mobile Security
PDF
Cost Justifying IT Security
PPTX
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
PDF
Applicaiton Security - Building The Audit Program
PDF
IT Security As A Service
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PDF
Michael Davis Bio
Can You Steal From Me Now? Mobile and BYOD Security Risks
Make Mobilization Work - Properly Implementing Mobile Security
Cost Justifying IT Security
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Applicaiton Security - Building The Audit Program
IT Security As A Service
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis Bio

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Empathic Computing: Creating Shared Understanding
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
Teaching material agriculture food technology
Chapter 3 Spatial Domain Image Processing.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Dropbox Q2 2025 Financial Results & Investor Presentation
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
Teaching material agriculture food technology

Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work

  • 1. Copyright © 2010-2011 IANS. The contents of this presentation are confidential . All rights reserved. Confirmation Bias How to Stop Doing the Things in Security That Don't Work November 2011
  • 2. 2Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Who am I? » Michael A. Davis – CEO of Savid Technologies • IT Security, Risk Assessment, Penetration Testing – Speaker • Blackhat, Defcon, CanSecWest, Toorcon, Hack In The Box – Open Source Software Developer • Snort • Nmap • Dsniff » Savid Technologies – Risk Assessments, IT Security Consulting, Audit and Compliance
  • 3. 3Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Author
  • 4. 4Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. The Issue “Single biggest security related problem is a lack of Senior Level commitment to enterprise wide security policies.“ Source: 2011 InformationWeek Strategic Security Survey, June 2011
  • 5. 5Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Execs Are Paying Attention 0% 5% 10% 15% 20% 25% 30% 35% 40% Exec Involvement Budget Constraints 2010 2011 Source: Information Week Data Survey, 2011
  • 6. 6Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. We Protect, They Are Criticized According to Bloomberg News, Sony has been subpoenaed by New York attorney general Eric Schneiderman, who is "seeking information on what Sony told customers about the security of their networks, as part of a consumer protection inquiry." (Source: informationweek.com) Rep. Mary Bono Mack (R-Calif.), the subcommittee chair, said that Sony should have informed its consumers of the breach earlier and said its efforts were “half-hearted, half-baked.” She was particularly critical of Sony’s decision to first notify customers of the attack via its company blog, leaving it up to customers to search for information on the breach. (Source: washingtonpost.com)
  • 7. 7Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. We All Do Them Source: 2011 InformationWeek Analytics Strategic Security Survey 0% 10% 20% 30% 40% 50% 60% 70% 80% Yes No Don't Know % that perform Risk Assessments 2011 2010
  • 8. 8Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. The Reality Source: 2011 InformationWeek Analytics Strategic Security Survey Very 30% Somewhat 67% Not At All 3% Risk Assessment Effectiveness
  • 9. 9Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Complex IT Projects Fail - A lot Out Of 200 Multi-nationals: 67% Failed To Terminate Unsuccessful Projects 61% Reported Major Conflicts 34% Of Projects Were Not Aligned With Strategy 32% Performed Redundant Work 1 In 6 Projects Had A Cost Overrun Of 200%! Source: 2011 Harvard Business Review – Berlin Univ Technical survey
  • 10. 10Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. T-Mobile CISO On Metrics “Security experts can't measure their success without security metrics, and what can't be measured can't be effectively managed.” ~ Bill Boni, VP of IS, T-Mobile USA
  • 11. 11Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Why Do We Care? Management Asks: –“Are We Secure?” Without Metrics: –“Depends How You Look At It” With Metrics: –“Look At Our Risk Score Before This Project, It Dropped 15%. We Are More Secure Today Than Yesterday”
  • 12. 12Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Metrics, We need metrics!
  • 13. 13Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Where/What to measure Strategy/Governance Code Reviews, Project Risk Assessments, Exceptions/Waivers Tactical/Sec Ops Vuln Management, Patch Management, Incidents, etc. IS Budget Spending/employee Policy gaps in existence Industry Standards Adopted Awareness Plan % projects going through assessment process # of policy exceptions # of risk acceptances % project doing code reviews Error rates Freq of vuln assessment # outstanding vulns Rate of fixing Trend of incident response losses
  • 14. 14Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Who are you? TCO Patch Latency SPAM/AV Stats
  • 15. 15Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Examples of metrics Baseline Defenses Coverage (AV, FW, etc) – Measurement of how well you are protecting your enterprise against the most basic information security threats. – 94% to 98%; less than 90% cause for concern Patch Latency – Time between a patch’s release and your successful deployment of that patch. – Express as averages and criticality Platform Security Scores – Measures your hardening guidelines Compliance – Measure departments against security standards – Number of Linux servers at least 90% compliant with the Linux platform security standard
  • 16. 16Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Phishing Still Works
  • 17. 17Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Stop With The Confirmation Bias Risk Perception Is Bad –Tornado V. Kitchen Fire –Less Familiar Are Perceived As Greater Risk Favor Info That Match Preconceptions Cause And Effect Processing Correlation Does Not Equal Causation We Manage Risk Using Metrics That Don’t Matter
  • 18. 18Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved.
  • 19. 19Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. The Formula Of Successful Risk Management PBL = λ1 x p1 + λ2 x p2 + λ3 x p3
  • 20. 20Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Hazard vs. Speculative Risk
  • 21. 21Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Linking to Business Goals Copyright Carnegie Mellon SETI MOSAIC Whitepaper
  • 22. 22Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Outcome Management Copyright Carnegie Mellon SETI MOSAIC Whitepaper
  • 23. 23Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. It Is About Risk MANAGEMENT Effective Metrics Catalog Define: Category Metric How To Measure Purpose Of This Metric Target Audience Reporting Frequency/Period
  • 24. 24Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. 5 Signs You Have a Confirmation Bias Using Quantitative Risk Scores To Make Decisions Look At Security Events Instead Of Probability Of Vulnerabilities Talk About Risk In Terms Of “Industry Data” Lack Of Risk Management Inability To Communicate Risk
  • 25. 25Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Security Metric Gotchas Not Tracking Visibility –What % is the metric representing? –Develop baseline for acceptance Not Trending –Provide at least 4 previous periods and trend line Not Providing Forward Guidance –Red, Green, Yellow (Worse, Better, Same) Not Mapping To A Business goal Focusing on Hazard Risk Not Using Qualitative Metrics
  • 26. 26Copyright © 2010-2011 IANS. The contents of this presentation are confidential and may not be distributed without IANS’ permission. All rights reserved. Contact Information Michael A. Davis mdavis@savidtech.com 708-532-2843 Twitter: @mdavisceo