SlideShare a Scribd company logo
  Convergence – Innovative Integration of Security   Dave Tyson CISO Pacific Gas & Electric
Imagine!
Technology Trends Cloud Computing Virtualization Social media IT Transformation Device Ubiquity Industry specific Medical devices on the network Smart Grid Nanotechnology
Security Trends Organized Crime Advanced Persistent Threats Zero day attacks Cyber extortion Internal threats are back on the rise Security staff scarcity and competition
Why are Security trends important Because one person’s reactive event is another person pro-active indicator
Enterprise Security Risk Management Options Security Investment Analysis Utilize a security Mgt. framework Have a clear security strategy Level your risk structure Evaluate all security resources at your disposal for the best mitigation path
Understand your security Investment Are we spending our resources against the most important business challenges? Do we map investment to General, Sector, and Targeted threats appropriately? Do we understand the best strategy to resource against a threat portfolio in a manner that generates the highest ROI? Do we manage risks by relevant BU?
Linkages to other enterprise risk framework and processes 3 Vision and principles Security operations Organization & governance Change management and BU integration Business case  (i.e., investments and ROI) Linkages to partners & suppliers Business environment (i.e., commercial and regulatory) Corporate and BU strategies Geopolitical   trends and forces Input to framework Counter measure portfolio Design Evaluate risk – investment trade off Implement Compliance, metrics and reporting Risk exposure and prioritization Standards legislation and regulation Security practices and technologies 1   Utilize a Strategic Management Framework
Have a clear security strategy… Security Foundation Preventive Security Three Security Layers Secure Innovation Policies & Standards, Awareness & Training, Laptop Encryption; Secure Desktops; Compliance, Investigations, Incident Response, Security Monitoring, Vendor Security, Mobile Device Security, Security Tools Management, Security Testing & Monitoring Program, Security Architecture, Security Metrics, Security Risk Management, Business Continuity Planning, Crisis Management, Disaster Recovery Planning,  Establish Security Technology Layer, Custom Security Solutions, Security Seeds (Partnerships) Cloud Computing, SOA Security Architecture, Fraud algorithms, secure coding 65% 10% 25%
Risk leveling Matrix May result in the costly loss of tangible assets or resources. May violate, harm, or impede an organization’s mission, reputation, or interest. Resulting or may result in human injury. May result in the highly costly loss of major tangible assets or resources. May significantly violate, harm, or impede an organization’s mission, reputation, or interest. Resulting or may result in human injury or death. Resulting or may result in major legal actions. Almost certain to result in the highly costly loss of major tangible assets or resources. Almost certain to significantly violate, harm, or impede an organization’s mission, reputation, or interest. Immediate Qualifying Factors (occurrences that would immediately qualify for this level) Information Resources may only be mildly affected. Non-critical information is vulnerable to exploit that is relatively easy to execute and there are no controls or weak controls currently to prevent or detect such an attack.. Important system has no disaster recovery environment or capacity does not meet operation requirement. Information Resources are vulnerable to exploit that is relatively easy to execute and there are no controls currently to prevent or detect such an attack. Systemic weakness that applies to the enterprise that may put a majority of Information Resources at risk. Some PII information is exposed. Critical system disaster recovery plan is not documented and or exercised. Active network attack  Compromised system Breach of Personally Identifiable Information (PII) such as sensitive customer data or employee data. Other Regulatory violations (e.g., Environmental, FCC, etc.) as determined by an authoritative group. Qualifiers / Examples (events that would equate to this risk rating) May be or is happening now. Medium that a particular event will happen. May be or is happening now. High that a particular event will happen. Is happening now or incident has occurred. Very high that a particular event will happen soon. Likelihood (probability that a given event will occur) Information Resource has vulnerability, however, no publically known exploit exists, and our environment may be mildly affected Information Resource has vulnerability and a publicly known exploit exists. Company is non-compliant with regulatory or policy requirements and subject to fines or penalties. Exploitable attack in the wild Evidence that a breach has occurred Company is non-compliant with Regulation Impact Level Description (the level of affect on the organization) Severity Level 3 Severity Level 4 Severity Level 5
Drivers for change in security convergence Rapid expansion of enterprise ecosystem Value Migration from Physical to information based & intangible assets New protective technologies blurring functional boundaries New compliance and regulatory regimes Continuing pressure to reduce cost
Convergence Defined the  integration, in a formal, collaborative and strategic manner, of the cumulative security resources of an organization in order to deliver enterprise wide benefits through enhanced risk mitigation, increased operational effectiveness and efficiency, and cost savings.
Security Intelligence Enterprise security intelligence is emerging as a comprehensive, holistic alternative to traditional disjointed security approaches  –Gartner 2010
Thoughts If your going into the cloud be sure you have a clear security plan to manage the security issues Ensure your security spend is mitigating your most important risks Retain your best security talent
Associations ASIS International www.asisonline.org Information Systems Audit & Control Association  http://www.isaca.org/ Alliance for Enterprise Security Risk Management www.aesrm.org Cloud Security Alliance www.cloudsecurityalliance.org
Dave Tyson CISO PG&E 415 973-5455 [email_address]

More Related Content

PPTX
Security Policies and Standards
PDF
Business case for enterprise continuity planning
PDF
How to write an IT security policy guide - Tareq Hanaysha
PPT
Implementing Business Aligned Security Strategy Dane Warren Li
PDF
Business case for information security program
PPTX
Business information security requirements
DOCX
Information Systems Security & Strategy
PDF
Building an effective Information Security Roadmap
Security Policies and Standards
Business case for enterprise continuity planning
How to write an IT security policy guide - Tareq Hanaysha
Implementing Business Aligned Security Strategy Dane Warren Li
Business case for information security program
Business information security requirements
Information Systems Security & Strategy
Building an effective Information Security Roadmap

What's hot (20)

PPTX
Risk Management Approach to Cyber Security
PPTX
Its time to rethink everything a governance risk compliance primer
PPT
Security Policies
PDF
Security-Brochure
PDF
Security-Brochure
PPT
Risk Assessment And Management
PDF
Connection can help keep your business secure!
PPT
2. Improving an Existing Sec Sys
PPT
Chapter003
PDF
Safety & Asset Integrity Excellence - A Study of Three Mile Island
DOCX
The Significance of IT Security Management & Risk Assessment
PDF
Information Security Risk Management Overview
PDF
Cybersecurity Preparedness Trends and Best Practices
PPT
Network security and policies
PPTX
Understanding the security_organization
PPT
Information security policy_2011
PDF
Strategy Insights - How to Quantify IT Risks
PPT
Supplement To Student Guide Seminar 03 A 3 Nov09
PPTX
Information Security Risk Management
Risk Management Approach to Cyber Security
Its time to rethink everything a governance risk compliance primer
Security Policies
Security-Brochure
Security-Brochure
Risk Assessment And Management
Connection can help keep your business secure!
2. Improving an Existing Sec Sys
Chapter003
Safety & Asset Integrity Excellence - A Study of Three Mile Island
The Significance of IT Security Management & Risk Assessment
Information Security Risk Management Overview
Cybersecurity Preparedness Trends and Best Practices
Network security and policies
Understanding the security_organization
Information security policy_2011
Strategy Insights - How to Quantify IT Risks
Supplement To Student Guide Seminar 03 A 3 Nov09
Information Security Risk Management
Ad

Similar to Convergence innovative integration of security (20)

PDF
Protecting the Portals - Strengthening Data Security.pdf
PPTX
defensible_security-executive_support-sample.pptx
PDF
Cybersecurity risk assessments help organizations identify.pdf
PPSX
Meraj Ahmad - Information security in a borderless world
PDF
Vskills Certified Network Security Professional Sample Material
PDF
What is the role of risk management in cybersecurity
PPTX
Selling security to the C-level
PPT
Testing
PDF
Cyber-Security-Whitepaper.pdf
PDF
Cyber-Security-Whitepaper.pdf
PPTX
Security architecture frameworks
PPTX
Best Open Threat Management Platform in USA
PPT
Risk Management: A Holistic Organizational Approach
PPT
Information security background
PPT
Information Security Background
PPT
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
PDF
Cyber Security Risk Mitigation Checklist
PPTX
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
PPTX
Enterprise incident response 2017
PDF
2010 Sc World Congress Nyc
Protecting the Portals - Strengthening Data Security.pdf
defensible_security-executive_support-sample.pptx
Cybersecurity risk assessments help organizations identify.pdf
Meraj Ahmad - Information security in a borderless world
Vskills Certified Network Security Professional Sample Material
What is the role of risk management in cybersecurity
Selling security to the C-level
Testing
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Security architecture frameworks
Best Open Threat Management Platform in USA
Risk Management: A Holistic Organizational Approach
Information security background
Information Security Background
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Cyber Security Risk Mitigation Checklist
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
Enterprise incident response 2017
2010 Sc World Congress Nyc
Ad

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
A Presentation on Artificial Intelligence
PDF
cuic standard and advanced reporting.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Cloud computing and distributed systems.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
A Presentation on Artificial Intelligence
cuic standard and advanced reporting.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Cloud computing and distributed systems.
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Convergence innovative integration of security

  • 1. Convergence – Innovative Integration of Security Dave Tyson CISO Pacific Gas & Electric
  • 3. Technology Trends Cloud Computing Virtualization Social media IT Transformation Device Ubiquity Industry specific Medical devices on the network Smart Grid Nanotechnology
  • 4. Security Trends Organized Crime Advanced Persistent Threats Zero day attacks Cyber extortion Internal threats are back on the rise Security staff scarcity and competition
  • 5. Why are Security trends important Because one person’s reactive event is another person pro-active indicator
  • 6. Enterprise Security Risk Management Options Security Investment Analysis Utilize a security Mgt. framework Have a clear security strategy Level your risk structure Evaluate all security resources at your disposal for the best mitigation path
  • 7. Understand your security Investment Are we spending our resources against the most important business challenges? Do we map investment to General, Sector, and Targeted threats appropriately? Do we understand the best strategy to resource against a threat portfolio in a manner that generates the highest ROI? Do we manage risks by relevant BU?
  • 8. Linkages to other enterprise risk framework and processes 3 Vision and principles Security operations Organization & governance Change management and BU integration Business case (i.e., investments and ROI) Linkages to partners & suppliers Business environment (i.e., commercial and regulatory) Corporate and BU strategies Geopolitical trends and forces Input to framework Counter measure portfolio Design Evaluate risk – investment trade off Implement Compliance, metrics and reporting Risk exposure and prioritization Standards legislation and regulation Security practices and technologies 1 Utilize a Strategic Management Framework
  • 9. Have a clear security strategy… Security Foundation Preventive Security Three Security Layers Secure Innovation Policies & Standards, Awareness & Training, Laptop Encryption; Secure Desktops; Compliance, Investigations, Incident Response, Security Monitoring, Vendor Security, Mobile Device Security, Security Tools Management, Security Testing & Monitoring Program, Security Architecture, Security Metrics, Security Risk Management, Business Continuity Planning, Crisis Management, Disaster Recovery Planning, Establish Security Technology Layer, Custom Security Solutions, Security Seeds (Partnerships) Cloud Computing, SOA Security Architecture, Fraud algorithms, secure coding 65% 10% 25%
  • 10. Risk leveling Matrix May result in the costly loss of tangible assets or resources. May violate, harm, or impede an organization’s mission, reputation, or interest. Resulting or may result in human injury. May result in the highly costly loss of major tangible assets or resources. May significantly violate, harm, or impede an organization’s mission, reputation, or interest. Resulting or may result in human injury or death. Resulting or may result in major legal actions. Almost certain to result in the highly costly loss of major tangible assets or resources. Almost certain to significantly violate, harm, or impede an organization’s mission, reputation, or interest. Immediate Qualifying Factors (occurrences that would immediately qualify for this level) Information Resources may only be mildly affected. Non-critical information is vulnerable to exploit that is relatively easy to execute and there are no controls or weak controls currently to prevent or detect such an attack.. Important system has no disaster recovery environment or capacity does not meet operation requirement. Information Resources are vulnerable to exploit that is relatively easy to execute and there are no controls currently to prevent or detect such an attack. Systemic weakness that applies to the enterprise that may put a majority of Information Resources at risk. Some PII information is exposed. Critical system disaster recovery plan is not documented and or exercised. Active network attack Compromised system Breach of Personally Identifiable Information (PII) such as sensitive customer data or employee data. Other Regulatory violations (e.g., Environmental, FCC, etc.) as determined by an authoritative group. Qualifiers / Examples (events that would equate to this risk rating) May be or is happening now. Medium that a particular event will happen. May be or is happening now. High that a particular event will happen. Is happening now or incident has occurred. Very high that a particular event will happen soon. Likelihood (probability that a given event will occur) Information Resource has vulnerability, however, no publically known exploit exists, and our environment may be mildly affected Information Resource has vulnerability and a publicly known exploit exists. Company is non-compliant with regulatory or policy requirements and subject to fines or penalties. Exploitable attack in the wild Evidence that a breach has occurred Company is non-compliant with Regulation Impact Level Description (the level of affect on the organization) Severity Level 3 Severity Level 4 Severity Level 5
  • 11. Drivers for change in security convergence Rapid expansion of enterprise ecosystem Value Migration from Physical to information based & intangible assets New protective technologies blurring functional boundaries New compliance and regulatory regimes Continuing pressure to reduce cost
  • 12. Convergence Defined the integration, in a formal, collaborative and strategic manner, of the cumulative security resources of an organization in order to deliver enterprise wide benefits through enhanced risk mitigation, increased operational effectiveness and efficiency, and cost savings.
  • 13. Security Intelligence Enterprise security intelligence is emerging as a comprehensive, holistic alternative to traditional disjointed security approaches –Gartner 2010
  • 14. Thoughts If your going into the cloud be sure you have a clear security plan to manage the security issues Ensure your security spend is mitigating your most important risks Retain your best security talent
  • 15. Associations ASIS International www.asisonline.org Information Systems Audit & Control Association http://www.isaca.org/ Alliance for Enterprise Security Risk Management www.aesrm.org Cloud Security Alliance www.cloudsecurityalliance.org
  • 16. Dave Tyson CISO PG&E 415 973-5455 [email_address]

Editor's Notes

  • #3: Eastern Europe Discussion on OC Business