SlideShare a Scribd company logo
Data security metrics and
  a value based approach


Licensed under the Creative Commons Attribution License
                   Danny Lieberman
    dannyl@controlpolicy.com www.controlpolicy.com
Why?




“I don't need data security, we outsource our IT to one of the big banks”

“It's never happened to us before”

“You can't estimate asset value”

“We encourage risk taking”

“I don't take risks”


True quotes from real people
Agenda



• Introduction and welcome
• What is data security?
• Anything can be measured
• Why metrics?
• Why quantify risk?
• Measurement methods
• Continuous improvement
• Questions and answers
Introduction




• Our mission today
    –   Tools to help make your work easier
    –   Share ideas
What the heck is data security?




•   Security
     –   Ensure we can survive & add value
           •   Physical, information, systems, people
•   Data security
     –   Protect data directly in all realms
Anything can be measured




All exact science is based on approximation.

If a man tells you he knows a thing exactly, then you can be safe in
inferring that you are speaking to an inexact man.


Bertrand Russell
Data security metrics


•   Dimensions
     –   organization, channel and content
•   Typical metrics
     –   % of employees that signed the AUP
     –   % Webmail traffic/all mail traffic
     –   % Office files by Webmail/Employees
     –   No. of revenue transactions
     –   Cost of security for operational/revenue systems
     –   Cost of security for customer service systems
     –   Cost of security for FnA systems
     –   Value of assets in Euro
     –   Total value at risk of assets
Why do we need metrics?




  •        Recognize this?                          The easy part of information security
                                                    (running the appliance, discovering
                                                    vulnerabilities, fixing things and
                                                    producing reports)




Ignores the hard stuff; quantification and   Ignorance is never better than
prioritization of your actions based on
financial value of assets and
                                             knowledge
measurement of threat impact

                                             Enrico Fermi
Why bother quantifying risk?




•   Why not qualitative metrics?

    When was the last time a customer paid a
    “qualitative price” ?
Quantitative risk model(*)




                                                                  Value at Risk
Metrics                                                           =Threat Damage to
Asset value,                                                      Asset x Asset Value x
Threat damage to                                                  Threat Probability
asset,
Threat probability




                                       (*)
                                             PTA -Practical threat analysis risk model
Quantitative risk model benefits




•   Run security like you run your business
     –   Quantify and prioritize actions in Euro/USD
     –   Justify data security investments


•   Measure improvement
     –   Reduced risk
     –   Lower costs
Measurement methods




•   Hand sampling
     –   Small samples of employees, routers...
           •   The “Rule of 5”
•   Expert estimates
     –   The CFO
           •   Pros at asset valuation
•   Test equipment
Test equipment



                                      Management

                                        Provisioning

                                           Events

                                         Reporting

                                           Policies
  Data   Document                         Forensics
Warehouse Server



                    Detection point




                      Interception
                                       Received: from [172.16.1.35]
                        Session

                       Decoders        (-80-230-224-
                                       Message
                        Policies       ID:<437C5FDE.9080>

                    Countermeasures    “Send me more


                                       files today.
Continuous improvement
Coming attractions




•   Sep 10: Selecting data security
    technology
•   Sep 17: Selling data security technology
•   Sep 24: Write a 2 page procedure
•   Oct 1: Home(land) security
•   Oct 8: SME data security
      http://www.controlpolicy.com/workshops
Learn more




•      Presentation materials and resources
http://www.controlpolicy.com/data-security-workshops

More Related Content

PDF
M&A security - E-crime Congress 2017
PDF
Fns Incident Management Powered By En Case
PDF
Mergers and Acquisition Security - Areas of Interest
PDF
Chapter 12 iso 27001 awareness
PPTX
TA security
PPT
The Datacenter Security Continuum
PDF
Incident response methodology
PPSX
Cyber Security Awareness Month 2017- Nugget2
M&A security - E-crime Congress 2017
Fns Incident Management Powered By En Case
Mergers and Acquisition Security - Areas of Interest
Chapter 12 iso 27001 awareness
TA security
The Datacenter Security Continuum
Incident response methodology
Cyber Security Awareness Month 2017- Nugget2

What's hot (18)

PPSX
Cyber Security Awareness Month 2017-Nugget 3
PPTX
Data Protection Top Ten Concerns
PPTX
The TTPs of hard hat incident response
PPTX
NZISF Talk: Six essential security services
PPTX
Red team vs Penetration Testing
PDF
Chapter 15 incident handling
PDF
A case for Managed Detection and Response
PDF
GDPR: The Application Security Twist
PDF
Vendor Cybersecurity Governance: Scaling the risk
PPTX
Incident Response in the age of Nation State Cyber Attacks
PPTX
Information Secuirty Vulnerability Management
PDF
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
PDF
Remote Deposit Capture Risk Management & FFIEC Complaince
PDF
End User Brochure
PPT
Internal Risk Management
PPSX
4 Operations Security
PDF
Cybersecurity Roadmap Development for Executives
PDF
Dynamic Log Analysis™ Business Value Sheet
Cyber Security Awareness Month 2017-Nugget 3
Data Protection Top Ten Concerns
The TTPs of hard hat incident response
NZISF Talk: Six essential security services
Red team vs Penetration Testing
Chapter 15 incident handling
A case for Managed Detection and Response
GDPR: The Application Security Twist
Vendor Cybersecurity Governance: Scaling the risk
Incident Response in the age of Nation State Cyber Attacks
Information Secuirty Vulnerability Management
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Remote Deposit Capture Risk Management & FFIEC Complaince
End User Brochure
Internal Risk Management
4 Operations Security
Cybersecurity Roadmap Development for Executives
Dynamic Log Analysis™ Business Value Sheet
Ad

Viewers also liked (7)

PPTX
The Tao of GRC
PDF
Data Security For SMB - Fly first class on a budget
PDF
Selling Data Security Technology
PPTX
Grc tao.4
PDF
Will Web 2.0 applications break the cloud?
PPTX
Pathcare: Patient-issue oriented healthcare
PPTX
Quick user guide to the Clear Clinica Cloud EDC system
The Tao of GRC
Data Security For SMB - Fly first class on a budget
Selling Data Security Technology
Grc tao.4
Will Web 2.0 applications break the cloud?
Pathcare: Patient-issue oriented healthcare
Quick user guide to the Clear Clinica Cloud EDC system
Ad

Similar to Data Security Metricsa Value Based Approach (20)

PPTX
MIS: Information Security Management
PPTX
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
PDF
Security For Free
PPTX
Database development and security certification and accreditation plan pitwg
PDF
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
PPTX
Information Security Cost Effective Managed Services
PPTX
Fernando Imperiale - Security Intelligence para PYMES
PPTX
IBM - Security Intelligence para PYMES
PPTX
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
PPTX
Security Analytics Beyond Cyber
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
Security Awareness Training
PPTX
Cyber Security Needs and Challenges
PPTX
Stay Ahead of Threats with Advanced Security Protection - Fortinet
PDF
Helicopter Assessments - Improve your Customer Data Security!
PPTX
Ta Security
PDF
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
PDF
Fully Integrated Defense Operation
PPT
Isys20261 lecture 01
PDF
2012 Data Center Security
MIS: Information Security Management
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Security For Free
Database development and security certification and accreditation plan pitwg
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
Information Security Cost Effective Managed Services
Fernando Imperiale - Security Intelligence para PYMES
IBM - Security Intelligence para PYMES
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
Security Analytics Beyond Cyber
Today's Cyber Challenges: Methodology to Secure Your Business
Security Awareness Training
Cyber Security Needs and Challenges
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Helicopter Assessments - Improve your Customer Data Security!
Ta Security
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
Fully Integrated Defense Operation
Isys20261 lecture 01
2012 Data Center Security

More from Flaskdata.io (12)

PDF
Flaskdata - Observability for clinical data
PDF
The travel industry does real-time. Why doesn't clinical research?
PDF
Flaskdata.io automated monitoring for clinical trials
PPTX
How to write secure code
PDF
The insights that will help your medtech clinical trial succeed
PDF
2017 02-05 en-eu-data-security_v2
PPTX
Killed by code 2015
PPTX
Killed by code 2015
PPTX
Killed by code - mobile medical devices
PPT
Data Security For Compliance 2
PDF
Homeland Security - strengthening the weakest link
PDF
Writing An Effective Security Procedure in 2 pages or less and make it stick
Flaskdata - Observability for clinical data
The travel industry does real-time. Why doesn't clinical research?
Flaskdata.io automated monitoring for clinical trials
How to write secure code
The insights that will help your medtech clinical trial succeed
2017 02-05 en-eu-data-security_v2
Killed by code 2015
Killed by code 2015
Killed by code - mobile medical devices
Data Security For Compliance 2
Homeland Security - strengthening the weakest link
Writing An Effective Security Procedure in 2 pages or less and make it stick

Data Security Metricsa Value Based Approach

  • 1. Data security metrics and a value based approach Licensed under the Creative Commons Attribution License Danny Lieberman dannyl@controlpolicy.com www.controlpolicy.com
  • 2. Why? “I don't need data security, we outsource our IT to one of the big banks” “It's never happened to us before” “You can't estimate asset value” “We encourage risk taking” “I don't take risks” True quotes from real people
  • 3. Agenda • Introduction and welcome • What is data security? • Anything can be measured • Why metrics? • Why quantify risk? • Measurement methods • Continuous improvement • Questions and answers
  • 4. Introduction • Our mission today – Tools to help make your work easier – Share ideas
  • 5. What the heck is data security? • Security – Ensure we can survive & add value • Physical, information, systems, people • Data security – Protect data directly in all realms
  • 6. Anything can be measured All exact science is based on approximation. If a man tells you he knows a thing exactly, then you can be safe in inferring that you are speaking to an inexact man. Bertrand Russell
  • 7. Data security metrics • Dimensions – organization, channel and content • Typical metrics – % of employees that signed the AUP – % Webmail traffic/all mail traffic – % Office files by Webmail/Employees – No. of revenue transactions – Cost of security for operational/revenue systems – Cost of security for customer service systems – Cost of security for FnA systems – Value of assets in Euro – Total value at risk of assets
  • 8. Why do we need metrics? • Recognize this? The easy part of information security (running the appliance, discovering vulnerabilities, fixing things and producing reports) Ignores the hard stuff; quantification and Ignorance is never better than prioritization of your actions based on financial value of assets and knowledge measurement of threat impact Enrico Fermi
  • 9. Why bother quantifying risk? • Why not qualitative metrics? When was the last time a customer paid a “qualitative price” ?
  • 10. Quantitative risk model(*) Value at Risk Metrics =Threat Damage to Asset value, Asset x Asset Value x Threat damage to Threat Probability asset, Threat probability (*) PTA -Practical threat analysis risk model
  • 11. Quantitative risk model benefits • Run security like you run your business – Quantify and prioritize actions in Euro/USD – Justify data security investments • Measure improvement – Reduced risk – Lower costs
  • 12. Measurement methods • Hand sampling – Small samples of employees, routers... • The “Rule of 5” • Expert estimates – The CFO • Pros at asset valuation • Test equipment
  • 13. Test equipment Management Provisioning Events Reporting Policies Data Document Forensics Warehouse Server Detection point Interception Received: from [172.16.1.35] Session Decoders (-80-230-224- Message Policies ID:<437C5FDE.9080> Countermeasures “Send me more files today.
  • 15. Coming attractions • Sep 10: Selecting data security technology • Sep 17: Selling data security technology • Sep 24: Write a 2 page procedure • Oct 1: Home(land) security • Oct 8: SME data security http://www.controlpolicy.com/workshops
  • 16. Learn more • Presentation materials and resources http://www.controlpolicy.com/data-security-workshops