SlideShare a Scribd company logo
Does IT Security Matter?
Dr. Luke O’Connor
Group IT Risk
Zurich Financial Services, Switzerland
Faculty of Information Technology, QUT
November 27th, 2007
2
Outline
• A bit about Zurich and myself
• Nicholas Carr and knowing your neighbours
• Security Tectonics
• The Explanation is Mightier than the Action
• Risk and the New Math
• Final Grains of Wisdom
3
Introduction to Zurich
• Offices in North America and Europe as well as in Asia
Pacific, Latin America and other markets
• Servicing capabilities to manage programs with risk
exposure in more
than 170 countries
• Approximately 58,000 employees worldwide
• Insurer of the majority of Fortune’s Global 100
companies
• Net income attributable to shareholders of USD 4.5
billion in 2006
• Business operating profit of USD 5.9 billion in 2006
4
My Background
Industrial Research (6 yr)
Wha t pe o ple m ig ht want
Consulting (5 yr)
Wha t pe o ple say the y want
In house (2 yr)
What pe o ple e xpe ct
(Se curity)
(Risk)
5
Service ProvidersZurich Business
G-IT Risk stakeholders
GITR
GSM
Investigations
Project risk management
Capabilities
Finance
GITAG
Process/QM
Sourcing
Audit
Compliance
Legal
Risk
Group functions
G-IT support functions
Industry Bodies &
Suppliers
GITRPartnerFocus
G-ISP
Consume
information and
Services
External functions
Business A
Supplier ABusiness B
Business C
Business x
Account Exec A
Account Exec B
Account Exec C
Account Exec x
SupplierB
Supplier x
Co-operate
Service risk management
Primary interface for G-IT
6
Does IT Matter?
• Carr, N, “IT Doesn’t Matter”, Harvard Busine ss Re vie w, Vol 81, 5, May 2003
• Carr, N, “Does IT Matter?”, 2004
“IT doesn’t matter and can’t bring strategic
advantage at present!“
• Spend less
• Follow, don't lead
• Focus on vulnerabilities, not on opportunities
• IT m anag e m e nt sho uld be co m e “bo ring ”
• Manag e risks and co sts
7
Good Neighbours, but Good Friends?
8
The Continental Drift of C, I, A
CIA better known to business as “Call in
Accenture”
9
The Explanation is Mightier Than the Action
Security Business
10
Security Bingo
11
Notable Security Setbacks
• Regulatory Frameworks over Security Frameworks (SOX over 7799)
• Excel over FUD (Fear, Uncertainty and Doubt)
• Reactive over Proactive
• SLAs over Security Program
• Commerical over Military
12
The New-ish Security Model
From Castle to Airport
Castle Airport
Security mechanisms are static and difficult to
change.
Security mechanisms are dynamic and responsive
to threats.
Reliance on a few mechanisms. Castle walls are
impregnable. Once inside security mechanisms are
minimal.
Uses multiple overlapping technologies for defence
in depth.
Known community have unrestricted access within
security boundary.
Security must be maintained whilst an unknown
population traverse. Security of inclusion (ensuring
the right people have access to the right resources)
and Security of exclusion (ensuring that assets are
protected). Use of roles to determine security
requirements.
Silo mentality in organisation. Requires an open, co-ordinated, global approach to
security.
13
The next Big Thing: Network Access Control (NAC)
How do you sell this to your IT
Department or Business?
14
From Security ….
Objectives Controls Testing Report
• ISO 1 7 7 9 9
• ISF
• Co bit
• NIST
• Yo ur Po licie s
and Standards
• e tc …
• ISO 1 7 7 9 9
• ISF
• Co bit
• NIST
• Yo ur Se rvice
Catalo g ue
• e tc …
• Do cum e ntatio n
• Que stio nnaire s
• Inte rvie ws
• De m o nstratio ns
• Inspe ctio ns
• To o ling
• 3rd Party Analysis
• Co ntro l
Effe ctive ne ss
• Co m pliance
• Risk
• Mitig atio n
• Prio ritie s
Pe rce ive d De sire d Re ality The Plan
15
… to Risk
Description Trigger Consequence
What could happen? How could it happen? What is the impact?
Probability Severity
How often? How bad?
16
Controls as Risk (as is)
Control C2
Needs Im provem ent
Not Effective
Effective
Control
Objective
Risk?
Risk?
Risk?
Control Assessment
Risk Scenarios are
reformulations
of control
deficiencies (gaps)
Control C4
Control C3
Control C1
e.g. CoBIT,
C2 C3 C4C1
NO !
Contr
ol
Gaps
are
poten
tial
trigg
ers
of
Risk
17
IT Risk – Com ponents
IT Risk Components
IT Projects Risk
• Financial & Resources
• Compliance & Audit
• Contract & Supplier Mgmt
• IT Architecture & Strategy
• IT Project Management Risks
• Facilities & Environment
• IT Operations & Support
• Time to Deliver
• IT Security
IT Services Risk
• Service Level Management
• Capacity Planning
• Contingency Planning
• Availability Management
• Cost Management
• Configuration Management
• Problem Management
• Change Management
• Help Desk
• Software Control & Distribution
• IT Security
18
Zurich’s IT Risk Managem ent Fram ework
Below threshold
Above threshold
The ABC (Assessment of
Business Criticality) risk
analysis prioritizes
resources
Object to be
assessed
ABC1
Optimised risk analysis
for projects Project
Project Risk Tool
Risk assessment
Within PMO process
2
Risk register provides
single global data
store for analysis
reporting Group IT - Risk Register (Central)
4
Project Risk Consulting Services Risk Consulting
IT Security Risk Assessments
Service
Service Risk Tool
Facilitated Assessments
and Self-Assessments
3
Optimised risk analysis
for services
Group IT
Risk Reporting
Dashboard
Actions
monitoring
QRR
5 Reporting,
Escalation and
Action Monitoring
1
2 3
4
5
No further Analysis
Apply Policies
and Standards
19
Relation to Operational Risk
20
Conclusion: Does IT Security Matter?
• IT Security in general is not an end in itself
• IT Security is one area competing for attention and funding, amongst many
• If you don’t make IT security matter, it won’t
• Keeping business secure is the main end
• Focus on securing business processes not the process of securing
• Excel is your new best friend
• Make your spreadsheets work with their spreadsheets
• A risk-based approach is the opportunity to speak business language
• Don’t replace FUD with GIGO (garbage in, garbage out)
21
Over to you

More Related Content

PPTX
Technology Risk Management
PPT
comesa cybersecurity
PPTX
Cse it seminar ppt1, An Approach To IT Project Management
PPT
Cyber Security 2016 Cade Zvavanjanja1
PDF
Cybersecurity risk management 101
PPT
The Datacenter Security Continuum
PDF
What your scanner isn't telling you
PDF
2011 SC Magazine Insider Threat Keynote
Technology Risk Management
comesa cybersecurity
Cse it seminar ppt1, An Approach To IT Project Management
Cyber Security 2016 Cade Zvavanjanja1
Cybersecurity risk management 101
The Datacenter Security Continuum
What your scanner isn't telling you
2011 SC Magazine Insider Threat Keynote

What's hot (20)

PPTX
Insider Threat Final Powerpoint Prezi
PDF
CISSP Preparation: Introduction
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PDF
Enterprise 360 degree risk management
PDF
Don't Get Left In The Dust How To Evolve From Ciso To Ciro
PDF
Addressing Future Risks and Legal Challenges of Insider Threats
PDF
How to Operationalize Big Data Security Analytics
PDF
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
PDF
isicg - 3 r's v4
PDF
7 Habits of Smart Threat Intelligence Analysts
PPTX
Cybersecurity Risk Management Program and Your Organization
PPTX
Selling security to the C-level
PDF
Rapid Risk Assessment: A New Approach to Risk Management
PDF
Dynamic Cyber Defense
PPTX
SOC: Use cases and are we asking the right questions?
PDF
OWASP based Threat Modeling Framework
PDF
Strategy considerations for building a security operations center
PDF
Partnership with a CFO: On the Front Line of Cybersecurity
PDF
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
PDF
Data Security Metricsa Value Based Approach
Insider Threat Final Powerpoint Prezi
CISSP Preparation: Introduction
Bridging the Gap Between Threat Intelligence and Risk Management
Enterprise 360 degree risk management
Don't Get Left In The Dust How To Evolve From Ciso To Ciro
Addressing Future Risks and Legal Challenges of Insider Threats
How to Operationalize Big Data Security Analytics
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
isicg - 3 r's v4
7 Habits of Smart Threat Intelligence Analysts
Cybersecurity Risk Management Program and Your Organization
Selling security to the C-level
Rapid Risk Assessment: A New Approach to Risk Management
Dynamic Cyber Defense
SOC: Use cases and are we asking the right questions?
OWASP based Threat Modeling Framework
Strategy considerations for building a security operations center
Partnership with a CFO: On the Front Line of Cybersecurity
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
Data Security Metricsa Value Based Approach
Ad

Similar to Does IT Security Matter? (20)

PDF
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
PDF
MacIT 2014 - Essential Security & Risk Fundamentals
PPT
Presentation to Irish ISSA Conference 12-May-11
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
PPTX
Risky Business
PDF
ciso-platform-annual-summit-2013-IT risk as business risk
PPTX
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
PDF
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PDF
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
PPSX
Meraj Ahmad - Information security in a borderless world
PPTX
What is Information Security and why you should care ...
PPTX
Current enterprise information security measures continue to fail us. Why is ...
PPTX
Top Cybersecurity Challenges Facing Your Business
PDF
Does title make a difference?
ODP
CISSP Week 9
PDF
Microsoft InfoSec for cloud and mobile
PDF
Sem 001 sem-001
PDF
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
PPTX
Why physical security just isn’t enough, Sending the heavies into virtualized...
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
MacIT 2014 - Essential Security & Risk Fundamentals
Presentation to Irish ISSA Conference 12-May-11
BSIDES DETROIT 2015: Data breaches cost of doing business
Risky Business
ciso-platform-annual-summit-2013-IT risk as business risk
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Dealing with Information Security, Risk Management & Cyber Resilience
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
Meraj Ahmad - Information security in a borderless world
What is Information Security and why you should care ...
Current enterprise information security measures continue to fail us. Why is ...
Top Cybersecurity Challenges Facing Your Business
Does title make a difference?
CISSP Week 9
Microsoft InfoSec for cloud and mobile
Sem 001 sem-001
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Why physical security just isn’t enough, Sending the heavies into virtualized...
Ad

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Machine learning based COVID-19 study performance prediction
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
August Patch Tuesday
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPT
Teaching material agriculture food technology
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Machine Learning_overview_presentation.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Getting Started with Data Integration: FME Form 101
TLE Review Electricity (Electricity).pptx
Machine learning based COVID-19 study performance prediction
OMC Textile Division Presentation 2021.pptx
August Patch Tuesday
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Spectral efficient network and resource selection model in 5G networks
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A comparative study of natural language inference in Swahili using monolingua...
Teaching material agriculture food technology
Univ-Connecticut-ChatGPT-Presentaion.pdf
Machine Learning_overview_presentation.pptx
1. Introduction to Computer Programming.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Weekly Chronicles - August'25-Week II

Does IT Security Matter?

  • 1. Does IT Security Matter? Dr. Luke O’Connor Group IT Risk Zurich Financial Services, Switzerland Faculty of Information Technology, QUT November 27th, 2007
  • 2. 2 Outline • A bit about Zurich and myself • Nicholas Carr and knowing your neighbours • Security Tectonics • The Explanation is Mightier than the Action • Risk and the New Math • Final Grains of Wisdom
  • 3. 3 Introduction to Zurich • Offices in North America and Europe as well as in Asia Pacific, Latin America and other markets • Servicing capabilities to manage programs with risk exposure in more than 170 countries • Approximately 58,000 employees worldwide • Insurer of the majority of Fortune’s Global 100 companies • Net income attributable to shareholders of USD 4.5 billion in 2006 • Business operating profit of USD 5.9 billion in 2006
  • 4. 4 My Background Industrial Research (6 yr) Wha t pe o ple m ig ht want Consulting (5 yr) Wha t pe o ple say the y want In house (2 yr) What pe o ple e xpe ct (Se curity) (Risk)
  • 5. 5 Service ProvidersZurich Business G-IT Risk stakeholders GITR GSM Investigations Project risk management Capabilities Finance GITAG Process/QM Sourcing Audit Compliance Legal Risk Group functions G-IT support functions Industry Bodies & Suppliers GITRPartnerFocus G-ISP Consume information and Services External functions Business A Supplier ABusiness B Business C Business x Account Exec A Account Exec B Account Exec C Account Exec x SupplierB Supplier x Co-operate Service risk management Primary interface for G-IT
  • 6. 6 Does IT Matter? • Carr, N, “IT Doesn’t Matter”, Harvard Busine ss Re vie w, Vol 81, 5, May 2003 • Carr, N, “Does IT Matter?”, 2004 “IT doesn’t matter and can’t bring strategic advantage at present!“ • Spend less • Follow, don't lead • Focus on vulnerabilities, not on opportunities • IT m anag e m e nt sho uld be co m e “bo ring ” • Manag e risks and co sts
  • 7. 7 Good Neighbours, but Good Friends?
  • 8. 8 The Continental Drift of C, I, A CIA better known to business as “Call in Accenture”
  • 9. 9 The Explanation is Mightier Than the Action Security Business
  • 11. 11 Notable Security Setbacks • Regulatory Frameworks over Security Frameworks (SOX over 7799) • Excel over FUD (Fear, Uncertainty and Doubt) • Reactive over Proactive • SLAs over Security Program • Commerical over Military
  • 12. 12 The New-ish Security Model From Castle to Airport Castle Airport Security mechanisms are static and difficult to change. Security mechanisms are dynamic and responsive to threats. Reliance on a few mechanisms. Castle walls are impregnable. Once inside security mechanisms are minimal. Uses multiple overlapping technologies for defence in depth. Known community have unrestricted access within security boundary. Security must be maintained whilst an unknown population traverse. Security of inclusion (ensuring the right people have access to the right resources) and Security of exclusion (ensuring that assets are protected). Use of roles to determine security requirements. Silo mentality in organisation. Requires an open, co-ordinated, global approach to security.
  • 13. 13 The next Big Thing: Network Access Control (NAC) How do you sell this to your IT Department or Business?
  • 14. 14 From Security …. Objectives Controls Testing Report • ISO 1 7 7 9 9 • ISF • Co bit • NIST • Yo ur Po licie s and Standards • e tc … • ISO 1 7 7 9 9 • ISF • Co bit • NIST • Yo ur Se rvice Catalo g ue • e tc … • Do cum e ntatio n • Que stio nnaire s • Inte rvie ws • De m o nstratio ns • Inspe ctio ns • To o ling • 3rd Party Analysis • Co ntro l Effe ctive ne ss • Co m pliance • Risk • Mitig atio n • Prio ritie s Pe rce ive d De sire d Re ality The Plan
  • 15. 15 … to Risk Description Trigger Consequence What could happen? How could it happen? What is the impact? Probability Severity How often? How bad?
  • 16. 16 Controls as Risk (as is) Control C2 Needs Im provem ent Not Effective Effective Control Objective Risk? Risk? Risk? Control Assessment Risk Scenarios are reformulations of control deficiencies (gaps) Control C4 Control C3 Control C1 e.g. CoBIT, C2 C3 C4C1 NO ! Contr ol Gaps are poten tial trigg ers of Risk
  • 17. 17 IT Risk – Com ponents IT Risk Components IT Projects Risk • Financial & Resources • Compliance & Audit • Contract & Supplier Mgmt • IT Architecture & Strategy • IT Project Management Risks • Facilities & Environment • IT Operations & Support • Time to Deliver • IT Security IT Services Risk • Service Level Management • Capacity Planning • Contingency Planning • Availability Management • Cost Management • Configuration Management • Problem Management • Change Management • Help Desk • Software Control & Distribution • IT Security
  • 18. 18 Zurich’s IT Risk Managem ent Fram ework Below threshold Above threshold The ABC (Assessment of Business Criticality) risk analysis prioritizes resources Object to be assessed ABC1 Optimised risk analysis for projects Project Project Risk Tool Risk assessment Within PMO process 2 Risk register provides single global data store for analysis reporting Group IT - Risk Register (Central) 4 Project Risk Consulting Services Risk Consulting IT Security Risk Assessments Service Service Risk Tool Facilitated Assessments and Self-Assessments 3 Optimised risk analysis for services Group IT Risk Reporting Dashboard Actions monitoring QRR 5 Reporting, Escalation and Action Monitoring 1 2 3 4 5 No further Analysis Apply Policies and Standards
  • 20. 20 Conclusion: Does IT Security Matter? • IT Security in general is not an end in itself • IT Security is one area competing for attention and funding, amongst many • If you don’t make IT security matter, it won’t • Keeping business secure is the main end • Focus on securing business processes not the process of securing • Excel is your new best friend • Make your spreadsheets work with their spreadsheets • A risk-based approach is the opportunity to speak business language • Don’t replace FUD with GIGO (garbage in, garbage out)

Editor's Notes

  • #18: IT Risks are assessed according to the IT assets these have been defined by G-IT as being IT Projects or IT Services. The diagram above provides a high level summary of the broad risk categories for each asset group The risks identified from each asset class are recorded into Risk Registers which are then transferred to a Central Risk Register used to aggregate all risks Underlying IT Risk assessment within ZFS is the need to consider IT Security and the risks to the business associated with IT Security. This is explained more in later slides however the Framework includes a specific service for IT Risk Assessments