SlideShare a Scribd company logo
Information Security Risk Management
      IT operation outsourcing

            A case study
Duncan hine input2_ irm_and_outsourcing
   Based on a real project
   Identities protected and altered – does not
    affect the process that was used
   A sensitive defence organisation needs to be
    more cost effective
   Already has long term outsource partner
   Mid contract break point drives improvement
   Perception that security experts will say no
   This is based on current policy
Duncan hine input2_ irm_and_outsourcing
   Research and advice across defence sector
   Many highly sensitive contracts and
    relationships
   Key target for traditional and cyber attack
   Already outsourced support in many areas
    but all delivered from inside UK
   Urgent need to make more savings
   Concept is to move back office processing
    and support to a low cost labour country
   Use the process to establish threats and
    exploits
   Look at sensitivity of assets affected
   See if controls and mitigations can reduce
    these to acceptable levels
   Stop or go ahead and accepts residual risks
   Sounds simple but only works if you
    understand how the exploits will happen
   Move offshore :
   No classified material at all
   Human resource basic records
   Travel expenses fulfilment
   Purchase order ledger
   Order generation
   Payment of suppliers
   Agree some risks to privacy sensitive records
   No classified material included so low risk
   Bulk data sets to be protected no copying or
    transport in country
   Staff in country to be vetted
   Buildings to be secured to higher level
   Subcontract suppliers to be vetted
   Extra monitoring to be established
   Threats from individuals, petty criminals and
    other low grade threat actors
   Opportunistic not organised
   No strategic goal

   Security first response is NO
   Little explanation but just a risk we don’t
    need to take
   Leadership want to make the savings
   Security role to establish the REAL risks
   Then find ways of reducing them
   Explain the result to leaders so they can
    decide if the residual risks are acceptable

   Key is to find a way we can all say yes to a
    desirable initiative not find reasons to say no!
   Threat sources FIS, competitors and sophisticated activist
    groups
   Want to reverse engineer size of cyber defences on new
    order for sensitive web hosting contract
   Purchase order ledger is moved offshore

   Use open source to establish likely timing of orders for
    components and services
   Penetrate data centre offshore via traditional human
    methods or cyber attack
   Collect and analyse project identifiers in database
   Collect orders and establish scale of servers and defences
   Mobilise denial of service resources now known to be able
    to destroy hosting at will
   Threat actors FIS, crime, competitors
   want to identify targets for corruption related to specific
    contracts
   HR and travel expenses moved offshore

   Use open source material to identify timing of contract
    negotiation and award
   Target country is known - penetrate data centre or create and
    remove copy (could acquire rotating backups)
   Mine travel expenses to find all trips to target country in window
    and create long list
   Qualify list with HR system look for expensive life, large family,
    lower bonus etc
   Go back to expenses to find detailed behaviours, bar bills,
    timing, phone call duration ..........
   Short list targets and move to more traditional methods
   Open source used to index low grade bulk data
   Structure of data is as valuable as the data itself
   Mining and profiling used to enrich data
   Traditional methods still needed but this improves
    chance of success significantly
   Access to data set or actual system is assumed in
    target country despite countermeasures
   Attacks are cyber used to enhance traditional
    approaches
   Scramble data before off shoring
   Remove structure from orders
   Reassemble in UK
   Anonymous HR records with numeric identifiers
    and address data and other pointers removed
   Scramble travel expenses and make claim to index
    number not person
   Other similar methods to scramble data and
    remove structure
   All reinserted in secure enclave in UK
   Off shoring can go ahead with residual risk
    lower than original solution
   Savings reduced by about 20% to pay for
    enclave in UK
   Information asset owners much more aware
    of real high impact risks
   Partnership with outsource provider
    strengthened
   Partner takes security function into other
    customers as expert adviser and secures new
    business
   Threats from sophisticated sources not well
    understood by asset owners
   Assumption that security will say NO!
   Savings reduced but project still went ahead
    and delivered a large net saving
   After solution risks were lower than original
    solution
   Ready for next break point off shoring can
    now go to any country even very high
    risk/low cost environments

More Related Content

PPT
A Guide to Managed Security Services
PDF
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
PDF
A case for Managed Detection and Response
PPTX
Critical Capabilities for MDR Services - What to Know Before You Buy
PPTX
Security Analytics Beyond Cyber
PDF
Vulnerability management - beyond scanning
PDF
Dlp Methodology
PPT
Security Consulting Methodology
A Guide to Managed Security Services
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
A case for Managed Detection and Response
Critical Capabilities for MDR Services - What to Know Before You Buy
Security Analytics Beyond Cyber
Vulnerability management - beyond scanning
Dlp Methodology
Security Consulting Methodology

What's hot (20)

PDF
Big data security in the cloud: Buzzword Bingo!
PDF
DS_Appliance_Datasheet
PDF
DS_Appliance_Datasheet
PDF
Pitfalls of Cyber Data
PPT
knowthyself : Internal IT Security in SA
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PDF
Cyber-Risk-Management-Assessment (1)
PDF
Top 6 Sources for Identifying Threat Actor TTPs
PDF
The Real Costs of SIEM vs. Managed Security Service
PDF
DSP-MSSMDR-DataSheet_Final (1)
PDF
DSP-MSSMDR-DataSheet_Final (1)
PPTX
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
PDF
Improve Your Threat Intelligence Strategy With These Ideas
PPTX
Managing security risks in today's digital era
PDF
Taking a Data-Driven Approach to Business Continuity
PDF
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
PDF
Security Consulting Services
PDF
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
PDF
To MSSP or not to MSSP IISF 2015
PDF
Cyber risk-overview-wtw (1)
Big data security in the cloud: Buzzword Bingo!
DS_Appliance_Datasheet
DS_Appliance_Datasheet
Pitfalls of Cyber Data
knowthyself : Internal IT Security in SA
Bridging the Gap Between Threat Intelligence and Risk Management
Cyber-Risk-Management-Assessment (1)
Top 6 Sources for Identifying Threat Actor TTPs
The Real Costs of SIEM vs. Managed Security Service
DSP-MSSMDR-DataSheet_Final (1)
DSP-MSSMDR-DataSheet_Final (1)
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Improve Your Threat Intelligence Strategy With These Ideas
Managing security risks in today's digital era
Taking a Data-Driven Approach to Business Continuity
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Security Consulting Services
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
To MSSP or not to MSSP IISF 2015
Cyber risk-overview-wtw (1)
Ad

Viewers also liked (10)

PDF
NCAT's Organic Livestock Workbook: A Guide to Sustainable and Allowed Practices
PDF
Organic Livestock Documentation Forms
PPTX
A propos de CreativeFeed Paris
PDF
Pawpaw - A "Tropical" Fruit for Temperate Climates
PDF
Pressbook Pourquoi Tu Cours Juillet 2008
PDF
Organic Pumpkin and Winter Squash Marketing and Production
PDF
Pressbook Pourquoi Tu Cours Mars 2010 V2
PPT
Wiltshire Horn Sheep
PPT
Northern Rock Case Study 1
DOCX
Bank Failures and Case Studies
NCAT's Organic Livestock Workbook: A Guide to Sustainable and Allowed Practices
Organic Livestock Documentation Forms
A propos de CreativeFeed Paris
Pawpaw - A "Tropical" Fruit for Temperate Climates
Pressbook Pourquoi Tu Cours Juillet 2008
Organic Pumpkin and Winter Squash Marketing and Production
Pressbook Pourquoi Tu Cours Mars 2010 V2
Wiltshire Horn Sheep
Northern Rock Case Study 1
Bank Failures and Case Studies
Ad

Similar to Duncan hine input2_ irm_and_outsourcing (20)

PDF
Duncan hine input1_irm_and_outsourcing
PDF
New Age Red Teaming - Enterprise Infilteration
PPTX
Six steps for securing offshore development
PPTX
unit 2informationsecuritynotesyyyyy.pptx
PDF
Duncan hine input3_irm_and_outsourcing
PDF
Microsoft InfoSec for cloud and mobile
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
PPTX
Information Security Risk Management and Compliance.pptx
PPT
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
PPTX
1234567RISK-MANAGEMENT-FOR-SECURITY.pptx
PPTX
Security risk management
PDF
Information Security from Risk Management and Design
PPTX
Lecture2.pptx
PPT
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
PPTX
Understanding the security_organization
PPT
Security Compliance Web Application Risk Management
PPTX
Ta Security
PPTX
TA security
PDF
Agam Profile
PDF
Agama Profile
Duncan hine input1_irm_and_outsourcing
New Age Red Teaming - Enterprise Infilteration
Six steps for securing offshore development
unit 2informationsecuritynotesyyyyy.pptx
Duncan hine input3_irm_and_outsourcing
Microsoft InfoSec for cloud and mobile
BSIDES DETROIT 2015: Data breaches cost of doing business
Information Security Risk Management and Compliance.pptx
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
1234567RISK-MANAGEMENT-FOR-SECURITY.pptx
Security risk management
Information Security from Risk Management and Design
Lecture2.pptx
Seccurity_Risk_Management.pptyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy
Understanding the security_organization
Security Compliance Web Application Risk Management
Ta Security
TA security
Agam Profile
Agama Profile

More from E-Government Center Moldova (20)

PDF
The new era of smart
PDF
The nexus of Social, Mobile, Cloud and Big Data Analytics
PDF
Digital Transformation by Richard Baird
PPT
Presentation cert gov-md 05.03.2013
PDF
Hannes astok data protection agency
PDF
Prezentare compartiment securitatea 05 03 2013 p sincariuc
PDF
Hannes astok policy development
PDF
Digital security hannes astok
PDF
Assessing cybersecurity_Anto Veldre
PPTX
MCloud operational framework
PPTX
Arhitectura de securitate_MCloud
PDF
Ibm smart cloud solutions m-cloud
PDF
Ibm security virtual server protection
PDF
Can e government work in the cloud reichstaedter
PDF
Driving government efficiency and innovation through cloud computing k...
PDF
Star storage m cloud week
PPT
Unleashing the potential of cloud computing in europe francisco garcia moran
PPTX
Government innovation through cloud computing arthur riel
PPT
4 francisco garcia_moran_moldova_2013
The new era of smart
The nexus of Social, Mobile, Cloud and Big Data Analytics
Digital Transformation by Richard Baird
Presentation cert gov-md 05.03.2013
Hannes astok data protection agency
Prezentare compartiment securitatea 05 03 2013 p sincariuc
Hannes astok policy development
Digital security hannes astok
Assessing cybersecurity_Anto Veldre
MCloud operational framework
Arhitectura de securitate_MCloud
Ibm smart cloud solutions m-cloud
Ibm security virtual server protection
Can e government work in the cloud reichstaedter
Driving government efficiency and innovation through cloud computing k...
Star storage m cloud week
Unleashing the potential of cloud computing in europe francisco garcia moran
Government innovation through cloud computing arthur riel
4 francisco garcia_moran_moldova_2013

Duncan hine input2_ irm_and_outsourcing

  • 1. Information Security Risk Management IT operation outsourcing A case study
  • 3. Based on a real project  Identities protected and altered – does not affect the process that was used  A sensitive defence organisation needs to be more cost effective  Already has long term outsource partner  Mid contract break point drives improvement  Perception that security experts will say no  This is based on current policy
  • 5. Research and advice across defence sector  Many highly sensitive contracts and relationships  Key target for traditional and cyber attack  Already outsourced support in many areas but all delivered from inside UK  Urgent need to make more savings  Concept is to move back office processing and support to a low cost labour country
  • 6. Use the process to establish threats and exploits  Look at sensitivity of assets affected  See if controls and mitigations can reduce these to acceptable levels  Stop or go ahead and accepts residual risks  Sounds simple but only works if you understand how the exploits will happen
  • 7. Move offshore :  No classified material at all  Human resource basic records  Travel expenses fulfilment  Purchase order ledger  Order generation  Payment of suppliers
  • 8. Agree some risks to privacy sensitive records  No classified material included so low risk  Bulk data sets to be protected no copying or transport in country  Staff in country to be vetted  Buildings to be secured to higher level  Subcontract suppliers to be vetted  Extra monitoring to be established
  • 9. Threats from individuals, petty criminals and other low grade threat actors  Opportunistic not organised  No strategic goal  Security first response is NO  Little explanation but just a risk we don’t need to take
  • 10. Leadership want to make the savings  Security role to establish the REAL risks  Then find ways of reducing them  Explain the result to leaders so they can decide if the residual risks are acceptable  Key is to find a way we can all say yes to a desirable initiative not find reasons to say no!
  • 11. Threat sources FIS, competitors and sophisticated activist groups  Want to reverse engineer size of cyber defences on new order for sensitive web hosting contract  Purchase order ledger is moved offshore  Use open source to establish likely timing of orders for components and services  Penetrate data centre offshore via traditional human methods or cyber attack  Collect and analyse project identifiers in database  Collect orders and establish scale of servers and defences  Mobilise denial of service resources now known to be able to destroy hosting at will
  • 12. Threat actors FIS, crime, competitors  want to identify targets for corruption related to specific contracts  HR and travel expenses moved offshore  Use open source material to identify timing of contract negotiation and award  Target country is known - penetrate data centre or create and remove copy (could acquire rotating backups)  Mine travel expenses to find all trips to target country in window and create long list  Qualify list with HR system look for expensive life, large family, lower bonus etc  Go back to expenses to find detailed behaviours, bar bills, timing, phone call duration ..........  Short list targets and move to more traditional methods
  • 13. Open source used to index low grade bulk data  Structure of data is as valuable as the data itself  Mining and profiling used to enrich data  Traditional methods still needed but this improves chance of success significantly  Access to data set or actual system is assumed in target country despite countermeasures  Attacks are cyber used to enhance traditional approaches
  • 14. Scramble data before off shoring  Remove structure from orders  Reassemble in UK  Anonymous HR records with numeric identifiers and address data and other pointers removed  Scramble travel expenses and make claim to index number not person  Other similar methods to scramble data and remove structure  All reinserted in secure enclave in UK
  • 15. Off shoring can go ahead with residual risk lower than original solution  Savings reduced by about 20% to pay for enclave in UK  Information asset owners much more aware of real high impact risks  Partnership with outsource provider strengthened  Partner takes security function into other customers as expert adviser and secures new business
  • 16. Threats from sophisticated sources not well understood by asset owners  Assumption that security will say NO!  Savings reduced but project still went ahead and delivered a large net saving  After solution risks were lower than original solution  Ready for next break point off shoring can now go to any country even very high risk/low cost environments