SlideShare a Scribd company logo
Information Security Metrics:
Practical Steps to Measurement
Jack Nichelson & James Tarala
I defend my companies competitive
advantage by helping solve business
problems through technology to
work faster and safer.
Who is Jack Nichelson?
 Director of Infrastructure & Security for Chart Industries.
 Recognized as one of the “People Who Made a Difference in Security” by the
SANS Institute and Received the CSO50 award.
 Adviser for Baldwin Wallace’s, State winner Collegiate Cyber Defense
Competition (CCDC) team. “Solving Problems, is my Passion”
Introduction
• How do you measure & report progress?
• Is your team focused on the right problems?
• How do you promote accountability &
transparency?
• How do you find waste, time and money?
• Are your projects improving the daily jobs of
your end users?
“Secure more with less, show continuous improvement and value”
Problem Statement
In an era of security breaches we tend to have only one metric
– Have my systems been compromised?
Why are Metrics Needed?
• Businesses use metrics to facilitate decision making
• Better data leads to better decisions
• Metrics allow organizations to set appropriate priorities
• Measurement allows comparison:
– Between our organization and industry benchmarks
– Between our organization and other organizations risk
levels
– Between levels of accepted risk over time
– Between business units within an organization
Metrics from the Business World
• The business world uses metrics all the time
• Consider the following examples:
– Price to Earnings Ratio
– Profit & Loss Statements
– Product Sales Quotas
– Number of Safety Incidents
– Unit Production
– Web Advertisement Click Counts
– Number of Facebook “Likes” per Post
Metrics in Technology
• Organizations even commonly use metrics to help measure
the performance of technology systems as well
• Consider the following examples:
– System uptime
– CPU Utilization Percentage
– Memory Use Percentage
– Average Email Mailbox Size
– Support Technician to Computer Node Ratio
– Help Desk Ticket Time to First Touch
– Help Desk Ticket Time to Resolution
IS Metrics: Too Broad?
• The first question we need to ask is, “What do we mean by
the term Information Security metrics?”
• IS Metrics is too broad of a term
• “Begin with the end in mind.” – Stephen Covey
• Measurement for measurement’s sake helps no one
• Organizations must be specific on what they are measuring
and the benefits they hope to achieve from it
Suggested Solution
Create an effective, sustainable security aware culture
that is results driven.
 Foundation
 Leading Change
 Gemba Board
• Security
• Quality
• Delivery
• Cost
• People
 Case Study Examples & Results
Begin With The End In Mind
Example of how some
simple goals that are
tracked as a team will
move security forward.
Primary Recommendation
1. Start small, excel at gathering a small number of metrics
2. Integrate these metrics into your business process
3. Grow the number of metrics you collect
• United States Department of State iPost began with only three
data sensors:
– Tenable Nessus
– Microsoft Active Directory
– Microsoft System Management Server (System Center)
iPost
Foundation
• Obtain a security charter from senior management
• Create an organization wide IS Steering Committee
• Document your organization’s overall security goals
• Create an asset inventory & Assign data owners to all of your systems
• Deploy a vulnerability scanner & scan your hosts on a regular basis
• Start with 4 data sources:
• Microsoft Active Directory
• Help Desk Ticketing System
• Microsoft System Center (SCCM)
• Tenable Nessus or Qualys
Recommended elements for getting started:
Leading Change
Step 1: Create Urgency - For change to happen, you
need to make the case why and be brutally honest.
Step 2: Form a Powerful Coalition – Get visible
support from key people and link metrics to
performance.
Step 3: Create a Vision for Change - Develop what
you "see" as the future that people can grasp easily
and remember.
Step 4: Communicate the Vision - Talk about it every
chance you get. Use the vision daily to make
decisions and solve problems.
Culture Eats Strategy - Make metrics part of your culture
Leading Change
Step 5: Remove Obstacles - Empower the people you need to execute
your vision, and help the change move forward.
Step 6: Create Short-Term Wins - Nothing motivates like success
Step 7: Build on the Change - change projects fail because victory is
declared too early.
Step 8: Anchor the Changes in Corporate Culture - Your culture
determines what gets done, so the values behind your vision must
show in day-to-day work.
You have to work hard to change a culture successfully. If
you're too impatient, and if you expect too many results
too soon, your plans for change are more likely to fail.
Gemba Board
Gemba (現場) is a Japanese term referring to the place where value
is created. The idea of Gemba is that the problems are visible, and
the best improvement ideas will come from going to the Gemba.
Gemba Board: Security
Example Metrics:
• # of systems not monitored & tracked in inventory by Location or LoB
• # Top Vulnerabilities by Location or LoB
• # of Legacy Systems by Location or LoB
• # of Users with Local Admin & Accounts with Domain Admin
• # of Total Security Incidences by Location or LoB
• # of Past Due Security Awareness Training by Location or LoB
Security - The current security posture at a glance
Gemba Board: Quality
Example Metrics:
• # of Servers & Workstation missing OS & App patches (30 day SLA)
• # of infections/Re-Images tickets (3 day SLA)
• # of Security Event tickets (5 day SLA)
• # of Security Request tickets (15 days SAL)
• Cause Mapping Analysis to find root cause of problems
Quality – Results for SLA goals of events & requests
Gemba Board: Delivery
Delivery – Active Projects & Audits at a glance
Example Metrics:
• Active Projects Status
• Active Audit Status
• Remediation Progress by Location or LoB
• On-Site Awareness Training by Location
Gemba Board: Cost
Cost – P&L at a glance
Example Metrics:
• Operating budget spending plan (OPEX & CAPEX)
• ROIC Qualitatively Rating of Perceived Value
• Support Agreements Costs & Renew dates
• Consultant Support Agreements Costs & Renew dates
• Running total of cost savings
Gemba Board: People
People – Skills matrix at a glance
Example Metrics:
• Skills Matrix of everyone in Security
• Training and development plans
• On-Call & Vacation Schedules
• Awards
Practical Steps: Base
• To create an effective, sustainable program to implement
metrics, don’t start by creating metrics
• Recommendation would be:
1. Obtain a security management charter from senior
management
2. Create an organization wide IS Steering Committee
3. Document your organization’s overall security goals
4. Create & approve appropriate security policies,
procedures, & standards
5. Educate your organization on those documents
Practical Steps: Phase I
Once a base or foundation for information assurance is laid, then
you can begin with metrics
• The next phase would be to:
1. Identify what information security sensors you have
already successfully deployed
2. Determine what meaningful metrics can be gleaned from
these sensors
3. Deploy a tool that can centrally aggregate, normalize, and
report on the data collected by the sensors
4. Create basic reports based on the metrics from strep #2
5. Work with business owners to remediate risk
Practical Steps: Phase II
Now you are ready for continuous process improvement
• The last steps are to refine your effort, gather more data, and
remediate more risk:
1. Deploy additional sensors & aggregate the results
2. Determine meaningful metrics that new sensors can
bring
3. Collaborate with business owners to make metrics more
meaningful
4. Remediate new risks as they are discovered
5. Automate the response to as many metrics as possible
Software Tools to Help
• Open Source Projects:
– Practical Threat Analysis (PTA) Professional
– OSSIM Open Source SIEM
• Commercial Tools:
– Archer Technologies SmartSuite
– OpenPages Enterprise GRC
– Bwise GRC
– MetricStream
– Methodware ERA
– Protiviti Governance Portal
– CCH TeamMate, Sword, & Axentis
Bare Minimum Response
1. Create an asset inventory
2. Assign data owners to all of your systems
3. Deploy a vulnerability scanner & scan all of your hosts on a
regular basis
4. Create overall CVSS risk scores, by business unit, and publish
those scores to key business owners
5. Remediate the risk you discover
• Focus on the basics, then improve your efforts
• Run a 5K first, then try a marathon
Further Questions
• Jack Nichelson
– E-mail: Jack@Nichelson.net
– Twitter: @Jack0Lope
– Website: http://www.linkedin.com/in/nichelson
• Resource for further study:
– Security Metrics: Replacing Fear, Uncertainty,
and Doubt by Andrew Jaquith

More Related Content

PPTX
Security metrics
PDF
Cybersecurity roadmap : Global healthcare security architecture
PPTX
Meaningfull security metrics
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PDF
NIST SP 800 30 Flow Chart
PPTX
Risk Management Approach to Cyber Security
PDF
Building a Next-Generation Security Operations Center (SOC)
Security metrics
Cybersecurity roadmap : Global healthcare security architecture
Meaningfull security metrics
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Security operations center-SOC Presentation-مرکز عملیات امنیت
NIST SP 800 30 Flow Chart
Risk Management Approach to Cyber Security
Building a Next-Generation Security Operations Center (SOC)

What's hot (20)

PDF
The Measure of Success: Security Metrics to Tell Your Story
PDF
Cybersecurity Roadmap Development for Executives
PPTX
Cybersecurity Risk Management Program and Your Organization
PDF
Threat Intelligence
PDF
Enterprise Cybersecurity: From Strategy to Operating Model
PPTX
Enterprise Security Architecture Design
PPTX
ISO 27001 - information security user awareness training presentation - Part 1
PDF
NIST cybersecurity framework
PDF
Common Practice in Data Privacy Program Management
PDF
Vulnerability Management
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PPTX
Iso27001 Risk Assessment Approach
PPTX
Risk Assessment and Threat Modeling
PDF
Global Cyber Threat Intelligence
PPTX
Third Party Risk Management
PPTX
Chapter 5: Asset Management
PPSX
Board and Cyber Security
PPTX
Information Assurance Metrics: Practical Steps to Measurement
PDF
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
PPTX
Cyber Threat Management
The Measure of Success: Security Metrics to Tell Your Story
Cybersecurity Roadmap Development for Executives
Cybersecurity Risk Management Program and Your Organization
Threat Intelligence
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Security Architecture Design
ISO 27001 - information security user awareness training presentation - Part 1
NIST cybersecurity framework
Common Practice in Data Privacy Program Management
Vulnerability Management
INCIDENT RESPONSE NIST IMPLEMENTATION
Iso27001 Risk Assessment Approach
Risk Assessment and Threat Modeling
Global Cyber Threat Intelligence
Third Party Risk Management
Chapter 5: Asset Management
Board and Cyber Security
Information Assurance Metrics: Practical Steps to Measurement
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cyber Threat Management
Ad

Viewers also liked (19)

PPTX
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
PDF
Measuring Success - Security KPIs
PDF
Top 10 Essentials for Building a Powerful Security Dashboard
PDF
Building an effective Information Security Roadmap
PDF
Information Security Governance at Board and Executive Level
PDF
Metrics & Reporting - A Failure in Communication
PPTX
Sans 20 CSC: Connecting Security to the Business Mission
PDF
Developing Metrics for Information Security Governance
PDF
10 Floor Marking Tips
PPTX
Kamishibai Process And General Training Instructions Created By Todd Mc Cann
PPTX
Web Application Security Vulnerability Management Framework
PDF
Improving Cyber Security Literacy in Boards & Executives
PPT
Security officer kpi
PDF
Scorecards, Learning Metrics and Measurement Strategies
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PPTX
Software Security Metrics
PDF
Digital trust and cyber challenge now extends beyond the Enterprise
PPTX
Build an Information Security Strategy
PPT
5 Models for Enterprise Software Security Management Teams
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
Measuring Success - Security KPIs
Top 10 Essentials for Building a Powerful Security Dashboard
Building an effective Information Security Roadmap
Information Security Governance at Board and Executive Level
Metrics & Reporting - A Failure in Communication
Sans 20 CSC: Connecting Security to the Business Mission
Developing Metrics for Information Security Governance
10 Floor Marking Tips
Kamishibai Process And General Training Instructions Created By Todd Mc Cann
Web Application Security Vulnerability Management Framework
Improving Cyber Security Literacy in Boards & Executives
Security officer kpi
Scorecards, Learning Metrics and Measurement Strategies
Cyber Risk Management in 2017: Challenges & Recommendations
Software Security Metrics
Digital trust and cyber challenge now extends beyond the Enterprise
Build an Information Security Strategy
5 Models for Enterprise Software Security Management Teams
Ad

Similar to Information Security Metrics - Practical Security Metrics (20)

PDF
Doing Analytics Right - Designing and Automating Analytics
PDF
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
PPTX
Pin the tail on the metric v01 2016 oct
PPTX
Pin the tail on the metric v00 75 min version
PPTX
RSA 2017 - CISO's 5 steps to Success
DOCX
Post 11. Long term GoalThe Group’s goal is to offer attr
PPT
Security metrics 2
PPTX
Information Security - Back to Basics - Own Your Vulnerabilities
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PDF
Endpoint Security & Why It Matters!
PPTX
DevSecCon Keynote
PPTX
DevSecCon KeyNote London 2015
PPTX
NARCA Presentation - IT Best Practice
PDF
Developing useful metrics
PPTX
Measuring Success in the Lean IT World
PPTX
Executing the project - Final PPT.pptx
PPTX
We Bought Some Tools
PDF
Metrics - You are what you measure (DevOps Perth)
PPT
Lean Software Development
PPTX
Software development o & c
Doing Analytics Right - Designing and Automating Analytics
(ISC)2 Security Congress 2015 - The Cloud Trust Conundrum- You’re Asking all ...
Pin the tail on the metric v01 2016 oct
Pin the tail on the metric v00 75 min version
RSA 2017 - CISO's 5 steps to Success
Post 11. Long term GoalThe Group’s goal is to offer attr
Security metrics 2
Information Security - Back to Basics - Own Your Vulnerabilities
Cybersecurity Frameworks and You: The Perfect Match
Endpoint Security & Why It Matters!
DevSecCon Keynote
DevSecCon KeyNote London 2015
NARCA Presentation - IT Best Practice
Developing useful metrics
Measuring Success in the Lean IT World
Executing the project - Final PPT.pptx
We Bought Some Tools
Metrics - You are what you measure (DevOps Perth)
Lean Software Development
Software development o & c

More from Jack Nichelson (10)

PDF
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
PPTX
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
PPTX
A Clear Path to NIST & CMMC Compliance_ISSA.pptx
PPTX
Office 365 Security - Its 2am do you know whos in your office 365
PPTX
Creating a results oriented culture
PPTX
The kickstarter to measuring what matters Evanta CISO 2017
PPTX
Creating a Results Oriented Culture
PPTX
Moving Mountains Through Measurement
PPTX
10 Critical Habits of Effective Security Managers
PPTX
Protecting the Crown Jewels – Enlist the Beefeaters
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance_ISSA.pptx
Office 365 Security - Its 2am do you know whos in your office 365
Creating a results oriented culture
The kickstarter to measuring what matters Evanta CISO 2017
Creating a Results Oriented Culture
Moving Mountains Through Measurement
10 Critical Habits of Effective Security Managers
Protecting the Crown Jewels – Enlist the Beefeaters

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation theory and applications.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
A Presentation on Artificial Intelligence
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Understanding_Digital_Forensics_Presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation theory and applications.pdf
The AUB Centre for AI in Media Proposal.docx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Monthly Chronicles - July 2025
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
A Presentation on Artificial Intelligence

Information Security Metrics - Practical Security Metrics

  • 1. Information Security Metrics: Practical Steps to Measurement Jack Nichelson & James Tarala
  • 2. I defend my companies competitive advantage by helping solve business problems through technology to work faster and safer. Who is Jack Nichelson?  Director of Infrastructure & Security for Chart Industries.  Recognized as one of the “People Who Made a Difference in Security” by the SANS Institute and Received the CSO50 award.  Adviser for Baldwin Wallace’s, State winner Collegiate Cyber Defense Competition (CCDC) team. “Solving Problems, is my Passion” Introduction
  • 3. • How do you measure & report progress? • Is your team focused on the right problems? • How do you promote accountability & transparency? • How do you find waste, time and money? • Are your projects improving the daily jobs of your end users? “Secure more with less, show continuous improvement and value” Problem Statement In an era of security breaches we tend to have only one metric – Have my systems been compromised?
  • 4. Why are Metrics Needed? • Businesses use metrics to facilitate decision making • Better data leads to better decisions • Metrics allow organizations to set appropriate priorities • Measurement allows comparison: – Between our organization and industry benchmarks – Between our organization and other organizations risk levels – Between levels of accepted risk over time – Between business units within an organization
  • 5. Metrics from the Business World • The business world uses metrics all the time • Consider the following examples: – Price to Earnings Ratio – Profit & Loss Statements – Product Sales Quotas – Number of Safety Incidents – Unit Production – Web Advertisement Click Counts – Number of Facebook “Likes” per Post
  • 6. Metrics in Technology • Organizations even commonly use metrics to help measure the performance of technology systems as well • Consider the following examples: – System uptime – CPU Utilization Percentage – Memory Use Percentage – Average Email Mailbox Size – Support Technician to Computer Node Ratio – Help Desk Ticket Time to First Touch – Help Desk Ticket Time to Resolution
  • 7. IS Metrics: Too Broad? • The first question we need to ask is, “What do we mean by the term Information Security metrics?” • IS Metrics is too broad of a term • “Begin with the end in mind.” – Stephen Covey • Measurement for measurement’s sake helps no one • Organizations must be specific on what they are measuring and the benefits they hope to achieve from it
  • 8. Suggested Solution Create an effective, sustainable security aware culture that is results driven.  Foundation  Leading Change  Gemba Board • Security • Quality • Delivery • Cost • People  Case Study Examples & Results
  • 9. Begin With The End In Mind Example of how some simple goals that are tracked as a team will move security forward.
  • 10. Primary Recommendation 1. Start small, excel at gathering a small number of metrics 2. Integrate these metrics into your business process 3. Grow the number of metrics you collect • United States Department of State iPost began with only three data sensors: – Tenable Nessus – Microsoft Active Directory – Microsoft System Management Server (System Center)
  • 11. iPost
  • 12. Foundation • Obtain a security charter from senior management • Create an organization wide IS Steering Committee • Document your organization’s overall security goals • Create an asset inventory & Assign data owners to all of your systems • Deploy a vulnerability scanner & scan your hosts on a regular basis • Start with 4 data sources: • Microsoft Active Directory • Help Desk Ticketing System • Microsoft System Center (SCCM) • Tenable Nessus or Qualys Recommended elements for getting started:
  • 13. Leading Change Step 1: Create Urgency - For change to happen, you need to make the case why and be brutally honest. Step 2: Form a Powerful Coalition – Get visible support from key people and link metrics to performance. Step 3: Create a Vision for Change - Develop what you "see" as the future that people can grasp easily and remember. Step 4: Communicate the Vision - Talk about it every chance you get. Use the vision daily to make decisions and solve problems. Culture Eats Strategy - Make metrics part of your culture
  • 14. Leading Change Step 5: Remove Obstacles - Empower the people you need to execute your vision, and help the change move forward. Step 6: Create Short-Term Wins - Nothing motivates like success Step 7: Build on the Change - change projects fail because victory is declared too early. Step 8: Anchor the Changes in Corporate Culture - Your culture determines what gets done, so the values behind your vision must show in day-to-day work. You have to work hard to change a culture successfully. If you're too impatient, and if you expect too many results too soon, your plans for change are more likely to fail.
  • 15. Gemba Board Gemba (現場) is a Japanese term referring to the place where value is created. The idea of Gemba is that the problems are visible, and the best improvement ideas will come from going to the Gemba.
  • 16. Gemba Board: Security Example Metrics: • # of systems not monitored & tracked in inventory by Location or LoB • # Top Vulnerabilities by Location or LoB • # of Legacy Systems by Location or LoB • # of Users with Local Admin & Accounts with Domain Admin • # of Total Security Incidences by Location or LoB • # of Past Due Security Awareness Training by Location or LoB Security - The current security posture at a glance
  • 17. Gemba Board: Quality Example Metrics: • # of Servers & Workstation missing OS & App patches (30 day SLA) • # of infections/Re-Images tickets (3 day SLA) • # of Security Event tickets (5 day SLA) • # of Security Request tickets (15 days SAL) • Cause Mapping Analysis to find root cause of problems Quality – Results for SLA goals of events & requests
  • 18. Gemba Board: Delivery Delivery – Active Projects & Audits at a glance Example Metrics: • Active Projects Status • Active Audit Status • Remediation Progress by Location or LoB • On-Site Awareness Training by Location
  • 19. Gemba Board: Cost Cost – P&L at a glance Example Metrics: • Operating budget spending plan (OPEX & CAPEX) • ROIC Qualitatively Rating of Perceived Value • Support Agreements Costs & Renew dates • Consultant Support Agreements Costs & Renew dates • Running total of cost savings
  • 20. Gemba Board: People People – Skills matrix at a glance Example Metrics: • Skills Matrix of everyone in Security • Training and development plans • On-Call & Vacation Schedules • Awards
  • 21. Practical Steps: Base • To create an effective, sustainable program to implement metrics, don’t start by creating metrics • Recommendation would be: 1. Obtain a security management charter from senior management 2. Create an organization wide IS Steering Committee 3. Document your organization’s overall security goals 4. Create & approve appropriate security policies, procedures, & standards 5. Educate your organization on those documents
  • 22. Practical Steps: Phase I Once a base or foundation for information assurance is laid, then you can begin with metrics • The next phase would be to: 1. Identify what information security sensors you have already successfully deployed 2. Determine what meaningful metrics can be gleaned from these sensors 3. Deploy a tool that can centrally aggregate, normalize, and report on the data collected by the sensors 4. Create basic reports based on the metrics from strep #2 5. Work with business owners to remediate risk
  • 23. Practical Steps: Phase II Now you are ready for continuous process improvement • The last steps are to refine your effort, gather more data, and remediate more risk: 1. Deploy additional sensors & aggregate the results 2. Determine meaningful metrics that new sensors can bring 3. Collaborate with business owners to make metrics more meaningful 4. Remediate new risks as they are discovered 5. Automate the response to as many metrics as possible
  • 24. Software Tools to Help • Open Source Projects: – Practical Threat Analysis (PTA) Professional – OSSIM Open Source SIEM • Commercial Tools: – Archer Technologies SmartSuite – OpenPages Enterprise GRC – Bwise GRC – MetricStream – Methodware ERA – Protiviti Governance Portal – CCH TeamMate, Sword, & Axentis
  • 25. Bare Minimum Response 1. Create an asset inventory 2. Assign data owners to all of your systems 3. Deploy a vulnerability scanner & scan all of your hosts on a regular basis 4. Create overall CVSS risk scores, by business unit, and publish those scores to key business owners 5. Remediate the risk you discover • Focus on the basics, then improve your efforts • Run a 5K first, then try a marathon
  • 26. Further Questions • Jack Nichelson – E-mail: Jack@Nichelson.net – Twitter: @Jack0Lope – Website: http://www.linkedin.com/in/nichelson • Resource for further study: – Security Metrics: Replacing Fear, Uncertainty, and Doubt by Andrew Jaquith

Editor's Notes

  • #2: Jack is a well-recognized for his passionate advocacy for information security, and has committed himself to leading IT and risk management initiatives within government, financial and manufacturing sectors. Jack offers nearly 20 years of experience complemented with experience instructing and mentoring. Jack earned the recognition as one of the “People Who Made a Difference in Security 2013” by the SANS Institute and received the CSO50 award for connecting security initiatives to business value. He is an adviser for Baldwin-Wallace’s State winner Collegiate Cyber Defense Competition (CCDC) team. He is certified in the following: CISSP, GCIH, GSLC, CRISC, CCNP, CCDA, CCNA and VCP. Secure more with less Secure more with less, because what's measured improves. Show up to a security presentation, walk away with a specific action plan. So exactly how do you integrate information assurance metrics into action in an organization and actually achieve value from the effort. Start measuring the effectiveness of your security program today. This is a blue team talk to help people in InfoSec better tell they story to management through metrics. The presentation is not going to be a bunch of math theory about metrics like some talks. But real stories of hard leases learned with lots of examples how to move security forward with clear and simple targets. My hope is that this talk will provide a very approachable and specific action plan to start leading security with metrics. **This talk could also fit as a 30min Stable Talk**
  • #6: Is the company plan working
  • #7: Basic Health
  • #8: Most Information Security metrics suck!
  • #16: Survival of the fittest System Thinking – A bunch of things that come together, for the pursuit of a common objective, in an environment or context that impacts them and their ability to achieve the objective!
  • #17: Start small, excel at gathering a small number of metrics Integrate these metrics into your business process Grow the number of metrics you collect