SlideShare a Scribd company logo
Intel Security and Privacy Office
Cyber Security Framework:
Intel’s Implementation Tools & Approach
Tim Casey
Senior Strategic Risk Analyst
@timcaseycyber
NIST Workshop #6
October 29, 2014
Intel Security and Privacy Office
Intel’s Goals in Using the CSF
2
 Establish alignment on risk tolerance
 Inform budget planning for 2015
 Communicate risk heat map to Senior Leadership
 CSF as risk management approach – NOT a compliance checklist!
Intel Security and Privacy Office
Strategy: 3-Phase Approach
Infrastructure
 Align Macro-level risk management practices to CSF
 Focus initially on OFFICE and ENTERPRISE
 Perform initial CSF assessment against infrastructure
Product
 Explore mapping of products and services capabilities to CSF
 Examine product assurance initiatives (SDL, etc.) through CSF lens
Supply Chain/Third Party Contracting
 Examine and potentially pilot contracting updates to align to CSF language
We are here
Intel Security and Privacy Office
Infrastructure Assessment Process
Set Targets
•Establish Core Group (key SME’s and Managers)
•Evaluate and modify Categories and Subcategories
•F2F Session with Core Group to set targets and score actuals (2x4 hour sessions/8-10 SME’s)
•Validate Targets with Decision Makers (CISO & Staff)
Assess
Current State
•Identify Key SME Scorers
•Train SMEs (virtual 1 hour sessions)
•SME Use Tools to self score [note: SME’s do not know Targets]
Analyze
Results
•Aggregate Individual SME roll-up with Core Team Actuals and compare to Targets
•Use simple heat map to identify gaps >1
•Drill down on subcategories for identified gaps >1 to identify key issues
Communicate
Results
• Review findings & recommendations with CISO & Staff
• Inform impacted Managers to ensure prioritization feed into budget and planning cycles
• Brief Senior Leadership on findings and resulting recommendations
Intel Security and Privacy Office
SME Rollup
5
Mapping highlighted outliers
and major differences
1
1
Intel Security and Privacy Office
SME-Core Target Roll Up
6
High 2’s – Focus
Areas stand out
Significant differences
between Core and
Individual scores can
highlight visibility issues
Results matched “Gut
Check” expectations
Intel Security and Privacy Office
Management Outcomes
Program Management
 CSF utilization has progressed with no major deviations from plan of record
 Very light-weight organizationally—leveraged existing processes & org structures
Estimated Cost
 Less than 150 work-hours invested to date with 2 focus areas (Office & Enterprise)
complete
 Repeatable tools & techniques developed so additional areas may be less overhead
Feedback from Participants
 Easy to understand and score
 No push back on resourcing or time commits
 Participants see value, with key concerns being granularity and repeatability
Intel Security and Privacy Office
Key Learnings
Setting Targets is a very valuable exercise
 Discussions on Tiers and Targets was enlightening and furthered intra-company
alignment
Categories
 Categories were useful and for our initial use only one additional Category added –
DETECT: THREAT INTELLIGENCE
 We expect additional Categories to emerge as we move through Design,
Manufacturing, and Services environments
Sub Categories
 Still a bit of a puzzle on how to optimally use this granularity while balancing
overhead
 Next rev of tool will do away with scoring subcategories and use over/under model
for heat mapping inputs
Intel Security and Privacy Office
Summary
 “This is a journey.” Informed internal discussion is a key aspect of
any risk management program—the CSF fosters this well
 For Intel, a relatively low-cost and low-impact process modification
 Improved harmonization of risk management methodologies and a
common language across internal stakeholder communities
 Improved visibility into our risk landscape
Intel Security and Privacy Office
This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
BunnyPeople, Celeron, Celeron Inside, Centrino, Centrino Inside, Core Inside, i960, Intel, the Intel logo, Intel AppUp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, the Intel Inside logo, Intel
NetBurst, Intel NetMerge, Intel NetStructure, Intel SingleDriver, Intel SpeedStep, Intel Sponsors of Tomorrow., the Intel Sponsors of Tomorrow. logo, Intel StrataFlash, Intel Viiv, Intel vPro, Intel
XScale, InTru, the InTru logo, InTru soundmark, Itanium, Itanium Inside, MCS, MMX, Moblin, Pentium, Pentium Inside, skoool, the skoool logo, Sound Mark, The Journey Inside, vPro Inside, VTune,
Xeon, and Xeon Inside are trademarks of Intel Corporation in the U.S. and other countries.
*Other names and brands may be claimed as the property of others.
Copyright © 2014, Intel Corporation. All rights reserved.

More Related Content

PDF
NISTs Cybersecurity Framework -- Comparison with Best Practice
PDF
Lessons Learned from the NIST CSF
PDF
Happiest Minds NIST CSF compliance Brochure
PDF
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
PPTX
NIST IT Standards for Local Governments 2010
PPTX
How to implement NIST cybersecurity standards in my organization
PDF
NIST Cybersecurity Framework 101
PDF
Cybersecurity Framework - What are Pundits Saying?
NISTs Cybersecurity Framework -- Comparison with Best Practice
Lessons Learned from the NIST CSF
Happiest Minds NIST CSF compliance Brochure
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
NIST IT Standards for Local Governments 2010
How to implement NIST cybersecurity standards in my organization
NIST Cybersecurity Framework 101
Cybersecurity Framework - What are Pundits Saying?

What's hot (19)

PPTX
Cybersecurity Frameworks and You: The Perfect Match
PDF
Introduction to NIST Cybersecurity Framework
PPTX
Security assessment with a hint of CISSP Prep
PPTX
How to Use the NIST CSF to Recover from a Healthcare Breach
PPTX
Top 20 Security Controls for a More Secure Infrastructure
PPTX
NIST CSF Overview
PDF
A Case Study of the Capital One Data Breach
PDF
CHIME Lead Forum - Seattle 2015
PDF
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
PDF
Rothke secure360 building a security operations center (soc)
PDF
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
PDF
Strategy considerations for building a security operations center
PDF
Nist.sp.800 37r2
PDF
Security operations center 5 security controls
PDF
OWASP based Threat Modeling Framework
PDF
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
PDF
security_assessment_slides
PPSX
Does audit make us more secure
PPSX
Next-Gen security operation center
Cybersecurity Frameworks and You: The Perfect Match
Introduction to NIST Cybersecurity Framework
Security assessment with a hint of CISSP Prep
How to Use the NIST CSF to Recover from a Healthcare Breach
Top 20 Security Controls for a More Secure Infrastructure
NIST CSF Overview
A Case Study of the Capital One Data Breach
CHIME Lead Forum - Seattle 2015
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Rothke secure360 building a security operations center (soc)
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Strategy considerations for building a security operations center
Nist.sp.800 37r2
Security operations center 5 security controls
OWASP based Threat Modeling Framework
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
security_assessment_slides
Does audit make us more secure
Next-Gen security operation center
Ad

Viewers also liked (17)

PPTX
NIST CyberSecurity Framework: An Overview
PDF
NIST Cybersecurity Framework - Mindmap
PDF
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
PDF
III Jornada de Ciberseguridad en Andalucía: Mesa redonda Ciberseguridad 4.0
PDF
Informe scsi 2012 sobre ciberseguridad
PDF
Accountability for Corporate Cybersecurity - Who Owns What?
PDF
NIST Cybersecurity Framework Cross Reference
PPT
Ciberseguridad - monográfico
PDF
Protegiendo el Negocio frente al Cumplimiento Legal
PPT
Ciberseguridad en empresas
PDF
Segurinfo colombia Estado de ciberseguridad en latinoamérica
PDF
FDA Cybersecurity Recommendations to Comply with NIST - Wearables Crash Cours...
PPTX
Ciberseguridad
PPTX
Eelco Karthaus
PPTX
Change Process in Organizations
PDF
IT Government
PPTX
Manajemen perubahan
NIST CyberSecurity Framework: An Overview
NIST Cybersecurity Framework - Mindmap
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
III Jornada de Ciberseguridad en Andalucía: Mesa redonda Ciberseguridad 4.0
Informe scsi 2012 sobre ciberseguridad
Accountability for Corporate Cybersecurity - Who Owns What?
NIST Cybersecurity Framework Cross Reference
Ciberseguridad - monográfico
Protegiendo el Negocio frente al Cumplimiento Legal
Ciberseguridad en empresas
Segurinfo colombia Estado de ciberseguridad en latinoamérica
FDA Cybersecurity Recommendations to Comply with NIST - Wearables Crash Cours...
Ciberseguridad
Eelco Karthaus
Change Process in Organizations
IT Government
Manajemen perubahan
Ad

Similar to Intel Presentation from NIST Cybersecurity Framework Workshop 6 (20)

DOCX
NIST Special Publication 800-37 Revision 2 Ris.docx
PPT
Accidental Insider
PDF
Exploration Draft Document- CEM Machine Learning & AI Project 2018
PPTX
A guide to Sustainable Cyber Security
PPTX
NIST Critical Security Framework (CSF)
PDF
NIST Framework for Information System
PPTX
Infosec is Broken “did you bring a knife to a gun fight?"
PPTX
INFS2701 T2 2025 Lecture 1 Data Warehousing.pptx
PPSX
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
PDF
National Institute of Standards and Technology (NIST) Risk Management Framework
PDF
NIST.SP.800-37r2.pdf
PDF
Demonstrating Information Security Program Effectiveness
PPTX
Security Ops for large and small companies
PDF
1. Security and Risk Management
PDF
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
PPTX
C2M2 V2.1 Self-Evaluation Workshop Kickoff Presentation -- July 2023.pptx
PDF
Intel 2021 Product Security Report
PDF
Where security and privacy meet partnering tips for CSOs and privacy/complian...
PPTX
June2014 brownbag privacy
PPTX
Perfect Profilers Final Presentation
NIST Special Publication 800-37 Revision 2 Ris.docx
Accidental Insider
Exploration Draft Document- CEM Machine Learning & AI Project 2018
A guide to Sustainable Cyber Security
NIST Critical Security Framework (CSF)
NIST Framework for Information System
Infosec is Broken “did you bring a knife to a gun fight?"
INFS2701 T2 2025 Lecture 1 Data Warehousing.pptx
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
National Institute of Standards and Technology (NIST) Risk Management Framework
NIST.SP.800-37r2.pdf
Demonstrating Information Security Program Effectiveness
Security Ops for large and small companies
1. Security and Risk Management
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
C2M2 V2.1 Self-Evaluation Workshop Kickoff Presentation -- July 2023.pptx
Intel 2021 Product Security Report
Where security and privacy meet partnering tips for CSOs and privacy/complian...
June2014 brownbag privacy
Perfect Profilers Final Presentation

More from Phil Agcaoili (20)

PDF
Cybersecurity Market 2020 - Bring the Noise
PPTX
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
PPTX
2016 ISSA Conference Threat Intelligence Keynote philA
PPTX
CSA Atlanta Q1'2016 Chapter Meeting
PPTX
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
PPTX
2015 KSU So You Want To Be in Cyber Security
PPTX
OWASP Knoxville Inaugural Chapter Meeting
PPTX
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
PPTX
Data Breaches. Are you next? What does the data say?
PDF
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
PPTX
2014 - KSU - So You Want to Be in Cyber Security?
PPTX
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
PPT
Good Security Starts with Software Assurance - Software Assurance Market Plac...
PPT
What CIOs and CFOs Need to Know About Cyber Security
PPTX
Southern Risk Council - Cybersecurity Update 10-9-13
PPTX
CSO Magazine Confab 2013 Atlanta - Cyber Security
PPTX
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
PPTX
Moneysec - Moneyball for Security
PPT
IAPP Atlanta Chapter Meeting 2013 February
PPTX
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cybersecurity Market 2020 - Bring the Noise
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
2016 ISSA Conference Threat Intelligence Keynote philA
CSA Atlanta Q1'2016 Chapter Meeting
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
2015 KSU So You Want To Be in Cyber Security
OWASP Knoxville Inaugural Chapter Meeting
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Data Breaches. Are you next? What does the data say?
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
2014 - KSU - So You Want to Be in Cyber Security?
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
What CIOs and CFOs Need to Know About Cyber Security
Southern Risk Council - Cybersecurity Update 10-9-13
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Moneysec - Moneyball for Security
IAPP Atlanta Chapter Meeting 2013 February
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312

Recently uploaded (20)

PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
Testing WebRTC applications at scale.pdf
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
artificial intelligence overview of it and more
DOCX
Unit-3 cyber security network security of internet system
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Digital Literacy And Online Safety on internet
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
Slides PDF The World Game (s) Eco Economic Epochs.pdf
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Testing WebRTC applications at scale.pdf
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Slides PPTX World Game (s) Eco Economic Epochs.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Paper PDF World Game (s) Great Redesign.pdf
introduction about ICD -10 & ICD-11 ppt.pptx
international classification of diseases ICD-10 review PPT.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
artificial intelligence overview of it and more
Unit-3 cyber security network security of internet system
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Digital Literacy And Online Safety on internet
Decoding a Decade: 10 Years of Applied CTI Discipline
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
Tenda Login Guide: Access Your Router in 5 Easy Steps

Intel Presentation from NIST Cybersecurity Framework Workshop 6

  • 1. Intel Security and Privacy Office Cyber Security Framework: Intel’s Implementation Tools & Approach Tim Casey Senior Strategic Risk Analyst @timcaseycyber NIST Workshop #6 October 29, 2014
  • 2. Intel Security and Privacy Office Intel’s Goals in Using the CSF 2  Establish alignment on risk tolerance  Inform budget planning for 2015  Communicate risk heat map to Senior Leadership  CSF as risk management approach – NOT a compliance checklist!
  • 3. Intel Security and Privacy Office Strategy: 3-Phase Approach Infrastructure  Align Macro-level risk management practices to CSF  Focus initially on OFFICE and ENTERPRISE  Perform initial CSF assessment against infrastructure Product  Explore mapping of products and services capabilities to CSF  Examine product assurance initiatives (SDL, etc.) through CSF lens Supply Chain/Third Party Contracting  Examine and potentially pilot contracting updates to align to CSF language We are here
  • 4. Intel Security and Privacy Office Infrastructure Assessment Process Set Targets •Establish Core Group (key SME’s and Managers) •Evaluate and modify Categories and Subcategories •F2F Session with Core Group to set targets and score actuals (2x4 hour sessions/8-10 SME’s) •Validate Targets with Decision Makers (CISO & Staff) Assess Current State •Identify Key SME Scorers •Train SMEs (virtual 1 hour sessions) •SME Use Tools to self score [note: SME’s do not know Targets] Analyze Results •Aggregate Individual SME roll-up with Core Team Actuals and compare to Targets •Use simple heat map to identify gaps >1 •Drill down on subcategories for identified gaps >1 to identify key issues Communicate Results • Review findings & recommendations with CISO & Staff • Inform impacted Managers to ensure prioritization feed into budget and planning cycles • Brief Senior Leadership on findings and resulting recommendations
  • 5. Intel Security and Privacy Office SME Rollup 5 Mapping highlighted outliers and major differences 1 1
  • 6. Intel Security and Privacy Office SME-Core Target Roll Up 6 High 2’s – Focus Areas stand out Significant differences between Core and Individual scores can highlight visibility issues Results matched “Gut Check” expectations
  • 7. Intel Security and Privacy Office Management Outcomes Program Management  CSF utilization has progressed with no major deviations from plan of record  Very light-weight organizationally—leveraged existing processes & org structures Estimated Cost  Less than 150 work-hours invested to date with 2 focus areas (Office & Enterprise) complete  Repeatable tools & techniques developed so additional areas may be less overhead Feedback from Participants  Easy to understand and score  No push back on resourcing or time commits  Participants see value, with key concerns being granularity and repeatability
  • 8. Intel Security and Privacy Office Key Learnings Setting Targets is a very valuable exercise  Discussions on Tiers and Targets was enlightening and furthered intra-company alignment Categories  Categories were useful and for our initial use only one additional Category added – DETECT: THREAT INTELLIGENCE  We expect additional Categories to emerge as we move through Design, Manufacturing, and Services environments Sub Categories  Still a bit of a puzzle on how to optimally use this granularity while balancing overhead  Next rev of tool will do away with scoring subcategories and use over/under model for heat mapping inputs
  • 9. Intel Security and Privacy Office Summary  “This is a journey.” Informed internal discussion is a key aspect of any risk management program—the CSF fosters this well  For Intel, a relatively low-cost and low-impact process modification  Improved harmonization of risk management methodologies and a common language across internal stakeholder communities  Improved visibility into our risk landscape
  • 10. Intel Security and Privacy Office This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. BunnyPeople, Celeron, Celeron Inside, Centrino, Centrino Inside, Core Inside, i960, Intel, the Intel logo, Intel AppUp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, the Intel Inside logo, Intel NetBurst, Intel NetMerge, Intel NetStructure, Intel SingleDriver, Intel SpeedStep, Intel Sponsors of Tomorrow., the Intel Sponsors of Tomorrow. logo, Intel StrataFlash, Intel Viiv, Intel vPro, Intel XScale, InTru, the InTru logo, InTru soundmark, Itanium, Itanium Inside, MCS, MMX, Moblin, Pentium, Pentium Inside, skoool, the skoool logo, Sound Mark, The Journey Inside, vPro Inside, VTune, Xeon, and Xeon Inside are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. Copyright © 2014, Intel Corporation. All rights reserved.