SlideShare a Scribd company logo
Copyright ©2011Savid
Security As A Service
The Future of Security Services
Michael A. Davis
Chief Executive Officer
Savid Technologies, Inc.
http://www.savidtech.com
Agenda
• Trends that you must get in front of
• What is SecaaS?
• Why do we need this methodology?
• How do I use it?
• War Stories
• Ask Questions
Who am I?
• Michael A. Davis
– CEO of Savid Technologies
• IT Security Consulting
• Risk Assessments/Auditing
• Security Remediation
– Speaker at Major Security Conferences
• Defcon, CanSecWest, Toorcon, Hack In The Box
– Open Source Software Developer
• Snort
• Nmap
• Dsniff
Author
InformationWeek Contributor
Where we got our data
» March 2012 And November 2011 Survey
» Over 1,100 Security Professionals
» Follow-up Interviews With Fortune 1000 CSO/CISOs
» Wide Variety Of Industries
– Financial
– Healthcare
– Business Services
What is everyone concerned
with?
Source: Savid/Information Week Data Survey, 2011
They are paying attention
Complexity is everywhere
Application
integration
OS
Database
Collaboration
Business
intelligence/
Analytical
applications
Application
development
tools
Hardware
platform
Applications
Services
Computer Network Storage
FS Applications
Security
IDS
Content Filtering
Management
AV/Spyware Anti-Spam
Identity Management
Regulatory Compliance
Firewalls
Vulnerability Assessment
Monitoring
Network & Systems
Management
Management Vendors
Dynamic Provisioning
Storage
Source: CA, 2009
Complex IT Projects Fail - A lot
Out Of 200 Multi-nationals:
• 67% Failed To Terminate Unsuccessful Projects
• 61% Reported Major Conflicts
• 34% Of Projects Were Not Aligned With Strategy
• 32% Performed Redundant Work
1 In 6 Projects Had A Cost Overrun Of 200%!
Source: 2011 Harvard Business Review – Berlin Univ Technical survey
The Problem
• Too many areas to audit
• Security can’t keep up either
• Velocity of change is high
• Audit or Security isn’t involved in the critical
projects
How do we handle a high velocity of change while
providing a high level of assurance that controls
are being implemented?
The Future of IT Audit
© PWC IA Audit 2012 Report
We All Do Them
Source: 2011 InformationWeek Analytics Strategic Security Survey
0%
10%
20%
30%
40%
50%
60%
70%
80%
Yes No Don't Know
% that perform Risk Assessments
2012
2011
The Reality
Source: 2011 InformationWeek Analytics Strategic Security Survey
Very
30%
Somewhat
67%
Not At All
3%
Risk Assessment
Effectiveness
That Cloud Thingy
What This Means To Security
Amazon EC2 - IaaS
The lower down the stack the Cloud provider
stops, the more security you are tactically
responsible for assessing and implementing
yourself.
Salesforce - SaaS
Google AppEngine - PaaS
RFP/Contract
It In
RFP/Contract
It In
Build It InBuild It In
Future of Audit and Security
Adequacy = Compliance
Effectiveness = Consultancy
Audit As a Service
• Be Relevant Not Redundant
• Partner with other risk functions in company
• Focus on start-up/future activities
• Be flexible, don’t limit to the annual plan
• Our recommendation is to stop trying to make
everyone a security expert and instead
• Focus on educating people so they know when to
ask for expertise
To be successful IT Audit’s fundamental VALUE
proposition MUST SHIFT
Security Services?
The Services Menu
• Risk Assessments
– NOT CONTROL ASSESSMENTS
• Guidance without risk levels
– Areas of concern, “pre-audit”
• Cloud Vendor Selection Analysis
• Education
• Advisory Services
• Metric/KRI Development
Why This Works
• Providing real value – Audit is asked to be involved
• Communication increases helping develop your team
talent
• Customers understand what services are available
• Audit understands which services are being requested
and which are not as popular. This allows for growth
planning.
• Customers understand how service consumption
affects their budgets.
• Increased accountability
• Closer to continuous monitoring/auditing!
How To Implement
• Approach each as an customer engagement
– Why are we performing this engagement?
– What value can we provide back?
– Can we provide value to another group?
• Surveys/NetPromoter
– “On a scale of one to 10, how likely is it that you
would recommend us to a colleague?”
– Promoters = 9 to 10.
Passive = 7 to 8, satisfied but enthusiastic about
service
Detractors = 0 to 6, unhappy with the service and will
damage teams reputation through word of month.
How To Implement
• Customize your deliverables!
– Not everything needs to be a finding/risk ranking
– What is valuable to the project?
• What other value can we derive from our
process?
– Interviews
– Data Collection
• Augment Security As a Service too!
Getting buy-in
• Metrics and Transparency are essential
• We want to provide consistency
• Reduce one-off high likelihood risks.
• Work with PMO, if you have one.
• Track adoption rates
• Provide incentives to adopt services
Security Services Menu
• Ensure Controls map to technologies being
deployed
• Traditionally you see items such as:
• Content security, Antivirus/Anti-malware,
Spam filtering
• Email encryption, DLP for outbound email,
Web mail, Anti-phishing
A Better Security Menu
• Focus on Services! Not Technologies!
• Internal and / or external penetration test,
Application penetration test
• Host and guest assessments, Firewall / IPS
(security components of the infrastructure)
• Virtual infrastructure assessment
• THEN provide technology options
IT Security As A Service
A Case Study
The Formula Of Successful Risk
Management
PBL = λ1 x p1 + λ2 x p2 + λ3 x p3
Hazard vs. Speculative Risk
Linking to Business Goals
Copyright Carnegie Mellon SETI MOSAIC Whitepaper
Outcome Management
Copyright Carnegie Mellon SETI MOSAIC Whitepaper
Conclusion
Contact Information
Michael A. Davis
mdavis@savidtech.com
708-532-2843
Twitter: @mdavisceo

More Related Content

PDF
Security as a Service with Microsoft Presented by Razor Technology
PDF
Security As A Service
PDF
Secaa s cat_10_network_security_implementation_guidance
PDF
Cloud Security Governance
PPTX
Identity's Role in a Zero Trust Strategy
PPTX
Secure remote access to AWS your users will love
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PPTX
Zscaler ThreatLabz dissects the latest SSL security attacks
Security as a Service with Microsoft Presented by Razor Technology
Security As A Service
Secaa s cat_10_network_security_implementation_guidance
Cloud Security Governance
Identity's Role in a Zero Trust Strategy
Secure remote access to AWS your users will love
Rethinking Cybersecurity for the Digital Transformation Era
Zscaler ThreatLabz dissects the latest SSL security attacks

What's hot (19)

PPT
Securing Sensitive Data in Your Hybrid Cloud
PDF
SOC-as-a-Service - comSpark 2019
PPTX
Maximize your cloud app control with Microsoft MCAS and Zscaler
PDF
CSA Introduction 2013 David Ross
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
PDF
Msft cloud architecture_security_commonattacks
PDF
The Year the Internet Fell Apart
PPTX
Service Organizational Control (SOC 2) Compliance - Kloudlearn
PDF
Cybersecurity frameworks globally and saudi arabia
PPTX
Intel SaaS Security Playbook
PPTX
Security as a Service Model for Cloud Environment
PDF
63 Requirements for CASB
PDF
How Zero Trust Makes the Mission Simple & Secure
PPSX
The security of SAAS and private cloud
PPTX
Mobile App Security: Enterprise Checklist
PPTX
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
PPTX
Faster, simpler, more secure remote access to apps in aws
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PPT
Ransomware webinar may 2016 final version external
Securing Sensitive Data in Your Hybrid Cloud
SOC-as-a-Service - comSpark 2019
Maximize your cloud app control with Microsoft MCAS and Zscaler
CSA Introduction 2013 David Ross
3 Modern Security - Secure identities to reach zero trust with AAD
Msft cloud architecture_security_commonattacks
The Year the Internet Fell Apart
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Cybersecurity frameworks globally and saudi arabia
Intel SaaS Security Playbook
Security as a Service Model for Cloud Environment
63 Requirements for CASB
How Zero Trust Makes the Mission Simple & Secure
The security of SAAS and private cloud
Mobile App Security: Enterprise Checklist
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Faster, simpler, more secure remote access to apps in aws
Adopting A Zero-Trust Model. Google Did It, Can You?
Ransomware webinar may 2016 final version external
Ad

Viewers also liked (11)

PDF
Security As A Service
PPTX
Elite Force Security Service Brief
PDF
Cyber Security as a Service
PDF
Hosted Security as a Service - Solution Architecture Design
PPTX
Security As A Service In Cloud(SECaaS)
PPT
Security As A Service
PDF
Security Service Management
PPTX
Security As A Service
PDF
How to avoid your website from keep getting hacked
PDF
Security as a Service in a Financial Institution: Reality or Chimera?
PPTX
Security as a Service = JSOC
Security As A Service
Elite Force Security Service Brief
Cyber Security as a Service
Hosted Security as a Service - Solution Architecture Design
Security As A Service In Cloud(SECaaS)
Security As A Service
Security Service Management
Security As A Service
How to avoid your website from keep getting hacked
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service = JSOC
Ad

Similar to IT Security As A Service (20)

PDF
Deliver the ‘Right’ Customer Experience without Compromising Data Security
PPTX
Secure Iowa Oct 2016
PPTX
ISACA Ireland Keynote 2015
PPTX
The State Of Information and Cyber Security in 2016
PDF
AppSphere 15 - Transforming the Business: The Role of DevOps
PPTX
DevSecCon Keynote
PPTX
DevSecCon KeyNote London 2015
PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
PDF
Protecting Agile Transformation through Secure DevOps (DevSecOps)
PPTX
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
PPTX
DevSecOps-Explained-converted.pptx
PDF
Gaining Insight through Predictive Analytics
PPTX
Battle Tested Application Security
PDF
Applicaiton Security - Building The Audit Program
PPTX
Under Defense
PDF
PPTX
State of DevSecOps - DevSecOpsDays 2019
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
PPTX
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
PDF
Advanced Project Data Analytics for Improved Project Delivery
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Secure Iowa Oct 2016
ISACA Ireland Keynote 2015
The State Of Information and Cyber Security in 2016
AppSphere 15 - Transforming the Business: The Role of DevOps
DevSecCon Keynote
DevSecCon KeyNote London 2015
BATbern48_How Zero Trust can help your organisation keep safe.pdf
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
DevSecOps-Explained-converted.pptx
Gaining Insight through Predictive Analytics
Battle Tested Application Security
Applicaiton Security - Building The Audit Program
Under Defense
State of DevSecOps - DevSecOpsDays 2019
Application Hackers Have A Handbook. Why Shouldn't You?
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Advanced Project Data Analytics for Improved Project Delivery

More from Michael Davis (7)

PDF
Can You Steal From Me Now? Mobile and BYOD Security Risks
PDF
Make Mobilization Work - Properly Implementing Mobile Security
PDF
Cost Justifying IT Security
PPTX
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
PDF
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PDF
Michael Davis Bio
Can You Steal From Me Now? Mobile and BYOD Security Risks
Make Mobilization Work - Properly Implementing Mobile Security
Cost Justifying IT Security
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis Bio

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Cloud computing and distributed systems.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Modernizing your data center with Dell and AMD
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The AUB Centre for AI in Media Proposal.docx
Network Security Unit 5.pdf for BCA BBA.
Machine learning based COVID-19 study performance prediction
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
NewMind AI Monthly Chronicles - July 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Review of recent advances in non-invasive hemoglobin estimation
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Per capita expenditure prediction using model stacking based on satellite ima...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Cloud computing and distributed systems.
Understanding_Digital_Forensics_Presentation.pptx
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Modernizing your data center with Dell and AMD
“AI and Expert System Decision Support & Business Intelligence Systems”

IT Security As A Service

  • 1. Copyright ©2011Savid Security As A Service The Future of Security Services Michael A. Davis Chief Executive Officer Savid Technologies, Inc. http://www.savidtech.com
  • 2. Agenda • Trends that you must get in front of • What is SecaaS? • Why do we need this methodology? • How do I use it? • War Stories • Ask Questions
  • 3. Who am I? • Michael A. Davis – CEO of Savid Technologies • IT Security Consulting • Risk Assessments/Auditing • Security Remediation – Speaker at Major Security Conferences • Defcon, CanSecWest, Toorcon, Hack In The Box – Open Source Software Developer • Snort • Nmap • Dsniff
  • 6. Where we got our data » March 2012 And November 2011 Survey » Over 1,100 Security Professionals » Follow-up Interviews With Fortune 1000 CSO/CISOs » Wide Variety Of Industries – Financial – Healthcare – Business Services
  • 7. What is everyone concerned with? Source: Savid/Information Week Data Survey, 2011
  • 8. They are paying attention
  • 9. Complexity is everywhere Application integration OS Database Collaboration Business intelligence/ Analytical applications Application development tools Hardware platform Applications Services Computer Network Storage FS Applications Security IDS Content Filtering Management AV/Spyware Anti-Spam Identity Management Regulatory Compliance Firewalls Vulnerability Assessment Monitoring Network & Systems Management Management Vendors Dynamic Provisioning Storage Source: CA, 2009
  • 10. Complex IT Projects Fail - A lot Out Of 200 Multi-nationals: • 67% Failed To Terminate Unsuccessful Projects • 61% Reported Major Conflicts • 34% Of Projects Were Not Aligned With Strategy • 32% Performed Redundant Work 1 In 6 Projects Had A Cost Overrun Of 200%! Source: 2011 Harvard Business Review – Berlin Univ Technical survey
  • 11. The Problem • Too many areas to audit • Security can’t keep up either • Velocity of change is high • Audit or Security isn’t involved in the critical projects How do we handle a high velocity of change while providing a high level of assurance that controls are being implemented?
  • 12. The Future of IT Audit © PWC IA Audit 2012 Report
  • 13. We All Do Them Source: 2011 InformationWeek Analytics Strategic Security Survey 0% 10% 20% 30% 40% 50% 60% 70% 80% Yes No Don't Know % that perform Risk Assessments 2012 2011
  • 14. The Reality Source: 2011 InformationWeek Analytics Strategic Security Survey Very 30% Somewhat 67% Not At All 3% Risk Assessment Effectiveness
  • 16. What This Means To Security Amazon EC2 - IaaS The lower down the stack the Cloud provider stops, the more security you are tactically responsible for assessing and implementing yourself. Salesforce - SaaS Google AppEngine - PaaS RFP/Contract It In RFP/Contract It In Build It InBuild It In
  • 17. Future of Audit and Security Adequacy = Compliance Effectiveness = Consultancy
  • 18. Audit As a Service • Be Relevant Not Redundant • Partner with other risk functions in company • Focus on start-up/future activities • Be flexible, don’t limit to the annual plan • Our recommendation is to stop trying to make everyone a security expert and instead • Focus on educating people so they know when to ask for expertise To be successful IT Audit’s fundamental VALUE proposition MUST SHIFT
  • 20. The Services Menu • Risk Assessments – NOT CONTROL ASSESSMENTS • Guidance without risk levels – Areas of concern, “pre-audit” • Cloud Vendor Selection Analysis • Education • Advisory Services • Metric/KRI Development
  • 21. Why This Works • Providing real value – Audit is asked to be involved • Communication increases helping develop your team talent • Customers understand what services are available • Audit understands which services are being requested and which are not as popular. This allows for growth planning. • Customers understand how service consumption affects their budgets. • Increased accountability • Closer to continuous monitoring/auditing!
  • 22. How To Implement • Approach each as an customer engagement – Why are we performing this engagement? – What value can we provide back? – Can we provide value to another group? • Surveys/NetPromoter – “On a scale of one to 10, how likely is it that you would recommend us to a colleague?” – Promoters = 9 to 10. Passive = 7 to 8, satisfied but enthusiastic about service Detractors = 0 to 6, unhappy with the service and will damage teams reputation through word of month.
  • 23. How To Implement • Customize your deliverables! – Not everything needs to be a finding/risk ranking – What is valuable to the project? • What other value can we derive from our process? – Interviews – Data Collection • Augment Security As a Service too!
  • 24. Getting buy-in • Metrics and Transparency are essential • We want to provide consistency • Reduce one-off high likelihood risks. • Work with PMO, if you have one. • Track adoption rates • Provide incentives to adopt services
  • 25. Security Services Menu • Ensure Controls map to technologies being deployed • Traditionally you see items such as: • Content security, Antivirus/Anti-malware, Spam filtering • Email encryption, DLP for outbound email, Web mail, Anti-phishing
  • 26. A Better Security Menu • Focus on Services! Not Technologies! • Internal and / or external penetration test, Application penetration test • Host and guest assessments, Firewall / IPS (security components of the infrastructure) • Virtual infrastructure assessment • THEN provide technology options
  • 29. The Formula Of Successful Risk Management PBL = λ1 x p1 + λ2 x p2 + λ3 x p3
  • 31. Linking to Business Goals Copyright Carnegie Mellon SETI MOSAIC Whitepaper
  • 32. Outcome Management Copyright Carnegie Mellon SETI MOSAIC Whitepaper
  • 33. Conclusion Contact Information Michael A. Davis mdavis@savidtech.com 708-532-2843 Twitter: @mdavisceo