SlideShare a Scribd company logo
SESSION ID:
#RSAC
Justin Monti
Make IR Effective with Risk
Evaluation and Reporting
AIR-R02
Sr. VP Security Engineering
MKA Cyber
Mischel Kwon
President/CEO
MKA Cyber
@mkacyber
#RSAC
You’ve Got an Incident – Now What?
2
Monitoring detects new rogue AD accounts
Preliminary investigation suggests an intrusion
What next? Who runs the incident?
Forensic investigation reveals many technical details of the attack but
fails to grasp business impact
Without clear understanding of risk to company and client data,
internal escalation is inadequate before client notification
Company is behind the 8-ball as clients aggressively respond to
potential breach
#RSAC
Classic Stove Piped Compliance Driven Security
Program
Executive Layer
Executives
HR
Finance
Legal
Business
Function
P&L
R&D
IT
Infrastructure
Desktop/ Laptop
Servers
Security
Architecture
Policy/
Compliance
Policies
Controls
Audit
Reporting
SOC
Threat
Intelligence
Forensics
Detection/
Analysis
IR Management
Reporting
#RSAC
Classic SOC Practices
Indicators based on disk forensics and canned vendor-delivered signatures
SEIM Alert
Pick a number – address the first 40 incidents because that’s what you can
handle
Malware focus
Find the dirty box and reimage
Count up the hits – measure by numbers
An occasional hunt and campaign discovery
#RSAC
This is What it Looks Like:
#RSAC
Incident Response – The Old Way
OMG it’s malware! – Manual Anti-virus
Risk is all about the “sexiness” of the malware
No distinction by systems impacted – critical business process or the soda machine
Business owners not involved – treated as an IT issue only
No criteria for severity – impact or technical sophistication – leaves open-ended decisions to
analysts
Anti-virus vendor, scan vendor – High, Medium, Low
Impossible to articulate risk to executives – the sky is always falling
The SOC ran the IR
#RSAC
Old IR Approach = FAIL
External attention to an incident requires careful handling – missteps
can be impossible to recover from
Not understanding the true impact to the business mission hinders
mitigation efforts
Incident is not just impacting IT – it impacts the business
Loss of business capability = loss of revenue
Reputational damage = loss of customer confidence/trust, brand
damage
Regulatory/Investigation = penalties and other consequences
#RSAC
Why this does NOT work…
Remediation
Reconstitution
Data
Infrastructure
Damage
BusinessLoss
Reputation
#RSAC
Threat and Business Risk Driven Program
Not just SOC
Education/Training/Exercise prior
to incident
Often other types of risk
processes are used if a cyber
incident affects a large amount of
the enterprise/business – Crisis
Teams
Intelligence
Threat
Analysis
Update
Sensoring
DefenseDetection
Reporting
Remediation
Business
Risk
#RSAC
Business Driven Incident Response
IncidentResponse
Investigation
Immediate
Response
Reputational
Defense
Reconstitution
Post Mortem
• Business may take over responding
to the incident
• Collaboration and early education
on the threat is critical
• Risk is more than losing the box
• Risk is more than losing data
• Risk is:
• Loss
• Cost
• Time
• Reputation
#RSAC
Articulating Incident Risk to the Business
Cyber Risk Condition
Severe Severe Risk to the Entity’s mission or function
High High Risk to the Entity’s mission or function
Elevated Elevated Risk to the Entity’s mission or function
Guarded Guarded Risk to the Entity’s mission or function
Low Low Risk to the Entity’s mission or function
#RSAC
The Algorithm
Attack Score * (Detection + Response + Remediation + Recovery + Reputation) = Risk Score
Severe 129 - 200
High 73 - 128
Elevated 33 - 72
Guarded 9 - 32
Low 0 - 8
This is an example – you would tailor this to your organization
#RSAC
Detection Score
Detection
H [3]
>100+ hosts
detected
M [2]
>11-99 hosts
detected
L [1]
>1-10 hosts
detected
#RSAC
Response Score
Response
H [3]
>10% detected
blocked
M [2]
>65% detected
blocked
L [1]
> 90% detected
blocked
#RSAC
Remediation Score
Remediate
H [3]
>10%
remediated
M [2]
>65%
remediated
L [1]
>90%
remediated
#RSAC
Recover Score
Recover
H [3]
10%
recovered
M [2]
65%
recovered
L [1]
90%
recovered
#RSAC
Reputational Score
Reputation
Press
Y[3]
N[0]
WH
Y[3]
N[0]
Hill
Y[3]
N[0]
DHS
Y[3]
N[0]
#RSAC
Scoring the Malware
Attack Attributes Score (0-10)
Prolific spreading (viral) 10
Polymorphic 10
Lateral movement 0
Zero day 0
Entity vulnerability exists 10
Lack of visibility to detect 8
Lack of intelligence 7
Lack of forensic evidence 5
Mission information exfiltration 10 (unknown)
Command and Control of internal machines 10 (unknown)
Spamming Campaign 10
Total 80
Total number of attributes = 11
AttackScore =
Sum(Scores)
Count(Attributes)
80
11
= 7.27
#RSAC
Cyber Risk Score - not just the SOC
Severe
High
Malware Attributes
Vulnerability Exposure
Elevated
Guarded
Low
Threat Intelligence
Reputation Impact: Press, Regulatory
Notification, Law Enforcement
IR Stats: Detection, Response,
Remediation, Recovery
#RSAC
Data and Analytics – the Achilles’ Heel
Massive amount of Data – just sensors – not including remediation/compliance
165,000 end users – 6000 servers
3 core enterprise domains
10 internet gateways – 4 OC-12s, 6 OC-3s
1B+ Log Events daily
Expensive
Analysts
often
repeating
basic analysis
tasks
#RSAC
Pulling the Data Together
#RSAC
Challenges
22
Technical
Fast Analysis
Engine – In
Memory
Agile Data
Model - Simple
Modifications
Mapping Attack
to Vuln to
Control/Policy
Communicate
Reporting -
Technical,
Managerial,
Executive
Metrics -
Technical,
Managerial,
Executive
Logistical
Data Storage
Data Access
Data Sources
Organizational
Budget
Policy – Keeping
up with the
Adversary
Understanding
Impact/Risk to
Business
#RSAC
The Future Wish List
Shared Pattern Libraries – on the meta data level
Vulnerability management based on patterns
not just one for one
One data format
Acceptance and tools to manage other data
storage formats
Shared Analyst pools
Mission participation in Risk Analysis
#RSAC
Apply – What Can I Do?
24
Help the SOC understand the business mission they protect
Get the SOC access to asset data – what business process it
supports, vulnerability state, configuration hygiene state
Review your IR plan – what is the escalation and communication
plan? Who is included? HR? Legal? PR? Business Units?
Work with IR stakeholders to tune the Cyber Risk Score algorithm
to your organization
Use it to track risk in your next incident or IR exercise
#RSAC
Summary
Today’s SOC must be driven by internal and external intelligence to clearly
understand both the threat and the risk
The entire organization MUST understand the threat and participate in
assessing the risk from the business perspective in order to accept the risk
Risk must be derived from Business Risk , IT Risk, as well as Security
Vulnerability
IR is more than understanding the attack – and loss of data – but what it
takes to get back to business or even – JUST SURVIVE
Targeted is scary – but a business that is crippled is just as scary
We have all the data – now how do we look at it…
#RSAC
Q&A
Mischel Kwon
Justin Monti
info@mkacyber.com
+1 (703) 291-1331
2700 Prosperity Ave, Suite 262
Fairfax, VA 22031
USA

More Related Content

PDF
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
PDF
Data Science Transforming Security Operations
PDF
Demystifying Security Analytics: Data, Methods, Use Cases
PDF
The Incident Response Playbook for Android and iOS
PDF
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
Security Program Development for the Hipster Company
PPTX
SOC 3.0: strategic threat intelligence May 2016
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
Data Science Transforming Security Operations
Demystifying Security Analytics: Data, Methods, Use Cases
The Incident Response Playbook for Android and iOS
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Effective Security Operation Center - present by Reza Adineh
Security Program Development for the Hipster Company
SOC 3.0: strategic threat intelligence May 2016

What's hot (20)

PDF
Preserving the Privilege during Breach Response
PDF
Building a Next-Generation Security Operations Center (SOC)
PDF
The Rise of the Purple Team
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PDF
Partnership with a CFO: On the Front Line of Cybersecurity
PDF
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
PDF
Medical Device Threat Modeling with Templates
PPTX
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
PDF
Embracing Threat Intelligence and Finding ROI in Your Decision
PDF
Cylance Information Security: Compromise Assessment Datasheet
PDF
From Cave Man to Business Man, the Evolution of the CISO to CIRO
PDF
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
PDF
Building Security Operation Center
PPTX
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
PDF
When and How to Set up a Security Operations Center
PPTX
SOC Cyber Security
PDF
Building A Security Operations Center
PPTX
Security Operations Center (SOC) Essentials for the SME
PDF
Next generation security analytics
PPTX
7 Steps to Build a SOC with Limited Resources
Preserving the Privilege during Breach Response
Building a Next-Generation Security Operations Center (SOC)
The Rise of the Purple Team
Bridging the Gap Between Threat Intelligence and Risk Management
Partnership with a CFO: On the Front Line of Cybersecurity
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
Medical Device Threat Modeling with Templates
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
Embracing Threat Intelligence and Finding ROI in Your Decision
Cylance Information Security: Compromise Assessment Datasheet
From Cave Man to Business Man, the Evolution of the CISO to CIRO
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
Building Security Operation Center
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
When and How to Set up a Security Operations Center
SOC Cyber Security
Building A Security Operations Center
Security Operations Center (SOC) Essentials for the SME
Next generation security analytics
7 Steps to Build a SOC with Limited Resources
Ad

Similar to Make IR Effective with Risk Evaluation and Reporting (20)

PDF
There’s No Such Thing as a Cyber-Risk
PDF
Implementing An Automated Incident Response Architecture
PDF
Threat intel- -content-curation-organizing-the-path-to-successful-detection
PDF
Intelligence-Led Security: Powering the Future of Cyber Defense
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PDF
Critical hygiene for preventing major breaches
PDF
The Measure of Success: Security Metrics to Tell Your Story
PDF
The Measure of Success: Security Metrics to Tell Your Story
PDF
Top 5 secrets to successfully jumpstarting your cyber-risk program
PDF
Creating Order from Chaos: Metrics That Matter
PDF
No more security empires - The ciso as an individual contributor
PPTX
Ten Tenets of CISO Success
PDF
RSA 2019 - Palo Alto Networks - 99+ Security tools and yet you still got brea...
PDF
Briefing the board lessons learned from cisos and directors
PDF
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
PDF
Applied cognitive security complementing the security analyst
PDF
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
PDF
Sophisticated Attacks vs. Advanced Persistent Security
PPTX
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
PDF
Diagnosis SOC-Atrophy: What To Do When Your SOC Is Sick
There’s No Such Thing as a Cyber-Risk
Implementing An Automated Incident Response Architecture
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Intelligence-Led Security: Powering the Future of Cyber Defense
Bridging the Gap Between Threat Intelligence and Risk Management
Critical hygiene for preventing major breaches
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
Top 5 secrets to successfully jumpstarting your cyber-risk program
Creating Order from Chaos: Metrics That Matter
No more security empires - The ciso as an individual contributor
Ten Tenets of CISO Success
RSA 2019 - Palo Alto Networks - 99+ Security tools and yet you still got brea...
Briefing the board lessons learned from cisos and directors
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Applied cognitive security complementing the security analyst
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
Sophisticated Attacks vs. Advanced Persistent Security
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
Diagnosis SOC-Atrophy: What To Do When Your SOC Is Sick
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Getting Started with Data Integration: FME Form 101
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Empathic Computing: Creating Shared Understanding
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Approach and Philosophy of On baking technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Electronic commerce courselecture one. Pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
Getting Started with Data Integration: FME Form 101
MIND Revenue Release Quarter 2 2025 Press Release
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Empathic Computing: Creating Shared Understanding
“AI and Expert System Decision Support & Business Intelligence Systems”
Approach and Philosophy of On baking technology
MYSQL Presentation for SQL database connectivity
Per capita expenditure prediction using model stacking based on satellite ima...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Network Security Unit 5.pdf for BCA BBA.
Electronic commerce courselecture one. Pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

Make IR Effective with Risk Evaluation and Reporting

  • 1. SESSION ID: #RSAC Justin Monti Make IR Effective with Risk Evaluation and Reporting AIR-R02 Sr. VP Security Engineering MKA Cyber Mischel Kwon President/CEO MKA Cyber @mkacyber
  • 2. #RSAC You’ve Got an Incident – Now What? 2 Monitoring detects new rogue AD accounts Preliminary investigation suggests an intrusion What next? Who runs the incident? Forensic investigation reveals many technical details of the attack but fails to grasp business impact Without clear understanding of risk to company and client data, internal escalation is inadequate before client notification Company is behind the 8-ball as clients aggressively respond to potential breach
  • 3. #RSAC Classic Stove Piped Compliance Driven Security Program Executive Layer Executives HR Finance Legal Business Function P&L R&D IT Infrastructure Desktop/ Laptop Servers Security Architecture Policy/ Compliance Policies Controls Audit Reporting SOC Threat Intelligence Forensics Detection/ Analysis IR Management Reporting
  • 4. #RSAC Classic SOC Practices Indicators based on disk forensics and canned vendor-delivered signatures SEIM Alert Pick a number – address the first 40 incidents because that’s what you can handle Malware focus Find the dirty box and reimage Count up the hits – measure by numbers An occasional hunt and campaign discovery
  • 5. #RSAC This is What it Looks Like:
  • 6. #RSAC Incident Response – The Old Way OMG it’s malware! – Manual Anti-virus Risk is all about the “sexiness” of the malware No distinction by systems impacted – critical business process or the soda machine Business owners not involved – treated as an IT issue only No criteria for severity – impact or technical sophistication – leaves open-ended decisions to analysts Anti-virus vendor, scan vendor – High, Medium, Low Impossible to articulate risk to executives – the sky is always falling The SOC ran the IR
  • 7. #RSAC Old IR Approach = FAIL External attention to an incident requires careful handling – missteps can be impossible to recover from Not understanding the true impact to the business mission hinders mitigation efforts Incident is not just impacting IT – it impacts the business Loss of business capability = loss of revenue Reputational damage = loss of customer confidence/trust, brand damage Regulatory/Investigation = penalties and other consequences
  • 8. #RSAC Why this does NOT work… Remediation Reconstitution Data Infrastructure Damage BusinessLoss Reputation
  • 9. #RSAC Threat and Business Risk Driven Program Not just SOC Education/Training/Exercise prior to incident Often other types of risk processes are used if a cyber incident affects a large amount of the enterprise/business – Crisis Teams Intelligence Threat Analysis Update Sensoring DefenseDetection Reporting Remediation Business Risk
  • 10. #RSAC Business Driven Incident Response IncidentResponse Investigation Immediate Response Reputational Defense Reconstitution Post Mortem • Business may take over responding to the incident • Collaboration and early education on the threat is critical • Risk is more than losing the box • Risk is more than losing data • Risk is: • Loss • Cost • Time • Reputation
  • 11. #RSAC Articulating Incident Risk to the Business Cyber Risk Condition Severe Severe Risk to the Entity’s mission or function High High Risk to the Entity’s mission or function Elevated Elevated Risk to the Entity’s mission or function Guarded Guarded Risk to the Entity’s mission or function Low Low Risk to the Entity’s mission or function
  • 12. #RSAC The Algorithm Attack Score * (Detection + Response + Remediation + Recovery + Reputation) = Risk Score Severe 129 - 200 High 73 - 128 Elevated 33 - 72 Guarded 9 - 32 Low 0 - 8 This is an example – you would tailor this to your organization
  • 13. #RSAC Detection Score Detection H [3] >100+ hosts detected M [2] >11-99 hosts detected L [1] >1-10 hosts detected
  • 14. #RSAC Response Score Response H [3] >10% detected blocked M [2] >65% detected blocked L [1] > 90% detected blocked
  • 15. #RSAC Remediation Score Remediate H [3] >10% remediated M [2] >65% remediated L [1] >90% remediated
  • 16. #RSAC Recover Score Recover H [3] 10% recovered M [2] 65% recovered L [1] 90% recovered
  • 18. #RSAC Scoring the Malware Attack Attributes Score (0-10) Prolific spreading (viral) 10 Polymorphic 10 Lateral movement 0 Zero day 0 Entity vulnerability exists 10 Lack of visibility to detect 8 Lack of intelligence 7 Lack of forensic evidence 5 Mission information exfiltration 10 (unknown) Command and Control of internal machines 10 (unknown) Spamming Campaign 10 Total 80 Total number of attributes = 11 AttackScore = Sum(Scores) Count(Attributes) 80 11 = 7.27
  • 19. #RSAC Cyber Risk Score - not just the SOC Severe High Malware Attributes Vulnerability Exposure Elevated Guarded Low Threat Intelligence Reputation Impact: Press, Regulatory Notification, Law Enforcement IR Stats: Detection, Response, Remediation, Recovery
  • 20. #RSAC Data and Analytics – the Achilles’ Heel Massive amount of Data – just sensors – not including remediation/compliance 165,000 end users – 6000 servers 3 core enterprise domains 10 internet gateways – 4 OC-12s, 6 OC-3s 1B+ Log Events daily Expensive Analysts often repeating basic analysis tasks
  • 22. #RSAC Challenges 22 Technical Fast Analysis Engine – In Memory Agile Data Model - Simple Modifications Mapping Attack to Vuln to Control/Policy Communicate Reporting - Technical, Managerial, Executive Metrics - Technical, Managerial, Executive Logistical Data Storage Data Access Data Sources Organizational Budget Policy – Keeping up with the Adversary Understanding Impact/Risk to Business
  • 23. #RSAC The Future Wish List Shared Pattern Libraries – on the meta data level Vulnerability management based on patterns not just one for one One data format Acceptance and tools to manage other data storage formats Shared Analyst pools Mission participation in Risk Analysis
  • 24. #RSAC Apply – What Can I Do? 24 Help the SOC understand the business mission they protect Get the SOC access to asset data – what business process it supports, vulnerability state, configuration hygiene state Review your IR plan – what is the escalation and communication plan? Who is included? HR? Legal? PR? Business Units? Work with IR stakeholders to tune the Cyber Risk Score algorithm to your organization Use it to track risk in your next incident or IR exercise
  • 25. #RSAC Summary Today’s SOC must be driven by internal and external intelligence to clearly understand both the threat and the risk The entire organization MUST understand the threat and participate in assessing the risk from the business perspective in order to accept the risk Risk must be derived from Business Risk , IT Risk, as well as Security Vulnerability IR is more than understanding the attack – and loss of data – but what it takes to get back to business or even – JUST SURVIVE Targeted is scary – but a business that is crippled is just as scary We have all the data – now how do we look at it…
  • 26. #RSAC Q&A Mischel Kwon Justin Monti info@mkacyber.com +1 (703) 291-1331 2700 Prosperity Ave, Suite 262 Fairfax, VA 22031 USA