SlideShare a Scribd company logo
Proactive
Information
Security
Asking the Right Questions
Michael Calderin, CISSP-ISSMP, CCISO, CEH
michael@calder.in
http://calder.in
Are you a roadblock to progress?
 Information security must evolve from just an IT
project to the core of critical business decisions.
 As an Information Security Leader:
 You must protect enterprise data from compromise
 AND drive innovation at the same time
Gartner, Inc. (2014). Information Security. Retrieved from Gartner:
http://www.gartner.com/technology/topics/information-security.jsp
Are you supporting
your organization’s
outcomes or inhibiting
them?
What do your peers think?
How do other executives see our jobs?
 To the average senior executive, security seems easy
– lock the doors and post a guard.
 “Use all of that money that has been allocated to IT
and come up with the entirely safe computer.”
 “Stop talking about risks and vulnerabilities and solve
the problem.”
 Information security is complex and simple
solutions are often the best for non-practitioners.
Sherizen, S. (2000). The Business Case for Information Security: Selling
Management on the Protection of Vital Secrets and Products. Retrieved from IT
Today: http://www.ittoday.info/AIMS/DSM/82-01-32.pdf
 Compliance enforcer and advisor
 As our IT environment grows, so do the legalities to be
considered to comply with laws and regulations.
 We assist management in making sure that the
organization is in compliance with the law.
What can we offer?
Sherizen, S. (2000). The Business Case for Information Security: Selling Management on
the Protection of Vital Secrets and Products. Retrieved from IT Today:
http://www.ittoday.info/AIMS/DSM/82-01-32.pdf
 Business enabler and company differentiator
 The internet has changed how organizations offer goods
and services. Information security must provide a value-
added way of providing ease of interaction as well as
security and privacy of customer activities.
 We provide security to differentiate our organization
by including security for free alongside the goods and
services offered by our organization. This can boost
customer satisfaction and encourage further use of
online activities.
 Total quality management contributor
 Quality is directly related to information security. CIA
allows an organization to offer customer service that is
protected, personal, and convenient.
 We combine proper controls over processes, machines,
and personnel, balancing our organization’s needs for
production and protection. Our information security
programs boost online transactions by helping
customers see them as safe and reliable.
 “Peopleware” controller
 Information security helps control the unauthorized
behavior of people through need-to-know and
segregation-of-duties policies.
 We translate managerial decisions into information
security policies, programs, and practices. We
structure authorized usage and detect unauthorized
usage.
How can we quickly
and strategically
become more
proactive?
The answer is not a technology, product, or vendor
Integrate
security into
processes
Create a
culture of
security
Address issues
before they
become
threats
Proactive Process
P R E V E N T I O N
D E T E C T I O N & R E M E D I A T I O N
My Situation
 Mid-sized business unit
 Less than 1000 people
 Multiple countries with varied regulatory requirements
 Relatively consolidated IT team
 Enormous change throughout our organization
 Security had a reputation for being disruptive and
a bottleneck
 New staff carry over their expectations from prior roles
 Proactive security is a recent way of thought
The Tool: A Questionnaire
 Organizations may conduct an information security review before
changing their systems
 Often informal and poorly documented
 Reviews are rarely built into a change process
 Still appropriate for today's business and regulatory environment?
 Develop a standard questionnaire to be completed as part of the
change process
 Complete the questionnaire as early in the process as possible
 Responsibility for the change
 Technical security impacts
 Physical security considerations
 Logical security requirements
 Disaster recovery and business continuity
Overly, M. R., Howell, C. T., & Scarano, R. M. (2012, February 1). A Proactive
Approach to Information Security in Health Information Technology Procurements.
(Foley & Lardner LLP) Retrieved from Association of Corporate Counsel:
http://www.acc.com/legalresources/quickcounsel/apatisihit.cfm
Questionnaire
Availability
Integrity
Confidentiality
Privacy & Security Impact Assessment
 Decision-making tool used to identify and mitigate risks associated
with new or changing systems
 Helps us understand how sensitive data is to be collected, used, shared,
accessed, and stored
 Required
 Before sending business requirements for development
 Before operationalizing new systems
 As part of the change process
 Completed by those who best understand the change
 Reviewed by those who best understand privacy & security
implications
 Approved PSIAs available for review within the organization
United States Department of Homeland Security. (2014, January 30). Privacy
Compliance. Retrieved from Homeland Security: http://www.dhs.gov/privacy-
compliance
I didn’t invent this.
 Recommended by
leading information
security organizations
 ISACA
 SANS
 United Kingdom
 National Health Service
 United States
 Securities and Exchange
Commission
 United States
Department of Defense
 United States
Department of Health
and Human Services
My Approach
Easy to understand
Completed in minutes
Addresses
confidentiality, integrity,
and availability
Captures only basic info
Qualitative assessment;
not a quantitative risk
analysis
Advantages Disadvantages
Requires short training and expert review
1 Page, 2 Sections, 10 Questions
1. How sensitive is the information (how is it classified)?
2. What Personally Identifiable Information is used?
3. Which types of Protected Health Information are used?
4. Which critical systems are affected?
5. How will the information be used (a summary of the
requirements)?
6. Are any third parties involved? If so, which ones?
7. If database changes are needed, what kinds?
8. Where is the production equipment physically located?
9. What is the business continuity impact?
10. What access rights will be needed and for whom?
Review
 Weekly review w/ interested parties
 If we have questions, we reach out to the person
who completed the PSIA and/or the project sponsor
 Formal signoff on approval
 Otherwise, new requirements or controls communicated
Results
 Integrate security into processes
 Security is now considered when business requirements are
documented
 Build a culture of security
 Over time, security requirements are thought of by other staff
throughout the organization
 Address issues before they become threats
 Reviewing and discussing issues before work begins helps to
control costs, deliver on time, and position security as a friend to
the organization
 Provide assurance to your executive team
 Addressing issues before they become threats allows us to focus
on reacting to external threats
Questions?
 michael@calder.in
http://calder.in

More Related Content

PDF
Building an effective Information Security Roadmap
PDF
Cisa 2013 ch3
PPT
Presentation to Irish ISSA Conference 12-May-11
PDF
Information Security Benchmarking 2015
PDF
Cisa 2013 ch0
PDF
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
PDF
Business case for information security program
PPTX
Information Security Governance and Strategy
Building an effective Information Security Roadmap
Cisa 2013 ch3
Presentation to Irish ISSA Conference 12-May-11
Information Security Benchmarking 2015
Cisa 2013 ch0
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Business case for information security program
Information Security Governance and Strategy

What's hot (20)

DOCX
Information Systems Security & Strategy
PPT
PCI DSS Compliance and Security: Harmony or Discord?
PPTX
Information Security Project
PDF
Cybersecurity Consulting Services flyer
PDF
Cybersecurity Challenges in Healthcare
PDF
Data-Centric Security for the Extended Enterprise
PDF
The Art of Cloud Auditing - ISACA ID
PDF
The state of data privacy with dimensional research
PDF
How to measure your cybersecurity performance
PPTX
Cybertopic_1security
PDF
Enterprise Information Security Architecture_Paper_1206
PDF
Detroit ISSA Healthcare Cybersecurity
PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
PPTX
Trends in Information Security
PPTX
Protecting the Crown Jewels – Enlist the Beefeaters
PPTX
MCGlobalTech Service Presentation
PDF
Integrating-Cyber-Security-for-Increased-Effectiveness
ODP
Active Network Monitoring brings Peace of Mind
PDF
Tcs cybersecurity for healthcare
PPT
IT Security Strategy
Information Systems Security & Strategy
PCI DSS Compliance and Security: Harmony or Discord?
Information Security Project
Cybersecurity Consulting Services flyer
Cybersecurity Challenges in Healthcare
Data-Centric Security for the Extended Enterprise
The Art of Cloud Auditing - ISACA ID
The state of data privacy with dimensional research
How to measure your cybersecurity performance
Cybertopic_1security
Enterprise Information Security Architecture_Paper_1206
Detroit ISSA Healthcare Cybersecurity
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Trends in Information Security
Protecting the Crown Jewels – Enlist the Beefeaters
MCGlobalTech Service Presentation
Integrating-Cyber-Security-for-Increased-Effectiveness
Active Network Monitoring brings Peace of Mind
Tcs cybersecurity for healthcare
IT Security Strategy
Ad

Similar to Proactive information security michael (20)

PDF
Cybersecurity risk assessments help organizations identify.pdf
PPT
2009 iapp-the corpprivacydeptmar13-2009
PDF
Equilibrium Security Methodology 030414 Final v2
PDF
Cyber-Security-Whitepaper.pdf
PDF
Cyber-Security-Whitepaper.pdf
PDF
Protecting the Core of Your Network
PPTX
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
PPTX
ISMS End-User Training Presentation.pptx
PDF
State of Security McAfee Study
PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
PDF
Mitigating Data Breach Risks: How a Data Privacy and Security Advisor Can Help
DOCX
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
PPTX
Introduction to Network Security
PDF
Information Security
DOC
Challenges in implementing effective data security practices
PPT
20th March Session Five by Ramesh Shanmughanathan
PDF
A to Z of Information Security Management
PDF
ICISS Newsletter Sept 14
PDF
NQA - Information security best practice guide
PPTX
Optimizing Security Operations: 5 Keys to Success
Cybersecurity risk assessments help organizations identify.pdf
2009 iapp-the corpprivacydeptmar13-2009
Equilibrium Security Methodology 030414 Final v2
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Protecting the Core of Your Network
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
ISMS End-User Training Presentation.pptx
State of Security McAfee Study
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
Mitigating Data Breach Risks: How a Data Privacy and Security Advisor Can Help
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
Introduction to Network Security
Information Security
Challenges in implementing effective data security practices
20th March Session Five by Ramesh Shanmughanathan
A to Z of Information Security Management
ICISS Newsletter Sept 14
NQA - Information security best practice guide
Optimizing Security Operations: 5 Keys to Success
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Machine learning based COVID-19 study performance prediction
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Cloud computing and distributed systems.
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Machine learning based COVID-19 study performance prediction
MYSQL Presentation for SQL database connectivity
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Cloud computing and distributed systems.
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Reach Out and Touch Someone: Haptics and Empathic Computing
Programs and apps: productivity, graphics, security and other tools
Digital-Transformation-Roadmap-for-Companies.pptx
The AUB Centre for AI in Media Proposal.docx
Review of recent advances in non-invasive hemoglobin estimation

Proactive information security michael

  • 1. Proactive Information Security Asking the Right Questions Michael Calderin, CISSP-ISSMP, CCISO, CEH michael@calder.in http://calder.in
  • 2. Are you a roadblock to progress?  Information security must evolve from just an IT project to the core of critical business decisions.  As an Information Security Leader:  You must protect enterprise data from compromise  AND drive innovation at the same time Gartner, Inc. (2014). Information Security. Retrieved from Gartner: http://www.gartner.com/technology/topics/information-security.jsp
  • 3. Are you supporting your organization’s outcomes or inhibiting them? What do your peers think?
  • 4. How do other executives see our jobs?  To the average senior executive, security seems easy – lock the doors and post a guard.  “Use all of that money that has been allocated to IT and come up with the entirely safe computer.”  “Stop talking about risks and vulnerabilities and solve the problem.”  Information security is complex and simple solutions are often the best for non-practitioners. Sherizen, S. (2000). The Business Case for Information Security: Selling Management on the Protection of Vital Secrets and Products. Retrieved from IT Today: http://www.ittoday.info/AIMS/DSM/82-01-32.pdf
  • 5.  Compliance enforcer and advisor  As our IT environment grows, so do the legalities to be considered to comply with laws and regulations.  We assist management in making sure that the organization is in compliance with the law. What can we offer? Sherizen, S. (2000). The Business Case for Information Security: Selling Management on the Protection of Vital Secrets and Products. Retrieved from IT Today: http://www.ittoday.info/AIMS/DSM/82-01-32.pdf  Business enabler and company differentiator  The internet has changed how organizations offer goods and services. Information security must provide a value- added way of providing ease of interaction as well as security and privacy of customer activities.  We provide security to differentiate our organization by including security for free alongside the goods and services offered by our organization. This can boost customer satisfaction and encourage further use of online activities.  Total quality management contributor  Quality is directly related to information security. CIA allows an organization to offer customer service that is protected, personal, and convenient.  We combine proper controls over processes, machines, and personnel, balancing our organization’s needs for production and protection. Our information security programs boost online transactions by helping customers see them as safe and reliable.  “Peopleware” controller  Information security helps control the unauthorized behavior of people through need-to-know and segregation-of-duties policies.  We translate managerial decisions into information security policies, programs, and practices. We structure authorized usage and detect unauthorized usage.
  • 6. How can we quickly and strategically become more proactive? The answer is not a technology, product, or vendor
  • 7. Integrate security into processes Create a culture of security Address issues before they become threats Proactive Process P R E V E N T I O N D E T E C T I O N & R E M E D I A T I O N
  • 8. My Situation  Mid-sized business unit  Less than 1000 people  Multiple countries with varied regulatory requirements  Relatively consolidated IT team  Enormous change throughout our organization  Security had a reputation for being disruptive and a bottleneck  New staff carry over their expectations from prior roles  Proactive security is a recent way of thought
  • 9. The Tool: A Questionnaire  Organizations may conduct an information security review before changing their systems  Often informal and poorly documented  Reviews are rarely built into a change process  Still appropriate for today's business and regulatory environment?  Develop a standard questionnaire to be completed as part of the change process  Complete the questionnaire as early in the process as possible  Responsibility for the change  Technical security impacts  Physical security considerations  Logical security requirements  Disaster recovery and business continuity Overly, M. R., Howell, C. T., & Scarano, R. M. (2012, February 1). A Proactive Approach to Information Security in Health Information Technology Procurements. (Foley & Lardner LLP) Retrieved from Association of Corporate Counsel: http://www.acc.com/legalresources/quickcounsel/apatisihit.cfm Questionnaire Availability Integrity Confidentiality
  • 10. Privacy & Security Impact Assessment  Decision-making tool used to identify and mitigate risks associated with new or changing systems  Helps us understand how sensitive data is to be collected, used, shared, accessed, and stored  Required  Before sending business requirements for development  Before operationalizing new systems  As part of the change process  Completed by those who best understand the change  Reviewed by those who best understand privacy & security implications  Approved PSIAs available for review within the organization United States Department of Homeland Security. (2014, January 30). Privacy Compliance. Retrieved from Homeland Security: http://www.dhs.gov/privacy- compliance
  • 11. I didn’t invent this.  Recommended by leading information security organizations  ISACA  SANS  United Kingdom  National Health Service  United States  Securities and Exchange Commission  United States Department of Defense  United States Department of Health and Human Services
  • 12. My Approach Easy to understand Completed in minutes Addresses confidentiality, integrity, and availability Captures only basic info Qualitative assessment; not a quantitative risk analysis Advantages Disadvantages Requires short training and expert review
  • 13. 1 Page, 2 Sections, 10 Questions 1. How sensitive is the information (how is it classified)? 2. What Personally Identifiable Information is used? 3. Which types of Protected Health Information are used? 4. Which critical systems are affected? 5. How will the information be used (a summary of the requirements)? 6. Are any third parties involved? If so, which ones? 7. If database changes are needed, what kinds? 8. Where is the production equipment physically located? 9. What is the business continuity impact? 10. What access rights will be needed and for whom?
  • 14. Review  Weekly review w/ interested parties  If we have questions, we reach out to the person who completed the PSIA and/or the project sponsor  Formal signoff on approval  Otherwise, new requirements or controls communicated
  • 15. Results  Integrate security into processes  Security is now considered when business requirements are documented  Build a culture of security  Over time, security requirements are thought of by other staff throughout the organization  Address issues before they become threats  Reviewing and discussing issues before work begins helps to control costs, deliver on time, and position security as a friend to the organization  Provide assurance to your executive team  Addressing issues before they become threats allows us to focus on reacting to external threats