SlideShare a Scribd company logo
FS15 Title Slide (WIP)
• Shaun Gordon, CSIO, New Relic
©2008-15 New Relic, Inc. All rights reserved.  
Safe Harbor
This document and the information herein (including any information that may be incorporated by reference) is provided for informational purposes only and should
not be construed as an offer, commitment, promise or obligation on behalf of New Relic, Inc. (“New Relic”) to sell securities or deliver any product, material, code,
functionality, or other feature. Any information provided hereby is proprietary to New Relic and may not be replicated or disclosed without New Relic’s express
written permission.

Such information may contain forward-looking statements within the meaning of federal securities laws. Any statement that is not a historical fact or refers to
expectations, projections, future plans, objectives, estimates, goals, or other characterizations of future events is a forward-looking statement. These forward-
looking statements can often be identified as such because the context of the statement will include words such as “believes,” “anticipates,” “expects” or words of
similar import.

Actual results may differ materially from those expressed in these forward-looking statements, which speak only as of the date hereof, and are subject to change at
any time without notice. Existing and prospective investors, customers and other third parties transacting business with New Relic are cautioned not to place undue
reliance on this forward-looking information. The achievement or success of the matters covered by such forward-looking statements are based on New Relic’s
current assumptions, expectations, and beliefs and are subject to substantial risks, uncertainties, assumptions, and changes in circumstances that may cause the
actual results, performance, or achievements to differ materially from those expressed or implied in any forward-looking statement. Further information on factors
that could affect such forward-looking statements is included in the filings we make with the SEC from time to time. Copies of these documents may be obtained
by visiting New Relic’s Investor Relations website at ir.newrelic.com or the SEC’s website at www.sec.gov. 

New Relic assumes no obligation and does not intend to update these forward-looking statements, except as required by law. New Relic makes no warranties,
expressed or implied, in this document or otherwise, with respect to the information provided.
EffectiveSaaS Security
Checklist
Not a
Not a
Shopping List
It’s about
Maturity
The Team
Processes
Policies
Compliance
Monitoring
Transparency
Mindset
Maturityis
The Team
Describe your security organization, including
the title of person who leads it, the size, and
the number of people 100% dedicated to it? 

How do you handle security incidents?
Describe your response to any recent security
event.
Questions about
The Team
Processes
How is the security team involved in reviewing
the software development process?

How do you ensure or validate the security of
the code that is pushed to your production
systems? 

How are the employees or 3rd parties
authenticated?

How do you ensure employees are
deprovisioned when they leave the company,
and appropriately reprovisioned when they
change roles?
Questions about
Processes
Policies
Do you have documented security policies? Please
provide copies, if available. 

Do you classify data based on sensitivity? If so, how?

What are your data sharing and retention policies and
practices?

Do you allow your employees to remove customer
data from the production environment? If so, under
what circumstances?

Which of your employees have access to customer
data and why?

Which third-parties will have access to that data, and
how do you ensure that they will protect it?
Questions about
Policies
SaaS Security Programs: Build What You Seek
Do you have a good understanding of the
regulations and/or industry standards that are
largely applicable to you? Please list them, as
well as your current evaluation of your
compliance status (yes, no, partially) with
each one.

Are there any major security exceptions and
gaps that you are aware of impacting your
compliance obligations? If so, what is your
roadmap for addressing them?
Questions about
Compliance
Monitoring
How do you know if there are new
vulnerabilities in your network, servers,
and applications?

How would you know if your network,
servers, and/or applications are breached
or compromised?

How do you monitor, log, and/or audit all
access to your network and/or customer
data?
Questions about
Monitoring
SaaS Security Programs: Build What You Seek
Do you perform external assessments,
and at what frequency? Please provide
latest reports, if available..
Questions about
Transparency
Mindset
AwarenessCompliance
and Security
SaaS Security Programs: Build What You Seek
Consists of
Our Company
People
We play the
Long
Game
We manage our
Capital
How are information security responsibilities
communicated to employees who work with
customer data? How frequently? 

Questions about
Mindset
Measure?
How do we
UNCONSCIOUS INCOMPETENCE UNCONSCIOUS COMPETENCE
CONSCIOUS INCOMPETENCE CONSCIOUS COMPETENCE
Learning Matrix
UNCONSCIOUS INCOMPETENCE UNCONSCIOUS COMPETENCE
CONSCIOUS INCOMPETENCE CONSCIOUS COMPETENCE
No Security Program or Team
Handwaving
No Policies or Processes
Poor Access Control
No Compliance Awareness
Security back-of-mind
Large Security Team
Formal Security Reviews
Audited Policies & Processes
Compliance Evidence
Companywide Mindset
Designated not Dedicated Sec Team
Understanding Concerns
Ad-Hoc Policies & Processes
Aware of Compliance Requirements
Checklist Security
Dedicated Security Team
Documented Policies &
Processes
No Compliance Auditing
Security Monitoring
Pragmatic Security
Security Maturity Matrix
UNCONSCIOUS INCOMPETENCE UNCONSCIOUS COMPETENCE
CONSCIOUS INCOMPETENCE CONSCIOUS COMPETENCE
OK for PUBLIC data
(but even then, we probably
wouldn’t recommend)
OK for any RESTRICTED
data
(e.g. CCs, SSNs)
OK for INTERNAL data
(e.g.Workplace plans)
OK for CONFIDENTIAL data
(e.g. customer data, PII, finance
data)
Allowable USe
UNCONSCIOUS INCOMPETENCE UNCONSCIOUS COMPETENCE
CONSCIOUS INCOMPETENCE CONSCIOUS COMPETENCE
No Security Program or Team
Handwaving
No Policies or Processes
Poor Access Control
No Compliance Awareness
Security back-of-mind
Large Security Team
Formal Security Reviews
Audited Policies & Processes
Compliance Evidence
Companywide Mindset
Designated not Dedicated Sec Team
Understanding Concerns
Ad-Hoc Policies & Processes
Aware of Compliance Requirements
Checklist Security
Dedicated Security Team
Documented Policies &
Processes
No Compliance Auditing
Security Monitoring
Pragmatic Security
Security Maturity Matrix
FS15 Thank You Slide (WIP)
• Shaun Gordon, CSIO, New Relic

More Related Content

PDF
Neuro chain the future of blockchain
PPTX
IT Security Metrics
PDF
10-things-you-ought-to-know-before-you-benchmark(1)
PPTX
Information+security rutgers(final)
PPTX
Track Welcome: New Relic 101 [FutureStack16]
PDF
SaaS Platform Securing
PPTX
Application Monitoring in a Post-Server World: Why Data Context is Critical
PPTX
Do DevOps Right with New Relic
Neuro chain the future of blockchain
IT Security Metrics
10-things-you-ought-to-know-before-you-benchmark(1)
Information+security rutgers(final)
Track Welcome: New Relic 101 [FutureStack16]
SaaS Platform Securing
Application Monitoring in a Post-Server World: Why Data Context is Critical
Do DevOps Right with New Relic

Similar to SaaS Security Programs: Build What You Seek (20)

PDF
Investor Deck - Q2 2015
PPTX
Information Security for Business Leaders - Eric Vanderburg - JurInnov
PPTX
FutureStack'19 Closing Keynote
PDF
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
PPTX
Top Cybersecurity Challenges Facing Your Business
PPTX
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
PDF
5 Proven Success Strategies for your Software Security Program - LASCON 2013
PDF
Security of the future - Adapting Approaches to What We Need
ODP
CISSP Week 12
PPTX
Mork - CISO Summit USA 2016 - Security in an Outsourced World
PPSX
Meraj Ahmad - Information security in a borderless world
PDF
The Permanent Campaign
PPTX
Selling security to the C-level
PDF
FS18 Chicago Keynote
PDF
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
PDF
Demonstrating Information Security Program Effectiveness
PDF
Streamline Compliance and Increase ROI White Paper
PDF
Mzumla_Dome_2015
PDF
Microsoft power point closing presentation-greenberg
PPTX
A guide to Sustainable Cyber Security
Investor Deck - Q2 2015
Information Security for Business Leaders - Eric Vanderburg - JurInnov
FutureStack'19 Closing Keynote
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
Top Cybersecurity Challenges Facing Your Business
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
5 Proven Success Strategies for your Software Security Program - LASCON 2013
Security of the future - Adapting Approaches to What We Need
CISSP Week 12
Mork - CISO Summit USA 2016 - Security in an Outsourced World
Meraj Ahmad - Information security in a borderless world
The Permanent Campaign
Selling security to the C-level
FS18 Chicago Keynote
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Demonstrating Information Security Program Effectiveness
Streamline Compliance and Increase ROI White Paper
Mzumla_Dome_2015
Microsoft power point closing presentation-greenberg
A guide to Sustainable Cyber Security
Ad

More from New Relic (20)

PPTX
7 Tips & Tricks to Having Happy Customers at Scale
PPTX
7 Tips & Tricks to Having Happy Customers at Scale
PDF
New Relic University at Future Stack Tokyo 2019
PDF
FutureStack Tokyo 19 -[事例講演]株式会社リクルートライフスタイル:年間9300万件以上のサロン予約を支えるホットペッパービューティ...
PDF
FutureStack Tokyo 19 -[New Relic テクニカル講演]モニタリングと可視化がデジタルトランスフォーメーションを救う! - サ...
PDF
FutureStack Tokyo 19 -[特別講演]システム開発によろこびと驚きの連鎖を
PDF
FutureStack Tokyo 19 -[パートナー講演]アマゾン ウェブ サービス ジャパン株式会社: New Relicを活用したAWSへのアプリ...
PDF
FutureStack Tokyo 19_インサイトとデータを組織の力にする_株式会社ドワンゴ 池田 明啓 氏
PPTX
Three Monitoring Mistakes and How to Avoid Them
PPTX
Intro to Multidimensional Kubernetes Monitoring
PDF
SRE-iously
PDF
10 Things You Can Do With New Relic - Number 9 Will Shock You
PDF
Ground Rules for Code Reviews
PPTX
Understanding Microservice Latency for DevOps Teams: An Introduction to New R...
PPTX
Monitor all your Kubernetes and EKS stack with New Relic
PPTX
Host for the Most: Cloud Cost Optimization
PPTX
New Relic Infrastructure in the Real World: AWS
PPTX
Best Practices for Measuring your Code Pipeline
PPTX
Top Three Mistakes People Make with Monitoring
PPTX
Kubernetes in the Wild: Best Practices for Monitoring
7 Tips & Tricks to Having Happy Customers at Scale
7 Tips & Tricks to Having Happy Customers at Scale
New Relic University at Future Stack Tokyo 2019
FutureStack Tokyo 19 -[事例講演]株式会社リクルートライフスタイル:年間9300万件以上のサロン予約を支えるホットペッパービューティ...
FutureStack Tokyo 19 -[New Relic テクニカル講演]モニタリングと可視化がデジタルトランスフォーメーションを救う! - サ...
FutureStack Tokyo 19 -[特別講演]システム開発によろこびと驚きの連鎖を
FutureStack Tokyo 19 -[パートナー講演]アマゾン ウェブ サービス ジャパン株式会社: New Relicを活用したAWSへのアプリ...
FutureStack Tokyo 19_インサイトとデータを組織の力にする_株式会社ドワンゴ 池田 明啓 氏
Three Monitoring Mistakes and How to Avoid Them
Intro to Multidimensional Kubernetes Monitoring
SRE-iously
10 Things You Can Do With New Relic - Number 9 Will Shock You
Ground Rules for Code Reviews
Understanding Microservice Latency for DevOps Teams: An Introduction to New R...
Monitor all your Kubernetes and EKS stack with New Relic
Host for the Most: Cloud Cost Optimization
New Relic Infrastructure in the Real World: AWS
Best Practices for Measuring your Code Pipeline
Top Three Mistakes People Make with Monitoring
Kubernetes in the Wild: Best Practices for Monitoring
Ad

Recently uploaded (20)

PDF
Introduction to the R Programming Language
PDF
How to run a consulting project- client discovery
PPT
Predictive modeling basics in data cleaning process
PPTX
Modelling in Business Intelligence , information system
PPTX
Leprosy and NLEP programme community medicine
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PDF
Optimise Shopper Experiences with a Strong Data Estate.pdf
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PPT
DATA COLLECTION METHODS-ppt for nursing research
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Database Infoormation System (DBIS).pptx
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PPTX
modul_python (1).pptx for professional and student
PDF
Introduction to Data Science and Data Analysis
PDF
Business Analytics and business intelligence.pdf
PDF
[EN] Industrial Machine Downtime Prediction
PPTX
importance of Data-Visualization-in-Data-Science. for mba studnts
Introduction to the R Programming Language
How to run a consulting project- client discovery
Predictive modeling basics in data cleaning process
Modelling in Business Intelligence , information system
Leprosy and NLEP programme community medicine
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Optimise Shopper Experiences with a Strong Data Estate.pdf
Introduction-to-Cloud-ComputingFinal.pptx
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
DATA COLLECTION METHODS-ppt for nursing research
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
IBA_Chapter_11_Slides_Final_Accessible.pptx
climate analysis of Dhaka ,Banglades.pptx
Database Infoormation System (DBIS).pptx
Qualitative Qantitative and Mixed Methods.pptx
modul_python (1).pptx for professional and student
Introduction to Data Science and Data Analysis
Business Analytics and business intelligence.pdf
[EN] Industrial Machine Downtime Prediction
importance of Data-Visualization-in-Data-Science. for mba studnts

SaaS Security Programs: Build What You Seek

  • 1. FS15 Title Slide (WIP) • Shaun Gordon, CSIO, New Relic
  • 2. ©2008-15 New Relic, Inc. All rights reserved.   Safe Harbor This document and the information herein (including any information that may be incorporated by reference) is provided for informational purposes only and should not be construed as an offer, commitment, promise or obligation on behalf of New Relic, Inc. (“New Relic”) to sell securities or deliver any product, material, code, functionality, or other feature. Any information provided hereby is proprietary to New Relic and may not be replicated or disclosed without New Relic’s express written permission. Such information may contain forward-looking statements within the meaning of federal securities laws. Any statement that is not a historical fact or refers to expectations, projections, future plans, objectives, estimates, goals, or other characterizations of future events is a forward-looking statement. These forward- looking statements can often be identified as such because the context of the statement will include words such as “believes,” “anticipates,” “expects” or words of similar import. Actual results may differ materially from those expressed in these forward-looking statements, which speak only as of the date hereof, and are subject to change at any time without notice. Existing and prospective investors, customers and other third parties transacting business with New Relic are cautioned not to place undue reliance on this forward-looking information. The achievement or success of the matters covered by such forward-looking statements are based on New Relic’s current assumptions, expectations, and beliefs and are subject to substantial risks, uncertainties, assumptions, and changes in circumstances that may cause the actual results, performance, or achievements to differ materially from those expressed or implied in any forward-looking statement. Further information on factors that could affect such forward-looking statements is included in the filings we make with the SEC from time to time. Copies of these documents may be obtained by visiting New Relic’s Investor Relations website at ir.newrelic.com or the SEC’s website at www.sec.gov. New Relic assumes no obligation and does not intend to update these forward-looking statements, except as required by law. New Relic makes no warranties, expressed or implied, in this document or otherwise, with respect to the information provided.
  • 9. Describe your security organization, including the title of person who leads it, the size, and the number of people 100% dedicated to it? How do you handle security incidents? Describe your response to any recent security event. Questions about The Team
  • 11. How is the security team involved in reviewing the software development process? How do you ensure or validate the security of the code that is pushed to your production systems? How are the employees or 3rd parties authenticated? How do you ensure employees are deprovisioned when they leave the company, and appropriately reprovisioned when they change roles? Questions about Processes
  • 13. Do you have documented security policies? Please provide copies, if available. Do you classify data based on sensitivity? If so, how? What are your data sharing and retention policies and practices? Do you allow your employees to remove customer data from the production environment? If so, under what circumstances? Which of your employees have access to customer data and why? Which third-parties will have access to that data, and how do you ensure that they will protect it? Questions about Policies
  • 15. Do you have a good understanding of the regulations and/or industry standards that are largely applicable to you? Please list them, as well as your current evaluation of your compliance status (yes, no, partially) with each one. Are there any major security exceptions and gaps that you are aware of impacting your compliance obligations? If so, what is your roadmap for addressing them? Questions about Compliance
  • 17. How do you know if there are new vulnerabilities in your network, servers, and applications? How would you know if your network, servers, and/or applications are breached or compromised? How do you monitor, log, and/or audit all access to your network and/or customer data? Questions about Monitoring
  • 19. Do you perform external assessments, and at what frequency? Please provide latest reports, if available.. Questions about Transparency
  • 26. How are information security responsibilities communicated to employees who work with customer data? How frequently? Questions about Mindset
  • 28. UNCONSCIOUS INCOMPETENCE UNCONSCIOUS COMPETENCE CONSCIOUS INCOMPETENCE CONSCIOUS COMPETENCE Learning Matrix
  • 29. UNCONSCIOUS INCOMPETENCE UNCONSCIOUS COMPETENCE CONSCIOUS INCOMPETENCE CONSCIOUS COMPETENCE No Security Program or Team Handwaving No Policies or Processes Poor Access Control No Compliance Awareness Security back-of-mind Large Security Team Formal Security Reviews Audited Policies & Processes Compliance Evidence Companywide Mindset Designated not Dedicated Sec Team Understanding Concerns Ad-Hoc Policies & Processes Aware of Compliance Requirements Checklist Security Dedicated Security Team Documented Policies & Processes No Compliance Auditing Security Monitoring Pragmatic Security Security Maturity Matrix
  • 30. UNCONSCIOUS INCOMPETENCE UNCONSCIOUS COMPETENCE CONSCIOUS INCOMPETENCE CONSCIOUS COMPETENCE OK for PUBLIC data (but even then, we probably wouldn’t recommend) OK for any RESTRICTED data (e.g. CCs, SSNs) OK for INTERNAL data (e.g.Workplace plans) OK for CONFIDENTIAL data (e.g. customer data, PII, finance data) Allowable USe
  • 31. UNCONSCIOUS INCOMPETENCE UNCONSCIOUS COMPETENCE CONSCIOUS INCOMPETENCE CONSCIOUS COMPETENCE No Security Program or Team Handwaving No Policies or Processes Poor Access Control No Compliance Awareness Security back-of-mind Large Security Team Formal Security Reviews Audited Policies & Processes Compliance Evidence Companywide Mindset Designated not Dedicated Sec Team Understanding Concerns Ad-Hoc Policies & Processes Aware of Compliance Requirements Checklist Security Dedicated Security Team Documented Policies & Processes No Compliance Auditing Security Monitoring Pragmatic Security Security Maturity Matrix
  • 32. FS15 Thank You Slide (WIP) • Shaun Gordon, CSIO, New Relic