SlideShare a Scribd company logo
© 2014 IBM Corporation 
IBM Security 
Security Principles for CEOs 
Fundamentals of a Risk-Aware Organization 
Morten Bjørklund 
Software Client Architect 
IBM Security 
October 24, 2014 
1© 2014 IBM Corporation
The soaring impact of breaches has created a new security reality 
average cost / breach2 
© 2014 IBM Corporation 
IBM Security 
2 
increase in Java 
vulnerabilities1 
Security Principles for CEOs 
3X 
15% 
increase in 
cost of a breach2 $ 
More Risk and Bigger Impact 
500,000,000 
records breached3 
$3.5M 
1) Q3 2014 IBM X-Force Research and Development, increase from 2012 to 2013 
2) 2014 Cost of a Data Breach, Ponemon Institute, global average cost, 15% increase from 2012 to 2013 
3) Q3 2014 IBM X-Force Report
TThheerree’’ss aa ssiillvveerr bbuulllleett ttoo pprrootteecctt yyoouu .( t(hTehreer’es nisont’)t..) 
You need to put your company in lock-down. You don’t.) 
© 2014 IBM Corporation 
IBM Security 
To address security, leaders must avoid common myths 
3 
Your company’s not infected (it is). 
Your company is not infected. (It is.) 
Whatever you’ve done is enough. (It is not.) 
There’s a silver bullet to protect you (there’s not). 
You need to put your company on lock-down (you don’t). 
Security Principles for CEOs
Prepare to respond, 
© 2014 IBM Corporation 
IBM Security 
Use five fundamental security principles to help guide you 
4 
faster 
(incidents will happen) 
Increase the security IQ 
of every employee 
(train, test, trick) 
Leverage 
security intelligence 
(analytics = threat insights) 
Protect your 
crown jewels 
(define, protect, monitor) (the vanishing perimeter) 
Security Principles for CEOs 
Safeguard 
BYOD
Make security education a continuous process – for everyone 
© 2014 IBM Corporation 
IBM Security 
5 
Increase the security IQ of every employee 
Train Test Trick 
Make training a priority from the 
start, then provide annual education 
– keep it fun and engaging 
Your help needed for IBM Cloud opportunity 
Christina Martin to: Daniel Allen Please respond to chris.martyn.ibm.executive 
Hi Daniel Allen, 
Your manager recommended you to contribute to a proposal for an important new client opportunity 
that I am working on. This is a great opportunity for IBM with large commissions likely when we win 
this account. Please review the material posted on CloudFile and provide your feedback by EOD. 
We’re counting on you! 
http://fileinthesky.com/IBMClientOpportunity 
Thanks, 
Security Principles for CEOs 
Require testing for all employees, 
and spell out the consequences 
for non-compliance 
Provide real-life scenarios that 
catch your employees off-guard 
with learning traps – “phish” them 
Nearly 60% of security incidents are caused internally1 
1,2014 Cost of a Data Breach, Ponemon Institute
50% plans are outdated1 
of incident response 
of data breaches took 
months or more to 
discover2 66% 
of security decision-makers 
92% 
say that staffing 
issues contribute to a 
heightened level of risk3 © 2014 IBM Corporation 
IBM Security 
Prepare to respond more quickly and effectively to attacks 
6 
Keep your incident 
response plan updated 
Constantly monitor to 
see if someone has 
breached your defenses 
Have an emergency 
response and forensics 
partner 
Security Principles for CEOs 
Prepare to respond, faster 
12013 IBM CISO Assessment, 2Verizon 2013 Data Breach Investigations Report 
3 Surviving the Technical Security Skills Crisis: a commissioned study conducted by Forrester Consulting on behalf of IBM, May 2013
© 2014 IBM Corporation 
IBM Security 
Get ahead of do-it-yourself BYOD with a formal program 
7 
Safeguard BYOD 
Mobile workers use 
at least one 
business-focused 
app in a year2 
200M 
of employed adults 
use at least one 
personally-owned 
device for business1 
81% 
of users surveyed 
had corporate 
security on their 
personal devices1 
<1% 
Manage the 
device 
Protect the 
data 
Protect the 
apps 
Protect the 
transaction 
* BYOD means ‘bring your own device’ 
Corporate 
container 
Security Principles for CEOs 1) Harris Interactive, 2012; 2) Global Mobile Enterprise 2011-2017 Forecast, Strategy Analytics
Identify your most critical data and protect these vital assets 
of publicly traded corporations’ value1 
is represented by intellectual property 
© 2014 IBM Corporation 
IBM Security 
8 
Protect your crown jewels 
and other enterprise-critical data 
1 
Define Protect Monitor 
your organization’s 
“crown jewels” 
these valuable assets 
at all stages 
12013 Commission on the Theft of American Security Principles for CEOs Intellectual Property 
the access and 
usage of the data
Use analytics and insights for smarter prevention and defense 
© 2014 IBM Corporation 
IBM Security 
9 
Leverage security intelligence 
Security Principles for CEOs 
Prioritized incidents 
Endpoints 
Mobile devices 
Cloud infrastructure 
Data center devices 
Threat intelligence 
Network activity 
Automated 
offense 
identification 
Real-time correlation 
and analytics 
Anomaly detection 
Industry and geo 
trending
Cybersecurity is a business risk that you need to manage actively 
Get involved. Set the tone and develop a governance model. 
© 2014 IBM Corporation 
IBM Security 
10 
Take an active role in policy – even if it’s unpopular. 
Make security an enabler, not an inhibitor. 
Everyone is part of the solution in a risk aware culture, 
and effective security starts at the top 
Security Principles for CEOs 
Engage the senior leadership.
 IBM Fiberlink® Mobile Security Solutions 
© 2014 IBM Corporation 
IBM Security 
We can help you get started 
11 
Increase the security IQ 
of every employee 
How 
 IBM Security Essentials and Maturity 
Consulting 
 IBM Cybersecurity Awareness and Training 
Prepare to respond, 
Safeguard BYOD 
Protect your 
crown jewels 
 IBM Mobile Application Security 
Assessment 
 IBM Critical Data Protection Program 
 IBM InfoSphere Guardium® 
Leverage security 
intelligence 
 IBM QRadar Security Intelligence Platform 
 IBM Managed Security Services 
Security Principles for CEOs 
faster 
 IBM Incident Response Planning 
 IBM Emergency Response Services
© 2014 IBM Corporation 
IBM Security 
One final tip 
12 
Tip: Ask your security team, 
“How many incidents did you handle last week?” 
Hint: if they say zero, consider getting 
a maturity benchmark assessment 
Security Principles for CEOs 
Our research shows that nearly 
every large enterprise deals with at 
least two incidents a week
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and 
response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, 
misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product 
should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use 
or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily 
involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT 
THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE 
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY 
© 2014 IBM Corporation 
IBM Security 
13 
www.ibm.com/security 
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes 
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use 
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any 
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement 
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in 
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole 
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any 
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United 
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

More Related Content

PDF
CS Sakerhetsdagen 2015 IBM Feb 19
PDF
IBM Insight 2015 - Security Sessions Roadmap
PPTX
4 Ways to Build your Immunity to Cyberthreats
PDF
The Economics of IT Risk and Reputation
PDF
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
PDF
An Integrated, Intelligent Approach to Security
PPT
Security solutions for a smarter planet
PDF
Kista watson summit final public version
CS Sakerhetsdagen 2015 IBM Feb 19
IBM Insight 2015 - Security Sessions Roadmap
4 Ways to Build your Immunity to Cyberthreats
The Economics of IT Risk and Reputation
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
An Integrated, Intelligent Approach to Security
Security solutions for a smarter planet
Kista watson summit final public version

What's hot (20)

PDF
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
PPTX
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
PDF
SBIC Enterprise Information Security Strategic Technologies
 
PDF
Security awarenesspreso draft-v-11
PDF
Security and SMBs
PPTX
Issa Charlotte 2009 Patching Your Users
PDF
Rogers eBook Security
PDF
Safeguarding the Enterprise
PPTX
Governance fail security fail
PPTX
IT security
PPTX
Smarter cyber security v8
PDF
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
PDF
Фишинг — проклятие или возможность для ИБ?
PDF
Hybrid Technology
PDF
10 KEYS TO EFFECTIVE NETWORK SECURITY
PDF
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
PPTX
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
PDF
Bring Your Own Device (BYOD)
PPTX
Data Breaches: Is IBM i Really at Risk?
PPT
Enterprise it consumerization survey
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
SBIC Enterprise Information Security Strategic Technologies
 
Security awarenesspreso draft-v-11
Security and SMBs
Issa Charlotte 2009 Patching Your Users
Rogers eBook Security
Safeguarding the Enterprise
Governance fail security fail
IT security
Smarter cyber security v8
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Фишинг — проклятие или возможность для ИБ?
Hybrid Technology
10 KEYS TO EFFECTIVE NETWORK SECURITY
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Bring Your Own Device (BYOD)
Data Breaches: Is IBM i Really at Risk?
Enterprise it consumerization survey
Ad

Similar to Security Principles for CEOs (20)

PPTX
Security in the Cognitive Era: Why it matters more than ever
PDF
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
PDF
10 Security Essentials Every CxO Should Know
PPTX
PCM Vision 2019 Breakout: IBM | Red Hat
 
PDF
Train like you fight
PDF
IBM Security 2017 Lunch and Learn Series
PPTX
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
PDF
Rochester Security Event
PPTX
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
PDF
IBM Security Services Overview
PPT
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
PPTX
Take your SOC Beyond SIEM
PDF
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
PDF
IBM - IAM Security and Trends
PPT
Smart security solutions for SMBs
PDF
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
PPTX
Cognitive Computing in Security with AI
PDF
3 Enablers of Successful Cyber Attacks and How to Thwart Them
PPT
Data security in the cloud
PDF
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Security in the Cognitive Era: Why it matters more than ever
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
10 Security Essentials Every CxO Should Know
PCM Vision 2019 Breakout: IBM | Red Hat
 
Train like you fight
IBM Security 2017 Lunch and Learn Series
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
Rochester Security Event
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
IBM Security Services Overview
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
Take your SOC Beyond SIEM
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
IBM - IAM Security and Trends
Smart security solutions for SMBs
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Cognitive Computing in Security with AI
3 Enablers of Successful Cyber Attacks and How to Thwart Them
Data security in the cloud
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Ad

Recently uploaded (20)

PDF
The Untold Story of Swami Vijay Kumar Durai: Building PRS International
PPTX
Course Overview of the Course Titled.pptx
PDF
The Sustainable Site: Boosting Productivity in Construction – Pipe Dream or P...
PPTX
Strategic Plan 2023-2024 Presentation.pptx
PDF
Case study -Uber strategic plan and management
PDF
Human resources management is a best management
PDF
1_Corporate Goverance presentation topic
PPTX
Empowering Project Management Through Servant Leadership - PMI UK.pptx
PDF
The Plan: Save the Palestinian Nation Now
PDF
Timeless Leadership Principles from History’s Greatest Figures by Alfonso Ken...
PPTX
INTELLECTUAL PROPERTY LAW IN UGANDA.pptx
PPTX
Improved_Leadership_in_Total_Quality_Lesson.pptx
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PPTX
Five S Training Program - Principles of 5S
PDF
The-Power-of-Communication (1).pdf......
PDF
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...
PDF
Maintaining a Quality Culture - Performance Metrics, Best Practices and QMS E...
PDF
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...
PDF
CISSP Domain 5: Identity and Access Management (IAM)
PPTX
Basics of Project Management for development of leadership skills in practice
The Untold Story of Swami Vijay Kumar Durai: Building PRS International
Course Overview of the Course Titled.pptx
The Sustainable Site: Boosting Productivity in Construction – Pipe Dream or P...
Strategic Plan 2023-2024 Presentation.pptx
Case study -Uber strategic plan and management
Human resources management is a best management
1_Corporate Goverance presentation topic
Empowering Project Management Through Servant Leadership - PMI UK.pptx
The Plan: Save the Palestinian Nation Now
Timeless Leadership Principles from History’s Greatest Figures by Alfonso Ken...
INTELLECTUAL PROPERTY LAW IN UGANDA.pptx
Improved_Leadership_in_Total_Quality_Lesson.pptx
_ISO_Presentation_ISO 9001 and 45001.pptx
Five S Training Program - Principles of 5S
The-Power-of-Communication (1).pdf......
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...
Maintaining a Quality Culture - Performance Metrics, Best Practices and QMS E...
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...
CISSP Domain 5: Identity and Access Management (IAM)
Basics of Project Management for development of leadership skills in practice

Security Principles for CEOs

  • 1. © 2014 IBM Corporation IBM Security Security Principles for CEOs Fundamentals of a Risk-Aware Organization Morten Bjørklund Software Client Architect IBM Security October 24, 2014 1© 2014 IBM Corporation
  • 2. The soaring impact of breaches has created a new security reality average cost / breach2 © 2014 IBM Corporation IBM Security 2 increase in Java vulnerabilities1 Security Principles for CEOs 3X 15% increase in cost of a breach2 $ More Risk and Bigger Impact 500,000,000 records breached3 $3.5M 1) Q3 2014 IBM X-Force Research and Development, increase from 2012 to 2013 2) 2014 Cost of a Data Breach, Ponemon Institute, global average cost, 15% increase from 2012 to 2013 3) Q3 2014 IBM X-Force Report
  • 3. TThheerree’’ss aa ssiillvveerr bbuulllleett ttoo pprrootteecctt yyoouu .( t(hTehreer’es nisont’)t..) You need to put your company in lock-down. You don’t.) © 2014 IBM Corporation IBM Security To address security, leaders must avoid common myths 3 Your company’s not infected (it is). Your company is not infected. (It is.) Whatever you’ve done is enough. (It is not.) There’s a silver bullet to protect you (there’s not). You need to put your company on lock-down (you don’t). Security Principles for CEOs
  • 4. Prepare to respond, © 2014 IBM Corporation IBM Security Use five fundamental security principles to help guide you 4 faster (incidents will happen) Increase the security IQ of every employee (train, test, trick) Leverage security intelligence (analytics = threat insights) Protect your crown jewels (define, protect, monitor) (the vanishing perimeter) Security Principles for CEOs Safeguard BYOD
  • 5. Make security education a continuous process – for everyone © 2014 IBM Corporation IBM Security 5 Increase the security IQ of every employee Train Test Trick Make training a priority from the start, then provide annual education – keep it fun and engaging Your help needed for IBM Cloud opportunity Christina Martin to: Daniel Allen Please respond to chris.martyn.ibm.executive Hi Daniel Allen, Your manager recommended you to contribute to a proposal for an important new client opportunity that I am working on. This is a great opportunity for IBM with large commissions likely when we win this account. Please review the material posted on CloudFile and provide your feedback by EOD. We’re counting on you! http://fileinthesky.com/IBMClientOpportunity Thanks, Security Principles for CEOs Require testing for all employees, and spell out the consequences for non-compliance Provide real-life scenarios that catch your employees off-guard with learning traps – “phish” them Nearly 60% of security incidents are caused internally1 1,2014 Cost of a Data Breach, Ponemon Institute
  • 6. 50% plans are outdated1 of incident response of data breaches took months or more to discover2 66% of security decision-makers 92% say that staffing issues contribute to a heightened level of risk3 © 2014 IBM Corporation IBM Security Prepare to respond more quickly and effectively to attacks 6 Keep your incident response plan updated Constantly monitor to see if someone has breached your defenses Have an emergency response and forensics partner Security Principles for CEOs Prepare to respond, faster 12013 IBM CISO Assessment, 2Verizon 2013 Data Breach Investigations Report 3 Surviving the Technical Security Skills Crisis: a commissioned study conducted by Forrester Consulting on behalf of IBM, May 2013
  • 7. © 2014 IBM Corporation IBM Security Get ahead of do-it-yourself BYOD with a formal program 7 Safeguard BYOD Mobile workers use at least one business-focused app in a year2 200M of employed adults use at least one personally-owned device for business1 81% of users surveyed had corporate security on their personal devices1 <1% Manage the device Protect the data Protect the apps Protect the transaction * BYOD means ‘bring your own device’ Corporate container Security Principles for CEOs 1) Harris Interactive, 2012; 2) Global Mobile Enterprise 2011-2017 Forecast, Strategy Analytics
  • 8. Identify your most critical data and protect these vital assets of publicly traded corporations’ value1 is represented by intellectual property © 2014 IBM Corporation IBM Security 8 Protect your crown jewels and other enterprise-critical data 1 Define Protect Monitor your organization’s “crown jewels” these valuable assets at all stages 12013 Commission on the Theft of American Security Principles for CEOs Intellectual Property the access and usage of the data
  • 9. Use analytics and insights for smarter prevention and defense © 2014 IBM Corporation IBM Security 9 Leverage security intelligence Security Principles for CEOs Prioritized incidents Endpoints Mobile devices Cloud infrastructure Data center devices Threat intelligence Network activity Automated offense identification Real-time correlation and analytics Anomaly detection Industry and geo trending
  • 10. Cybersecurity is a business risk that you need to manage actively Get involved. Set the tone and develop a governance model. © 2014 IBM Corporation IBM Security 10 Take an active role in policy – even if it’s unpopular. Make security an enabler, not an inhibitor. Everyone is part of the solution in a risk aware culture, and effective security starts at the top Security Principles for CEOs Engage the senior leadership.
  • 11.  IBM Fiberlink® Mobile Security Solutions © 2014 IBM Corporation IBM Security We can help you get started 11 Increase the security IQ of every employee How  IBM Security Essentials and Maturity Consulting  IBM Cybersecurity Awareness and Training Prepare to respond, Safeguard BYOD Protect your crown jewels  IBM Mobile Application Security Assessment  IBM Critical Data Protection Program  IBM InfoSphere Guardium® Leverage security intelligence  IBM QRadar Security Intelligence Platform  IBM Managed Security Services Security Principles for CEOs faster  IBM Incident Response Planning  IBM Emergency Response Services
  • 12. © 2014 IBM Corporation IBM Security One final tip 12 Tip: Ask your security team, “How many incidents did you handle last week?” Hint: if they say zero, consider getting a maturity benchmark assessment Security Principles for CEOs Our research shows that nearly every large enterprise deals with at least two incidents a week
  • 13. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY © 2014 IBM Corporation IBM Security 13 www.ibm.com/security © Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.