Security Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security

Similar documents
The CIS Security Metrics & Benchmarking Service. Clint Kreitner The Center for Internet Security

The Center for Internet Security

The Center for Internet Security

INTELLIGENCE DRIVEN GRC FOR SECURITY

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Cyber Partnership Blueprint: An Outline

Turning Risk into Advantage

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

The University of Queensland

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

The Business Value of Metadata for Data Governance: The Challenge of Integrating Packaged Applications

Measuring Cybersecurity Readiness: The Cybersecurity Maturity Model

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

John Snare Chair Standards Australia Committee IT/12/4

Accelerate Your Enterprise Private Cloud Initiative

Information Security Continuous Monitoring (ISCM) Program Evaluation

Defining the Challenges and Solutions. Resiliency Model. A Holistic Approach to Risk Management. Discussion Outline

Project Management Professional (PMP ) Certification

The U.S. Manufacturing Extension Partnership - MEP

Data Governance Central to Data Management Success

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Moving Beyond the Heat Map: Making Better Decisions with Cyber Risk Quantification

EGM, 9-10 December A World that Counts: Mobilising the Data Revolution for Sustainable Development. 9 December 2014 BACKGROUND

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

Cybersecurity and the Board of Directors

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Avoid a DCIM Procurement Disaster

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

THE POWER OF TECH-SAVVY BOARDS:

Security Director - VisionFund International

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

MHA Consulting BCM Metrics Resiliency Through Measurement

Symantec Data Center Transformation

COBIT 5 Update October 2010

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

Cylance Axiom Alliances Program

Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Fact Or Fiction: The State Of GDPR Compliance

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

RBI GUIDELINES ON CYBER SECURITY AND RAKSHA APPROACH

Navigate IT Security with a Framework as Your Guide

Security Metrics Framework

GDPR: A QUICK OVERVIEW

Better skilled workforce

Predstavenie štandardu ISO/IEC 27005

CISO MASTERCLASS FOR SENIOR EXECUTIVES 2 DAYS

NYDFS Cybersecurity Regulations

Cloud Security Alliance Quantum-safe Security Working Group

2017 Ethics & Compliance Hotline & Incident Management Benchmark Report Webinar

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

What is IT Governance and Why is it Important?

Framework for Improving Critical Infrastructure Cybersecurity

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges

Automating the Top 20 CIS Critical Security Controls

Copyright 2011 EMC Corporation. All rights reserved.

Effective COBIT Learning Solutions Information package Corporate customers

Cyber Risks, Coverage, and the Board of Directors.

Exam : Title : ASAM Advanced Security for Account Managers Exam. Version : Demo

Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker

CCISO Blueprint v1. EC-Council

Matt Quinn.

Why you should adopt the NIST Cybersecurity Framework

How IIBA Certifications are being utilized at Deloitte?

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

TSC Business Continuity & Disaster Recovery Session

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

FDA & Medical Device Cybersecurity

Bringing Cybersecurity to the Boardroom Bret Arsenault

Federal Government. Each fiscal year the Federal Government is challenged CATEGORY MANAGEMENT IN THE WHAT IS CATEGORY MANAGEMENT?

The Open Group. Cybersecurity Risk Management

CISO Success Strategies: On Becoming a Security Business Leader

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

What It Takes to be a CISO in 2017

Enabling efficiency through Data Governance: a phased approach

THE CYBERSECURITY LITERACY CONFIDENCE GAP

White Paper. View cyber and mission-critical data in one dashboard

Securing Your Digital Transformation

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

Modern Database Architectures Demand Modern Data Security Measures

Global Headquarters: 5 Speen Street Framingham, MA USA P F

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.

Cyber Crime Seminar 8 December 2015

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

REAL-WORLD STRATEGIES FOR MEDICAL DEVICE SECURITY

Threat and Vulnerability Assessment Tool

2017 Category Management Conference

DOD Medical Device Cybersecurity Considerations

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Cybersecurity: Incident Response Short

Transcription:

Security Metrics Establishing unambiguous and logically defensible security metrics Steven Piliero CSO The Center for Internet Security

The Center for Internet Security (CIS) Formed - October 2000 As a not-for-profit public-private partnership The mission produce security guidance to: Help organizations measurably reduce risk Equip IT buyers with purchasing leverage so they can buy systems with security built-in Support the higher level standards/regulations with unambiguous operational-level how-to detail The method Security benchmarks built by consensus teams of security experts The use downloaded over 1,000,000 times / year

Agenda CIS Security Metrics Initiative Overview Objective and Goals Consensus team Security Metrics The Challenge What is a metric? Business outcomes measure the right things Examples How to participate Summary Questions

Current Reality A focus on compliance with practices / processes with inadequate attention to outcomes Security investment decisions made on an intuitive basis Lack an effective feedback / learning loop Lack of adequate information sharing The result is an independent, metric framework to define, collect and analyze data on security outcomes and process benefits.

What s Missing? A widely accepted, overarching definition of success Consensus Security Metrics A comprehensive feedback learning mechanism for continuous improvement

Essential Value Proposition Align Risk to Organization Risk Tolerance Create Operational Efficiencies

CIS Security Metrics Abstract Organizations struggle to make cost-effective security investment decisions; Information Security Professionals lack widely accepted and unambiguous metrics for decision support. CIS established a consensus team of industry experts to address this need. The result is an independent, metric framework to define, collect and analyze data on security outcomes and process benefits.

Security Metrics Initiative sponsored by the Center for Internet Security proven track record in security guidance community driven consensus group establish practical approaches to security management. Initial Security Metrics selected (Milestone 1) Complete draft definition Metrics (Milestone 2) Publish initial Security Metrics (Milestone 3)

Objective and Goals Achieve community consensus on a small number of security outcome metrics. 1. Establish unambiguous and widely accepted security metrics 2. Provide mechanisms for organizations to benchmark and effectively communicate performance. 3. Establish widely understood and proven correlation of security practices and security performance.

Scope and Purpose Create standard metrics To reduce the impact of incidents that interfere with critical enterprise functions To support better security investment decisions Facilitate future inter-enterprise benchmarking For correlation of practices with outcomes For best practice discovery

Consensus team members Corporations and Organizations Small Fortune 50 organizations, non-profit and commercial, many industry verticals, especially banking and financial Industry Experts Mathematicians, statisticians, actuaries, CISO s, security managers Government Federal, state, and local Vendors Security product, solution and consulting firms Universities and Researchers Well know institutions that specialize in information security

The Challenge How secure are we? Are we better off than this time last year? Are we spending the right amount of $$? How do we compare to our peers? 1 Can we unambiguously communicate performance in terms relevant to customers and our business?

What is a metric? A standard of measurement 2 that facilitates the quantification of some particular characteristic 3 Enables repeatable measurement Facilitates decision making Examples from other industries: Profit Margin 4,5 - (finance & accounting) Transit time 6 - (transportation & logistics) Cost per click 7,8,9 (advertising & marketing) Customer Satisfaction 10,11 (business & marketing) Post Surgical Infection Rate 12 (Healthcare & Insurance)

Metric vs KPI Sound key performance indicators (KPI s) necessitate that we: First have good metrics, based on sound measures, for making decisions under conditions of uncertainty and Second we establish appropriate thresholds

Qualitative and Quantitative Data Quantitative Data Interval - origin is a meaningful number Ratio Qualitative Data Nominal can t be ordered Ordinal can be meaningfully ordered

Accuracy & Precision Accuracy Precision

Context and Meaning All Vulnerabilities Detected Vulnerabilities Known Vulnerabilities

Dimensions, Aggregates & Primitives Incident Impact Incident Impact (Org. 1) Incident Impact (Org. X) # of Incidents (Org. 1) Total Impact of Incidents

Business Outcomes Measure the right things (Step 1) Business outcomes Performance Metrics 13 how you are doing Screening Test(s) Inspires drill-down questions by seeding thinking process (Step 2) Internal business processes & practices Diagnostic Metrics 13 ascertain why An unacceptable value of an outcome metric will invariably suggest that the organizational process that produced the outcome is in need of improvement

Example: Online Banking How do customers measure success? My transactions are authorized by me My information is safe My information is secure My information is available 14 Key Assurances: My data is private; My identity cannot be compromised; The resources I require are secure and available; and I understand my role in building a secure environment. 14

Business Functions Covered Incident Management Financial Change Management Vulnerability Management Patch Management Software Security

Sample of CIS Consensus Metrics Security Incidents Rate of Security Incidents Mean-Time-Between-Security Incidents Mean-Time-To-Incident Discovery (MTTID) Mean-Time-To-Incident Recovery (MTTIR) Incident Impact (Draft) % of Incidents Detected by Internal Controls (Draft)

Consensus Metric Definitions 1. Pose business questions (goal) 2. Create Data Set Definition of readily available information to answer business questions 3. Develop unambiguous metrics derived from Data Set. Title Description Objective Usage References Calculation and Visualization.

Example: Business Questions Is there a sustained reduction of security incident impact over time? How well do we detect, accurately identify, handle and recover from security incidents?

Example: Data Set

Example: Metric Definition

Example: Insights (Verizon, 2008)

Example: Insights (DataLossDB 2008)

Next Steps Facilitate Adoption and Information Sharing Enhance Security Metric Definitions and Coverage Publish Quick Start Guide Conduct Analysis and Identify High Performers / Best Practice

Call to Action Establish business support and goals with senior executives and board of directors Use detailed, Consensus Security Metric Definitions and Quick Start Guide from: https://community.cisecurity.org/download Collaborate and obtain community help Require vendors & consultants to provide and support solutions using community standars

Summary Leverage CIS community efforts and experience Focus on business outcomes first Implement a few metrics that are repeatable https://community.cisecurity.org/download Contact spiliero@cisecurity.org to participate

Questions? What are your top 3 security metric requests from leadership? What are 3 5 application security metrics we can develop? What requirements must be addressed for your organization to contribute metrics data to enable performance measurement against peers?

CIS Security Guidance is: Available free-of-charge in.pdf format to everyone in tool-readable XML format to CIS Members for use with configuration auditing/monitoring tools Used worldwide as the basis for enterprise security standards the recognized standard against which to compare Downloaded >1,000,000 times/year

http//:www.cisecurity.org spiliero@cisecurity.org 818-425-6129 2008 Center for Internet Security