SlideShare a Scribd company logo
1 of 17
7 THINGS
Every CEO Should Know
About Information Security
        Policy and
        Process Reign
        Supreme
                              The Costs
                              of Ignoring
                              Security

         Emergence of
         the Borderless
         Enterprise
                                                Security is a
                                                Boardroom
                                                Issue

               Traditional
               Security No
                                Increasing
               Longer Works
                                Insider
                                Threats



                                             Well-Organized
                                             & Focused
                                             Cybercriminals
TAblE Of CONTENTS

7 Things EvERY CEO SHOULd KNOW ABOUT INFORMATION SECURITY
                                  Unless you’ve been living under a rock, you               If that sounds like your organization, then keep reading. Hopefully, once you’ve
                                                                                                                                                                                         1. Security is a Boardroom
                                  probably realize what a hot-button issue                  finished this ebook, you’ll see how important your role is in maintaining a secure
                                                                                                                                                                                         Issue
                                  information security has become for the modern            environment, why it isn’t a good idea to cross your fingers and hope the tech guys
                                  enterprise. Maybe you’ve already mobilized a C-           have everything under control and why compliance with security regulations won’t
                                  level security executive to develop a comprehensive       solve all of your problems.
                                                                                                                                                                                         2. The Costs of Ignoring
                                  security program, maybe you’ve just asked your
                                                                                                                                                                                         Security
                                  CIO to get a handle on things, or maybe you’re just       As a CEO, I understand the complexities and nuances of leading an organization

                                  fantasizing that security incidents can’t possibly        to profitability and success. And as an expert in the security industry, I also have         3. Well-Organized &
                                  happen to a company like yours. Either way, you           a clear picture of how the very best businesses protect themselves. These two                Focused Cybercriminals
probably recognize the magnitude of trouble companies face when a breach,                   perspectives put me in a good position to talk to you—CEO to CEO—about the

caused by their practices, hits The Wall Street Journal. And like many CEOs, you at least   most important components of information security and why you should know                    4. Increasing Insider
have an inkling that your company has room to improve its security practices.               about them. There’s no marketing mumbo-jumbo here, just straight talk about a                Threats
                                                                                            topic that can very well impact your bottom line and the ability for your business to
Currently, there exists a troubling disconnect between information security                 deliver its product to customers.
                                                                                                                                                                                         5. Emergence of the
personnel and top decision-makers within the enterprise. According to last year’s
                                                                                            Pat Clawson                                                                                  Borderless Enterprise
Ernst and Young global security survey, almost one-third of information security
professionals never meet with their board of directors, and most meet less than             Chairman & CEO, Lumension Security™, Inc.
                                                                                                                                                                                         6. Traditional Security No
once a quarter with their corporate officers and business unit leaders.
                                                                                                                                                                                         Longer Works

                                                                                                                                                                                         7. Policy and Process
                                                                                                                                                                                         Reign Supreme

                                                                                                                                                                                         Conclusion: The Security
                                                                                                                                                                                         Role of the CEO


                                                                                                                                                                                                                      2
7 THINGS EvEry CEO SHOuld KNOw
                                                                                                                                                                                     AbOuT INfOrmATION SECurITy
1. securiTy is a Boardroom issue
Contrary to what some CEOs may think, information security is absolutely a                  Clearly, your peers are standing up and listening because their feet are being held
boardroom issue. Even though it sometimes may seem as if security issues end up             to the fire by regulators. In some ways, this can be a good thing. It has definitely
being mired in technical details, it is clear that ignoring them altogether can impact      helped bump up overall awareness of security topics amongst the C-suite. As one of
the bottom line, the brand and shareholder value. These aren’t technology issues;           my customers puts it, his department is starting to finally get the input he believes
these are core business issues.                                                             information security personnel should have.


If a business chooses not to set security policies, or sets them so loosely that they       “In the last few years, I’ve started to see a change. Traditionally, we’d be ignored,”
                                                             suffer a highly publicized     he says. “Even if you’re a C-level person, you never really got the inclusion that the
  If a business chooses not to                               attack, it could find itself   rest of the C-suite did. That’s starting to change. I find my department becoming

  set security policies or sets                              ostracized by its largest      included in more business decisions. Anytime people are looking to do their due
                                                             customers and partners.        diligence in acquisitions and mergers, we’re consulted.”
  them so loosely that they                                  These types of risks are                                                                                                   Lumension Security’s Chairman and CEO Pat Clawson sits
  suffer a highly publicized                                 boardroom issues and                                                                                                       down to provide executive-level insight into effective and
                                                                                              64% of corporate executives reported                                                      data-centric corporate security.
  attack, it could find itself                               they should be discussed
                                                             by you and your advisors,        compliance as the principal information
  ostracized by its largest                                  no matter what their
                                                                                              security driver.
  customers and its partners.                                technical background
                                                             looks like.
                                                                                            But compliance as a security driver is a double-edged sword. According to John
Currently, most executives only focus on security in relation to complying with             Pescatore, analyst with Gartner Research, executives and board members should not
security regulations such as HIPAA, Sarbanes-Oxley and PCI data Security                    be so quick to throw their security spend on compliance efforts.
Standards. In last year’s 10th annual Ernst & Young global information security
survey, approximately 64 percent of corporate executives reported compliance as the         “Really, it is dangerous to hang your hat on compliance as a justification for

principal information security driver.                                                      everything,” Pescatore says. “From a boardroom point of view, we think security
                                                                                            should be protection-driven, not compliance-driven.”


                                                                                                                                                                                                                                                     3
GuIdANCE fOr
                                                                                                                                                                                   bOArdS Of dIrECTOrS

The way he sees it, compliance fines pale in comparison to the cost of an actual          Executives need to oversee a security program that meshes the security needs of their
security incident that can occur when proper precautions are not put into place. If an    specific organization with the demands of regulators to prove security. They need to        “To achieve effectiveness and sustainability in today’s
otherwise compliant organization misses a certain piece of the security puzzle, not       recognize that the organization has an ultimate responsibility to secure its data and       complex, interconnected world, security over information
                                                                                                                                                                                      assets must be addressed at the highest levels of the
included in “XYZ” regulations, and suffers a “denial of service” attack, then it stands   that of its customers.
                                                                                                                                                                                      organization, not regarded as a technical specialty
to lose a lot more in lost revenue than if it had been secure but non-compliant.                                                                                                      relegated to the IT department.

                                                                                                                                                                                      Implementing effective security governance and defining
CEOs really need to eliminate the mentality that being compliant with regulations
                                                                                            Executives need to oversee a security                                                     the strategic security objectives of an organization are
means their organizations are secure. Compliance is a measurement against                                                                                                             complex, arduous tasks. They require leadership and
regulatory standards, not necessarily a measurement of overall security. Look at
                                                                                            program that meshes the security needs                                                    ongoing support from executive management to succeed.

the recent breach at New England’s Hannaford Brothers grocers. In that case, the            of their specific organization with the                                                   Developing an effective information security strategy
                                                                                                                                                                                      requires integration with and co-operation of business
company claimed that it was PCI compliant when the incident occurred. Even if this
claim was true, compliance didn’t shield Hannaford in the court of public opinion—
                                                                                            demands of regulators to prove security.                                                  unit managers and process owners.

                                                                                                                                                                                      A successful outcome is the alignment of information
and it won’t shield your organization if something similar happens to you.                                                                                                            security activities in support of organizational objectives.
                                                                                          “What I tell CEOs is make sure your security program is protecting your customers           The extent to which this is achieved will determine the
In my opinion, there is definitely a wide-scale wake-up call that still needs to happen                                                                                               effectiveness of the information security program in
                                                                                          and protecting your business. Then give the auditors what they need for you to
at the executive level in regards to this security compliance misconception.                                                                                                          meeting the desired objective of providing a predictable,
                                                                                          demonstrate compliance,” Pescatore says. “decide what controls are needed to                defined level of management assurance for business
                                                                                          protect the business and customer data and then add some additional reporting               processes and an acceptable level of impact from
                                                                                          functions that demonstrate compliance for all of them.”                                     adverse events.”

                                                                                                                                                                                      Information Security Governance: Guidance for Boards
                                                                                          This is not only a safer and saner way of doing things, it is usually cheaper to boot.      of Directors and Executive Management, IT Governance
                                                                                                                                                                                      Institute, 2006




                                                                                                                                                                                                                                                     4
CuTTING THE COST Of COmplIANCE
                                                                                                                                                                                  wITHOuT COmprOmISING SECurITy
2. The cosTs of ignoring securiTy
Many of the most publicized security failures in recent years can be attributed to       proceedings can put a big dent in the bottom line. Add to that the cost of litigation,
short-sighted leadership decisions to save a few bucks on security in the short term.    regulatory punitive fees and the cost of consultants to perform an investigation of
Take TJX’s (TJ Maxx) record breach of 94 million customer records—it all came as a       the breach and it becomes clear why breaches cost so much. The shame of it all is
result of an upper level management directive to wait on upgrading wireless security.    that once this money has been laid out, the new scrutiny you’ll face will force your
                                                                                         company to spend more on the security program you should have implemented in
                                                                                         the first place. Why not spend that money up front and avoid all of those millions in
  Why not spend that money up front                                                      breach costs?

  and avoid all of those millions in                                                     The largest cost associated with ignoring security, however, still may not be
  breach costs?                                                                          completely quantifiable. The loss of brand equity is a huge risk posed by lax
                                                                                         security practices, one which many CEOs need to address. Brand is the bedrock
As a CEO, what risk to the bottom line are you willing to assume for the sake of         upon which most major enterprises build. When that bedrock cracks, many                     Pat Clawson sits down to discuss the biggest compliance
saving a few dollars in the coming years’ budgets? In TJX’s case, they’ve paid           businesses have a hard time recovering.                                                     challenges and how organizations can effectively address
hundreds of millions of dollars as a result of the breach—many, many times the                                                                                                       compliance.

amount it would have cost to upgrade their technology and practices.                     Remember ValuJet? The high-flying discount airliner had a quality brand in the mid-
                                                                                         1990s until one of its jets crashed into the Everglades in 1996. The disaster proved
Last year, one of the security gurus with Forrester Research took a quantitative look
at just how much poor security practices were costing enterprises. Analyst Khalid
Kark found that the average security breach can cost a company between $90 and             ...they’ve paid hundreds of millions
$305 per lost record. The financial effects can be staggering for a company with
millions of customers.
                                                                                           of dollars... many, many times
                                                                                           the amount it would have cost to
Kark used a number of very real factors to come up with this projection. First of all,
data breach legislation in most states now puts companies on the hook to disclose
                                                                                           upgrade technology and practices.
any data breach to those affected. Just the sheer cost of going through notification


                                                                                                                                                                                                                                                5
wHAT I wISH my CEO
                                                                                                                                                                                       KNEw AbOuT SECurITy…

so damaging to the valuJet brand that the company had to buy AirTran for                    In a 2006 study conducted by the CMO Council, over 50 percent of consumers said
its identity and completely purge the valuJet brand from its corporate memory.              they would either strongly consider or definitely take their business elsewhere if their     “The most difficult part of being a CSO or CISO is
                                                                                            personal information were compromised by a business. Even more disconcerting,                getting CEOs and CFOs to understand that IT security is
Granted, a large security breach will rarely result in the loss of human life. But                                                                                                       a part of life, just like fire and flood insurance. You hope
                                                                                            more than half of business executives said they would either consider or would
                                                                                                                                                                                         you never need to use it, but if you don’t have it and you
the valuJet incident still offers a stark lesson in how corporate negligence can            recommend taking their business elsewhere if a business partner suffered a security          have a fire, you can lose everything. If you don’t have a
destroy a brand.                                                                            breach that compromised their corporate or customer data.                                    strong information security practice in place, the same
                                                                                                                                                                                         thing can happen.
If a large bank is found to be at fault for not protecting its data assets, and customer    Interestingly, the CMO Council study also found 60 percent of marketers believe that         Support is key, and if you work with your CEO and help
information is spread around the world, the event will hit the news. In turn, that          security and IT integrity offer an opportunity for brand differentiation. Yet 60 percent     him or her understand what value IT security has on
                                                                        organization                                                                                                     the big picture, this will go a long way in gaining the
                                                                                            of these same marketers said security has not become a more significant theme in
  Clearly, executives who choose                                        will lose           their company’s messaging and marketing communications.
                                                                                                                                                                                         support of different business divisions. If you educate
                                                                                                                                                                                         everyone from the top down, it helps tremendously.”
                                                                        brand equity,
  to ignore security are not only                                       lose existing       Clearly, executives who choose to ignore security are not only gambling their
                                                                                                                                                                                         Richard Linke, Vice President and CSO for Global
                                                                                                                                                                                         Security Management Inc.
  gambling their company’s                                              customer            company’s brand and good name, they’re also losing an opportunity to differentiate

  brand and good name, they’re                                          loyalty, and will
                                                                        have a harder
                                                                                            themselves from the rest of the crowd.


  also losing an opportunity to                                         time drawing

  differentiate themselves from                                         new customers
                                                                        with its now-
  the rest of the crowd.                                                damaged
                                                                        reputation. The
same goes for health care companies, insurance companies, big retail chains, you
name it.




                                                                                                                                                                                                                                                        6
CybErCrImE ECONOmy
3. Well-organized & focused cyBercriminals
CEOs really need to stop deluding themselves and understand that their information         The enormous payouts from such antics have driven cybercriminals to dial up their            Cybercrime has grown into an extremely mature black
                                                                                                                                                                                        market with major players often employing more
is worth being stolen. If your data is poorly protected, your business is essentially      risk thresholds and their ingenuity levels. “Cybercrime today is targeted, it hits
                                                                                                                                                                                        sophisticated business methods and partnerships than
just setting out gold bars in an unprotected window so that any opportunistic bad          deeply, it tries to be stealthy, rarely making the news, and often those attacks on a        many legitimate businesses. Tom Espiner with CNET
                                                                                                                                                                                        News.com wrote a particularly illuminating summary of
guy can come and take what he likes. Some of the “gold bars” are different for each        damage-per-incident level are 10 to 50 times higher than the costs of things like the
                                                                                                                                                                                        the cybercrime ecosystem in his article, “Cracking Open
business–perhaps secret recipes for food manufacturers, blueprints for engineering         Slammer worm and other high-profile attacks we used to see,” says John Pescatore,            the Cybercrime Economy,” published Dec. 14, 2007:
firms, programming code for software developers. Other “gold bars” transcend               analyst with Gartner Research. “It’s way higher than what a simple virus used to cost        “Hackers can buy denial-of-service attacks for $100
industry verticals. Every business risks confidential information about partners,          us.”                                                                                         per day, while spammers can buy CDs with harvested
                                                                                                                                                                                        e-mail addresses. Spammers can also send mail via
sensitive customer data and potential sales leads when they don’t shore up security.                                                                                                    spam brokers, handled via online forums such as
                                                                                           In 2007, the U.S. Government Accountability Office estimated that cybercrime costs           specialham.com and spamforum.biz. In this environment,
                                                                                                                                                                                        $1 buys 1,000 to 5,000 credits, while $1,000 buys 10,000
The cat is out of the bag that all of these data tidbits are worth a considerable          the economy $117.5 billion a year. And yet, I still hear CEOs ask, “What would they
                                                                                                                                                                                        compromised PCs.
amount to competitors and identity thieves—most modern hackers already realize             want with my organization? They’ve got better targets to attack. It’s not like I’m a
                                                                                                                                                                                        Carders, who mainly deal in stolen credit card details,
this and are well on their way to figuring out how to steal yours without you even         Fortune 500 company.”                                                                        openly publish prices, or engage in private negotiations
                                                                                                                                                                                        to decide the price, with some sources giving bulk
knowing it.
                                                                                                                                                                                        discounts for larger purchases. The rate for credit card
                                                                                           That thinking is all wrong. The thing is that most hackers are smart enough to
                                                                                                                                                                                        details is approximately $1 for all the details down to the
See, it used to be that the bad guys in cybercrime were simple script kiddies, just        recognize that smaller companies don’t spend the kind of money and effort securing           Card Verification Value (CVV); $10 for details with CVV
                                                                                                                                                                                        linked to a Social Security number; and $50 for a full
in it for the rush of defacing company property and getting their props from news          their information that the big boys do. If you aren’t spending on security, then you
                                                                                                                                                                                        bank account.
reports. Their attacks were meant to be visible, so it was very clear when they            become the better target to attack.
                                                                                                                                                                                        Scammers use a variety of ways to launder cash.
occurred. But money changed all of that—hackers saw a dollar sign attached to the                                                                                                       Compromised bank accounts can be used to launder funds,
                                                                                           Think about it. If I’m a hacker planning to make some money by selling personal              or struggling companies can be bribed to turn the money
technical feats they could accomplish and they switched gears. Nowadays, the crooks
                                                                                                                                                                                        into ready cash. Scammers can find businesses with a debt
are trying to fly under the radar, sneaking in to pillage data stores undetected so they   identifiable information to an identity thief, who would I rather attack? A large
                                                                                                                                                                                        of $10,000, and agree to pay them $20,000 if they agree to
                                                                                           multinational bank that likely has billions of dollars invested in information security?     cash out 50 percent of the funds. Dedicated cashiers, also
can do it again and again to the same target-rich environments. In poorer Eastern
                                                                                                                                                                                        known as “money mules,” can also take up to 50 percent of
Bloc countries, hacking corporate systems is a job for some people. They go to work        Or a small credit union that probably hasn’t fully secured its systems? It’s like asking
                                                                                                                                                                                        the funds to move the money via transfer services.
and hack American companies for other companies or for well-organized crime rings          a burglar whether he’d rather sneak into a house with unlocked doors or crowbar his
                                                                                                                                                                                        Money can also be laundered by buying and selling
perpetuating identity theft.                                                               way into a deadlocked home. He’ll pick the unlocked house every time.                        merchandise on the wider black market. Shipper rings
                                                                                                                                                                                        can ship PCs to scammers via intermediaries, which can
                                                                                                                                                                                        then be resold.“


                                                                                                                                                                                                                                                      7
dEbuNKING THE mOST COmmON
                                                                                                                                                                                myTHS AbOuT dATA prOTECTION
4. increasing insider ThreaTs
It isn’t just those well-funded adversaries outside the business that you, as a CEO,   It happens all of the time, and in many cases the damages can be in the hundreds
must worry about either. There are also numerous threats much closer to home—          of millions of dollars. In February 2007, it came out that a senior chemist at
literally inside the business.                                                         duPont stole $400 million worth of data and tried to leak it to a third party. In just
                                                                                       a six month period, this trusted employee downloaded about 22,000 abstracts and
According to Gartner analysts, 70 percent of the security incidents that cost          16,700 documents. He was eventually ferreted out by duPont’s IT staff and taken to
enterprises money involve insiders in some way or another. Companies often spend so    trial for his transgressions—but for every one of those caught there are many more
much time and money worrying about threats outside the enterprise walls they often     who actually get away with it.
forget about the dangers that lurk within. The risks posed by employees and trusted
partners can run from out-and-out fraud, all the way down to simple user errors that   As a CEO, I understand that trust
cause system insecurity and open them up to attack. Typically, both are caused by      is an important part of running
                                                                                                                              ...70% of the security
lack of controls and poor oversight of employee computer activities.                   a business. But I also realize         incidents that cost
                                                                                       that while I can trust people up
                                                                                                                              enterprises money                                    Lumension Security’s Senior Vice President of Business
                                                                                       to a certain extent, I have to set                                                          Development Rich Hlavka sits down to debunk the most
  The risks posed by employees and                                                     boundaries around trust.               involve insiders...                                  common myths about data protection

  trusted partners can run from out-                                                   Just as a company wouldn’t think twice about auditing the books and double-

  and-out fraud all the way down to                                                    checking ledgers, it should be standard practice to keep track of access to valuable
                                                                                       data assets and risky computing activities that could cost the business a mint.
  simple user errors that cause system
  insecurity and open them up to attack.                                               Too many companies choose not to monitor employee interaction with intellectual
                                                                                       property and sensitive data, and eventually pay a steep price for their lack of
                                                                                       verification. And even those who choose to monitor general staff forget to watch the

Especially damaging are the cases of intentional theft when employees remain           waters, leaving IT administrators with far more account access privileges than their

unmonitored or have unconrolled access to sensitive data or systems.                   jobs require. Besides, even the most trustworthy insiders are capable of triggering a
                                                                                       security event that can send a business reeling.
dId yOu KNOw ?


“The insider threat hasn’t gone up; there have always been dishonest employees,”            does your organization
                                                                                                                               does it have a way of
Pescatore says. “What has gone up, and what the real insider threat is employees            have a way of tracking how                                                                        Most insider events are triggered
trying to do their jobs using technology that we didn’t first make safe. And then,          information is being copied        protecting the data at                                         by a negative event in the workplace.

oops, information is either accidentally exposed or left open such that a fairly simple     and transported? does it
                                                                                                                               rest, in motion and in use?                                    Most perpetrators had prior disciplinary issues.
cyber attack can get to it. That represents thr majority of growth of insider incidents.”   have a way of protecting                                                                          Most insider events were planned in advance.
                                                                                            data at rest, in motion and in use? As a CEO, you should at very least know the
                                                                                                                                                                                              Up to 87 percent of attacks didn’t require
Some employees may not know they are doing anything wrong. They’re just doing               answer to those questions, because your job very well may depend on it.                           advanced technical knowledge.
what they think needs to be done to do their job. Everyone within the security field
                                                                                                                                                                                              Approximately 30 percent of incidents happened
has heard of numerous cases of people copying sensitive databases to their mobile           Because employees and trusted partners with access to your information will take
                                                                                                                                                                                              at the insider’s home through remote access.
devices and bringing them home from work. It happens every day, and every day               risks if they aren’t aware of them, education plays a big part in curbing insider threat.
                                                                                                                                                                                           From the Insider Threat Study conducted by the National
                                                                                            Education is huge because simply telling errant employees not to do something                  Threat Assessment Center of the U.S. Secret Service and

  does your organization have a way                                                         doesn’t always have the desired effect. People sometimes justify bad behavior when
                                                                                            they are under-the-gun; they think, “I’ll just do it this once,” or “They didn’t really
                                                                                                                                                                                           the Software Engineering Institute at Carnegie Mellon
                                                                                                                                                                                           University, 2005
  of tracking how information is being                                                      mean it when they said not to do this.” It is the job of your information security

  copied and transported?                                                                   department to educate users and make sure they understand why taking certain
                                                                                            actions puts the business at risk. And it is your job as the CEO to back up the Chief
                                                                                            Information Officer (CIO) and to really emphasize the stakes at hand. Often the only
that your employees do this, they are putting your organization at serious risk. If that    way employees will listen is if the directive comes from the top, so give your infosec
device is lost or stolen, you face a serious breach with all of those costs I mentioned     personnel some support.
earlier.
                                                                                            Education can’t do it alone, however. The only way to truly keep insiders to their word
                                                                                            is through automated policy enforcement, smart monitoring technology and effective
                                                                                            use of account restrictions.




                                                                                                                                                                                                                                                     9
mObIlE dEvICES —
                                                                                                                                                                                    THE NEw mObIlE THrEAT
5. emergence of The Borderless enTerprise
Many business-side leaders don’t fully appreciate all of the holes and points of         Plus, as I just mentioned, you have got lots of potential “bad apple” employees who
weakness that exist in their network today. They figure that after green lighting        are automatically allowed access inside network boundaries. It has gotten to the
the CIO to spend buckets of money on firewalls and other network defenses, the           point where there isn’t an impenetrable border around the enterprise anymore.
organization should be pretty well fortified against assault. The problem is that
since that money has been spent, the enterprise has changed and the CIO has
been forced to change the technology that supports the business. In this age of            Nearly 75 percent had off-line devices
super-connectivity, they’ve been asked to provide more ways to give employees and
partners access to information.
                                                                                           lost or stolen in the last two years and
                                                                                           of those 42 percent involved the loss of
                                                    In the process, insecure systems
                                                    that were never meant to be
                                                                                           sensitive information.
  In this age of                                    connected to the Internet are
                                                                                                                                                                                       Lumension Security’s Vice President of Security
                                                    now online. Information portals      Unfortunately, most businesses have been unable to adjust their security programs
  super-connectivity, CIOs                          are poking holes in the network      to account for this borderless enterprise. In a study of 735 CIOs conducted by the
                                                                                                                                                                                       Technologies, Chris Andrew, sits down to discuss how
                                                                                                                                                                                       security has moved beyond the endpoint with the

  have been                                         infrastructure all over the place,   Ponemon Institute in 2007, more than 60 percent of them said their organizations              convergence of business and personal tools.

                                                    data is leaving the network on       still place more importance on network security issues than any other. Approximately
  asked to provide                                  portable storage devices, and        62 percent said their off-network controls are not “rigorously managed.” And yet,
  more ways to give                                 mobile devices are enabling          62 percent said that they have a lot of unprotected confidential information on off-

  employees and partners                            people to move outside the
                                                    network with sensitive data while
                                                                                         network systems. This assumption of risk has lead to a much higher rate of incidents
                                                                                         involving those off-line devices—nearly 75 percent of the managers surveyed had one
  access to information.                            coming back onto the network         of these devices lost or stolen in the last two years, and of those, 42 percent involved
                                                    with infected systems.               the loss of sensitive information.




                                                                                                                                                                                                                                              10
wHAT I wISH my CEO
                                                                                             KNEw AbOuT SECurITy…

These numbers aren’t meant to scare you. I’ve brought them to light so that you
understand why your CIO keeps knocking on your door to talk about data protection—             “For me, it’s got to be the application level security
these days, that is the name of the game in security. Executives today must recognize that     and code-security. In our company and a lot of
                                                                                               companies, security is still seen as an IT process, you
security is no longer about fortifying the network, it’s about protecting the data. We’ve
                                                                                               do some IT things, development does their things.
already established that the crooks aren’t looking to simply break your network. They want     Making the argument that code security, revision
to get their grubby little hands on your data.                                                 control are so absolutely important that often times
                                                                                               they can be the invalidation of all the controls that
                                                                                               I’ve put around things.
  Executives today must recognize that security is no longer                                   If someone screws up and makes a code error, it’s now

  about fortifying the network, it’s about protecting the data.                                dumping your databases to the Internet. So, that’s
                                                                                               going to become one of the next hot items – database
                                                                                               and web application security in multiple ways. Getting
                                                                                               some kind of insight into your code’s security is very
These bad guys are no dummies—they know how to exploit holes in the network and how            important. It’s not being properly communicated
                                                                                               by anyone at this point. Mostly because people
to take advantage of offline systems and endpoints in order to gain future access to your
                                                                                               don’t have a hard grasp of the application threat
data stores. If the endpoints and the data are protected, it becomes a lot harder for the      landscape. There are a few people who understand
criminals to steal information.                                                                it, and to my knowledge, they work for their own
                                                                                               companies. They’re independent contractors. They’re
                                                                                               not convincing CEOs that that’s important. A lot of
Your technology leaders must be able to satisfy the needs of your staff and partners to
                                                                                               the other people out there just haven’t gotten it yet.”
access appropriate data while maintaining appropriate control and monitoring of that
                                                                                               William Bell, Director of Security for ECSuite.com
information to ensure it remains safe. In the end, organizations need to make sure they’re
not giving away too much free access at the expense of the company’s well being.




                                                                                                                                                         11
HOw TO mAKE wHITElISTING
                                                                                                                                                                                OpErATIONAlly EffICIENT 
                                                                                                                                                                                mANAGEAblE
6. TradiTional securiTy no longer Works
So now that the climate has changed and we operate within a borderless enterprise,       Executives must have their technical staff focus on the squishy center that exists
it is imperative for company and technology leadership to realize that the security      inside that perimeter exoskeleton they’ve built up over the years. Otherwise, crafty
model they’ve depended on for so many years is broken.                                   bad guys are going to attack from the inside out.


Simply installing antivirus and firewall perimeters no longer helps businesses           Think about it, with all of your employees demanding connectivity online and
effectively defend themselves. There are too many ways around the network                online portals directing customers and partners to data from the outside, there
perimeter. Those well-funded criminals I already talked about are using clandestine      are loads of little back doors leading directly into networked data stores. And if
code that cannot be detected by mass-marketed antivirus software, that only offers
protection from known attacks.
                                                                                            Why attack the network directly when
That’s not to say that these older technologies no longer have a place in the               I could simply get an employee to visit
enterprise. They still do a reasonable job protecting enterprises from old attacks and
act as a good, existing first layer of defense.
                                                                                            an infected website that will load a                                                   Lumension Security’s Senior Vice President of Americas,

                                                                                            Trojan onto their system and will grant                                                Matt Mosher sits down to discuss the advancements in
                                                                                                                                                                                   Endpoint Security with Operational Whitelisting.
“The real key is figuring out how to make the perimeter security less expensive and
then be able to deal with where the threats are starting to bypass the traditional
                                                                                            me access into their system and into
forms of security,” says Pescatore, “because there are new forms of attacks and there       wherever it is connected?
are always these waves of old attacks that come back.”


We recently had a customer say to us, “I can’t tell you how many of my peers find        I’m a bad guy, why would I try to go through the fortified front door when I can

it easy to fund and implement perimeter security, but find it harder to do so for the    just waltz through the back door and ride the wave of connectivity directly to your

needed internal security.”                                                               most valuable data? Why attack the network directly when I could simply get an
                                                                                         employee to visit an infected website that will load a Trojan onto their system and
                                                                                         will grant me access into their system and into wherever it is connected?




                                                                                                                                                                                                                                             12
vulNErAbIlITy mANAGEmENT
                                                                                                                          IN A wEb 2.0 wOrld

If you have nothing to prevent that, they’ve already won. They’re establishing an
outbound connection right back to their system which means you’re toast and
your firewall means nothing.


Businesses who have recognized the death of security as they once knew it have
kept their protection programs up-to-date by shifting focus on areas such as internal
network security and monitoring, endpoint security and configuration management.


Most importantly, the most successful security
practitioners have begun to supplement the old guard in
technology with proactive security through whitelisting.
                                                                  “Both the threat environment has changed and our
Unlike the traditional method of blacklisting the “known          priorities have changed so that we really need to get
bad” programs and application, whitelisting only lets the
“known good” execute within the enterprise environment.
                                                                  into protecting the information itself,” Mogull said.     Senior Director of Solutions and Strategy, Don Leatham,
                                                                                                                            sits down to discuss Vulnerability Management
                                                                  “So that’s where the concept of information-centric       challenges in a Web 2.0 world, and how to defend against
                                                                                                                            these threats.
                                                                  security comes from. Which is why people are saying
                                                                  ‘Why don’t we look at the tools and techniques we
                                                                  need to protect the data and not just protect our
                                                                  networks?’” - Rich Mogull, Securosis, from March
                                                                  200 Baseline Magazine article.



                                                                                                                                                                                       13
5 bASIC TENANTS
                                                                                                                                                                                     Of INfOrmATION SECurITy
7. policy and process reign supreme
One of the real dangers of working with technical executives is that some of them          As in many other aspects of the business, tools support a solid foundation laid by           “Information security governance requires senior
tend to fall so completely in love with certain technologies that they fail to remember    effective policies and processes. It is your job as the head honcho to guide your Chief      management commitment, a security-aware culture,
                                                                                                                                                                                        promotion of good security practices and compliance
their overarching goals. This particular malady infects a lot of people in security, who   Information Security Officer (CISO) to make sure he or she isn’t using technology as
                                                                                                                                                                                        with policy. It is easier to buy a solution than to change a
unfortunately focus on buying and implementing tools they view as a panacea.               an ineffective crutch.                                                                       culture, but even the most secure system will not achieve
                                                                                                                                                                                        a significant degree of security if used by ill-informed,
As a CEO, you probably already know that there’s no product in the world that can          “So if every time there’s a problem and the only thing your CISO is suggesting is            untrained, careless or indifferent personnel.
completely solve a complex business problem. It is no less true for information            technology, you should poke ‘em with a stick,” Pescatore says. “You should say, ‘Wait        Information security is a top-down process requiring a
security than anything else in the business.                                               a minute, where’s the process change or the other things that always have to go with         comprehensive security strategy that is explicitly linked to
                                                                                                                                                                                        the organization’s business processes and strategy. Security
                                                                                           technology to make it work?’”
  “...we have to set up a security policy                                                                                                                                               must address entire organizational processes, both physical
                                                                                                                                                                                        and technical, from end to end.
  that finds the right balance between                                                     These “other things” need to include risk assessment, standardized procedures,
                                                                                                                                                                                        The five basic outcomes of information security governance
                                                                                           boundary setting around what employees should and shouldn’t be doing with systems
  overreacting and exposing your                                                           and data, and also setting baselines on how systems are configured. From there, the
                                                                                                                                                                                        should include:

                                                                                                                                                                                        1. Strategic alignment of information security with business
  system to any and every hack.”                                                           technology can monitor and enforce all of those policies and procedures, providing
                                                                                                                                                                                        strategy to support organizational objectives
                                                                                           reporting to prove to the auditors that everything is working.
                                                                                                                                                                                        2. Risk management by executing appropriate measures to
“Information security by technical means is not sufficient and needs to be supported
                                                                                                                                                                                        manage and mitigate risks and reduce potential impacts on
by policies and procedures,” wrote Chaiw Kok Kee in a SANS Institute whitepaper                                                                                                         information resources to an acceptable level
on security policies. “Security polices are the foundation and the bottom line of                                                                                                       3. Resource management by utilizing information security
information security in an organization. Depending on the company’s size, financial                                                                                                     knowledge and infrastructure efficiently and effectively
resources and the degree of threat, we have to set up a security policy that finds the                                                                                                  4. Performance measurement by measuring, monitoring and
right balance between overreacting and exposing your system to any and every hack.”                                                                                                     reporting information security governance metrics to ensure
                                                                                                                                                                                        that organizational objectives are achieved

                                                                                                                                                                                        5. Value delivery by optimizing information security
                                                                                                                                                                                        investments in support of organizational objectives”

                                                                                                                                                                                        Information Security Governance: Guidance for Boards
                                                                                                                                                                                        of Directors and Executive Management, IT Governance
                                                                                                                                                                                        Institute, 2006
                                                                                                                                                                                                                                                       14
wHAT I wISH my CEO
                                                                                                                                                                                      KNEw AbOuT SECurITy…

If your CISO is doing a good job setting policies, the SANS policy guidance suggests   “If I could have a CEO
that he or she will be:                                                                boot camp, I’d say,
                                                                                                                       The responsibility                                               “Information security is not simply an IT issue.
                                                                                       ‘Make sure you put              for security oversight                                           Information security is the responsibility of every
                                                                                                                                                                                        employee beginning with the CEO. Awareness, detection
        Identifying all of the assets that need to be protected                        security top of mind
                                                                                                                       and policy development                                           and remediation is also everyone’s responsibility. We
        Identifying all of the vulnerabilities and threats and the likeliness          to all of your direct                                                                            can invest in tools that will mitigate the risk, and tools

        of the threats happening                                                       reports: your CFO, your         doesn’t rest solely on the                                       to audit how well we are mitigating the risks, but at

                                                                                       CIO, your HR people,            CISO’s shoulders, either.                                        the end of the day, it is the individual users who most
                                                                                                                                                                                        significantly impacts the security of information at
        deciding which measures will protect the assets in                             your sales people and                                                                            an organization. If we start with the idea that the
        a cost-effective manner                                                        so on,’” Pescatore                                                                               management of the investment we have in information
                                                                                       says. “For most businesses today, the product is information and security is key. So             is of paramount importance, we will make decisions
        Communicating findings and result to the appropriate
                                                                                                                                                                                        that ensures its security throughout all levels of the
        parties (i.e. you and the board)                                               you have to make sure that your top reports understand that security is part of their
                                                                                                                                                                                        organization. In this way, the products, policies,
                                                                                       evaluation. It’s not just the CIO’s responsibility. It is part of life for every one of your     procedures and audits you put in place will not be
        Monitoring and reviewing the process for improvement along the way             direct reports.”                                                                                 sidestepped, downgraded or ignored for the comfort of
                                                                                                                                                                                        the end user.”
The responsibility for security oversight and policy development doesn’t rest solely
                                                                                                                                                                                        Tony Hildesheim, Vice President of Information Technology
on the CISO’s shoulders, either. As chief executive, you should also be guiding
a program of information security governance that reaches far beyond the IT                                                                                                             Washington State Employees Credit Union

department.


  As chief executive, you should also
  be guiding a program of information
  security governance that reaches far
  beyond the IT department.


                                                                                                                                                                                                                                                     15
A prACTICAl ApprOACH
                                                                                                                                                                                  TO IT SECurITy rISKS
conclusion: The securiTy role of The ceo
Obviously, chief executives don’t play a detailed day-to-day role in information         The CEO has to be the one that constantly challenges the organization to understand
security. You probably don’t know how to administer a vulnerability scanner, nor         its risks and needs to be constantly reviewing security progress as part of the
should you. But understanding security can have such a dramatic effect on an             quarterly review process. Are we right on track with initiatives? Have we suffered any
organization’s bottom line, it is clear CEOs need to provide strong leadership           incidents lately? Have our competitors? What new threats are cropping up. These
on the matter.                                                                           are the types of questions that the CEO must ask of the CIO or CISO on a consistent
                                                                                         basis in order to keep that company messaging relevant. It should be an ongoing,
According to many of the CISOs we speak with here at Lumension Security, the only        dynamic process instead of one where the CEO is simply the recipient of information.
way to get user buy-in for major infosec initiatives is by relying on support from the
top of the food chain. As a CEO, you have a chance to set a culture of security that
permeates into every silo, department and remote office you maintain.


As our customer Bell puts it, “When it comes from the CEO, it’s a bigger deal than
when it comes from the security officer. You’re going to get more penetration through                                                                                                Pat Clawson discuss how organizations can implement
                                                                                                                                                                                     a practical approach to identifying, prioritizing and
your enterprise. The folks in accounting are going to go, ‘Oh! It’s the CEO!’ They
                                                                                                                                                                                     responding to IT security risks
don’t care about me, but they’ll listen to the CEO. There are a lot of companies with
silos that are so deep these days that the security departments don’t have a lot of
visibility. If you can work to get some kind of company message, it’s helpful.”




                                                                                                                                                                                                                                             16
Lumension Security™, Inc.
150 N Greenway-Hayden Loop, Suite 100
Scottsdale, AZ 5260
www.lumension.com




7 Thnigs Every CEO Should Know About Information Security is licensed under a
Creative Commons Attribution 3.0 United States License.

More Related Content

What's hot

Building The Framework For A Culture Of Security
Building The Framework For A Culture Of SecurityBuilding The Framework For A Culture Of Security
Building The Framework For A Culture Of Security
mguenther
 
Information Security Brochure
Information Security BrochureInformation Security Brochure
Information Security Brochure
Liliana50
 
Presentation crafting your active security management strategy 3 keys and 4...
Presentation   crafting your active security management strategy 3 keys and 4...Presentation   crafting your active security management strategy 3 keys and 4...
Presentation crafting your active security management strategy 3 keys and 4...
xKinAnx
 
The safety leadership challenge building soft skills for exemplary safety p...
The safety leadership challenge   building soft skills for exemplary safety p...The safety leadership challenge   building soft skills for exemplary safety p...
The safety leadership challenge building soft skills for exemplary safety p...
OHS Leaders Summit
 
2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess
asundaram1
 
SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011
Satish Hemachandran
 
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09   Social EngineeringIssa Seattle 5 09   Social Engineering
Issa Seattle 5 09 Social Engineering
Mike Murray
 

What's hot (18)

Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
Building The Framework For A Culture Of Security
Building The Framework For A Culture Of SecurityBuilding The Framework For A Culture Of Security
Building The Framework For A Culture Of Security
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
Information Security Brochure
Information Security BrochureInformation Security Brochure
Information Security Brochure
 
Presentation crafting your active security management strategy 3 keys and 4...
Presentation   crafting your active security management strategy 3 keys and 4...Presentation   crafting your active security management strategy 3 keys and 4...
Presentation crafting your active security management strategy 3 keys and 4...
 
Paralegal Rainmakers Digest Volume 2 Issue 3
Paralegal Rainmakers Digest Volume 2 Issue 3Paralegal Rainmakers Digest Volume 2 Issue 3
Paralegal Rainmakers Digest Volume 2 Issue 3
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013
 
The safety leadership challenge building soft skills for exemplary safety p...
The safety leadership challenge   building soft skills for exemplary safety p...The safety leadership challenge   building soft skills for exemplary safety p...
The safety leadership challenge building soft skills for exemplary safety p...
 
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared CarstensenCyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
Cyber Threats & Cybersecurity - Are You Ready? - Jared Carstensen
 
2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess
 
Pdf7
Pdf7Pdf7
Pdf7
 
SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011
 
Issa Seattle 5 09 Social Engineering
Issa Seattle 5 09   Social EngineeringIssa Seattle 5 09   Social Engineering
Issa Seattle 5 09 Social Engineering
 
PCI: A Valuable Security Framework, Not a Punishment
PCI: A Valuable Security Framework, Not a PunishmentPCI: A Valuable Security Framework, Not a Punishment
PCI: A Valuable Security Framework, Not a Punishment
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 

Viewers also liked

Information security management system
Information security management systemInformation security management system
Information security management system
Arani Srinivasan
 

Viewers also liked (17)

Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best Practice
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information Security
 
Tci reference architecture_v2.0
Tci reference architecture_v2.0Tci reference architecture_v2.0
Tci reference architecture_v2.0
 
Development and implementation of metrics for information security risk asses...
Development and implementation of metrics for information security risk asses...Development and implementation of metrics for information security risk asses...
Development and implementation of metrics for information security risk asses...
 
Security Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVSecurity Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOV
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration Overview
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Measuring Success - Security KPIs
Measuring Success - Security KPIsMeasuring Success - Security KPIs
Measuring Success - Security KPIs
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to 7 Things Every Ceo Should Know About Information Security

Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Hamisi Kibonde
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Berezha Security Group
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agents
ocinc
 
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docxPROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
woodruffeloisa
 

Similar to 7 Things Every Ceo Should Know About Information Security (20)

7 things every ceo should know about information security
7 things every ceo should know about information security7 things every ceo should know about information security
7 things every ceo should know about information security
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
 
Virtualization Security Risks
Virtualization Security RisksVirtualization Security Risks
Virtualization Security Risks
 
Whitepaper - Data Security while outsourcing
Whitepaper - Data Security while outsourcingWhitepaper - Data Security while outsourcing
Whitepaper - Data Security while outsourcing
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your Business
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agents
 
Data leakage prevention EN Final
Data leakage prevention EN FinalData leakage prevention EN Final
Data leakage prevention EN Final
 
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docxPROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
Convergence of Security Risks
Convergence of Security RisksConvergence of Security Risks
Convergence of Security Risks
 
232 a7d01
232 a7d01232 a7d01
232 a7d01
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

7 Things Every Ceo Should Know About Information Security

  • 1. 7 THINGS Every CEO Should Know About Information Security Policy and Process Reign Supreme The Costs of Ignoring Security Emergence of the Borderless Enterprise Security is a Boardroom Issue Traditional Security No Increasing Longer Works Insider Threats Well-Organized & Focused Cybercriminals
  • 2. TAblE Of CONTENTS 7 Things EvERY CEO SHOULd KNOW ABOUT INFORMATION SECURITY Unless you’ve been living under a rock, you If that sounds like your organization, then keep reading. Hopefully, once you’ve 1. Security is a Boardroom probably realize what a hot-button issue finished this ebook, you’ll see how important your role is in maintaining a secure Issue information security has become for the modern environment, why it isn’t a good idea to cross your fingers and hope the tech guys enterprise. Maybe you’ve already mobilized a C- have everything under control and why compliance with security regulations won’t level security executive to develop a comprehensive solve all of your problems. 2. The Costs of Ignoring security program, maybe you’ve just asked your Security CIO to get a handle on things, or maybe you’re just As a CEO, I understand the complexities and nuances of leading an organization fantasizing that security incidents can’t possibly to profitability and success. And as an expert in the security industry, I also have 3. Well-Organized & happen to a company like yours. Either way, you a clear picture of how the very best businesses protect themselves. These two Focused Cybercriminals probably recognize the magnitude of trouble companies face when a breach, perspectives put me in a good position to talk to you—CEO to CEO—about the caused by their practices, hits The Wall Street Journal. And like many CEOs, you at least most important components of information security and why you should know 4. Increasing Insider have an inkling that your company has room to improve its security practices. about them. There’s no marketing mumbo-jumbo here, just straight talk about a Threats topic that can very well impact your bottom line and the ability for your business to Currently, there exists a troubling disconnect between information security deliver its product to customers. 5. Emergence of the personnel and top decision-makers within the enterprise. According to last year’s Pat Clawson Borderless Enterprise Ernst and Young global security survey, almost one-third of information security professionals never meet with their board of directors, and most meet less than Chairman & CEO, Lumension Security™, Inc. 6. Traditional Security No once a quarter with their corporate officers and business unit leaders. Longer Works 7. Policy and Process Reign Supreme Conclusion: The Security Role of the CEO 2
  • 3. 7 THINGS EvEry CEO SHOuld KNOw AbOuT INfOrmATION SECurITy 1. securiTy is a Boardroom issue Contrary to what some CEOs may think, information security is absolutely a Clearly, your peers are standing up and listening because their feet are being held boardroom issue. Even though it sometimes may seem as if security issues end up to the fire by regulators. In some ways, this can be a good thing. It has definitely being mired in technical details, it is clear that ignoring them altogether can impact helped bump up overall awareness of security topics amongst the C-suite. As one of the bottom line, the brand and shareholder value. These aren’t technology issues; my customers puts it, his department is starting to finally get the input he believes these are core business issues. information security personnel should have. If a business chooses not to set security policies, or sets them so loosely that they “In the last few years, I’ve started to see a change. Traditionally, we’d be ignored,” suffer a highly publicized he says. “Even if you’re a C-level person, you never really got the inclusion that the If a business chooses not to attack, it could find itself rest of the C-suite did. That’s starting to change. I find my department becoming set security policies or sets ostracized by its largest included in more business decisions. Anytime people are looking to do their due customers and partners. diligence in acquisitions and mergers, we’re consulted.” them so loosely that they These types of risks are Lumension Security’s Chairman and CEO Pat Clawson sits suffer a highly publicized boardroom issues and down to provide executive-level insight into effective and 64% of corporate executives reported data-centric corporate security. attack, it could find itself they should be discussed by you and your advisors, compliance as the principal information ostracized by its largest no matter what their security driver. customers and its partners. technical background looks like. But compliance as a security driver is a double-edged sword. According to John Currently, most executives only focus on security in relation to complying with Pescatore, analyst with Gartner Research, executives and board members should not security regulations such as HIPAA, Sarbanes-Oxley and PCI data Security be so quick to throw their security spend on compliance efforts. Standards. In last year’s 10th annual Ernst & Young global information security survey, approximately 64 percent of corporate executives reported compliance as the “Really, it is dangerous to hang your hat on compliance as a justification for principal information security driver. everything,” Pescatore says. “From a boardroom point of view, we think security should be protection-driven, not compliance-driven.” 3
  • 4. GuIdANCE fOr bOArdS Of dIrECTOrS The way he sees it, compliance fines pale in comparison to the cost of an actual Executives need to oversee a security program that meshes the security needs of their security incident that can occur when proper precautions are not put into place. If an specific organization with the demands of regulators to prove security. They need to “To achieve effectiveness and sustainability in today’s otherwise compliant organization misses a certain piece of the security puzzle, not recognize that the organization has an ultimate responsibility to secure its data and complex, interconnected world, security over information assets must be addressed at the highest levels of the included in “XYZ” regulations, and suffers a “denial of service” attack, then it stands that of its customers. organization, not regarded as a technical specialty to lose a lot more in lost revenue than if it had been secure but non-compliant. relegated to the IT department. Implementing effective security governance and defining CEOs really need to eliminate the mentality that being compliant with regulations Executives need to oversee a security the strategic security objectives of an organization are means their organizations are secure. Compliance is a measurement against complex, arduous tasks. They require leadership and regulatory standards, not necessarily a measurement of overall security. Look at program that meshes the security needs ongoing support from executive management to succeed. the recent breach at New England’s Hannaford Brothers grocers. In that case, the of their specific organization with the Developing an effective information security strategy requires integration with and co-operation of business company claimed that it was PCI compliant when the incident occurred. Even if this claim was true, compliance didn’t shield Hannaford in the court of public opinion— demands of regulators to prove security. unit managers and process owners. A successful outcome is the alignment of information and it won’t shield your organization if something similar happens to you. security activities in support of organizational objectives. “What I tell CEOs is make sure your security program is protecting your customers The extent to which this is achieved will determine the In my opinion, there is definitely a wide-scale wake-up call that still needs to happen effectiveness of the information security program in and protecting your business. Then give the auditors what they need for you to at the executive level in regards to this security compliance misconception. meeting the desired objective of providing a predictable, demonstrate compliance,” Pescatore says. “decide what controls are needed to defined level of management assurance for business protect the business and customer data and then add some additional reporting processes and an acceptable level of impact from functions that demonstrate compliance for all of them.” adverse events.” Information Security Governance: Guidance for Boards This is not only a safer and saner way of doing things, it is usually cheaper to boot. of Directors and Executive Management, IT Governance Institute, 2006 4
  • 5. CuTTING THE COST Of COmplIANCE wITHOuT COmprOmISING SECurITy 2. The cosTs of ignoring securiTy Many of the most publicized security failures in recent years can be attributed to proceedings can put a big dent in the bottom line. Add to that the cost of litigation, short-sighted leadership decisions to save a few bucks on security in the short term. regulatory punitive fees and the cost of consultants to perform an investigation of Take TJX’s (TJ Maxx) record breach of 94 million customer records—it all came as a the breach and it becomes clear why breaches cost so much. The shame of it all is result of an upper level management directive to wait on upgrading wireless security. that once this money has been laid out, the new scrutiny you’ll face will force your company to spend more on the security program you should have implemented in the first place. Why not spend that money up front and avoid all of those millions in Why not spend that money up front breach costs? and avoid all of those millions in The largest cost associated with ignoring security, however, still may not be breach costs? completely quantifiable. The loss of brand equity is a huge risk posed by lax security practices, one which many CEOs need to address. Brand is the bedrock As a CEO, what risk to the bottom line are you willing to assume for the sake of upon which most major enterprises build. When that bedrock cracks, many Pat Clawson sits down to discuss the biggest compliance saving a few dollars in the coming years’ budgets? In TJX’s case, they’ve paid businesses have a hard time recovering. challenges and how organizations can effectively address hundreds of millions of dollars as a result of the breach—many, many times the compliance. amount it would have cost to upgrade their technology and practices. Remember ValuJet? The high-flying discount airliner had a quality brand in the mid- 1990s until one of its jets crashed into the Everglades in 1996. The disaster proved Last year, one of the security gurus with Forrester Research took a quantitative look at just how much poor security practices were costing enterprises. Analyst Khalid Kark found that the average security breach can cost a company between $90 and ...they’ve paid hundreds of millions $305 per lost record. The financial effects can be staggering for a company with millions of customers. of dollars... many, many times the amount it would have cost to Kark used a number of very real factors to come up with this projection. First of all, data breach legislation in most states now puts companies on the hook to disclose upgrade technology and practices. any data breach to those affected. Just the sheer cost of going through notification 5
  • 6. wHAT I wISH my CEO KNEw AbOuT SECurITy… so damaging to the valuJet brand that the company had to buy AirTran for In a 2006 study conducted by the CMO Council, over 50 percent of consumers said its identity and completely purge the valuJet brand from its corporate memory. they would either strongly consider or definitely take their business elsewhere if their “The most difficult part of being a CSO or CISO is personal information were compromised by a business. Even more disconcerting, getting CEOs and CFOs to understand that IT security is Granted, a large security breach will rarely result in the loss of human life. But a part of life, just like fire and flood insurance. You hope more than half of business executives said they would either consider or would you never need to use it, but if you don’t have it and you the valuJet incident still offers a stark lesson in how corporate negligence can recommend taking their business elsewhere if a business partner suffered a security have a fire, you can lose everything. If you don’t have a destroy a brand. breach that compromised their corporate or customer data. strong information security practice in place, the same thing can happen. If a large bank is found to be at fault for not protecting its data assets, and customer Interestingly, the CMO Council study also found 60 percent of marketers believe that Support is key, and if you work with your CEO and help information is spread around the world, the event will hit the news. In turn, that security and IT integrity offer an opportunity for brand differentiation. Yet 60 percent him or her understand what value IT security has on organization the big picture, this will go a long way in gaining the of these same marketers said security has not become a more significant theme in Clearly, executives who choose will lose their company’s messaging and marketing communications. support of different business divisions. If you educate everyone from the top down, it helps tremendously.” brand equity, to ignore security are not only lose existing Clearly, executives who choose to ignore security are not only gambling their Richard Linke, Vice President and CSO for Global Security Management Inc. gambling their company’s customer company’s brand and good name, they’re also losing an opportunity to differentiate brand and good name, they’re loyalty, and will have a harder themselves from the rest of the crowd. also losing an opportunity to time drawing differentiate themselves from new customers with its now- the rest of the crowd. damaged reputation. The same goes for health care companies, insurance companies, big retail chains, you name it. 6
  • 7. CybErCrImE ECONOmy 3. Well-organized & focused cyBercriminals CEOs really need to stop deluding themselves and understand that their information The enormous payouts from such antics have driven cybercriminals to dial up their Cybercrime has grown into an extremely mature black market with major players often employing more is worth being stolen. If your data is poorly protected, your business is essentially risk thresholds and their ingenuity levels. “Cybercrime today is targeted, it hits sophisticated business methods and partnerships than just setting out gold bars in an unprotected window so that any opportunistic bad deeply, it tries to be stealthy, rarely making the news, and often those attacks on a many legitimate businesses. Tom Espiner with CNET News.com wrote a particularly illuminating summary of guy can come and take what he likes. Some of the “gold bars” are different for each damage-per-incident level are 10 to 50 times higher than the costs of things like the the cybercrime ecosystem in his article, “Cracking Open business–perhaps secret recipes for food manufacturers, blueprints for engineering Slammer worm and other high-profile attacks we used to see,” says John Pescatore, the Cybercrime Economy,” published Dec. 14, 2007: firms, programming code for software developers. Other “gold bars” transcend analyst with Gartner Research. “It’s way higher than what a simple virus used to cost “Hackers can buy denial-of-service attacks for $100 industry verticals. Every business risks confidential information about partners, us.” per day, while spammers can buy CDs with harvested e-mail addresses. Spammers can also send mail via sensitive customer data and potential sales leads when they don’t shore up security. spam brokers, handled via online forums such as In 2007, the U.S. Government Accountability Office estimated that cybercrime costs specialham.com and spamforum.biz. In this environment, $1 buys 1,000 to 5,000 credits, while $1,000 buys 10,000 The cat is out of the bag that all of these data tidbits are worth a considerable the economy $117.5 billion a year. And yet, I still hear CEOs ask, “What would they compromised PCs. amount to competitors and identity thieves—most modern hackers already realize want with my organization? They’ve got better targets to attack. It’s not like I’m a Carders, who mainly deal in stolen credit card details, this and are well on their way to figuring out how to steal yours without you even Fortune 500 company.” openly publish prices, or engage in private negotiations to decide the price, with some sources giving bulk knowing it. discounts for larger purchases. The rate for credit card That thinking is all wrong. The thing is that most hackers are smart enough to details is approximately $1 for all the details down to the See, it used to be that the bad guys in cybercrime were simple script kiddies, just recognize that smaller companies don’t spend the kind of money and effort securing Card Verification Value (CVV); $10 for details with CVV linked to a Social Security number; and $50 for a full in it for the rush of defacing company property and getting their props from news their information that the big boys do. If you aren’t spending on security, then you bank account. reports. Their attacks were meant to be visible, so it was very clear when they become the better target to attack. Scammers use a variety of ways to launder cash. occurred. But money changed all of that—hackers saw a dollar sign attached to the Compromised bank accounts can be used to launder funds, Think about it. If I’m a hacker planning to make some money by selling personal or struggling companies can be bribed to turn the money technical feats they could accomplish and they switched gears. Nowadays, the crooks into ready cash. Scammers can find businesses with a debt are trying to fly under the radar, sneaking in to pillage data stores undetected so they identifiable information to an identity thief, who would I rather attack? A large of $10,000, and agree to pay them $20,000 if they agree to multinational bank that likely has billions of dollars invested in information security? cash out 50 percent of the funds. Dedicated cashiers, also can do it again and again to the same target-rich environments. In poorer Eastern known as “money mules,” can also take up to 50 percent of Bloc countries, hacking corporate systems is a job for some people. They go to work Or a small credit union that probably hasn’t fully secured its systems? It’s like asking the funds to move the money via transfer services. and hack American companies for other companies or for well-organized crime rings a burglar whether he’d rather sneak into a house with unlocked doors or crowbar his Money can also be laundered by buying and selling perpetuating identity theft. way into a deadlocked home. He’ll pick the unlocked house every time. merchandise on the wider black market. Shipper rings can ship PCs to scammers via intermediaries, which can then be resold.“ 7
  • 8. dEbuNKING THE mOST COmmON myTHS AbOuT dATA prOTECTION 4. increasing insider ThreaTs It isn’t just those well-funded adversaries outside the business that you, as a CEO, It happens all of the time, and in many cases the damages can be in the hundreds must worry about either. There are also numerous threats much closer to home— of millions of dollars. In February 2007, it came out that a senior chemist at literally inside the business. duPont stole $400 million worth of data and tried to leak it to a third party. In just a six month period, this trusted employee downloaded about 22,000 abstracts and According to Gartner analysts, 70 percent of the security incidents that cost 16,700 documents. He was eventually ferreted out by duPont’s IT staff and taken to enterprises money involve insiders in some way or another. Companies often spend so trial for his transgressions—but for every one of those caught there are many more much time and money worrying about threats outside the enterprise walls they often who actually get away with it. forget about the dangers that lurk within. The risks posed by employees and trusted partners can run from out-and-out fraud, all the way down to simple user errors that As a CEO, I understand that trust cause system insecurity and open them up to attack. Typically, both are caused by is an important part of running ...70% of the security lack of controls and poor oversight of employee computer activities. a business. But I also realize incidents that cost that while I can trust people up enterprises money Lumension Security’s Senior Vice President of Business to a certain extent, I have to set Development Rich Hlavka sits down to debunk the most The risks posed by employees and boundaries around trust. involve insiders... common myths about data protection trusted partners can run from out- Just as a company wouldn’t think twice about auditing the books and double- and-out fraud all the way down to checking ledgers, it should be standard practice to keep track of access to valuable data assets and risky computing activities that could cost the business a mint. simple user errors that cause system insecurity and open them up to attack. Too many companies choose not to monitor employee interaction with intellectual property and sensitive data, and eventually pay a steep price for their lack of verification. And even those who choose to monitor general staff forget to watch the Especially damaging are the cases of intentional theft when employees remain waters, leaving IT administrators with far more account access privileges than their unmonitored or have unconrolled access to sensitive data or systems. jobs require. Besides, even the most trustworthy insiders are capable of triggering a security event that can send a business reeling.
  • 9. dId yOu KNOw ? “The insider threat hasn’t gone up; there have always been dishonest employees,” does your organization does it have a way of Pescatore says. “What has gone up, and what the real insider threat is employees have a way of tracking how Most insider events are triggered trying to do their jobs using technology that we didn’t first make safe. And then, information is being copied protecting the data at by a negative event in the workplace. oops, information is either accidentally exposed or left open such that a fairly simple and transported? does it rest, in motion and in use? Most perpetrators had prior disciplinary issues. cyber attack can get to it. That represents thr majority of growth of insider incidents.” have a way of protecting Most insider events were planned in advance. data at rest, in motion and in use? As a CEO, you should at very least know the Up to 87 percent of attacks didn’t require Some employees may not know they are doing anything wrong. They’re just doing answer to those questions, because your job very well may depend on it. advanced technical knowledge. what they think needs to be done to do their job. Everyone within the security field Approximately 30 percent of incidents happened has heard of numerous cases of people copying sensitive databases to their mobile Because employees and trusted partners with access to your information will take at the insider’s home through remote access. devices and bringing them home from work. It happens every day, and every day risks if they aren’t aware of them, education plays a big part in curbing insider threat. From the Insider Threat Study conducted by the National Education is huge because simply telling errant employees not to do something Threat Assessment Center of the U.S. Secret Service and does your organization have a way doesn’t always have the desired effect. People sometimes justify bad behavior when they are under-the-gun; they think, “I’ll just do it this once,” or “They didn’t really the Software Engineering Institute at Carnegie Mellon University, 2005 of tracking how information is being mean it when they said not to do this.” It is the job of your information security copied and transported? department to educate users and make sure they understand why taking certain actions puts the business at risk. And it is your job as the CEO to back up the Chief Information Officer (CIO) and to really emphasize the stakes at hand. Often the only that your employees do this, they are putting your organization at serious risk. If that way employees will listen is if the directive comes from the top, so give your infosec device is lost or stolen, you face a serious breach with all of those costs I mentioned personnel some support. earlier. Education can’t do it alone, however. The only way to truly keep insiders to their word is through automated policy enforcement, smart monitoring technology and effective use of account restrictions. 9
  • 10. mObIlE dEvICES — THE NEw mObIlE THrEAT 5. emergence of The Borderless enTerprise Many business-side leaders don’t fully appreciate all of the holes and points of Plus, as I just mentioned, you have got lots of potential “bad apple” employees who weakness that exist in their network today. They figure that after green lighting are automatically allowed access inside network boundaries. It has gotten to the the CIO to spend buckets of money on firewalls and other network defenses, the point where there isn’t an impenetrable border around the enterprise anymore. organization should be pretty well fortified against assault. The problem is that since that money has been spent, the enterprise has changed and the CIO has been forced to change the technology that supports the business. In this age of Nearly 75 percent had off-line devices super-connectivity, they’ve been asked to provide more ways to give employees and partners access to information. lost or stolen in the last two years and of those 42 percent involved the loss of In the process, insecure systems that were never meant to be sensitive information. In this age of connected to the Internet are Lumension Security’s Vice President of Security now online. Information portals Unfortunately, most businesses have been unable to adjust their security programs super-connectivity, CIOs are poking holes in the network to account for this borderless enterprise. In a study of 735 CIOs conducted by the Technologies, Chris Andrew, sits down to discuss how security has moved beyond the endpoint with the have been infrastructure all over the place, Ponemon Institute in 2007, more than 60 percent of them said their organizations convergence of business and personal tools. data is leaving the network on still place more importance on network security issues than any other. Approximately asked to provide portable storage devices, and 62 percent said their off-network controls are not “rigorously managed.” And yet, more ways to give mobile devices are enabling 62 percent said that they have a lot of unprotected confidential information on off- employees and partners people to move outside the network with sensitive data while network systems. This assumption of risk has lead to a much higher rate of incidents involving those off-line devices—nearly 75 percent of the managers surveyed had one access to information. coming back onto the network of these devices lost or stolen in the last two years, and of those, 42 percent involved with infected systems. the loss of sensitive information. 10
  • 11. wHAT I wISH my CEO KNEw AbOuT SECurITy… These numbers aren’t meant to scare you. I’ve brought them to light so that you understand why your CIO keeps knocking on your door to talk about data protection— “For me, it’s got to be the application level security these days, that is the name of the game in security. Executives today must recognize that and code-security. In our company and a lot of companies, security is still seen as an IT process, you security is no longer about fortifying the network, it’s about protecting the data. We’ve do some IT things, development does their things. already established that the crooks aren’t looking to simply break your network. They want Making the argument that code security, revision to get their grubby little hands on your data. control are so absolutely important that often times they can be the invalidation of all the controls that I’ve put around things. Executives today must recognize that security is no longer If someone screws up and makes a code error, it’s now about fortifying the network, it’s about protecting the data. dumping your databases to the Internet. So, that’s going to become one of the next hot items – database and web application security in multiple ways. Getting some kind of insight into your code’s security is very These bad guys are no dummies—they know how to exploit holes in the network and how important. It’s not being properly communicated by anyone at this point. Mostly because people to take advantage of offline systems and endpoints in order to gain future access to your don’t have a hard grasp of the application threat data stores. If the endpoints and the data are protected, it becomes a lot harder for the landscape. There are a few people who understand criminals to steal information. it, and to my knowledge, they work for their own companies. They’re independent contractors. They’re not convincing CEOs that that’s important. A lot of Your technology leaders must be able to satisfy the needs of your staff and partners to the other people out there just haven’t gotten it yet.” access appropriate data while maintaining appropriate control and monitoring of that William Bell, Director of Security for ECSuite.com information to ensure it remains safe. In the end, organizations need to make sure they’re not giving away too much free access at the expense of the company’s well being. 11
  • 12. HOw TO mAKE wHITElISTING OpErATIONAlly EffICIENT mANAGEAblE 6. TradiTional securiTy no longer Works So now that the climate has changed and we operate within a borderless enterprise, Executives must have their technical staff focus on the squishy center that exists it is imperative for company and technology leadership to realize that the security inside that perimeter exoskeleton they’ve built up over the years. Otherwise, crafty model they’ve depended on for so many years is broken. bad guys are going to attack from the inside out. Simply installing antivirus and firewall perimeters no longer helps businesses Think about it, with all of your employees demanding connectivity online and effectively defend themselves. There are too many ways around the network online portals directing customers and partners to data from the outside, there perimeter. Those well-funded criminals I already talked about are using clandestine are loads of little back doors leading directly into networked data stores. And if code that cannot be detected by mass-marketed antivirus software, that only offers protection from known attacks. Why attack the network directly when That’s not to say that these older technologies no longer have a place in the I could simply get an employee to visit enterprise. They still do a reasonable job protecting enterprises from old attacks and act as a good, existing first layer of defense. an infected website that will load a Lumension Security’s Senior Vice President of Americas, Trojan onto their system and will grant Matt Mosher sits down to discuss the advancements in Endpoint Security with Operational Whitelisting. “The real key is figuring out how to make the perimeter security less expensive and then be able to deal with where the threats are starting to bypass the traditional me access into their system and into forms of security,” says Pescatore, “because there are new forms of attacks and there wherever it is connected? are always these waves of old attacks that come back.” We recently had a customer say to us, “I can’t tell you how many of my peers find I’m a bad guy, why would I try to go through the fortified front door when I can it easy to fund and implement perimeter security, but find it harder to do so for the just waltz through the back door and ride the wave of connectivity directly to your needed internal security.” most valuable data? Why attack the network directly when I could simply get an employee to visit an infected website that will load a Trojan onto their system and will grant me access into their system and into wherever it is connected? 12
  • 13. vulNErAbIlITy mANAGEmENT IN A wEb 2.0 wOrld If you have nothing to prevent that, they’ve already won. They’re establishing an outbound connection right back to their system which means you’re toast and your firewall means nothing. Businesses who have recognized the death of security as they once knew it have kept their protection programs up-to-date by shifting focus on areas such as internal network security and monitoring, endpoint security and configuration management. Most importantly, the most successful security practitioners have begun to supplement the old guard in technology with proactive security through whitelisting. “Both the threat environment has changed and our Unlike the traditional method of blacklisting the “known priorities have changed so that we really need to get bad” programs and application, whitelisting only lets the “known good” execute within the enterprise environment. into protecting the information itself,” Mogull said. Senior Director of Solutions and Strategy, Don Leatham, sits down to discuss Vulnerability Management “So that’s where the concept of information-centric challenges in a Web 2.0 world, and how to defend against these threats. security comes from. Which is why people are saying ‘Why don’t we look at the tools and techniques we need to protect the data and not just protect our networks?’” - Rich Mogull, Securosis, from March 200 Baseline Magazine article. 13
  • 14. 5 bASIC TENANTS Of INfOrmATION SECurITy 7. policy and process reign supreme One of the real dangers of working with technical executives is that some of them As in many other aspects of the business, tools support a solid foundation laid by “Information security governance requires senior tend to fall so completely in love with certain technologies that they fail to remember effective policies and processes. It is your job as the head honcho to guide your Chief management commitment, a security-aware culture, promotion of good security practices and compliance their overarching goals. This particular malady infects a lot of people in security, who Information Security Officer (CISO) to make sure he or she isn’t using technology as with policy. It is easier to buy a solution than to change a unfortunately focus on buying and implementing tools they view as a panacea. an ineffective crutch. culture, but even the most secure system will not achieve a significant degree of security if used by ill-informed, As a CEO, you probably already know that there’s no product in the world that can “So if every time there’s a problem and the only thing your CISO is suggesting is untrained, careless or indifferent personnel. completely solve a complex business problem. It is no less true for information technology, you should poke ‘em with a stick,” Pescatore says. “You should say, ‘Wait Information security is a top-down process requiring a security than anything else in the business. a minute, where’s the process change or the other things that always have to go with comprehensive security strategy that is explicitly linked to the organization’s business processes and strategy. Security technology to make it work?’” “...we have to set up a security policy must address entire organizational processes, both physical and technical, from end to end. that finds the right balance between These “other things” need to include risk assessment, standardized procedures, The five basic outcomes of information security governance boundary setting around what employees should and shouldn’t be doing with systems overreacting and exposing your and data, and also setting baselines on how systems are configured. From there, the should include: 1. Strategic alignment of information security with business system to any and every hack.” technology can monitor and enforce all of those policies and procedures, providing strategy to support organizational objectives reporting to prove to the auditors that everything is working. 2. Risk management by executing appropriate measures to “Information security by technical means is not sufficient and needs to be supported manage and mitigate risks and reduce potential impacts on by policies and procedures,” wrote Chaiw Kok Kee in a SANS Institute whitepaper information resources to an acceptable level on security policies. “Security polices are the foundation and the bottom line of 3. Resource management by utilizing information security information security in an organization. Depending on the company’s size, financial knowledge and infrastructure efficiently and effectively resources and the degree of threat, we have to set up a security policy that finds the 4. Performance measurement by measuring, monitoring and right balance between overreacting and exposing your system to any and every hack.” reporting information security governance metrics to ensure that organizational objectives are achieved 5. Value delivery by optimizing information security investments in support of organizational objectives” Information Security Governance: Guidance for Boards of Directors and Executive Management, IT Governance Institute, 2006 14
  • 15. wHAT I wISH my CEO KNEw AbOuT SECurITy… If your CISO is doing a good job setting policies, the SANS policy guidance suggests “If I could have a CEO that he or she will be: boot camp, I’d say, The responsibility “Information security is not simply an IT issue. ‘Make sure you put for security oversight Information security is the responsibility of every employee beginning with the CEO. Awareness, detection Identifying all of the assets that need to be protected security top of mind and policy development and remediation is also everyone’s responsibility. We Identifying all of the vulnerabilities and threats and the likeliness to all of your direct can invest in tools that will mitigate the risk, and tools of the threats happening reports: your CFO, your doesn’t rest solely on the to audit how well we are mitigating the risks, but at CIO, your HR people, CISO’s shoulders, either. the end of the day, it is the individual users who most significantly impacts the security of information at deciding which measures will protect the assets in your sales people and an organization. If we start with the idea that the a cost-effective manner so on,’” Pescatore management of the investment we have in information says. “For most businesses today, the product is information and security is key. So is of paramount importance, we will make decisions Communicating findings and result to the appropriate that ensures its security throughout all levels of the parties (i.e. you and the board) you have to make sure that your top reports understand that security is part of their organization. In this way, the products, policies, evaluation. It’s not just the CIO’s responsibility. It is part of life for every one of your procedures and audits you put in place will not be Monitoring and reviewing the process for improvement along the way direct reports.” sidestepped, downgraded or ignored for the comfort of the end user.” The responsibility for security oversight and policy development doesn’t rest solely Tony Hildesheim, Vice President of Information Technology on the CISO’s shoulders, either. As chief executive, you should also be guiding a program of information security governance that reaches far beyond the IT Washington State Employees Credit Union department. As chief executive, you should also be guiding a program of information security governance that reaches far beyond the IT department. 15
  • 16. A prACTICAl ApprOACH TO IT SECurITy rISKS conclusion: The securiTy role of The ceo Obviously, chief executives don’t play a detailed day-to-day role in information The CEO has to be the one that constantly challenges the organization to understand security. You probably don’t know how to administer a vulnerability scanner, nor its risks and needs to be constantly reviewing security progress as part of the should you. But understanding security can have such a dramatic effect on an quarterly review process. Are we right on track with initiatives? Have we suffered any organization’s bottom line, it is clear CEOs need to provide strong leadership incidents lately? Have our competitors? What new threats are cropping up. These on the matter. are the types of questions that the CEO must ask of the CIO or CISO on a consistent basis in order to keep that company messaging relevant. It should be an ongoing, According to many of the CISOs we speak with here at Lumension Security, the only dynamic process instead of one where the CEO is simply the recipient of information. way to get user buy-in for major infosec initiatives is by relying on support from the top of the food chain. As a CEO, you have a chance to set a culture of security that permeates into every silo, department and remote office you maintain. As our customer Bell puts it, “When it comes from the CEO, it’s a bigger deal than when it comes from the security officer. You’re going to get more penetration through Pat Clawson discuss how organizations can implement a practical approach to identifying, prioritizing and your enterprise. The folks in accounting are going to go, ‘Oh! It’s the CEO!’ They responding to IT security risks don’t care about me, but they’ll listen to the CEO. There are a lot of companies with silos that are so deep these days that the security departments don’t have a lot of visibility. If you can work to get some kind of company message, it’s helpful.” 16
  • 17. Lumension Security™, Inc. 150 N Greenway-Hayden Loop, Suite 100 Scottsdale, AZ 5260 www.lumension.com 7 Thnigs Every CEO Should Know About Information Security is licensed under a Creative Commons Attribution 3.0 United States License.