SlideShare a Scribd company logo
1 of 10
Technology Executives Club
Roundtable / SIG
Cyber Security & Risk Management
“Changing Weather Patterns: Managing Supplier
Cyber Security Risk in the age of Cloud Services”
Meeting Summary
January 29, 2016
W. Capra Consulting Group
Topic Overview
1
Addressing the challenges associated with managing
supplier cyber security risk:
 Supplier Visibility – identify shadow supplier
relationships that pose risk to digital assets
 Contracting and Accountability – identify key contractual
elements to ensure disclosure, remediation & recourse
 Measuring Security Effectiveness – assess capability of
existing controls and ongoing security program
 Incident Response Execution – ensure supplier security
incident (e.g., breach) is communicated and handled
effectively and efficiently
 Governance – continual monitoring and periodic review
to ensure effective controls are maintained
W. Capra Consulting Group
Discussion Points (1)
2
What’s the most significant struggle managing traditional
and cloud providers in today’s environment?
Predominant View – governance is the key to ensuring suppliers are
maintaining effective security controls.
Leadership Feedback
1. Visibility to the what’s being outsourced remains a challenge – business
stakeholders working outside of IT. Educating the business community
to the importance of IT involvement is key to closing the gap.
2. The ability to verify supplier controls at a detailed level - supplier
services are opaque.
3. Effective governance is required to ensure suppliers are delivering
services in a manner that provides the right protection for information
assets.
W. Capra Consulting Group
Discussion Points (2)
3
What security and risk due diligence/validation process do
you utilize when evaluating suppliers? Do you require
certifications (e.g., ISO 27002) or specific controls based on
the sensitivity of data included in scope?
Predominant View – Conducting surveys is the most common approach to
evaluating suppliers. The survey content is a derived from several sources –
National Institute of Standards and Technology (NIST), Cloud Security
Alliance (CSA) and others.
Leadership Feedback
1. Company brand is on the line. When a breach occurs the provider is
not in the headlines, it’s your brand. There has to be a level of due
diligence prior to contracting and throughout the relationship.
2. It’s a challenge to obtain “real assurance” there has to be a level of
trust.
3. Providers delivering industry solutions are beginning to push back on
the level of scrutiny. They have been vetted by many organizations and
point to achieved certification (e.g., ISO, SOC).
W. Capra Consulting Group
Discussion Points (3)
4
Does your organization view the risk of public IaaS, private
cloud, private hosted, PaaS or SaaS services differently?
Predominant View – supplier risk associated with SaaS, PaaS and public
IaaS services are perceived to be higher than private (company controlled)
services. The loss of visibility and control is a concern.
Leadership Feedback
1. Data classification influences what is hosted with providers versus
delivered in-house. The most sensitive data is hosted in-house.
2. Public IaaS services continue to improve security and provide more
options for customers to protect data. The key is architecting the
services preserve confidentiality of data at rest and in transit. Avoiding
multi-tenant application and data services is key.
3. In each scenario the same level of thought is required to ensure data is
protected. What shifts is the level of responsibility for applying and
maintaining the security controls.
W. Capra Consulting Group
Discussion Points (4)
5
How do you contract to hold suppliers accountable for
maintaining the right level of security? What recourse do you
have when they fall short on their contractual security
obligations?
Predominant View – The contracting process is essential to establishing the
right expectations and holding the supplier accountable for maintaining the
right level of security.
Leadership Feedback
1. Damages – supplier contracts include damages in the event a breach occurs
and company data is exposed
2. Brand exposure – suppliers are not able to disclose the company name in
the event a breach occurs
3. Data sovereignty – supplier must process and store data within a specified
geographical boundary
4. Security controls – company data must be encrypted at rest and in transit
using cryptography that, at a minimum, meets FIPS 140-2 standards
W. Capra Consulting Group
Discussion Points (5)
6
How frequently do you audit suppliers? Is there a defined
governance role? What’s the interaction with security?
Predominant View – The consensus view is an annual audit. The role
responsible for this varies across organizations. Security is most often
involved in the process to ensure it is effective.
Leadership Feedback
1. All organizations perform audits prior to contracting and annually
during the relationship.
2. Cloud Security Alliance (CSA) controls matrix is used to guide audit
activities for some organizations
3. The governance role must be more clearly defined in most
organizations. Establishment of Service Manager/Service Delivery
Manager role is needed.
W. Capra Consulting Group
Discussion Points (6)
7
How do you maintain visibility of what data is hosted where
within the organization – traditional hosting, public IaaS,
private hosted, private IaaS or SaaS?
Predominant View – The challenge persists throughout most organizations.
Accountability resides within the IT organization but there isn’t a consensus
regarding which role is responsible. The industry response is most often the
role responsible for information/data architecture.
Leadership Feedback
1. Working with internal partners to increase awareness is the key to
maintaining visibility to cloud/sourcing relationships.
2. This is an important issue as data sovereignty is a key issue and the
proper expectations must be established during the contracting
process.
3. Organizations are beginning the assess the effectiveness of Cloud
Access Security Brokers to monitor traffic patterns and identify “rogue”
services.
W. Capra Consulting Group
Questions We Didn’t Get
To Ask…
1. How do you validate security incident response processes
(notification/communication, impact analysis, remediation,
response)? How are supplier processes integrated with your
internal processes?
2. Are there any services that you would not outsource to a cloud
provider? For example, mission critical business services or
highly sensitive data (e.g., PCI, HIPAA).
3. How has the increasing Board responsibility for security
diligence impacted management of suppliers?
4. How are compliance requirements integrated with your due
diligence and review processes?
9
W. Capra Consulting Group
221 N. LaSalle, Suite 1325
Chicago, Illinois 60601
Security SIG Chairperson:
Matt Beale, Associate Partner, W. Capra mbeale@wcapra.com
(312)972-2433
Technology Executive Club Reference:
www.technologyexecutivesclub.com
www.technologyexecutivesclub.com/securitychicago

More Related Content

What's hot

Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudHappiest Minds Technologies
 
Module 2 information security risk management student slides ver 1.0
Module 2 information security risk management    student slides ver 1.0Module 2 information security risk management    student slides ver 1.0
Module 2 information security risk management student slides ver 1.0Aladdin Dandis
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodologytbeckwith
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT SecuritySeccuris Inc.
 
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldRSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldEMC
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Resolver Inc.
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program AssessmentsJohn Anderson
 
Security services mind map
Security services mind mapSecurity services mind map
Security services mind mapDavid Kennedy
 
TrustedAgent and Defense Industrial Base (DIB)
TrustedAgent and Defense Industrial Base (DIB)TrustedAgent and Defense Industrial Base (DIB)
TrustedAgent and Defense Industrial Base (DIB)Tuan Phan
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and responseZyrellLalaguna
 
Need for Action (GDPR Risk Mgmt) Oct'16
Need for Action (GDPR Risk Mgmt)   Oct'16Need for Action (GDPR Risk Mgmt)   Oct'16
Need for Action (GDPR Risk Mgmt) Oct'16Dr. Sanjeev B Ahuja
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTuan Phan
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerEnclaveSecurity
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0Aladdin Dandis
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftAppsian
 

What's hot (20)

Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
 
Ch3 cism 2014
Ch3 cism 2014Ch3 cism 2014
Ch3 cism 2014
 
Module 2 information security risk management student slides ver 1.0
Module 2 information security risk management    student slides ver 1.0Module 2 information security risk management    student slides ver 1.0
Module 2 information security risk management student slides ver 1.0
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodology
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
 
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldRSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program Assessments
 
Security services mind map
Security services mind mapSecurity services mind map
Security services mind map
 
TrustedAgent and Defense Industrial Base (DIB)
TrustedAgent and Defense Industrial Base (DIB)TrustedAgent and Defense Industrial Base (DIB)
TrustedAgent and Defense Industrial Base (DIB)
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
 
Need for Action (GDPR Risk Mgmt) Oct'16
Need for Action (GDPR Risk Mgmt)   Oct'16Need for Action (GDPR Risk Mgmt)   Oct'16
Need for Action (GDPR Risk Mgmt) Oct'16
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability Management
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
Catalyst research institute
Catalyst research instituteCatalyst research institute
Catalyst research institute
 
17 domains
17 domains17 domains
17 domains
 
Security review using SABSA
Security review using SABSASecurity review using SABSA
Security review using SABSA
 

Viewers also liked (17)

Métodos en la escuela clásica
Métodos en la escuela clásicaMétodos en la escuela clásica
Métodos en la escuela clásica
 
Reglas de hanboll
Reglas de hanbollReglas de hanboll
Reglas de hanboll
 
Anshuman_CV_-_Copy_2_-_Copy
Anshuman_CV_-_Copy_2_-_CopyAnshuman_CV_-_Copy_2_-_Copy
Anshuman_CV_-_Copy_2_-_Copy
 
Manual casa de_marcat_orgtech_abac
Manual casa de_marcat_orgtech_abacManual casa de_marcat_orgtech_abac
Manual casa de_marcat_orgtech_abac
 
Question 4
Question 4Question 4
Question 4
 
Confecções Danifer - 28/02/2013
Confecções Danifer - 28/02/2013Confecções Danifer - 28/02/2013
Confecções Danifer - 28/02/2013
 
Marketing Internship finished
Marketing Internship finishedMarketing Internship finished
Marketing Internship finished
 
Koningsliedpp
KoningsliedppKoningsliedpp
Koningsliedpp
 
LA LÓGICA, LA RETORICA Y LA POÉTICA
LA LÓGICA, LA RETORICA Y LA POÉTICA LA LÓGICA, LA RETORICA Y LA POÉTICA
LA LÓGICA, LA RETORICA Y LA POÉTICA
 
Canarias y las fiestas de cruz
Canarias y las fiestas de cruzCanarias y las fiestas de cruz
Canarias y las fiestas de cruz
 
Canarias y la fiesta de la cruz
Canarias y la fiesta de la cruzCanarias y la fiesta de la cruz
Canarias y la fiesta de la cruz
 
Felicitación navideña .Laura sexto de Primaria .
Felicitación navideña .Laura sexto de Primaria .Felicitación navideña .Laura sexto de Primaria .
Felicitación navideña .Laura sexto de Primaria .
 
Nomes Populares de Doenças e Sintomas
Nomes Populares de Doenças e SintomasNomes Populares de Doenças e Sintomas
Nomes Populares de Doenças e Sintomas
 
Tecnología en colombia
Tecnología en colombiaTecnología en colombia
Tecnología en colombia
 
Basketball
BasketballBasketball
Basketball
 
Rede de atenção
Rede de atençãoRede de atenção
Rede de atenção
 
Final Cut Pro
Final Cut ProFinal Cut Pro
Final Cut Pro
 

Similar to TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Summary

State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee StudyHiten Sethi
 
Technology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session SummaryTechnology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session SummaryWCapra
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingTory Quinton
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businessesbasilmph
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docxevonnehoggarth79783
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Where Is Your Sensitive Data Wp
Where Is Your Sensitive Data   WpWhere Is Your Sensitive Data   Wp
Where Is Your Sensitive Data Wptbeckwith
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael Priyanka Aash
 
Explain Key Reasons to Evaluate Vulnerability [ updated 2023].docx
Explain Key Reasons to Evaluate Vulnerability [ updated 2023].docxExplain Key Reasons to Evaluate Vulnerability [ updated 2023].docx
Explain Key Reasons to Evaluate Vulnerability [ updated 2023].docxintel-writers.com
 
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSouth Tyrol Free Software Conference
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperMarc St-Pierre
 
Navigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowNavigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowShyamMishra72
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 

Similar to TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Summary (20)

State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
Technology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session SummaryTechnology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session Summary
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
Information Security
Information SecurityInformation Security
Information Security
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Where Is Your Sensitive Data Wp
Where Is Your Sensitive Data   WpWhere Is Your Sensitive Data   Wp
Where Is Your Sensitive Data Wp
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
Explain Key Reasons to Evaluate Vulnerability [ updated 2023].docx
Explain Key Reasons to Evaluate Vulnerability [ updated 2023].docxExplain Key Reasons to Evaluate Vulnerability [ updated 2023].docx
Explain Key Reasons to Evaluate Vulnerability [ updated 2023].docx
 
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) Whitepaper
 
Navigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to KnowNavigating the SOC 2 Certification Maze: What You Need to Know
Navigating the SOC 2 Certification Maze: What You Need to Know
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 

Recently uploaded

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 

TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Summary

  • 1. Technology Executives Club Roundtable / SIG Cyber Security & Risk Management “Changing Weather Patterns: Managing Supplier Cyber Security Risk in the age of Cloud Services” Meeting Summary January 29, 2016
  • 2. W. Capra Consulting Group Topic Overview 1 Addressing the challenges associated with managing supplier cyber security risk:  Supplier Visibility – identify shadow supplier relationships that pose risk to digital assets  Contracting and Accountability – identify key contractual elements to ensure disclosure, remediation & recourse  Measuring Security Effectiveness – assess capability of existing controls and ongoing security program  Incident Response Execution – ensure supplier security incident (e.g., breach) is communicated and handled effectively and efficiently  Governance – continual monitoring and periodic review to ensure effective controls are maintained
  • 3. W. Capra Consulting Group Discussion Points (1) 2 What’s the most significant struggle managing traditional and cloud providers in today’s environment? Predominant View – governance is the key to ensuring suppliers are maintaining effective security controls. Leadership Feedback 1. Visibility to the what’s being outsourced remains a challenge – business stakeholders working outside of IT. Educating the business community to the importance of IT involvement is key to closing the gap. 2. The ability to verify supplier controls at a detailed level - supplier services are opaque. 3. Effective governance is required to ensure suppliers are delivering services in a manner that provides the right protection for information assets.
  • 4. W. Capra Consulting Group Discussion Points (2) 3 What security and risk due diligence/validation process do you utilize when evaluating suppliers? Do you require certifications (e.g., ISO 27002) or specific controls based on the sensitivity of data included in scope? Predominant View – Conducting surveys is the most common approach to evaluating suppliers. The survey content is a derived from several sources – National Institute of Standards and Technology (NIST), Cloud Security Alliance (CSA) and others. Leadership Feedback 1. Company brand is on the line. When a breach occurs the provider is not in the headlines, it’s your brand. There has to be a level of due diligence prior to contracting and throughout the relationship. 2. It’s a challenge to obtain “real assurance” there has to be a level of trust. 3. Providers delivering industry solutions are beginning to push back on the level of scrutiny. They have been vetted by many organizations and point to achieved certification (e.g., ISO, SOC).
  • 5. W. Capra Consulting Group Discussion Points (3) 4 Does your organization view the risk of public IaaS, private cloud, private hosted, PaaS or SaaS services differently? Predominant View – supplier risk associated with SaaS, PaaS and public IaaS services are perceived to be higher than private (company controlled) services. The loss of visibility and control is a concern. Leadership Feedback 1. Data classification influences what is hosted with providers versus delivered in-house. The most sensitive data is hosted in-house. 2. Public IaaS services continue to improve security and provide more options for customers to protect data. The key is architecting the services preserve confidentiality of data at rest and in transit. Avoiding multi-tenant application and data services is key. 3. In each scenario the same level of thought is required to ensure data is protected. What shifts is the level of responsibility for applying and maintaining the security controls.
  • 6. W. Capra Consulting Group Discussion Points (4) 5 How do you contract to hold suppliers accountable for maintaining the right level of security? What recourse do you have when they fall short on their contractual security obligations? Predominant View – The contracting process is essential to establishing the right expectations and holding the supplier accountable for maintaining the right level of security. Leadership Feedback 1. Damages – supplier contracts include damages in the event a breach occurs and company data is exposed 2. Brand exposure – suppliers are not able to disclose the company name in the event a breach occurs 3. Data sovereignty – supplier must process and store data within a specified geographical boundary 4. Security controls – company data must be encrypted at rest and in transit using cryptography that, at a minimum, meets FIPS 140-2 standards
  • 7. W. Capra Consulting Group Discussion Points (5) 6 How frequently do you audit suppliers? Is there a defined governance role? What’s the interaction with security? Predominant View – The consensus view is an annual audit. The role responsible for this varies across organizations. Security is most often involved in the process to ensure it is effective. Leadership Feedback 1. All organizations perform audits prior to contracting and annually during the relationship. 2. Cloud Security Alliance (CSA) controls matrix is used to guide audit activities for some organizations 3. The governance role must be more clearly defined in most organizations. Establishment of Service Manager/Service Delivery Manager role is needed.
  • 8. W. Capra Consulting Group Discussion Points (6) 7 How do you maintain visibility of what data is hosted where within the organization – traditional hosting, public IaaS, private hosted, private IaaS or SaaS? Predominant View – The challenge persists throughout most organizations. Accountability resides within the IT organization but there isn’t a consensus regarding which role is responsible. The industry response is most often the role responsible for information/data architecture. Leadership Feedback 1. Working with internal partners to increase awareness is the key to maintaining visibility to cloud/sourcing relationships. 2. This is an important issue as data sovereignty is a key issue and the proper expectations must be established during the contracting process. 3. Organizations are beginning the assess the effectiveness of Cloud Access Security Brokers to monitor traffic patterns and identify “rogue” services.
  • 9. W. Capra Consulting Group Questions We Didn’t Get To Ask… 1. How do you validate security incident response processes (notification/communication, impact analysis, remediation, response)? How are supplier processes integrated with your internal processes? 2. Are there any services that you would not outsource to a cloud provider? For example, mission critical business services or highly sensitive data (e.g., PCI, HIPAA). 3. How has the increasing Board responsibility for security diligence impacted management of suppliers? 4. How are compliance requirements integrated with your due diligence and review processes? 9
  • 10. W. Capra Consulting Group 221 N. LaSalle, Suite 1325 Chicago, Illinois 60601 Security SIG Chairperson: Matt Beale, Associate Partner, W. Capra mbeale@wcapra.com (312)972-2433 Technology Executive Club Reference: www.technologyexecutivesclub.com www.technologyexecutivesclub.com/securitychicago