SlideShare a Scribd company logo
1 of 13
cloud
Wayne Anderson
@NoCo_Architect
@NoCo_Architect
@AccentureSecurity
@schneierblog
@threatintel
@Tripwireinc
@mkrigsman
This presentation does not constitute a professional advisory
relationship and does not necessarily represent the official opinions
of Avanade Inc or its partners and parents.
“
”Aristotle (384-322 BC)
And lets be clear:
There are a lot of really interesting security
investments available to the modern complex
enterprise.
Among the most effective in “new” models is
cloud analytics backed threat analysis.
We are surrounded by
cloud marketing.
Plan
Deliver
Operate
Manage
Who holds the due diligence documentation? Has it been revisited? Does your
contract match your business needs? How do you know? When is the last time
you measured what your residual risk is for ServiceX? ServiceY?
Who owns the incident? Where does your organization pick up investigation?
What specific evidence artifacts will your vendor turn over to you? Can you
even read them? Have you ever tested your incident processWITH your
vendor(s)?
How are you communicating your top risks to your vendor(s)? Do you know
what those vendors’ top risks are likely to be? Checklist: Risk Registry, Record
of RiskTreatment, Record of Risk Acceptance
Does your organization know who is responsible for the vendor(s)? Do you have
a map of who internally is the escalation contact for ServiceX and ServiceY?
What internal services depend on which external services?
http://www.microsoft.com/mof
How does security plug into what you need to do with a cloud vendor? What are
the connections between your vendor and your systems? Are there
appropriate data boundaries over which certain data should not move?
1
Plan
Deliver
Operate
Manage
Who holds the due diligence documentation? Has it been revisited? Does your
contract match your business needs? How do you know? When is the last time
you measured what your residual risk is for ServiceX? ServiceY?
Who owns the incident? Where does your organization pick up investigation?
What specific evidence artifacts will your vendor turn over to you? Can you
even read them? Have you ever tested your incident processWITH your
vendor(s)?
How are you communicating your top risks to your vendor(s)? Do you know
what those vendors’ top risks are likely to be? Checklist: Risk Registry, Record
of RiskTreatment, Record of Risk Acceptance
Does your organization know who is responsible for the vendor(s)? Do you have
a map of who internally is the escalation contact for ServiceX and ServiceY?
What internal services depend on which external services?
How does security plug into what you need to do with a cloud vendor? What are
the connections between your vendor and your systems? Are there
appropriate data boundaries over which certain data should not move?
ITIL 2011
• AmitYoran, RSA, 2015
• PwC with CIO and CSO Magazines, September 2015
• Available from PwC with targeted guidance for Retail and Financial Services
• Gartner, July 2015
2
• http://www.opensecurityarchitecture.org/cms/library/patternlandscape/
• Cloud SecurityAlliance –Trusted Cloud Reference Architecture
• FedRAMP
• https://www.fedramp.gov/
http://ithandbook.ffiec.gov/what's-new.aspx
3
http://ithandbook.ffiec.gov/what's-new.aspx
3
Use analysts to save you time and money.
Gartner, Forrester, PwC, Accenture Research,
Symantec, IO Active
Can help in “knitting” together multiple
applicable governance frameworks.
Industry offerings like Unified Compliance
Framework are also dedicated to the problem.
https://www.accenture.com/us-en/insight-cybersecurity-research-report.aspx
4
(ISO 20000, ITIL, MOF)
(Surveys, Cross-IndustryAnalysts)
(Published guidance)
“
”
@NoCo_Architect wanderson@wanderson.org

More Related Content

What's hot

Partnership with a CFO: On the Front Line of Cybersecurity
Partnership with a CFO: On the Front Line of CybersecurityPartnership with a CFO: On the Front Line of Cybersecurity
Partnership with a CFO: On the Front Line of CybersecurityPriyanka Aash
 
CyberGRX TPCRM Case Study - ComplySci
CyberGRX TPCRM Case Study - ComplySci CyberGRX TPCRM Case Study - ComplySci
CyberGRX TPCRM Case Study - ComplySci Jazmin Frederick
 
CXAIR for Healthcare Brochure
CXAIR for Healthcare BrochureCXAIR for Healthcare Brochure
CXAIR for Healthcare BrochureConnexica
 
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)Ulf Mattsson
 
Omnia AI Factory – Cyber AI Product Suite
Omnia AI Factory – Cyber AI Product SuiteOmnia AI Factory – Cyber AI Product Suite
Omnia AI Factory – Cyber AI Product SuiteNeo4j
 
How Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers MillionsHow Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers MillionsElasticsearch
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchLaurent Pacalin
 
A&I for Security Overview
A&I for Security OverviewA&I for Security Overview
A&I for Security OverviewA&I Solutions
 
A&I for Security
A&I for SecurityA&I for Security
A&I for SecurityJerry Recht
 

What's hot (10)

Kenna Datasheet
Kenna DatasheetKenna Datasheet
Kenna Datasheet
 
Partnership with a CFO: On the Front Line of Cybersecurity
Partnership with a CFO: On the Front Line of CybersecurityPartnership with a CFO: On the Front Line of Cybersecurity
Partnership with a CFO: On the Front Line of Cybersecurity
 
CyberGRX TPCRM Case Study - ComplySci
CyberGRX TPCRM Case Study - ComplySci CyberGRX TPCRM Case Study - ComplySci
CyberGRX TPCRM Case Study - ComplySci
 
CXAIR for Healthcare Brochure
CXAIR for Healthcare BrochureCXAIR for Healthcare Brochure
CXAIR for Healthcare Brochure
 
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)Thought leaders in big data   ulf mattsson, cto of protegrity (part 4)
Thought leaders in big data ulf mattsson, cto of protegrity (part 4)
 
Omnia AI Factory – Cyber AI Product Suite
Omnia AI Factory – Cyber AI Product SuiteOmnia AI Factory – Cyber AI Product Suite
Omnia AI Factory – Cyber AI Product Suite
 
How Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers MillionsHow Walmart is Combating Fraud and Saving Consumers Millions
How Walmart is Combating Fraud and Saving Consumers Millions
 
ROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus ResearchROI of Fraud Detection by Nucleus Research
ROI of Fraud Detection by Nucleus Research
 
A&I for Security Overview
A&I for Security OverviewA&I for Security Overview
A&I for Security Overview
 
A&I for Security
A&I for SecurityA&I for Security
A&I for Security
 

Similar to IASA eSummit Nov 15 - signposts for security investment in a cloud world

Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security reportGabe Akisanmi
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docxevonnehoggarth79783
 
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOUHOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOUNormShield
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataSteven Schwartz
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementMighty Guides, Inc.
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey aheadKevin Duffey
 
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSouth Tyrol Free Software Conference
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsUlf Mattsson
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersMighty Guides, Inc.
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...Nordic APIs
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsReview on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsNormShield
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - HackersDendreon
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 

Similar to IASA eSummit Nov 15 - signposts for security investment in a cloud world (20)

Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security report
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOUHOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
DVV Solutions Legal Vendor Network White Paper April 2016
DVV Solutions Legal Vendor Network White Paper April 2016DVV Solutions Legal Vendor Network White Paper April 2016
DVV Solutions Legal Vendor Network White Paper April 2016
 
Asteros Cybersecurity Services PowerPoint Design
Asteros Cybersecurity Services PowerPoint DesignAsteros Cybersecurity Services PowerPoint Design
Asteros Cybersecurity Services PowerPoint Design
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsReview on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - Hackers
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 

IASA eSummit Nov 15 - signposts for security investment in a cloud world

  • 2. @NoCo_Architect @AccentureSecurity @schneierblog @threatintel @Tripwireinc @mkrigsman This presentation does not constitute a professional advisory relationship and does not necessarily represent the official opinions of Avanade Inc or its partners and parents.
  • 4. And lets be clear: There are a lot of really interesting security investments available to the modern complex enterprise. Among the most effective in “new” models is cloud analytics backed threat analysis. We are surrounded by cloud marketing.
  • 5. Plan Deliver Operate Manage Who holds the due diligence documentation? Has it been revisited? Does your contract match your business needs? How do you know? When is the last time you measured what your residual risk is for ServiceX? ServiceY? Who owns the incident? Where does your organization pick up investigation? What specific evidence artifacts will your vendor turn over to you? Can you even read them? Have you ever tested your incident processWITH your vendor(s)? How are you communicating your top risks to your vendor(s)? Do you know what those vendors’ top risks are likely to be? Checklist: Risk Registry, Record of RiskTreatment, Record of Risk Acceptance Does your organization know who is responsible for the vendor(s)? Do you have a map of who internally is the escalation contact for ServiceX and ServiceY? What internal services depend on which external services? http://www.microsoft.com/mof How does security plug into what you need to do with a cloud vendor? What are the connections between your vendor and your systems? Are there appropriate data boundaries over which certain data should not move? 1
  • 6. Plan Deliver Operate Manage Who holds the due diligence documentation? Has it been revisited? Does your contract match your business needs? How do you know? When is the last time you measured what your residual risk is for ServiceX? ServiceY? Who owns the incident? Where does your organization pick up investigation? What specific evidence artifacts will your vendor turn over to you? Can you even read them? Have you ever tested your incident processWITH your vendor(s)? How are you communicating your top risks to your vendor(s)? Do you know what those vendors’ top risks are likely to be? Checklist: Risk Registry, Record of RiskTreatment, Record of Risk Acceptance Does your organization know who is responsible for the vendor(s)? Do you have a map of who internally is the escalation contact for ServiceX and ServiceY? What internal services depend on which external services? How does security plug into what you need to do with a cloud vendor? What are the connections between your vendor and your systems? Are there appropriate data boundaries over which certain data should not move? ITIL 2011
  • 7. • AmitYoran, RSA, 2015 • PwC with CIO and CSO Magazines, September 2015 • Available from PwC with targeted guidance for Retail and Financial Services • Gartner, July 2015 2
  • 8. • http://www.opensecurityarchitecture.org/cms/library/patternlandscape/ • Cloud SecurityAlliance –Trusted Cloud Reference Architecture • FedRAMP • https://www.fedramp.gov/
  • 10. http://ithandbook.ffiec.gov/what's-new.aspx 3 Use analysts to save you time and money. Gartner, Forrester, PwC, Accenture Research, Symantec, IO Active Can help in “knitting” together multiple applicable governance frameworks. Industry offerings like Unified Compliance Framework are also dedicated to the problem.
  • 12. (ISO 20000, ITIL, MOF) (Surveys, Cross-IndustryAnalysts) (Published guidance)