SlideShare a Scribd company logo
1 of 18
Download to read offline
Emerging Trends in Security
Governance:
Making Security a
Business Success



       Daniel J Blander, CISM,CISSP
[ agenda ]
[ challenges ]

[ why ]

[ emerging changes ]
[ challenges ]

How many of you struggle to get
management and users to take part in
security?

Do they seek out your advice?
Do they follow policy?
Do have their respect?
[ challenges ]

How consistent is your security posture?
   Policies
   Risk Management & Planning
   Security Organization
   User Awareness
   System Security
   Network Security
   Physical Asset Security
   Operational Security
   Monitoring
   User Access
   Legal Due-Diligence
[ challenges ]

How good is your organization’s security
awareness?
[ why ]
Security is driven by:
•   Company & Stakeholder awareness of risk
    •   “Its never happened to us before”
•   Prevalent focus on: Profit, Cost, Opportunity
[ why ]
Security is Only for Computers
  •   Network Security Manager
  •   IT Security Manager
  •   IT Compliance
  •   CIO = Chief IT Officer

  •   67% of Information Security is driven by IT
  •   81% of Security Policies are written
      exclusively by IT
[ why ]
Security is a Cost Center
•   Security does not generate revenue
•   Security is restrictive
•   Security stops us from doing things

The result:
•   Security is marginalized
•   Security is the first to be cut
[ why ]
How did we get here?
•   Self Inflicted Wounds
    •   Techno-babble
    •   Fear mongering – FUD & Hype
    •   Troublesome list of risks that never happen
•   Unfulfilled Prophecies
    •   Companies did not fail after a breach
    •   TJX – stock up 50% one year later
[ change ]
Create a shared Governance Function
•   Involve business stakeholders
•   Address all department’s needs for
    Confidentiality, Integrity, and Availability
•   Discuss strategic issues
•   Talk about opportunities and company future


Result:
•   Unified awareness, vision and effort
•   Awareness and consistency across the business
[ change ]

                  HR
     Finance               Sales


                Security
    IT          Steering      Legal
               Committee
[ change ]
Coach the Team

Have clear goals
•   Aligned with business goals
•   Make the meeting meaningful with take away
    info and tasks
•   Make subject matter relevant.

Do not let one area grab all the focus
•   Risk across all business areas
•   Risk of all types
[ change ]
Security as “Business Risk Management”
•   Information Protection     •   Investigations
•   Privacy                    •   Insurance
•   Business Continuity        •   Personnel Safety
•   Physical Security          •   Counter Espionage
•   Loss Prevention            •   Legal Counsel

                         Chief Risk
                          Officer

         Physical                         Information
                             Legal
         Security                         & IT Security
[ change ]
Think how security can enhance real
  business drivers…
•   Consistent Process & Environments = Efficiency
•   System Availability = More Time Working
•   Security Systems = Consistent Environments +
    Availability
•   Consistent Processes + Environments = Security


•   ITIL
•   Process Improvement
•   Predictability
[ the future ]
Security = The Company
It is not security for IT, it is security for the
    protecting the company.
•   Company is made up of people and processes.
•   Computers support the process.

Security is not the end, it is a process contained in
  larger processes.
•   Security enables business – not through mitigating risk but
    promoting best practices (ITIL).
•   Look to give back to the company whenever you can. Be a
    facilitator, and show that security can tag along for the ride, not
    be the kick in the teeth.
[ change ]
Decentralize Enforcement
   •   savings + shared responsibility
Information Security Team
   •   Consult, Guide, Monitor, Assess         Network
                                                Admin
Network Administrator
   •   Network Firewalls, Routers
                                     Service     Info     System
System Administrator                  Desk     Security   Admin

   •   Anti-Virus
Service Desk                                   Physical
                                               Security
   •   User Access Setup
[ change ]
How do you lead to achieve this?
•   Have a New Attitude
    •   NO FUD

•   Put your business hat on!
    •   Think of good business practices that reflect security
    •   Think of business opportunities

•   Be a Team Player - Include everyone on the team
[ change: sources ]

More Related Content

Similar to Security Governance - Trends and Ideas

Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System SecurityCSSRL PUNE
 
FRSecure Company Overview
FRSecure Company OverviewFRSecure Company Overview
FRSecure Company OverviewKevin Orth
 
FRSecure Company Overview
FRSecure Company OverviewFRSecure Company Overview
FRSecure Company Overviewstevemarsden
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your BusinessNeil Kemp
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMIvanti
 
ISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxNapoleon NV
 
bh-win-04-conacher.ppt
bh-win-04-conacher.pptbh-win-04-conacher.ppt
bh-win-04-conacher.pptRakesh Kumar
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsSam Bowne
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsSam Bowne
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales DeckEvan Francen
 

Similar to Security Governance - Trends and Ideas (20)

Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Belgina ism-v3 3
Belgina ism-v3 3Belgina ism-v3 3
Belgina ism-v3 3
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
Information security
Information securityInformation security
Information security
 
FRSecure Company Overview
FRSecure Company OverviewFRSecure Company Overview
FRSecure Company Overview
 
FRSecure Company Overview
FRSecure Company OverviewFRSecure Company Overview
FRSecure Company Overview
 
Data Protection: An Approach to Privacy
Data Protection: An Approach to PrivacyData Protection: An Approach to Privacy
Data Protection: An Approach to Privacy
 
Confidis-Briefing-Web
Confidis-Briefing-WebConfidis-Briefing-Web
Confidis-Briefing-Web
 
IT Security for your Business
IT Security for your BusinessIT Security for your Business
IT Security for your Business
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSM
 
ISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptx
 
bh-win-04-conacher.ppt
bh-win-04-conacher.pptbh-win-04-conacher.ppt
bh-win-04-conacher.ppt
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 

Security Governance - Trends and Ideas

  • 1. Emerging Trends in Security Governance: Making Security a Business Success Daniel J Blander, CISM,CISSP
  • 2. [ agenda ] [ challenges ] [ why ] [ emerging changes ]
  • 3. [ challenges ] How many of you struggle to get management and users to take part in security? Do they seek out your advice? Do they follow policy? Do have their respect?
  • 4. [ challenges ] How consistent is your security posture?  Policies  Risk Management & Planning  Security Organization  User Awareness  System Security  Network Security  Physical Asset Security  Operational Security  Monitoring  User Access  Legal Due-Diligence
  • 5. [ challenges ] How good is your organization’s security awareness?
  • 6. [ why ] Security is driven by: • Company & Stakeholder awareness of risk • “Its never happened to us before” • Prevalent focus on: Profit, Cost, Opportunity
  • 7. [ why ] Security is Only for Computers • Network Security Manager • IT Security Manager • IT Compliance • CIO = Chief IT Officer • 67% of Information Security is driven by IT • 81% of Security Policies are written exclusively by IT
  • 8. [ why ] Security is a Cost Center • Security does not generate revenue • Security is restrictive • Security stops us from doing things The result: • Security is marginalized • Security is the first to be cut
  • 9. [ why ] How did we get here? • Self Inflicted Wounds • Techno-babble • Fear mongering – FUD & Hype • Troublesome list of risks that never happen • Unfulfilled Prophecies • Companies did not fail after a breach • TJX – stock up 50% one year later
  • 10. [ change ] Create a shared Governance Function • Involve business stakeholders • Address all department’s needs for Confidentiality, Integrity, and Availability • Discuss strategic issues • Talk about opportunities and company future Result: • Unified awareness, vision and effort • Awareness and consistency across the business
  • 11. [ change ] HR Finance Sales Security IT Steering Legal Committee
  • 12. [ change ] Coach the Team Have clear goals • Aligned with business goals • Make the meeting meaningful with take away info and tasks • Make subject matter relevant. Do not let one area grab all the focus • Risk across all business areas • Risk of all types
  • 13. [ change ] Security as “Business Risk Management” • Information Protection • Investigations • Privacy • Insurance • Business Continuity • Personnel Safety • Physical Security • Counter Espionage • Loss Prevention • Legal Counsel Chief Risk Officer Physical Information Legal Security & IT Security
  • 14. [ change ] Think how security can enhance real business drivers… • Consistent Process & Environments = Efficiency • System Availability = More Time Working • Security Systems = Consistent Environments + Availability • Consistent Processes + Environments = Security • ITIL • Process Improvement • Predictability
  • 15. [ the future ] Security = The Company It is not security for IT, it is security for the protecting the company. • Company is made up of people and processes. • Computers support the process. Security is not the end, it is a process contained in larger processes. • Security enables business – not through mitigating risk but promoting best practices (ITIL). • Look to give back to the company whenever you can. Be a facilitator, and show that security can tag along for the ride, not be the kick in the teeth.
  • 16. [ change ] Decentralize Enforcement • savings + shared responsibility Information Security Team • Consult, Guide, Monitor, Assess Network Admin Network Administrator • Network Firewalls, Routers Service Info System System Administrator Desk Security Admin • Anti-Virus Service Desk Physical Security • User Access Setup
  • 17. [ change ] How do you lead to achieve this? • Have a New Attitude • NO FUD • Put your business hat on! • Think of good business practices that reflect security • Think of business opportunities • Be a Team Player - Include everyone on the team