SlideShare a Scribd company logo
CENTRALIZED CYBERSECURITY IN
A DECENTRALIZED WORLD
BOB TURNER
CHIEF INFORMATION SECURITY OFFICER
UNIVERSITY OF WISCONSIN-MADISON
CISO CHICAGO SUMMIT - AUGUST 2015
CYBERSECURITY PERSPECTIVES
3/10/2016
2
CENTRALLY GOVERNED DISTRIBUTED GOVERNANCE
Single threaded authority, responsibility, and
decision making power
Authority, responsibility, and decision making
power are vested in and delegated to
individual groups and teams
Common hierarchy for policies, standards,
guidelines, procedures, and processes
Teams establish their own policies, standards,
guidelines, procedures, and processes
Enterprise-wide involvement in the
development and implementation of risk
management and cybersecurity strategies
Decentralized cybersecurity risk
management is based on individual team
and business strategies
Strong, well-informed central leadership
provides consistency throughout the
organization
Sharing of risk-related information among
subordinate organizations
Less autonomy for subordinate organizations No subordinate organization is able to
transfer risk to another without the latter's
informed consent.
3/10/2016 3
Advanced Persistent Threat
Data Breach Attacks
WHY ARE WE TALKING ABOUT THIS?
DDoS or Other Events
3/10/2016
What are the current attack vectors?
CHANGES IN HIGHER EDUCATION
3/10/2016
4
From 2014 Wisegate Survey: Assessing and Managing IT Security Risks
• Academic and research responsibilities can be burdened when
cybersecurity processes and procedures are not risk reducers
 While research environments are run by talented technologists providing adequate
security controls, providing system information to the campus wide cybersecurity
team should follow industry best-practices
 Remote scans and continuous monitoring are options for gathering vulnerability
information and can be run during off-peak hours
• Perceptions (and a little reality) that vulnerability and asset management
scanning slows down higher performance networks
 Computing power and high bandwidth can mask criminal activity
 Scans can be tailored to be as non-intrusive as possible or scheduled to occur
outside peak computing windows
• Not all campus networks have adequate IT support or appropriately
trained cybersecurity staff
 Can centralized cybersecurity staff provide support on a transactional basis?
WHAT IS THE ROOT CAUSE?
3/10/2016
5
THINK TANK!
What does a CISO do when IT support and
cybersecurity services are not centrally driven?
How can CISOs address common cybersecurity
threats with a unified and cohesive approach?
Where do CISO’s turn to find the right
partnerships to improve cybersecurity
programs?
3/10/2016
6
3/10/2016
7
What questions do you have?
http://www.cio.wisc.edu/security/

More Related Content

What's hot

SECURITY
SECURITYSECURITY
SECURITY
Tony Fanelli
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
Synack
 
HPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly InnovateHPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly Innovate
scoopnewsgroup
 
Cybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. BaldwinCybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. Baldwin
scoopnewsgroup
 
CyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROICyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROI
Siemplify
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
Craig McGill
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
Tripwire
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
Cylance
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity Framework
William McBorrough
 
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-OverviewCylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
Innovation Network Technologies: InNet
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
Skoda Minotti
 
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment DatasheetCylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
Innovation Network Technologies: InNet
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
ePlus
 
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
North Texas Chapter of the ISSA
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident Response
Siemplify
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
ZyrellLalaguna
 
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
TNSIMarketing
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
wardjo
 
Cybersecurity Consulting Services flyer
Cybersecurity Consulting Services flyerCybersecurity Consulting Services flyer
Cybersecurity Consulting Services flyer
John Anderson
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data Security
MarkLogic
 

What's hot (20)

SECURITY
SECURITYSECURITY
SECURITY
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
HPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly InnovateHPE Protect 2016 - Fearlessly Innovate
HPE Protect 2016 - Fearlessly Innovate
 
Cybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. BaldwinCybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. Baldwin
 
CyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROICyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROI
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity Framework
 
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-OverviewCylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
 
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment DatasheetCylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
 
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident Response
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
 
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
Cybersecurity Consulting Services flyer
Cybersecurity Consulting Services flyerCybersecurity Consulting Services flyer
Cybersecurity Consulting Services flyer
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data Security
 

Similar to Centralized Cybersecurity in a Decentralized World

How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
Tammy Clark
 
Transforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence SharingTransforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence Sharing
EMC
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and Response
EMC
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
Ramón Gómez de Olea y Bustinza
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attention
Ramón Gómez de Olea y Bustinza
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
Andréanne Clarke
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Leslie McFarlin
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
Steve Fantauzzo
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
The Internet of Things
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
James Gachie
 
Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711
Trainning Educação
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
The Internet of Things
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
Cisco Canada
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdf
kelyn Technology
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
gurneyhal
 
Security Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based QuestionsSecurity Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based Questions
priyanshamadhwal2
 
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
infosecTrain
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
BernardinoMelgar1
 

Similar to Centralized Cybersecurity in a Decentralized World (20)

How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
 
Transforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence SharingTransforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence Sharing
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and Response
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attention
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
 
Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdf
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
Security Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based QuestionsSecurity Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based Questions
 
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
Explore SOC (Security Operations Center)-based Interview Questions to Unlock ...
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 

Centralized Cybersecurity in a Decentralized World

  • 1. CENTRALIZED CYBERSECURITY IN A DECENTRALIZED WORLD BOB TURNER CHIEF INFORMATION SECURITY OFFICER UNIVERSITY OF WISCONSIN-MADISON CISO CHICAGO SUMMIT - AUGUST 2015
  • 2. CYBERSECURITY PERSPECTIVES 3/10/2016 2 CENTRALLY GOVERNED DISTRIBUTED GOVERNANCE Single threaded authority, responsibility, and decision making power Authority, responsibility, and decision making power are vested in and delegated to individual groups and teams Common hierarchy for policies, standards, guidelines, procedures, and processes Teams establish their own policies, standards, guidelines, procedures, and processes Enterprise-wide involvement in the development and implementation of risk management and cybersecurity strategies Decentralized cybersecurity risk management is based on individual team and business strategies Strong, well-informed central leadership provides consistency throughout the organization Sharing of risk-related information among subordinate organizations Less autonomy for subordinate organizations No subordinate organization is able to transfer risk to another without the latter's informed consent.
  • 3. 3/10/2016 3 Advanced Persistent Threat Data Breach Attacks WHY ARE WE TALKING ABOUT THIS? DDoS or Other Events 3/10/2016
  • 4. What are the current attack vectors? CHANGES IN HIGHER EDUCATION 3/10/2016 4 From 2014 Wisegate Survey: Assessing and Managing IT Security Risks
  • 5. • Academic and research responsibilities can be burdened when cybersecurity processes and procedures are not risk reducers  While research environments are run by talented technologists providing adequate security controls, providing system information to the campus wide cybersecurity team should follow industry best-practices  Remote scans and continuous monitoring are options for gathering vulnerability information and can be run during off-peak hours • Perceptions (and a little reality) that vulnerability and asset management scanning slows down higher performance networks  Computing power and high bandwidth can mask criminal activity  Scans can be tailored to be as non-intrusive as possible or scheduled to occur outside peak computing windows • Not all campus networks have adequate IT support or appropriately trained cybersecurity staff  Can centralized cybersecurity staff provide support on a transactional basis? WHAT IS THE ROOT CAUSE? 3/10/2016 5
  • 6. THINK TANK! What does a CISO do when IT support and cybersecurity services are not centrally driven? How can CISOs address common cybersecurity threats with a unified and cohesive approach? Where do CISO’s turn to find the right partnerships to improve cybersecurity programs? 3/10/2016 6
  • 7. 3/10/2016 7 What questions do you have? http://www.cio.wisc.edu/security/