SlideShare a Scribd company logo
leet security

     Corporate presentation
     F38ru4ry 2012
Content

          • Initial concepts
                                 1



          • Vendor risk rating

          • Our proposal for a
            rating system
2




INITIAL CONCEPTS
What is a rating?
• Rating (Collins English Dictionary)
   – “a classification according to order or grade; ranking.”
                                                                          3
   – (Economics, Accounting & Finance / Banking & Finance) “the
     estimated financial or credit standing of a business enterprise or
     individual”
What is a rating?
• Ratings of main agencies
  are expressed with a
  nomenclature that combines   4

  letters, upper and
  lowercase, numbers and
  symbols.


• Although they can change
  from one to another, in
  general, better rating is
  expressed as AAA or A1+.
What is a risk rating agency?
• “Company that assigns credit ratings for issuers of
  certain types of debt obligations as well as the debt
  instruments themselves”, www.wikipedia.org               5




• Companies specialized in securities analysis and that
  analyse issuers with their own methodologies (that
  combines quantitave and qualitative financial analysis
  methods).
What is it for a rating?
• Show the synthesis of a company capacity analysis to
  deal with its financial liabilities in the short and long term.
  That means, it shows the solvency of that company.                6


• It is a succinct indicator of an issuance risk. Issuance with
  lower rating, normally, provide higher returns to
  compensate the risk.
• Allows investors to compare the risk of different
  investments although they come from different issuers,
  countries, industries…
Rating challenges
• Time, energy, or money
  that agent side
  (provider) should use to            Time            7

  send a signal.

• Mechanisms for the
  receiver (potential
  client) to trust that the
  signal is a credible        Money          Effort
  statement of its
  information.
Theoretical Foundation
• In some economical transactions
  (contract theory), disparities in access
  to information alter the normal            8

  functioning of markets, creating
  problems of adverse selection and
  moral hazard.
• There are two solutions for opposing
  imperfect information (George Akerlof,
  1970):
   – Signaling
   – Screening
Theoretical Foundation
• Signaling (Michael Spence, 1973)
   – Two sides can circumvent asymmetric
                                               9
     information problem if one of them
     sends a signal to the other party to
     disclose relevant information.
   – Signaling consist precisely in that the
     agent submit credibly some
     information about itself to the other
     party.
Theoretical Foundation
• Screening (Joseph E. Stiglitz, 1973)
   – In this theory, one of the sides can lead
                                                    10
     the other to show its information.
   – In this situation, the side that posses
     information is not the first to act, but the
     side without information the one who
     accept to learn what it can from the other.
11




VENDOR RISK RATING
Need description
          • In services outsourcing (especially in ICT
            sector) we find an example of assymetric
            information that can leads to adverse              12

            selection.
             – The client does not really know the security
               measures that the vendor implements.
             – Lack of information could lead the client to
               choose always the cheaper service although it
               was not the one that better fits its needs.
          • This situation is really pressing regarding
            cloud computing market.
Need description
• There is a need of a
                                                 Audit
  mechanism that helps to                     (screening)
  balance the asymmetry of                                                  13

  information.

• Options (all of them based
  on trusted third parties) :                 Options

                                   Rating                       ISMS
                                                            Certification
                                (signaling)                  (signaling)
What shows risk vendor rating?
          • Rating (for services) gives a relative value
            that can be understood as a forecast about
            technical solvency of the vendor in relation     14
            to its security and resiliency.

          • In this way, services with a better rating are
            the ones with fewer probability of suffering
            an incident that affects Service Level
            Agreements in a significant way.
Rating advantages


    Rating                     Other options             15



    • Less resources (time,     • More used / known by
      money and efforts)          security sector
    • Focus on security and
      resiliency
    • Feasibility of
      homogeneous
      comparison (single scale)
Rating advantages: Supply
      segmentation
       Current situation –                     Segmented services
       Provider only has one                   with different ratings
       option                                                    Users that
                                                                               16


                                                                  buy the
                                                                  service
Fee               Users that             Fee
                                                                  Low risk
                   buy the                                        service
                   service
                          Service risk                           Medium risk
                          level                                  service


                          User needs                             High risk
                                                                 service

                       Risk                                    Risk
Ventajas de la calificación: Cada
     proceso su nivel de riesgo
         Situación actual – Los                       Diferentes procesos
         servicios son “café                          con diferentes
         para todos”                                  necesidades
                                                                       Usuarios que
                                                                                            17


                                                                       contratan el
                                                                         servicio
Precio            Usuarios que               Precio
                                                                          Servicio riesgo
                  contratan el                                            bajo
                    servicio
                           Nivel de riesgo                               Servicio riesgo
                           del servicio                                  medio


                           Necesidades                                   Servicio riesgo
                           de los usuarios                               alto

                        Riesgo                                         Riesgo
18




OUR PROPOSAL FOR A RATING
SYSTEM
Dimensions
                                            A
                           B
             C                                              19


       D

   E




                 + Compliance specific levels: D+, C+, B+
Areas / chapters


                   20
General information


                      21
Mixed approach Self-statement &
Assessment
• Goal: Avoid the usual conflict of interest arising from the
  trusted third party fees being paid by the provider.
                                                                22
   – Enter to the system: Explanatory dossier.
   – Once accepted: Provider self-declare the service rating.
   – Upper rating level can be defined by the agency.
• Consequence: Strengthen monitoring mechanisms
   – Random and periodic audits.
   – Incident notification channel.
   – Disciplinary proceedings.
Service use conditions
• Allows service providers to use the rating system.
• Establish vendor commitment to use the system in a
                                                                23
  correct way when self-statement rating levels.
• Defines penalties in case of non-observance of rating
  system guide.
• Gives right for the necessary training to self-state rating
  levels.
• Annual renewals.
Thank you…



             … Questions?   24
Contact


                                                            25
                                            leet_security




                                    www.leetsecurity.com


          info@leetsecurity.com
          antonio.ramos@leetsecurity.com

More Related Content

What's hot

Making BancAssurance Agile - 4th Annual BancAssurance Conference
Making BancAssurance Agile - 4th Annual BancAssurance ConferenceMaking BancAssurance Agile - 4th Annual BancAssurance Conference
Making BancAssurance Agile - 4th Annual BancAssurance Conference
Agile Financial Technologies
 
Competitive Market Analysis
Competitive Market AnalysisCompetitive Market Analysis
Competitive Market Analysis
guestc9708f8
 
The Transitions Group Llc 2009
The Transitions Group Llc 2009The Transitions Group Llc 2009
The Transitions Group Llc 2009
John A Deasy
 
Credit risk off shoring
Credit risk off shoringCredit risk off shoring
Credit risk off shoringVenkat Iyer
 
Investor Presentation - August 2011
Investor Presentation - August 2011Investor Presentation - August 2011
Investor Presentation - August 2011
Multiplus
 
Role for lawyers in adr
Role for lawyers in adrRole for lawyers in adr
Role for lawyers in adr
Durgeshk Pandey
 
Pensioen Forum 2009, Rotterdam, 30 September 2009
Pensioen Forum 2009, Rotterdam, 30 September 2009Pensioen Forum 2009, Rotterdam, 30 September 2009
Pensioen Forum 2009, Rotterdam, 30 September 2009
fvalkenburg
 
Plaquette de présentation CDH2
Plaquette de présentation CDH2Plaquette de présentation CDH2
Plaquette de présentation CDH2Mathieu Chevillard
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
Rahul Bhan (CA, CIA, MBA)
 
Regulatory Models For CuraçAo
Regulatory Models For CuraçAoRegulatory Models For CuraçAo
Regulatory Models For CuraçAoHakvoort
 
Flex leg intl bmc final without video
Flex leg intl bmc final without videoFlex leg intl bmc final without video
Flex leg intl bmc final without videoStanford University
 

What's hot (16)

Continuity planning
Continuity planningContinuity planning
Continuity planning
 
Making BancAssurance Agile - 4th Annual BancAssurance Conference
Making BancAssurance Agile - 4th Annual BancAssurance ConferenceMaking BancAssurance Agile - 4th Annual BancAssurance Conference
Making BancAssurance Agile - 4th Annual BancAssurance Conference
 
XBRL en el ámbito internacional
XBRL en el ámbito internacionalXBRL en el ámbito internacional
XBRL en el ámbito internacional
 
Competitive Market Analysis
Competitive Market AnalysisCompetitive Market Analysis
Competitive Market Analysis
 
Alm and hp
Alm and hpAlm and hp
Alm and hp
 
The Transitions Group Llc 2009
The Transitions Group Llc 2009The Transitions Group Llc 2009
The Transitions Group Llc 2009
 
Fraud Risk Services Brochure
Fraud Risk  Services BrochureFraud Risk  Services Brochure
Fraud Risk Services Brochure
 
Credit risk off shoring
Credit risk off shoringCredit risk off shoring
Credit risk off shoring
 
Investor Presentation - August 2011
Investor Presentation - August 2011Investor Presentation - August 2011
Investor Presentation - August 2011
 
Role for lawyers in adr
Role for lawyers in adrRole for lawyers in adr
Role for lawyers in adr
 
Pensioen Forum 2009, Rotterdam, 30 September 2009
Pensioen Forum 2009, Rotterdam, 30 September 2009Pensioen Forum 2009, Rotterdam, 30 September 2009
Pensioen Forum 2009, Rotterdam, 30 September 2009
 
Plaquette de présentation CDH2
Plaquette de présentation CDH2Plaquette de présentation CDH2
Plaquette de présentation CDH2
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Fraud risk services 2013
Fraud risk services 2013Fraud risk services 2013
Fraud risk services 2013
 
Regulatory Models For CuraçAo
Regulatory Models For CuraçAoRegulatory Models For CuraçAo
Regulatory Models For CuraçAo
 
Flex leg intl bmc final without video
Flex leg intl bmc final without videoFlex leg intl bmc final without video
Flex leg intl bmc final without video
 

Similar to Corporate presentation of rating services from LEET SECURITY

SQ Lecture Two : Consumer Behaviour and Service Quality
SQ Lecture Two : Consumer Behaviour and Service QualitySQ Lecture Two : Consumer Behaviour and Service Quality
SQ Lecture Two : Consumer Behaviour and Service QualitySQAdvisor
 
Real Estate Risk Advisory Brochure
Real Estate Risk Advisory BrochureReal Estate Risk Advisory Brochure
Real Estate Risk Advisory Brochure
Rahul Bhan (CA, CIA, MBA)
 
Real Estate Risk Advisory Brochure
Real Estate Risk Advisory BrochureReal Estate Risk Advisory Brochure
Real Estate Risk Advisory Brochure
Rahul Bhan (CA, CIA, MBA)
 
DDMA / Oracle: Datakwaliteit
DDMA / Oracle: DatakwaliteitDDMA / Oracle: Datakwaliteit
DDMA / Oracle: Datakwaliteit
DDMA
 
Chapter 9: Effectiveness of Loyalty Programs
Chapter 9: Effectiveness of Loyalty ProgramsChapter 9: Effectiveness of Loyalty Programs
Chapter 9: Effectiveness of Loyalty Programsitsvineeth209
 
Does the cloud have a role in fixing the economy?
Does the cloud have a role in fixing the economy?Does the cloud have a role in fixing the economy?
Does the cloud have a role in fixing the economy?
CGI
 
Operational risk management (orm)
Operational risk management (orm)Operational risk management (orm)
Operational risk management (orm)Bushra Angbeen
 
Riskpro Trainings Automotive Industry
Riskpro Trainings Automotive IndustryRiskpro Trainings Automotive Industry
Riskpro Trainings Automotive Industry
Rahul Bhan (CA, CIA, MBA)
 
How to Manage Increasing Data Compliance Issues in Community Banks
How to Manage Increasing Data Compliance Issues in Community BanksHow to Manage Increasing Data Compliance Issues in Community Banks
How to Manage Increasing Data Compliance Issues in Community Banks
Colleen Beck-Domanico
 
Personal Finance On-line: New Models & Opportunities
Personal Finance On-line: New Models & OpportunitiesPersonal Finance On-line: New Models & Opportunities
Personal Finance On-line: New Models & Opportunities
Joe Lamantia
 
Riskpro Insurance Services Ver5
Riskpro Insurance Services Ver5Riskpro Insurance Services Ver5
Riskpro Insurance Services Ver5
Rahul Bhan (CA, CIA, MBA)
 

Similar to Corporate presentation of rating services from LEET SECURITY (20)

SQ Lecture Two : Consumer Behaviour and Service Quality
SQ Lecture Two : Consumer Behaviour and Service QualitySQ Lecture Two : Consumer Behaviour and Service Quality
SQ Lecture Two : Consumer Behaviour and Service Quality
 
Real Estate Risk Advisory Brochure
Real Estate Risk Advisory BrochureReal Estate Risk Advisory Brochure
Real Estate Risk Advisory Brochure
 
Real Estate Risk Advisory Brochure
Real Estate Risk Advisory BrochureReal Estate Risk Advisory Brochure
Real Estate Risk Advisory Brochure
 
Real Estate Risk Advisory Brochure
Real Estate Risk Advisory BrochureReal Estate Risk Advisory Brochure
Real Estate Risk Advisory Brochure
 
Real estate risk advisory brochure 2013
Real estate risk advisory brochure 2013Real estate risk advisory brochure 2013
Real estate risk advisory brochure 2013
 
Real estate risk advisory brochure 2013
Real estate risk advisory brochure 2013Real estate risk advisory brochure 2013
Real estate risk advisory brochure 2013
 
DDMA / Oracle: Datakwaliteit
DDMA / Oracle: DatakwaliteitDDMA / Oracle: Datakwaliteit
DDMA / Oracle: Datakwaliteit
 
Real estate risk advisory brochure 2013
Real estate risk advisory brochure 2013Real estate risk advisory brochure 2013
Real estate risk advisory brochure 2013
 
Real estate risk advisory brochure 2013
Real estate risk advisory brochure 2013Real estate risk advisory brochure 2013
Real estate risk advisory brochure 2013
 
Chapter 9: Effectiveness of Loyalty Programs
Chapter 9: Effectiveness of Loyalty ProgramsChapter 9: Effectiveness of Loyalty Programs
Chapter 9: Effectiveness of Loyalty Programs
 
Does the cloud have a role in fixing the economy?
Does the cloud have a role in fixing the economy?Does the cloud have a role in fixing the economy?
Does the cloud have a role in fixing the economy?
 
Operational risk management (orm)
Operational risk management (orm)Operational risk management (orm)
Operational risk management (orm)
 
Riskpro Trainings Automotive Industry
Riskpro Trainings Automotive IndustryRiskpro Trainings Automotive Industry
Riskpro Trainings Automotive Industry
 
Riskpro Trainings Automotive Industry
Riskpro Trainings Automotive IndustryRiskpro Trainings Automotive Industry
Riskpro Trainings Automotive Industry
 
Riskpro Trainings Automotive Industry
Riskpro Trainings Automotive IndustryRiskpro Trainings Automotive Industry
Riskpro Trainings Automotive Industry
 
How to Manage Increasing Data Compliance Issues in Community Banks
How to Manage Increasing Data Compliance Issues in Community BanksHow to Manage Increasing Data Compliance Issues in Community Banks
How to Manage Increasing Data Compliance Issues in Community Banks
 
Personal Finance On-line: New Models & Opportunities
Personal Finance On-line: New Models & OpportunitiesPersonal Finance On-line: New Models & Opportunities
Personal Finance On-line: New Models & Opportunities
 
Riskpro capital markets industry 2013
Riskpro capital markets industry 2013Riskpro capital markets industry 2013
Riskpro capital markets industry 2013
 
Riskpro capital markets industry 2013
Riskpro capital markets industry 2013Riskpro capital markets industry 2013
Riskpro capital markets industry 2013
 
Riskpro Insurance Services Ver5
Riskpro Insurance Services Ver5Riskpro Insurance Services Ver5
Riskpro Insurance Services Ver5
 

More from Antonio Ramos

20150423 Jornada_Col Abogados
20150423 Jornada_Col Abogados20150423 Jornada_Col Abogados
20150423 Jornada_Col AbogadosAntonio Ramos
 
Hacker. ¿Héroes o villanos?
Hacker. ¿Héroes o villanos?Hacker. ¿Héroes o villanos?
Hacker. ¿Héroes o villanos?
Antonio Ramos
 
Seguridad informática en la Ley de Seguridad Privada. Territorio no explorado
Seguridad informática en la Ley de Seguridad Privada. Territorio no exploradoSeguridad informática en la Ley de Seguridad Privada. Territorio no explorado
Seguridad informática en la Ley de Seguridad Privada. Territorio no explorado
Antonio Ramos
 
Presentación corporativa calificación de seguridad de LEET SECURITY
Presentación corporativa calificación de seguridad de LEET SECURITYPresentación corporativa calificación de seguridad de LEET SECURITY
Presentación corporativa calificación de seguridad de LEET SECURITY
Antonio Ramos
 
Asimetría en el mercado de la seguridad [rooted2011]
Asimetría en el mercado de la seguridad [rooted2011]Asimetría en el mercado de la seguridad [rooted2011]
Asimetría en el mercado de la seguridad [rooted2011]
Antonio Ramos
 
Teoría de las Limitaciones aplicada a Seguridad de la Información
Teoría de las Limitaciones aplicada a Seguridad de la InformaciónTeoría de las Limitaciones aplicada a Seguridad de la Información
Teoría de las Limitaciones aplicada a Seguridad de la Información
Antonio Ramos
 

More from Antonio Ramos (6)

20150423 Jornada_Col Abogados
20150423 Jornada_Col Abogados20150423 Jornada_Col Abogados
20150423 Jornada_Col Abogados
 
Hacker. ¿Héroes o villanos?
Hacker. ¿Héroes o villanos?Hacker. ¿Héroes o villanos?
Hacker. ¿Héroes o villanos?
 
Seguridad informática en la Ley de Seguridad Privada. Territorio no explorado
Seguridad informática en la Ley de Seguridad Privada. Territorio no exploradoSeguridad informática en la Ley de Seguridad Privada. Territorio no explorado
Seguridad informática en la Ley de Seguridad Privada. Territorio no explorado
 
Presentación corporativa calificación de seguridad de LEET SECURITY
Presentación corporativa calificación de seguridad de LEET SECURITYPresentación corporativa calificación de seguridad de LEET SECURITY
Presentación corporativa calificación de seguridad de LEET SECURITY
 
Asimetría en el mercado de la seguridad [rooted2011]
Asimetría en el mercado de la seguridad [rooted2011]Asimetría en el mercado de la seguridad [rooted2011]
Asimetría en el mercado de la seguridad [rooted2011]
 
Teoría de las Limitaciones aplicada a Seguridad de la Información
Teoría de las Limitaciones aplicada a Seguridad de la InformaciónTeoría de las Limitaciones aplicada a Seguridad de la Información
Teoría de las Limitaciones aplicada a Seguridad de la Información
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

Corporate presentation of rating services from LEET SECURITY

  • 1. leet security Corporate presentation F38ru4ry 2012
  • 2. Content • Initial concepts 1 • Vendor risk rating • Our proposal for a rating system
  • 4. What is a rating? • Rating (Collins English Dictionary) – “a classification according to order or grade; ranking.” 3 – (Economics, Accounting & Finance / Banking & Finance) “the estimated financial or credit standing of a business enterprise or individual”
  • 5. What is a rating? • Ratings of main agencies are expressed with a nomenclature that combines 4 letters, upper and lowercase, numbers and symbols. • Although they can change from one to another, in general, better rating is expressed as AAA or A1+.
  • 6. What is a risk rating agency? • “Company that assigns credit ratings for issuers of certain types of debt obligations as well as the debt instruments themselves”, www.wikipedia.org 5 • Companies specialized in securities analysis and that analyse issuers with their own methodologies (that combines quantitave and qualitative financial analysis methods).
  • 7. What is it for a rating? • Show the synthesis of a company capacity analysis to deal with its financial liabilities in the short and long term. That means, it shows the solvency of that company. 6 • It is a succinct indicator of an issuance risk. Issuance with lower rating, normally, provide higher returns to compensate the risk. • Allows investors to compare the risk of different investments although they come from different issuers, countries, industries…
  • 8. Rating challenges • Time, energy, or money that agent side (provider) should use to Time 7 send a signal. • Mechanisms for the receiver (potential client) to trust that the signal is a credible Money Effort statement of its information.
  • 9. Theoretical Foundation • In some economical transactions (contract theory), disparities in access to information alter the normal 8 functioning of markets, creating problems of adverse selection and moral hazard. • There are two solutions for opposing imperfect information (George Akerlof, 1970): – Signaling – Screening
  • 10. Theoretical Foundation • Signaling (Michael Spence, 1973) – Two sides can circumvent asymmetric 9 information problem if one of them sends a signal to the other party to disclose relevant information. – Signaling consist precisely in that the agent submit credibly some information about itself to the other party.
  • 11. Theoretical Foundation • Screening (Joseph E. Stiglitz, 1973) – In this theory, one of the sides can lead 10 the other to show its information. – In this situation, the side that posses information is not the first to act, but the side without information the one who accept to learn what it can from the other.
  • 13. Need description • In services outsourcing (especially in ICT sector) we find an example of assymetric information that can leads to adverse 12 selection. – The client does not really know the security measures that the vendor implements. – Lack of information could lead the client to choose always the cheaper service although it was not the one that better fits its needs. • This situation is really pressing regarding cloud computing market.
  • 14. Need description • There is a need of a Audit mechanism that helps to (screening) balance the asymmetry of 13 information. • Options (all of them based on trusted third parties) : Options Rating ISMS Certification (signaling) (signaling)
  • 15. What shows risk vendor rating? • Rating (for services) gives a relative value that can be understood as a forecast about technical solvency of the vendor in relation 14 to its security and resiliency. • In this way, services with a better rating are the ones with fewer probability of suffering an incident that affects Service Level Agreements in a significant way.
  • 16. Rating advantages Rating Other options 15 • Less resources (time, • More used / known by money and efforts) security sector • Focus on security and resiliency • Feasibility of homogeneous comparison (single scale)
  • 17. Rating advantages: Supply segmentation Current situation – Segmented services Provider only has one with different ratings option Users that 16 buy the service Fee Users that Fee Low risk buy the service service Service risk Medium risk level service User needs High risk service Risk Risk
  • 18. Ventajas de la calificación: Cada proceso su nivel de riesgo Situación actual – Los Diferentes procesos servicios son “café con diferentes para todos” necesidades Usuarios que 17 contratan el servicio Precio Usuarios que Precio Servicio riesgo contratan el bajo servicio Nivel de riesgo Servicio riesgo del servicio medio Necesidades Servicio riesgo de los usuarios alto Riesgo Riesgo
  • 19. 18 OUR PROPOSAL FOR A RATING SYSTEM
  • 20. Dimensions A B C 19 D E + Compliance specific levels: D+, C+, B+
  • 23. Mixed approach Self-statement & Assessment • Goal: Avoid the usual conflict of interest arising from the trusted third party fees being paid by the provider. 22 – Enter to the system: Explanatory dossier. – Once accepted: Provider self-declare the service rating. – Upper rating level can be defined by the agency. • Consequence: Strengthen monitoring mechanisms – Random and periodic audits. – Incident notification channel. – Disciplinary proceedings.
  • 24. Service use conditions • Allows service providers to use the rating system. • Establish vendor commitment to use the system in a 23 correct way when self-statement rating levels. • Defines penalties in case of non-observance of rating system guide. • Gives right for the necessary training to self-state rating levels. • Annual renewals.
  • 25. Thank you… … Questions? 24
  • 26. Contact 25 leet_security www.leetsecurity.com info@leetsecurity.com antonio.ramos@leetsecurity.com