SlideShare a Scribd company logo
Metrics, Risk Management & DLP
a step by step approach




Rob Kloots
Vice-President ISSA-NL (2009)
Webmaster ISSA-BE (2009+10)
Owner CSF b.v. - GRC Consulting
Rob.Kloots@csf.nl
Agenda
•   Do we have a Data Loss Problem?
•   What can we do?
•   Compliance Security Framework
•   Risk Management
•   DLP




                                      2
Firefighting DLP incidents                DLP



• DLP more then a Gartner-hype
• DLP key to GRC




• DLP incidents are a given fact of operations
• If or When?




                                                 3
Adopt, Adapt, Improve
•   Firefighting
    ===========
•   Maturity level
•   What Measures?
•   Learning Management System
                                           Adopt
    o Metrics,
    o Measures, and
    o Markerpoints.


                                 Improve               Adapt




                                                   4
Maturitylevels
• Predefined business process
• Clear goals/performance requirements
• Quantitative/qualitative measures

                                                  Quantitatively
                                                  Managed
                                        Defined

                              Managed


                  Performed



     Incomplete




                                                   5
Compliance Security Framework
• A Compliance Security Framework should allow for team-effort
  for both
• Mgt (2) and operators(3) to enter into a learning system
• with respect to Compliance & Risk based security measures (1).




                                     1


                                   CSF

                            2               3



                                                6
Metrics - 1
• Metrics are simply a standard or system of measurement
• Metric - A quantitative measure of the degree to which a
  system, component, or process possesses a given attribute [2].
  A calculated or composite indicator based upon two or more
  measures. A quantified measure of the degree to which a
  system, component, or process possesses a given attribute [3].




                                                7
Metrics - 2
• Characteristics & Classification
• Process metrics
   – CSFs, KGIs and KPIs
• Asset related vulnerability metrics
   – What value has Data, when static, dynamic, owned, stored, lost
• Monetary value of Reputation
   – ? Market Capitalisation
   – ! Value of assets in Euro
   – ! Total asset value at Risk




                                                        8
Measures
• Measure - To ascertain or appraise by comparing to a
  standard [1]. A standard or unit of measurement; the extent,
  dimensions, capacity, etc., of anything, especially as
  determined by a standard; an act or process of measuring; a
  result of measurement [3]. A related term is Measurement -
  The act or process of measuring. A figure, extent, or amount
  obtained by measuring [1]. The act or process of measuring
  something. Also a result, such as a figure expressing the
  extent or value that is obtained by measuring [3].




                                                9
Achieveable Markerpoints
• How to set
• Where to use
• Purpose




                           10
Risk Management - 1



                                 Qualitative
            Quantitative



                             RM
                           mechanics




                    Mgt info

                                               11
Risk Management - 2




                      12
Risk Management - 3
Threat Materialisation

                         DLP MEASURES




                                  13
Risk Management - 4

                       Management Review



                              Risk
                           Treatment




        Corrective /                       Plans for
        Preventative                   Program / Project
           Action                          / Action




                                                    14
Data Loss Prevention System
•   1. Introduction to the DLPS                     10%
•   2. Creating the Asset Inventory                  8%
•   3. Establishing DLP Risk Management process      8%
•   4. Establish a Continual Improvement process    10%
•   5. Developing Documentation                      5%
•   6. Establishing a Legal Registry process        8%
•   7. Establishing a Compliance Management process 5%
•   8. Establishing an Audit process               10%
•   9. Establishing a Governance process           10%
•   10. Establishing DLP testing process            8%
•   11. Establishing the Incident Response process  8%
•   12. Establishing Training & Awareness process  10%

                                              15
DLP metrics program:
•   1. Define the metrics program goal(s) and objectives
•   2. Decide which metrics to generate
•   3. Develop strategies for generating the metrics
•   4. Establish benchmarks and targets
•   5. Determine how the metrics will be reported
•   6. Create an action plan and act on it, and
•   7. Establish a formal program review/refinement cycle




                                                 16
DLP Controls

  SANS Critical Security Controls
  •   1: Inventory of Authorized and Unauthorized Devices
  •   2: Inventory of Authorized and Unauthorized Software
  •   3: Secure Configurations for Hardware and Software on Laptops,
      WorkstationsCritical, and Servers
  •   4: Secure Configurations for Network Devices such as Firewalls, Routers,
      and Switches
Control 15 Metric
  •   5: Boundary Defense
  •   6: Maintenance, Monitoring, and Analysis of Audit Logs
Control 15Test
  •   7: Application Software Security
  •   8: Controlled Use of Administrative Privileges
  •   9: Controlled Access Based on Need to Know
  •   10: Continuous Vulnerability Assessment and Remediation
  •   11: Account Monitoring and Control
  •   12: Malware Defenses
  •   13: Limitation and Control of Network Ports, Protocols, and Services
  •   14: Wireless Device Control
  •   15: Data Loss Prevention
                                                                   17
DLP metrics
• Incident Management
    o   Mean-Time to Incident Discovery
    o   Number of Data Leakage Incidents
    o   Mean-Time Between Security Incidents
    o   Mean-Time to Incident Recovery


•   Vulnerability Management
•   Patch Management
•   Application Security
•   Configuration Management
•   Financial Metrics


                                               18
Questions, please!




                     19

More Related Content

What's hot

Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
360factors
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
Mark Conway
 
Information security management system
Information security management systemInformation security management system
Information security management system
Arani Srinivasan
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
Eryk Budi Pratama
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
Hussein Al-Sanabani
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
JoniGarcia9
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
PECB
 
Security operation center
Security operation centerSecurity operation center
Security operation center
MuthuKumaran267
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
Syed Sabhi Haider
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
dj1arry
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
Terranovatraining
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
Information Security
Information SecurityInformation Security
Information Security
Dhilsath Fathima
 
Deutsche Telekom on Big Data
Deutsche Telekom on Big DataDeutsche Telekom on Big Data
Deutsche Telekom on Big Data
DataWorks Summit
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
Margarete McGrath
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler
 

What's hot (20)

Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Information Security
Information SecurityInformation Security
Information Security
 
Deutsche Telekom on Big Data
Deutsche Telekom on Big DataDeutsche Telekom on Big Data
Deutsche Telekom on Big Data
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 

Similar to Metrics, Risk Management & DLP

Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
Vijayananda Mohire
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
dotco
 
CMMI.pptx
CMMI.pptxCMMI.pptx
CMMI.pptx
Pandiya Rajan
 
Risk Management and Remediation
Risk Management and RemediationRisk Management and Remediation
Risk Management and Remediation
Carahsoft
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
yaseraljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
Yaser Alrefai
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
Shankar Subramaniyan
 
Rob kloots presentation_issa_spain
Rob kloots presentation_issa_spainRob kloots presentation_issa_spain
Rob kloots presentation_issa_spain
Robert Kloots
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIP
Scott Baron
 
Contract Security Officer Services
Contract Security Officer ServicesContract Security Officer Services
Contract Security Officer Services
Anthony Noblett CISSP, CISA, CGEIT, CRISC, CCSK
 
Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls Monitoring
Emma Kelly
 
Pm Toolbox Nlr Final
Pm Toolbox Nlr FinalPm Toolbox Nlr Final
Pm Toolbox Nlr Final
Ydalus
 
BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
Yusuf Hadiwinata Sutandar
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
Sam Bowne
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
Sam Bowne
 
Dr. Almerindo Graziano - log maturity-compressed
Dr. Almerindo Graziano - log maturity-compressedDr. Almerindo Graziano - log maturity-compressed
Dr. Almerindo Graziano - log maturity-compressed
promediakw
 
2015 05-kuwait-log maturity-compressed
2015 05-kuwait-log maturity-compressed2015 05-kuwait-log maturity-compressed
2015 05-kuwait-log maturity-compressed
promediakw
 
Abidance Cip Presentation
Abidance Cip PresentationAbidance Cip Presentation
Abidance Cip Presentation
jamesholler
 
Control y seguimiento del proyecto herramientas
Control y seguimiento del proyecto   herramientasControl y seguimiento del proyecto   herramientas
Control y seguimiento del proyecto herramientas
ProColombia
 
The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field
Resolver Inc.
 

Similar to Metrics, Risk Management & DLP (20)

Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
CMMI.pptx
CMMI.pptxCMMI.pptx
CMMI.pptx
 
Risk Management and Remediation
Risk Management and RemediationRisk Management and Remediation
Risk Management and Remediation
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Rob kloots presentation_issa_spain
Rob kloots presentation_issa_spainRob kloots presentation_issa_spain
Rob kloots presentation_issa_spain
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIP
 
Contract Security Officer Services
Contract Security Officer ServicesContract Security Officer Services
Contract Security Officer Services
 
Gain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls MonitoringGain business insight with Continuous Controls Monitoring
Gain business insight with Continuous Controls Monitoring
 
Pm Toolbox Nlr Final
Pm Toolbox Nlr FinalPm Toolbox Nlr Final
Pm Toolbox Nlr Final
 
BiznetGio Presentation Business Continuity
BiznetGio Presentation Business ContinuityBiznetGio Presentation Business Continuity
BiznetGio Presentation Business Continuity
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
 
Dr. Almerindo Graziano - log maturity-compressed
Dr. Almerindo Graziano - log maturity-compressedDr. Almerindo Graziano - log maturity-compressed
Dr. Almerindo Graziano - log maturity-compressed
 
2015 05-kuwait-log maturity-compressed
2015 05-kuwait-log maturity-compressed2015 05-kuwait-log maturity-compressed
2015 05-kuwait-log maturity-compressed
 
Abidance Cip Presentation
Abidance Cip PresentationAbidance Cip Presentation
Abidance Cip Presentation
 
Control y seguimiento del proyecto herramientas
Control y seguimiento del proyecto   herramientasControl y seguimiento del proyecto   herramientas
Control y seguimiento del proyecto herramientas
 
The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field The Journey to Integrated Risk Management: Lessons from the Field
The Journey to Integrated Risk Management: Lessons from the Field
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 

Metrics, Risk Management & DLP

  • 1. Metrics, Risk Management & DLP a step by step approach Rob Kloots Vice-President ISSA-NL (2009) Webmaster ISSA-BE (2009+10) Owner CSF b.v. - GRC Consulting Rob.Kloots@csf.nl
  • 2. Agenda • Do we have a Data Loss Problem? • What can we do? • Compliance Security Framework • Risk Management • DLP 2
  • 3. Firefighting DLP incidents DLP • DLP more then a Gartner-hype • DLP key to GRC • DLP incidents are a given fact of operations • If or When? 3
  • 4. Adopt, Adapt, Improve • Firefighting =========== • Maturity level • What Measures? • Learning Management System Adopt o Metrics, o Measures, and o Markerpoints. Improve Adapt 4
  • 5. Maturitylevels • Predefined business process • Clear goals/performance requirements • Quantitative/qualitative measures Quantitatively Managed Defined Managed Performed Incomplete 5
  • 6. Compliance Security Framework • A Compliance Security Framework should allow for team-effort for both • Mgt (2) and operators(3) to enter into a learning system • with respect to Compliance & Risk based security measures (1). 1 CSF 2 3 6
  • 7. Metrics - 1 • Metrics are simply a standard or system of measurement • Metric - A quantitative measure of the degree to which a system, component, or process possesses a given attribute [2]. A calculated or composite indicator based upon two or more measures. A quantified measure of the degree to which a system, component, or process possesses a given attribute [3]. 7
  • 8. Metrics - 2 • Characteristics & Classification • Process metrics – CSFs, KGIs and KPIs • Asset related vulnerability metrics – What value has Data, when static, dynamic, owned, stored, lost • Monetary value of Reputation – ? Market Capitalisation – ! Value of assets in Euro – ! Total asset value at Risk 8
  • 9. Measures • Measure - To ascertain or appraise by comparing to a standard [1]. A standard or unit of measurement; the extent, dimensions, capacity, etc., of anything, especially as determined by a standard; an act or process of measuring; a result of measurement [3]. A related term is Measurement - The act or process of measuring. A figure, extent, or amount obtained by measuring [1]. The act or process of measuring something. Also a result, such as a figure expressing the extent or value that is obtained by measuring [3]. 9
  • 10. Achieveable Markerpoints • How to set • Where to use • Purpose 10
  • 11. Risk Management - 1 Qualitative Quantitative RM mechanics Mgt info 11
  • 13. Risk Management - 3 Threat Materialisation DLP MEASURES 13
  • 14. Risk Management - 4 Management Review Risk Treatment Corrective / Plans for Preventative Program / Project Action / Action 14
  • 15. Data Loss Prevention System • 1. Introduction to the DLPS 10% • 2. Creating the Asset Inventory 8% • 3. Establishing DLP Risk Management process 8% • 4. Establish a Continual Improvement process 10% • 5. Developing Documentation 5% • 6. Establishing a Legal Registry process 8% • 7. Establishing a Compliance Management process 5% • 8. Establishing an Audit process 10% • 9. Establishing a Governance process 10% • 10. Establishing DLP testing process 8% • 11. Establishing the Incident Response process 8% • 12. Establishing Training & Awareness process 10% 15
  • 16. DLP metrics program: • 1. Define the metrics program goal(s) and objectives • 2. Decide which metrics to generate • 3. Develop strategies for generating the metrics • 4. Establish benchmarks and targets • 5. Determine how the metrics will be reported • 6. Create an action plan and act on it, and • 7. Establish a formal program review/refinement cycle 16
  • 17. DLP Controls SANS Critical Security Controls • 1: Inventory of Authorized and Unauthorized Devices • 2: Inventory of Authorized and Unauthorized Software • 3: Secure Configurations for Hardware and Software on Laptops, WorkstationsCritical, and Servers • 4: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Control 15 Metric • 5: Boundary Defense • 6: Maintenance, Monitoring, and Analysis of Audit Logs Control 15Test • 7: Application Software Security • 8: Controlled Use of Administrative Privileges • 9: Controlled Access Based on Need to Know • 10: Continuous Vulnerability Assessment and Remediation • 11: Account Monitoring and Control • 12: Malware Defenses • 13: Limitation and Control of Network Ports, Protocols, and Services • 14: Wireless Device Control • 15: Data Loss Prevention 17
  • 18. DLP metrics • Incident Management o Mean-Time to Incident Discovery o Number of Data Leakage Incidents o Mean-Time Between Security Incidents o Mean-Time to Incident Recovery • Vulnerability Management • Patch Management • Application Security • Configuration Management • Financial Metrics 18