SlideShare a Scribd company logo
Session ID:
Session Classification:
Ben Rothke, CISSP, CISA
Information Security
Wyndham Worldwide Corp.
STU-R35B
Intermediate
The Five Habits of Highly
Secure Organizations
► Discussion of effective information security habits,
characteristics and practices
► great practices of security-conscious companies
► not directly related to ITIL, ISO 17799, etc.
► based on my past experience at a large spectrum of Fortune 500
and Global 2000 companies
► primarily financial services, pharmaceutical, aviation and
healthcare
Agenda
► Computer security is simply attention to detail and good
design
► focusing on the five habits of this presentation will enable
you to ensure your organizations data assets are
secured
► rather than blindly wasting your budget on security appliances
that do nothing more that look cool in a rack
Why it’s important you are here
► Effective infosec is built on risk management, good
business practices and project management
► while the mathematics of cryptography is rocket science, most
aspects of information security are not
► successful information security programs have all
occurred by focusing on security from a framework of
risk mitigation
► cost of security hardware and software purchased has
absolutely no corresponding effect to the level of security
Key Take Away Thoughts
1. CISO
2. Risk Management
3. Invests in people, not products
4. Policies and Procedures
5. Awareness and Training
The five habits
► Accountants achieve efficiency and effectiveness under
the guidance and coordination of a CFO
► security teams will reach their optimal levels under a CISO
► infosec is more than a single technology. It involves:
► physical, psychological and legal aspects, such as training,
encouraging, enforcing and prosecuting
► strategic planning, skilled negotiating and practical problem
solving
► only an individual with strong business savvy and security
knowledge can oversee security planning, implement
policies and select measures appropriate to business
requirements - that person is the CISO
Habit #1 – CISO
► Characteristics of a great CISO
► deep understanding of technology, combined with understanding
of the organizations function, politics and business drivers
► gold medal CISO: Electrical engineer with an MBA
► silver medal CISO: NSA veteran with corporate experience
► never a yes-man to the CxO or Board of Directors
► invests in people, not technology
► corollary: vendors intimidated by CISO due to technical prowess
► not intimidated by a screaming SVP trying to force
firewall admin to violate policy
► but also willing to evaluate the policy to determine whether it is
reasonable
CISO
► CISO works at the executive level
► serves on the executive council or equivalent
► be on CIO’s architectural strategy council or equivalent
► direct or dotted-line manager of all information security staff
► without executive level control, will face difficulty when
bridging the gap between business process demands
and security technology requirements
► CISO at the non-executive level – expect Spaf’s Law:
► “if you have responsibility for security but have no authority to set
rules or punish violators, your own role in the organization is to
take the blame when something big goes wrong”
► Prof. Gene Spafford - CS Dept. - Purdue University
CISO
► How management often perceives risk
► risk = evil hacker
Habit #2 – Risk Management
This is risk management…
Backup tapes
Hackers
Risk matrix
Software Patches
Power grid
Data center
Token
management
Political
Malicious end-users
Customers
Regulatory
compliance
Contractors
Telco
Revocation
processes
Terrorists
Legal
liability
Unions
External
Environmental
DR/BCP
Internal
External
Unhappy
customers
Physical
security
Disgruntled employees
Operations test
Consultants
Third-partyClients
Operational
Audit
Lack of budget
Vendor bankruptcy
Vulnerabilities
Forensics
Crypto keys
Lack of staff
Fraud
Poor risk assessment
Hactivists
Spyware
Blogs
Insecure software
WirelessGoogle
Documentation
Organized crime
China
India
Illegal downloads
Web-scripting
Viruses
Worms
Malicious software
Rogue employee
Windows
VoIP
Social engineeringApp dev
practices
Malware
Background checks
Database
Data destruction
Hardware
Procedural violations
phishing
► comprehensive risk management program must be
created around these four areas:
1. Identification
2. Analysis
3. Mitigation
4. Monitoring
Risk Management
► People, not products
► huge mistake companies make is expecting security products to
solve their security problems
► they buy myriad products without being able to answer:
► what is your security problem and how do you expect this
security product to solve it?
► why you are buying a product?
► create detailed requirements for its use
► processes and procedures
► metrics to measure its effectiveness and value
Habit #3 – People, not products
► Vendors want you to think their product is the best; but
all products are for the most part indistinguishable
► by the time a product hits version 3, competition has matched it
feature for feature
► observation: most established COTS security products
are essentially indistinguishable from each other and can
achieve what most organizations require:
► Check Point vs. Cisco
► eEye vs. McAfee
► don’t obsess on the products. Focus on your staff,
internal procedures and specific requirements
The big lie of security products
► Comprehensive security policies are required to map
abstract security concepts to your real world
implementation of your security products
► policy defines the aims and goals of the business
► no policies = no information security…. and
► no policies enforcement = no information security
Habit #4 - Policies & Procedures
► SOP’s ensure Chicago firewall admin builds & configures
corporate firewalls in the same manner as Tokyo admin
► immense benefits of Standard Operating Procedures
► standardize operations among divisions and departments
► reduce confusion
► designate responsibility
► improve accountability of personnel
► record the performance of all tasks and their results
► reduce costs
► reduce liability
Information security procedures
► Organizations that take the time and effort to create
infosec SOP’s demonstrate their commitment to security
► by creating SOP’s, costs are drastically lowered (greater ROI),
and their level of security is drastically increased
► another example: Aviation industry lives and dies
(literally) via their SOP’s
► SOP’s are built into job requirements and regulations
► today’s airplanes are far too complex to maintain and operate
without SOP’s
► information security might not be as complex as a Boeing 777,
but it still requires appropriate SOP’s
Information Security SOP
► Users who read and trust the Weekly World News will
invariably choose an insecure Java applet over security
► information security and associated risks aren’t intuitive
► invest in training users to properly use the tools given to them
► effective information security training and awareness
effort can’t be initiated without first writing information
security policies
Habit #5 – Awareness & Training
► Awareness defines the rules for computer use
► users must be clearly educated as to what acceptable
use means
► define exactly what a confidential document is
► what is a good password?
► what emails should be forwarded?
► can I set up my own wireless network?
Awareness and Training
Image source: www.secureit.utah.edu/images/ISA/isa_banner2009.gif
► Dark moment in computer security awareness #358
► 1998 – US President Bill Clinton and Irish Prime Minister Bertie
Ahern used digital signature technology to append their personal
signatures to a statement endorsing broad e-commerce policy
concerns
► Clinton and Ahern are videotaped entering the passphrase for
their private keys
► at the conclusion of the ceremony, they swap the smart cards
that contain their private keys
Awareness and Training
► Security Engineering: A Guide to Building Dependable Distributed Systems
► Ross Anderson
► Free digital copy http://www.cl.cam.ac.uk/~rja14/book.html
► Information Risk and Security
► Edward Wilding
► NIST Information Security Handbook: A Guide for Managers
► http://csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07-
2007.pdf
► Security Strategy: From Requirements to Reality
► Bill Stackpole and Eric Oksendahl
Required reading
► Bruce Schneier / Marcus Ranum
► Two really smart guys who understand security and risk, and
don’t believe in the common wisdom of security pixie dust
► visit their web sites – www.schneier.com / www.ranum.com
► Crypto-Gram – Schneier’s monthly e-mail newsletter
► http://www.schneier.com/crypto-gram.html
Required listening
► Effective information security takes:
► hard work
► leadership
► commitment
► knowledge
► responsibility
► dedication
► when implemented in the 5 habits, those are the
characteristics of highly secure organizations
Summary
Ben Rothke, CISSP CISA
Manager – Information Security
Wyndham Worldwide
Corporation
www.linkedin.com/in/benrothke
www.twitter.com/benrothke
www.slideshare.net/benrothke

More Related Content

What's hot

Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
Hamed Moghaddam
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
Jack Nichelson
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
Shwetank Jayaswal
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
Kroll
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
esbosman
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Dhani Ahmad
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
Tudor Damian
 
Information Security
Information SecurityInformation Security
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
SPI Conference
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD
 
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions  - NTT Security - Miriam LevensteinSecurity in Mergers and Acquisitions  - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
Miriam L
 
The need for security
The need for securityThe need for security
The need for security
Dhani Ahmad
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
PECB
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
EC-Council
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
Janghyuck Choi
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 

What's hot (20)

Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Information Security
Information SecurityInformation Security
Information Security
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions  - NTT Security - Miriam LevensteinSecurity in Mergers and Acquisitions  - NTT Security - Miriam Levenstein
Security in Mergers and Acquisitions - NTT Security - Miriam Levenstein
 
The need for security
The need for securityThe need for security
The need for security
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Viewers also liked (18)

Law r31
Law r31Law r31
Law r31
 
Spo2 t18 spo2-t18
Spo2 t18 spo2-t18Spo2 t18 spo2-t18
Spo2 t18 spo2-t18
 
Sem 004
Sem 004Sem 004
Sem 004
 
Law t19
Law t19Law t19
Law t19
 
Stu w25 a
Stu w25 aStu w25 a
Stu w25 a
 
Stu t17 b
Stu t17 bStu t17 b
Stu t17 b
 
Stu w27 b
Stu w27 bStu w27 b
Stu w27 b
 
Spo2 r35
Spo2 r35Spo2 r35
Spo2 r35
 
Tech r33
Tech r33Tech r33
Tech r33
 
Spo1 w23 b
Spo1 w23 bSpo1 w23 b
Spo1 w23 b
 
Stu w21 b
Stu w21 bStu w21 b
Stu w21 b
 
Iam f43
Iam f43Iam f43
Iam f43
 
Tech w23
Tech w23Tech w23
Tech w23
 
Tech t18
Tech t18Tech t18
Tech t18
 
Sect r35 a
Sect r35 aSect r35 a
Sect r35 a
 
Spo2 w23 a
Spo2 w23 aSpo2 w23 a
Spo2 w23 a
 
Law r33
Law r33Law r33
Law r33
 
Sem 001 sem-001
Sem 001 sem-001Sem 001 sem-001
Sem 001 sem-001
 

Similar to Stu r35 b

Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
kpatrickwheeler
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
rabeetkashif
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
EC-Council
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
NRBsanv
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
Pedro Espinosa
 
Risk Management
Risk ManagementRisk Management
Risk Management
ijtsrd
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
Citrix
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
Murray Security Services
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
FERMA
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
Donald Tabone
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
Misha Hanin
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
Razorpoint Security
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
captsbtyagi
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
techtutorus
 
Gartner Information Security Summit Brochure
Gartner Information Security Summit BrochureGartner Information Security Summit Brochure
Gartner Information Security Summit Brochuretrunko
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
Dhani Ahmad
 
111.pptx
111.pptx111.pptx
111.pptx
JESUNPK
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
InfosecTrain
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
skumartarget
 

Similar to Stu r35 b (20)

Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Gartner Information Security Summit Brochure
Gartner Information Security Summit BrochureGartner Information Security Summit Brochure
Gartner Information Security Summit Brochure
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
111.pptx
111.pptx111.pptx
111.pptx
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 

More from SelectedPresentations

Длительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решенияДлительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решения
SelectedPresentations
 
Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.
SelectedPresentations
 
Варианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройстваВарианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройства
SelectedPresentations
 
Новые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решенийНовые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решений
SelectedPresentations
 
Управление безопасностью мобильных устройств
Управление безопасностью мобильных устройствУправление безопасностью мобильных устройств
Управление безопасностью мобильных устройств
SelectedPresentations
 
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
SelectedPresentations
 
Кадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасностиКадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасности
SelectedPresentations
 
Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...
SelectedPresentations
 
Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...
SelectedPresentations
 
Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...
SelectedPresentations
 
Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...
SelectedPresentations
 
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
SelectedPresentations
 
Запись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данныхЗапись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данных
SelectedPresentations
 
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
SelectedPresentations
 
Обеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИСОбеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИС
SelectedPresentations
 
Документ, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБДокумент, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБ
SelectedPresentations
 
Чего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложенийЧего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложений
SelectedPresentations
 
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
SelectedPresentations
 
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
SelectedPresentations
 
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИОб угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
SelectedPresentations
 

More from SelectedPresentations (20)

Длительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решенияДлительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решения
 
Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.
 
Варианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройстваВарианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройства
 
Новые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решенийНовые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решений
 
Управление безопасностью мобильных устройств
Управление безопасностью мобильных устройствУправление безопасностью мобильных устройств
Управление безопасностью мобильных устройств
 
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
 
Кадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасностиКадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасности
 
Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...
 
Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...
 
Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...
 
Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...
 
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
 
Запись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данныхЗапись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данных
 
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
 
Обеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИСОбеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИС
 
Документ, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБДокумент, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБ
 
Чего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложенийЧего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложений
 
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
 
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
 
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИОб угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
 

Stu r35 b

  • 1. Session ID: Session Classification: Ben Rothke, CISSP, CISA Information Security Wyndham Worldwide Corp. STU-R35B Intermediate The Five Habits of Highly Secure Organizations
  • 2. ► Discussion of effective information security habits, characteristics and practices ► great practices of security-conscious companies ► not directly related to ITIL, ISO 17799, etc. ► based on my past experience at a large spectrum of Fortune 500 and Global 2000 companies ► primarily financial services, pharmaceutical, aviation and healthcare Agenda
  • 3. ► Computer security is simply attention to detail and good design ► focusing on the five habits of this presentation will enable you to ensure your organizations data assets are secured ► rather than blindly wasting your budget on security appliances that do nothing more that look cool in a rack Why it’s important you are here
  • 4. ► Effective infosec is built on risk management, good business practices and project management ► while the mathematics of cryptography is rocket science, most aspects of information security are not ► successful information security programs have all occurred by focusing on security from a framework of risk mitigation ► cost of security hardware and software purchased has absolutely no corresponding effect to the level of security Key Take Away Thoughts
  • 5. 1. CISO 2. Risk Management 3. Invests in people, not products 4. Policies and Procedures 5. Awareness and Training The five habits
  • 6. ► Accountants achieve efficiency and effectiveness under the guidance and coordination of a CFO ► security teams will reach their optimal levels under a CISO ► infosec is more than a single technology. It involves: ► physical, psychological and legal aspects, such as training, encouraging, enforcing and prosecuting ► strategic planning, skilled negotiating and practical problem solving ► only an individual with strong business savvy and security knowledge can oversee security planning, implement policies and select measures appropriate to business requirements - that person is the CISO Habit #1 – CISO
  • 7. ► Characteristics of a great CISO ► deep understanding of technology, combined with understanding of the organizations function, politics and business drivers ► gold medal CISO: Electrical engineer with an MBA ► silver medal CISO: NSA veteran with corporate experience ► never a yes-man to the CxO or Board of Directors ► invests in people, not technology ► corollary: vendors intimidated by CISO due to technical prowess ► not intimidated by a screaming SVP trying to force firewall admin to violate policy ► but also willing to evaluate the policy to determine whether it is reasonable CISO
  • 8. ► CISO works at the executive level ► serves on the executive council or equivalent ► be on CIO’s architectural strategy council or equivalent ► direct or dotted-line manager of all information security staff ► without executive level control, will face difficulty when bridging the gap between business process demands and security technology requirements ► CISO at the non-executive level – expect Spaf’s Law: ► “if you have responsibility for security but have no authority to set rules or punish violators, your own role in the organization is to take the blame when something big goes wrong” ► Prof. Gene Spafford - CS Dept. - Purdue University CISO
  • 9. ► How management often perceives risk ► risk = evil hacker Habit #2 – Risk Management
  • 10. This is risk management… Backup tapes Hackers Risk matrix Software Patches Power grid Data center Token management Political Malicious end-users Customers Regulatory compliance Contractors Telco Revocation processes Terrorists Legal liability Unions External Environmental DR/BCP Internal External Unhappy customers Physical security Disgruntled employees Operations test Consultants Third-partyClients Operational Audit Lack of budget Vendor bankruptcy Vulnerabilities Forensics Crypto keys Lack of staff Fraud Poor risk assessment Hactivists Spyware Blogs Insecure software WirelessGoogle Documentation Organized crime China India Illegal downloads Web-scripting Viruses Worms Malicious software Rogue employee Windows VoIP Social engineeringApp dev practices Malware Background checks Database Data destruction Hardware Procedural violations phishing
  • 11. ► comprehensive risk management program must be created around these four areas: 1. Identification 2. Analysis 3. Mitigation 4. Monitoring Risk Management
  • 12. ► People, not products ► huge mistake companies make is expecting security products to solve their security problems ► they buy myriad products without being able to answer: ► what is your security problem and how do you expect this security product to solve it? ► why you are buying a product? ► create detailed requirements for its use ► processes and procedures ► metrics to measure its effectiveness and value Habit #3 – People, not products
  • 13. ► Vendors want you to think their product is the best; but all products are for the most part indistinguishable ► by the time a product hits version 3, competition has matched it feature for feature ► observation: most established COTS security products are essentially indistinguishable from each other and can achieve what most organizations require: ► Check Point vs. Cisco ► eEye vs. McAfee ► don’t obsess on the products. Focus on your staff, internal procedures and specific requirements The big lie of security products
  • 14. ► Comprehensive security policies are required to map abstract security concepts to your real world implementation of your security products ► policy defines the aims and goals of the business ► no policies = no information security…. and ► no policies enforcement = no information security Habit #4 - Policies & Procedures
  • 15. ► SOP’s ensure Chicago firewall admin builds & configures corporate firewalls in the same manner as Tokyo admin ► immense benefits of Standard Operating Procedures ► standardize operations among divisions and departments ► reduce confusion ► designate responsibility ► improve accountability of personnel ► record the performance of all tasks and their results ► reduce costs ► reduce liability Information security procedures
  • 16. ► Organizations that take the time and effort to create infosec SOP’s demonstrate their commitment to security ► by creating SOP’s, costs are drastically lowered (greater ROI), and their level of security is drastically increased ► another example: Aviation industry lives and dies (literally) via their SOP’s ► SOP’s are built into job requirements and regulations ► today’s airplanes are far too complex to maintain and operate without SOP’s ► information security might not be as complex as a Boeing 777, but it still requires appropriate SOP’s Information Security SOP
  • 17. ► Users who read and trust the Weekly World News will invariably choose an insecure Java applet over security ► information security and associated risks aren’t intuitive ► invest in training users to properly use the tools given to them ► effective information security training and awareness effort can’t be initiated without first writing information security policies Habit #5 – Awareness & Training
  • 18. ► Awareness defines the rules for computer use ► users must be clearly educated as to what acceptable use means ► define exactly what a confidential document is ► what is a good password? ► what emails should be forwarded? ► can I set up my own wireless network? Awareness and Training Image source: www.secureit.utah.edu/images/ISA/isa_banner2009.gif
  • 19. ► Dark moment in computer security awareness #358 ► 1998 – US President Bill Clinton and Irish Prime Minister Bertie Ahern used digital signature technology to append their personal signatures to a statement endorsing broad e-commerce policy concerns ► Clinton and Ahern are videotaped entering the passphrase for their private keys ► at the conclusion of the ceremony, they swap the smart cards that contain their private keys Awareness and Training
  • 20. ► Security Engineering: A Guide to Building Dependable Distributed Systems ► Ross Anderson ► Free digital copy http://www.cl.cam.ac.uk/~rja14/book.html ► Information Risk and Security ► Edward Wilding ► NIST Information Security Handbook: A Guide for Managers ► http://csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07- 2007.pdf ► Security Strategy: From Requirements to Reality ► Bill Stackpole and Eric Oksendahl Required reading
  • 21. ► Bruce Schneier / Marcus Ranum ► Two really smart guys who understand security and risk, and don’t believe in the common wisdom of security pixie dust ► visit their web sites – www.schneier.com / www.ranum.com ► Crypto-Gram – Schneier’s monthly e-mail newsletter ► http://www.schneier.com/crypto-gram.html Required listening
  • 22. ► Effective information security takes: ► hard work ► leadership ► commitment ► knowledge ► responsibility ► dedication ► when implemented in the 5 habits, those are the characteristics of highly secure organizations Summary
  • 23. Ben Rothke, CISSP CISA Manager – Information Security Wyndham Worldwide Corporation www.linkedin.com/in/benrothke www.twitter.com/benrothke www.slideshare.net/benrothke