SlideShare a Scribd company logo
Information Security
Science
The Art & Science of Simple Security
By Ravila White | CISSP, CISM, CISA, CIPP, GCIH
Making it better without making it complex
Disclaimer
This presentation and the concepts herein are my
opinions through private research, practice and
chatting with other professionals.
It is not the opinion of past, present or future
employers.
Overview
Information Security is a broad, deep and complex
discipline. The success of information security
requires succinct artful presentation and agile
scientific execution.
This discussion will focus on the aspects of Macro
and Micro Information security. What it is, Why
you need it, and how to use it.
Information Security is…..
“Knowing computer security and compliancy is like
knowing the law, everyone has their own opinion and
each judge interprets it differently.” [Bruce Lobree]
How do you get hurt skiing?
“Information Security and IT are a lot like skiing. You
only get hurt when you ski beyond your abilities, out of
control or out of bounds.” [Ravila H. White]
Learning from economist
“We can make information security more consumable
by taking a page from economics history and making it
divisible. Divide information security in the same
manner as economics.” [Ravila H. White]
Macro-Information
Security (the
business process and
resulting artifacts
designed to influence
business choices,
protect the business,
drive technology
selection)
Micro-Information
Security (the
technology, controls,
countermeasures
and tactical
solutions that protect
information assets)
Simple Security
(information security
driven by and from
the business)
Art Science
Emotional Right Logical Left
The ART of Macro-Information
Security
Art is the process or product of deliberately arranging
elements in a way to affect the senses or emotions.
What are the elements?
 Dollars
 Compounding Investments
 Business Value & Concerns
 Efficiency Gains
 Asset Protection
 Visualization
“Executives are strategists who should not focus on
the minutiae of operations, but rather look outward at
the competitive landscape.” [Baldwin & Curley]
How we arrange the elements
 Business model analysis and mapping
 Organizational dashboards
 Authoritative Artifacts
 Meaningful Visualizations
“Copy-Exactly accelerates the diffusion process and,
at the same time, it simplifies system maintenance and
user training.” [Baldwin & Curley]
Linear Visualizations
One Dimensional Visualizations
The SCIENCE of Micro-
Information Security
Knowledge of a system or knowledge covering general
truths or the operation of general laws especially as
obtained and tested through scientific method.
What are we protecting?
How do we protect simply?
 Our primary protection is…
 If the primary fails then…
 Our secondary protection is…
 If the secondary fails then…
 Tertiary protection contains
“Three Rules of Work: Out of clutter find simplicity;
From discord find harmony; In the middle of difficulty
lies opportunity.” [Einstein]
Where we influence protection
How do we protect?
Protection is simple
 In Scope
 Asset core
 Enterprise, point or hybrid
 Primary, secondary and tertiary
Credits & References
General Professional Influencers
 Business Model Generation
 www.dictionary.com
 Google: www.Google.com
 Oxford Dictionary
 Wikipedia: www.wikipedia.com
 Managing IT Innovation for
Business Value
 Nick Malick
Copyright Information
Some works in this presentation have been
licensed under the Creative Common license
(CC). Please respect the license when using
the concepts or adapting them.
For more information please go here:
 www.creativecommons.org
Thank you…
Questions and Comments
Contact me on LinkedIn

More Related Content

What's hot

CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
Kevin Duffey
 
IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 3IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 3
Andrew Sanders
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a Role
Kevin Duffey
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vladimir Jirasek
 
Cyber Security Organizational Operating Model and Governance
Cyber Security Organizational Operating Model and GovernanceCyber Security Organizational Operating Model and Governance
Cyber Security Organizational Operating Model and Governance
Srinidhi Aithal
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
IANS
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – Keynote – M.Akker...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – Keynote – M.Akker...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – Keynote – M.Akker...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – Keynote – M.Akker...
FinTech Belgium
 
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Dragos, Inc.
 
Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk management
Wilfred Barretto
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
Paul Feldman
 
Keith Fricke - CISO for an Hour
Keith Fricke - CISO for an HourKeith Fricke - CISO for an Hour
Keith Fricke - CISO for an Hour
centralohioissa
 
Information security governance
Information security governanceInformation security governance
Information security governance
Koen Maris
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium
 
Case Study: Risk Assessment & Security Strategy Definition - Happiest Minds
Case Study: Risk Assessment & Security Strategy Definition - Happiest MindsCase Study: Risk Assessment & Security Strategy Definition - Happiest Minds
Case Study: Risk Assessment & Security Strategy Definition - Happiest Minds
Happiest Minds Technologies
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Education & Training Boards
 
Security For Free
Security For FreeSecurity For Free
Security For Free
gwarden
 
Organizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC ApproachOrganizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC Approach
PECB
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
CSSRL PUNE
 
IT Asset Management
IT Asset ManagementIT Asset Management
IT Asset Management
MDS TS
 

What's hot (19)

CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
 
IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 3IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 3
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a Role
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Cyber Security Organizational Operating Model and Governance
Cyber Security Organizational Operating Model and GovernanceCyber Security Organizational Operating Model and Governance
Cyber Security Organizational Operating Model and Governance
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – Keynote – M.Akker...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – Keynote – M.Akker...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – Keynote – M.Akker...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – Keynote – M.Akker...
 
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
 
Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk management
 
Cybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of DirectorsCybersecurity Goverence for Boards of Directors
Cybersecurity Goverence for Boards of Directors
 
Keith Fricke - CISO for an Hour
Keith Fricke - CISO for an HourKeith Fricke - CISO for an Hour
Keith Fricke - CISO for an Hour
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
 
Case Study: Risk Assessment & Security Strategy Definition - Happiest Minds
Case Study: Risk Assessment & Security Strategy Definition - Happiest MindsCase Study: Risk Assessment & Security Strategy Definition - Happiest Minds
Case Study: Risk Assessment & Security Strategy Definition - Happiest Minds
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
Organizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC ApproachOrganizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC Approach
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
IT Asset Management
IT Asset ManagementIT Asset Management
IT Asset Management
 

Similar to The Art & Science of Simple Security

Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
EC-Council
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS
 
The Perspective of Today's Information Security Leader
The Perspective of Today's Information Security LeaderThe Perspective of Today's Information Security Leader
The Perspective of Today's Information Security Leader
Ravila White
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
360 BSI
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
Rogers Communications
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
Edinburgh Napier University
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
Syed Azher
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Ben Rothke
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
infosec train
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security services
Hinne Hettema
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
Global Knowledge Training
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & Manufacturing
Evan Francen
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
lior mazor
 

Similar to The Art & Science of Simple Security (20)

Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)
 
The Perspective of Today's Information Security Leader
The Perspective of Today's Information Security LeaderThe Perspective of Today's Information Security Leader
The Perspective of Today's Information Security Leader
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
Stu r35 b
Stu r35 bStu r35 b
Stu r35 b
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security services
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & Manufacturing
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 

Recently uploaded

CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 

Recently uploaded (20)

CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 

The Art & Science of Simple Security

  • 1. Information Security Science The Art & Science of Simple Security By Ravila White | CISSP, CISM, CISA, CIPP, GCIH Making it better without making it complex
  • 2. Disclaimer This presentation and the concepts herein are my opinions through private research, practice and chatting with other professionals. It is not the opinion of past, present or future employers.
  • 3. Overview Information Security is a broad, deep and complex discipline. The success of information security requires succinct artful presentation and agile scientific execution. This discussion will focus on the aspects of Macro and Micro Information security. What it is, Why you need it, and how to use it.
  • 4. Information Security is….. “Knowing computer security and compliancy is like knowing the law, everyone has their own opinion and each judge interprets it differently.” [Bruce Lobree]
  • 5. How do you get hurt skiing? “Information Security and IT are a lot like skiing. You only get hurt when you ski beyond your abilities, out of control or out of bounds.” [Ravila H. White]
  • 6. Learning from economist “We can make information security more consumable by taking a page from economics history and making it divisible. Divide information security in the same manner as economics.” [Ravila H. White] Macro-Information Security (the business process and resulting artifacts designed to influence business choices, protect the business, drive technology selection) Micro-Information Security (the technology, controls, countermeasures and tactical solutions that protect information assets) Simple Security (information security driven by and from the business) Art Science Emotional Right Logical Left
  • 7. The ART of Macro-Information Security Art is the process or product of deliberately arranging elements in a way to affect the senses or emotions.
  • 8. What are the elements?  Dollars  Compounding Investments  Business Value & Concerns  Efficiency Gains  Asset Protection  Visualization “Executives are strategists who should not focus on the minutiae of operations, but rather look outward at the competitive landscape.” [Baldwin & Curley]
  • 9. How we arrange the elements  Business model analysis and mapping  Organizational dashboards  Authoritative Artifacts  Meaningful Visualizations “Copy-Exactly accelerates the diffusion process and, at the same time, it simplifies system maintenance and user training.” [Baldwin & Curley]
  • 12. The SCIENCE of Micro- Information Security Knowledge of a system or knowledge covering general truths or the operation of general laws especially as obtained and tested through scientific method.
  • 13. What are we protecting?
  • 14. How do we protect simply?  Our primary protection is…  If the primary fails then…  Our secondary protection is…  If the secondary fails then…  Tertiary protection contains “Three Rules of Work: Out of clutter find simplicity; From discord find harmony; In the middle of difficulty lies opportunity.” [Einstein]
  • 15. Where we influence protection
  • 16. How do we protect?
  • 17. Protection is simple  In Scope  Asset core  Enterprise, point or hybrid  Primary, secondary and tertiary
  • 18. Credits & References General Professional Influencers  Business Model Generation  www.dictionary.com  Google: www.Google.com  Oxford Dictionary  Wikipedia: www.wikipedia.com  Managing IT Innovation for Business Value  Nick Malick
  • 19. Copyright Information Some works in this presentation have been licensed under the Creative Common license (CC). Please respect the license when using the concepts or adapting them. For more information please go here:  www.creativecommons.org
  • 20. Thank you… Questions and Comments Contact me on LinkedIn

Editor's Notes

  1. Presented at SecureWorld Expo
  2. Why has information security become so complex? In part the complexity has risen from its beginning in the military. You cannot protect a nation or lives without the best security. The spawn of the dotcom boom made information/data readily accessible. The value of information and data created a new type of asset, intellectual property and information assets. Traditional companies realize an internet presence is essential to their continued growth. Criminals of any echelon realize they can tap the internet commodities with anonymity to reap financial rewards. The government begins providing some regulation around the protection of data through laws like COPA, HIPAA, PCI etc. The outcome is organizations respond using old school information security tactics. Now we are faced with the quandary of what to protect? How much protection is necessary and how to make it mesh with the business.
  3. When I learned to ski, my instructor told us how to avoid getting hurt. I took that to heart because shortly thereafter, my friends who were already great skiers tricked me into taking a black diamond run. I didn’t ski the run as skillfully as they did, but I stuck to the basics that I’d learned. Another factor was my physical condition. I had been strength training for an entire year prior to this so my legs didn’t tire out. The result was I survived a complex run and made it down the mountain safely. This served as a very good learning lesson for me. (1) Our abilities will be tested usually in situations where you have little choice, however by sticking to the basics you can navigate safely and successfully. (2) When confronted with complexity, fall back on simple techniques, (3) You can manage the unexpected if you have conditioned yourself in a manner that will compliment the arenas you enter. We are better information security professionals, when we first understand the boundaries. Boundaries are set by regulators and the business. We provide value, when we understand how, when and where to apply security to the business. This reduces information security white noise. Information security white noise is the next big ‘thing’ (e.g. threat or technology) that is on the horizon. Cloud computing has caused quite a stir. However, honestly do we have the secure the cloud any differently than an on-site data center? It’s secure using the same techniques and technology. The linchpin of cloud security lies with legal. Protection of assets entrusted to cloud vendors is managed through the contractual obligations your legal department agrees. Another example is the push by some vendors to sell technology that is suppose to protect Unified Communications (UC) technology. Do we really need ‘special’ technology to protect UC? Buying into Information Security white noise results in technology/technique complexity. It will force you and the organization you work for to work beyond the organization’s abilities. Condition yourself by reading non-information security material. It will help you as it can bridge the gap between you and the business because it will be a long run.
  4. Economics is the social science that studies the production, distribution, and consumption of goods and services. Sounds simple but once you delve beneath the surface you realize why economics is a science. Look around the room we are sitting in and catalog the various goods you see: chairs, tables, windows, clothes, shoes, laptops, pen, Ethernet cables etc. Now think about who, when and how it is consumed or used. Next think about how it was distributed so that it could be consumed and finally how it was produced. There is much to be considered. If you were to mind map just what you’d observed in this room or even around your home, the end result is a fairly tortuous diagram. Consideration is simplified through maco/micro economics. Information security is complex. We know that. We must possess business acumen, law enforcement understanding, legal awareness, technology savvy and the human connection. We can make it easy for the business if we simplify. Macro-Information Security is the big picture and how we communicate to management using the terms of the business. Macro-information security also extends to external to an organization to support partners and customers as well as ensure compliance of regulations. Internal organization extension includes support of convergence programs and includes alignment to business goals and objectives. Micro-Information Security is the nuts and bolts, the details that support an organization’s information security practice. It’s the technology, controls, countermeasures and tactical solutions that are employed on a day-to-day basis. Most important is how you implement micro-information security. A scientific approach provides greater success as techniques used to reduce the threat of computer crime are based on known observations, experimentation, testing of hypotheses and measurable evidence. When presenting information security to the business, should it be presented as art or science? You have to present both eventually. However presenting what has meaning to the business will prove most effective.
  5. Information security practioners cannot afford to offer knee jerk solutions to the business. Nor can they continue to apply militaristic styles which results in corporate revolt. Pandering to the latest threat be is social media such as FaceBook is not advised as well. Talking to the business on its terms is what will gain you a seat at the table and support for current and future initiatives. That is how you appeal to the emotional right which takes artifice. The Sagrada Familia is one of the best metaphors I can use to introduce the art of macro-information security. For anyone who has visited Barcelona and viewed it, it is unforgettable. I use it here as it truly does represent the definition of art. The deliberate nature by which Gaudi approached its design definitely affects ones senses. So deliberate was his approach that work has continued on using the techniques he developed.
  6. In the spirit of keeping security simple lets apply the rule of 7-2 or no more than 10. This speaks to the amount of individual elements or points that the human mind can easily retain. Recently I discussed with fellow professionals how to present the security portfolio to the business. The first recommendation was a framework that comprised of cross cutting concerns of: (1) Identity & Access Mgmt and Provisioning , (2) Baseline Security & Configuration Mgmt (3) Logging, Monitoring and Incident Response (4) Business Continuity & DR (5) Network Infrastructure & Zoning By the end of the discussion it was agreed that the cross cutting concerns were Business Concerns, Efficiency Gains and Asset Protection. The list above, those are solutions and minutiae. It does not tell the business how it will continue to advance and survive in today's competitive market-place. The other problem with the initial elements, they are solutions. Not interests. You want to present interests to the business first. This will show you are aligned to the business. You can discuss solutions once you’ve validated business alignment. The list we have here demonstrates the choice of effective elements/interests to present to business.
  7. Copy-exactly is a method employed to avoid tinkering. Tinkering results in systemic inefficiencies to the business and results in reactive solutions that do not reduce risk to the business. Additionally tinkering results in unexpected results to the enterprise. Copy-exactly applied to information security in the business means the use of the same or similar tools that the business uses to communicate. Not information security centric tools. The result is the business understands how information security is supporting the business and how it is integrated within the business. Copy-exactly supports the metaphor used at the beginning of this section. Had Gaudi not used a clear methodology for the Sagrada Familia his predecessors could not continue and ultimately finish the project he began. Copy-exactly when you present business concepts to the business. Need a dashboard, then use the same dashboard as the CIO. Is there an ask around Risk? Why not start with a SWOT analysis before diving into a infosec centric risk assessment. Avoid abuse of copy-exactly by understanding why the model in use was chosen. Otherwise you when changes are made to the model you may be left behind.
  8. These are the major contributors and considerations for Macro-Information Security in the business. Each vector interacts with the other vectors at any given time. Also depending on where the business is vectors may align or change position based on business priority. The Regulator vector is on top because it is considered autonomous as it behavior cannot be changed by any of the other vectors. It will likely drive the other vectors at some point. The Internal Partner vector anchors Macro-Information Security as it ensures internal convergence is addressed and customer concerns are vetted. The content vectors of The Business and External Partners drive the business and support the business with guidance from the governance vectors of Regulators and Internal Partners. The simple visualization of a one dimensional image enables the consumer easy processing and the opportunity to arrange the image visuals as they would like.
  9. This triad is a simple yet effective visual for presenting the concepts of Simple Information Security, Macro-Information Security and Micro-Information Security without overloading the consumer. Each component of this triad can stand alone as a unit, pair or a whole and still bring value to the business.
  10. If science is about general truths testing to find new truths, what is the opposite of science? What do we know about systems? We know that they can be vulnerable to attack. How are they vulnerable to attack? The human error of insecure coding or configuration. What happens if we don’t secure our systems? They system will be attacked and data exposed. What happens when we secure our systems? Risk to the business is reduced; dollars can be spent growing the business, IT staff can spend time on innovation rather than band-aids and fire fighting. Can most of the basic security software today protect emerging technologies? More than likely. We know how to protect ports, we know how software is developed and we know someone is going to develop malware to take advantage of unprotected ports and software.
  11. We protect the business assets We protect the business against itself We protect the business against competitors We protect the business against what they are not aware of (e.g. hackers) We protect the asset core, peripheral services and the infrastructure.
  12. Copy-exactly is a method employed to avoid tinkering. Tinkering results in systemic inefficiencies to the business and results in reactive solutions that do not reduce risk to the business. Copy-exactly applied to information security in the business means the use of the same or similar tools that the business uses to communicate. Not information security centric tools. The result is the business understands how information security is supporting the business and how it is integrated within the business. Copy-exactly supports the metaphor used at the beginning of this section. Had Gaudi not used a clear methodology for the Sagrada Familia his predecessors could not continue and ultimately finish the project he began. Avoid abuse of copy-exactly by understanding why the model in use was chosen. Otherwise you when changes are made to the model you may be left behind.
  13. There is much debate around where information security should reside in the business. As of late the comment has been as a vertical alongside other vertically-oriented domain architectures and also horizontally-oriented with infusion points into the domain architectures noted above. Describing security has horizontal or vertical is does not represent its true intent. The intent of security is to protect the interest of the business. In a nutshell, security is a wrapper or insulator that is driven by the enterprise to protect the interests of the enterprise. This drawing illustrates how EA drives architecture with Security as a wrapper. Business architecture is a back-plane to the domain architectures of data, information systems and technical.
  14. We make better choices for protection when we think of them as compounding investments. That is an asset that can be reapplied to protect future business investments. At its most basic, we protect by investing in (1) identities, (2) preventative technologies and (3) encryption. By referencing our solutions in this manner, non-information security professionals can easily identify where dollars will be spent and calculate reoccurring costs. Of the solutions mentioned, security testing, code review and threat modeling is not mentioned. Why? Because these are one time investments that can only be applied to one project at any one time. An example is the deployment of a web-based application that is internet facing. A full-featured security test will ensure the application is deployed without vulnerabilities. However we know that a full-featured security test can cost more than $250K. To lower the cost of ownership investing in an application firewall will ensure the application remains safe when incremental features are added. Additionally risk to other applications is reduced by placing them behind the application firewall. When that zero-day hits, your application will remain protected.
  15. The Chateau de Chenonceau is a castle located in the Loire Valley of France. It is a fitting metaphor to end our discussion. This ancient castle has survived over the years because each owner reflected on its strength and weaknesses. It has survived through principles of reapplication, copy exactly, understanding what portions of the rebuild were in-scope or what changes were necessary throughout the structure. The main castle is protected by a moat and guard house. Before you being your next Information Security project, remember to first reflect on what is present then keep it simple by applying the art and science of simple security. The result is lasting value to the business.
  16. Something I’d like to encourage all of you do to…when presenting in the future, list not only your online and book references, but also your people credits. We all meet people who are pivotal in growing or knowledge or professionalism. Don’t forget to mention them.