SlideShare a Scribd company logo
1 of 25
www.niiconsulting.com @kkmookhey
The Economics of Security
K. K. Mookhey
Founder & Director
Network Intelligence (I) Pvt. Ltd.
www.niiconsulting.com @kkmookhey
Agenda
What should you invest in?
Solving current problems?
Being ready for future ones?
How do you justify this investment to the Board?
Some parting thoughts…
www.niiconsulting.com @kkmookhey
Investing in security solutions
Should I buy APT Protection?
Or WAF / DLP / IRM / Whatever?
www.niiconsulting.com @kkmookhey
Before we get to the technology…
www.niiconsulting.com @kkmookhey
Because, weak foundations!
www.niiconsulting.com @kkmookhey
Why do I need to invest in X?
www.niiconsulting.com @kkmookhey
Measuring Information Security
What is your Risk?
Standard Risk Assessments
 More for compliance than for actual business decision making
 Elaborate Excel sheets
 Few insights
Taking a different approach
 War-game exercises
 Run scenarios
 APT attack
 Insider breach
 Perimeter breach
www.niiconsulting.com @kkmookhey
Scenario 1: End-point compromise
Typical breaches target the end-point and the attacker then penetrate
deeper into the network from there onwards. End-points are compromised
due to missing Adobe/Java patches or unpatched browsers being used.
Malware can also get introduced via USB drives.Controls:
End-point malware protection
Internet content filtering
USB blocking
Removal of local admin rights
Installing latest OS patches
Installing latest non-OS patches (for Java,
Adobe, etc.)
Email filtering
Restrict local admin rights
Modify local administrator account password
Observations:
Anti-virus protection is working well
Microsoft patches are being applied properly
Email filtering is working well
Internet content filtering allows access to file
sharing sites and does not block zip/exe
downloads
Patches not applied to non-MS software
such as Java, Adobe]
Internet content filtering can be bypassed by
changing WLAN/browser settings
Nearly 100 users have local admin rights
Local administrator password not changed
Recommendations:
1. Enhance end-point
security controls
2. Enhance Internet
content filtering
3. Address systems
noted as malware-
infected
www.niiconsulting.com @kkmookhey
Recommendation 1: Enhance end-point &
gateway security controls
As a media company and due to various software requirements, we understand
that standard end-point security controls are difficult to implement. Yet we cannot
stress enough the importance of protecting the end-point as that has become the
primary target for attackers:
a. Restrict the Internet access and block Skype / YouTube / Dropbox / Social Media
b. Upgrade firewalls to Next Generation Firewalls
c. Ensure patching process covers non-MS software such as Adobe and Java
d. Remove local admin rights by working with the provider of Media software
e. Block USB access and provide users with an alternate means of file sharing
f. Enhance endpoint security to enforce conditional USB / Local Admin controls
g. Evaluate and budget for DLP
Priority: Critical
www.niiconsulting.com @kkmookhey
Justifying investments in
security
www.niiconsulting.com @kkmookhey
Two major decision points
Choosing the right solution
Choosing the right price
www.niiconsulting.com @kkmookhey
Case Study
 Large Telco
 On-going application security assessments
 On-going source code reviews
 Periodic penetration tests
 Development done by vendors
 WAF decision pending for a year…
 Should they buy a WAF? Should they invest more in
application security? Should they implement a GRC
solution?
www.niiconsulting.com @kkmookhey
Vulnerability Statistics
0
10
20
30
40
50
60
70
High
Medium
Low
The # of High/Medium vulnerabilities are stable – no significant trends
emerge! Why?
www.niiconsulting.com @kkmookhey
Insights from data analytics
 Vendor delays in fixing the issues
 Multiple reassessments leads to the issues
remaining open and overlapped in subsequent
assessments
 High level of exposure on the Internet
 Multiple approaches adopted and strong focus on
appsec in recent times
www.niiconsulting.com @kkmookhey
Hence…
Strategy is two pronged
1. WAF and other virtual patching
technologies should be implemented
2. Vendor management practices and
contractual negotiation should have CISO
involvement
www.niiconsulting.com @kkmookhey
Why you need your data
 Surveys/Reports cover
organizations across
industries
 Do not take into account
nature of the organization’s
current web app situation –
vendor, in-house, legacy,
COTSE, etc.
 Do not take into account
current level of maturity
 Try to draw general
conclusions from
average/sum of all data
www.niiconsulting.com @kkmookhey
Justifying the investment
www.niiconsulting.com @kkmookhey
Economic Model for Information Security
Parameter Value
Turnover ₹1000 crores
Profit-After-Tax (15%) ₹150 crores
Number of customers 10 lakhs (0.1 crore)
Profit per customer ₹1500
Number of customers that will go away in case of
cyber-security incident
5%
Profit reduction (financial impact) ₹7.5 crores
Remediation costs (incident response, forensics,
legal fees, if any)
₹20 lakhs
Business growth projection 15% - 1.5 lakh new customers
Future customer attrition 5% new customers won’t join
Cost of lost future business ₹1.12 crores
Total cost of the breach ₹8.8 crores
www.niiconsulting.com @kkmookhey
Average Cost of Breach – India
www.niiconsulting.com @kkmookhey
Other economic models
Theft of intellectual property
Market opportunity cost is much higher
Cost of regulatory non-compliance
Penalties to be paid to the regulator; or
Cost of class-action lawsuit
www.niiconsulting.com @kkmookhey
Solving for the future?
Are your investments
future-proof?
www.niiconsulting.com @kkmookhey
On the horizon…
Cloud adoption – only going to increase
Mobility – moving towards mobile-first
Shadow IT
Big Data
Social Media Access
DevOps
Internet of Things
Deperimeterization
Business environments are becoming increasingly VUCA
www.niiconsulting.com @kkmookhey
Changing role of information
security
www.niiconsulting.com @kkmookhey
Evolving Role of Information Security
More evangelist than checkpoint
Embedding information security within the business
Enabling the business to address information security risk
Reporting structure outside of IT
You will – or have already been – compromised; so be
responsive
You can’t protect everything – so strategize and prioritize
www.niiconsulting.com @kkmookhey
Q&A
Thank You!
kkmookhey@niiconsulting.com
@kkmookhey
linkedin.com/kkmookhey

More Related Content

What's hot

10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
The Future of Technology Operations
The Future of Technology OperationsThe Future of Technology Operations
The Future of Technology OperationsIvanti
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Enterprise Management Associates
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation SlidesIvanti
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0Happiest Minds Technologies
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworksJohn Arnold
 
Accelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident InvestigationAccelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident InvestigationEnterprise Management Associates
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
Security Trends in the Retail Industry
Security Trends in the Retail IndustrySecurity Trends in the Retail Industry
Security Trends in the Retail IndustryIBM Security
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 

What's hot (20)

IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
The Future of Technology Operations
The Future of Technology OperationsThe Future of Technology Operations
The Future of Technology Operations
 
CYBER SECURITY audit course report
CYBER SECURITY audit course reportCYBER SECURITY audit course report
CYBER SECURITY audit course report
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
 
"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
Accelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident InvestigationAccelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident Investigation
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Security Trends in the Retail Industry
Security Trends in the Retail IndustrySecurity Trends in the Retail Industry
Security Trends in the Retail Industry
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 

Viewers also liked

Real-time Static Malware Analysis Using NepenthesFE
Real-time Static Malware Analysis Using NepenthesFEReal-time Static Malware Analysis Using NepenthesFE
Real-time Static Malware Analysis Using NepenthesFENetwork Intelligence India
 
Rencontres de l'eau - 2016
Rencontres de l'eau - 2016Rencontres de l'eau - 2016
Rencontres de l'eau - 2016Thomas Redoulez
 
Article pénélope
Article pénélopeArticle pénélope
Article pénélopelfiduras
 
FoFN Friends of FixNix Partner briefing - Aug 2nd
FoFN Friends of FixNix Partner briefing - Aug 2ndFoFN Friends of FixNix Partner briefing - Aug 2nd
FoFN Friends of FixNix Partner briefing - Aug 2ndFixNix Inc.,
 

Viewers also liked (20)

RBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on ITRBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on IT
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
Application security enterprise strategies
Application security enterprise strategiesApplication security enterprise strategies
Application security enterprise strategies
 
XML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus ScannerXML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus Scanner
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
NII Social Engineering Case Study
NII Social Engineering Case StudyNII Social Engineering Case Study
NII Social Engineering Case Study
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Understanding Governance
Understanding GovernanceUnderstanding Governance
Understanding Governance
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Real-time Static Malware Analysis Using NepenthesFE
Real-time Static Malware Analysis Using NepenthesFEReal-time Static Malware Analysis Using NepenthesFE
Real-time Static Malware Analysis Using NepenthesFE
 
Rencontres de l'eau - 2016
Rencontres de l'eau - 2016Rencontres de l'eau - 2016
Rencontres de l'eau - 2016
 
Article pénélope
Article pénélopeArticle pénélope
Article pénélope
 
Calles de Encinasola
Calles de EncinasolaCalles de Encinasola
Calles de Encinasola
 
FoFN Friends of FixNix Partner briefing - Aug 2nd
FoFN Friends of FixNix Partner briefing - Aug 2ndFoFN Friends of FixNix Partner briefing - Aug 2nd
FoFN Friends of FixNix Partner briefing - Aug 2nd
 
Ozone
OzoneOzone
Ozone
 

Similar to The Economics of Security

Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itChandra Sekhar Tondepu
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Ajay Kumar Uppal
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information SecurityAjay Kumar Uppal
 
Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010simongreaves
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentationlucydavidson
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016InvestorSymantec
 
How Business Acceleration Cloud is Revolutionizing Software Sales
How Business Acceleration Cloud is Revolutionizing Software SalesHow Business Acceleration Cloud is Revolutionizing Software Sales
How Business Acceleration Cloud is Revolutionizing Software SalesCloudShare
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityDreamforce
 
Building the Global "Cloud 2"
Building the Global "Cloud 2"Building the Global "Cloud 2"
Building the Global "Cloud 2"Peter Coffee
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?guestc65425
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech applicationnimbleappgenie
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
The path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe Economist Media Businesses
 
Webinar for August 2018 Technology infrastructure for global insurers
Webinar for August 2018 Technology infrastructure  for global insurersWebinar for August 2018 Technology infrastructure  for global insurers
Webinar for August 2018 Technology infrastructure for global insurersThe Digital Insurer
 
IoT product business plan creation for entrepreneurs and intrepreneurs
IoT product business plan creation for entrepreneurs and intrepreneursIoT product business plan creation for entrepreneurs and intrepreneurs
IoT product business plan creation for entrepreneurs and intrepreneursDr. Shivananda Koteshwar
 
G01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionG01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionSatya Harish
 

Similar to The Economics of Security (20)

Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
 
Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010
 
The path to self-disruption
The path to self-disruptionThe path to self-disruption
The path to self-disruption
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 
How Business Acceleration Cloud is Revolutionizing Software Sales
How Business Acceleration Cloud is Revolutionizing Software SalesHow Business Acceleration Cloud is Revolutionizing Software Sales
How Business Acceleration Cloud is Revolutionizing Software Sales
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
 
Building the Global "Cloud 2"
Building the Global "Cloud 2"Building the Global "Cloud 2"
Building the Global "Cloud 2"
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
The path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journeyThe path to self disruption: Nine steps of a digital transformation journey
The path to self disruption: Nine steps of a digital transformation journey
 
Webinar for August 2018 Technology infrastructure for global insurers
Webinar for August 2018 Technology infrastructure  for global insurersWebinar for August 2018 Technology infrastructure  for global insurers
Webinar for August 2018 Technology infrastructure for global insurers
 
IoT product business plan creation for entrepreneurs and intrepreneurs
IoT product business plan creation for entrepreneurs and intrepreneursIoT product business plan creation for entrepreneurs and intrepreneurs
IoT product business plan creation for entrepreneurs and intrepreneurs
 
G01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionG01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protection
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 

More from Network Intelligence India

More from Network Intelligence India (11)

ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 
National Cyber Security Policy 2013
National Cyber Security Policy 2013National Cyber Security Policy 2013
National Cyber Security Policy 2013
 
Spear Phishing Methodology
Spear Phishing MethodologySpear Phishing Methodology
Spear Phishing Methodology
 
Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Distributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyDistributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing Methodology
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Scada assessment case study
Scada assessment case studyScada assessment case study
Scada assessment case study
 
Virtualization security audit
Virtualization security auditVirtualization security audit
Virtualization security audit
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

The Economics of Security

  • 1. www.niiconsulting.com @kkmookhey The Economics of Security K. K. Mookhey Founder & Director Network Intelligence (I) Pvt. Ltd.
  • 2. www.niiconsulting.com @kkmookhey Agenda What should you invest in? Solving current problems? Being ready for future ones? How do you justify this investment to the Board? Some parting thoughts…
  • 3. www.niiconsulting.com @kkmookhey Investing in security solutions Should I buy APT Protection? Or WAF / DLP / IRM / Whatever?
  • 7. www.niiconsulting.com @kkmookhey Measuring Information Security What is your Risk? Standard Risk Assessments  More for compliance than for actual business decision making  Elaborate Excel sheets  Few insights Taking a different approach  War-game exercises  Run scenarios  APT attack  Insider breach  Perimeter breach
  • 8. www.niiconsulting.com @kkmookhey Scenario 1: End-point compromise Typical breaches target the end-point and the attacker then penetrate deeper into the network from there onwards. End-points are compromised due to missing Adobe/Java patches or unpatched browsers being used. Malware can also get introduced via USB drives.Controls: End-point malware protection Internet content filtering USB blocking Removal of local admin rights Installing latest OS patches Installing latest non-OS patches (for Java, Adobe, etc.) Email filtering Restrict local admin rights Modify local administrator account password Observations: Anti-virus protection is working well Microsoft patches are being applied properly Email filtering is working well Internet content filtering allows access to file sharing sites and does not block zip/exe downloads Patches not applied to non-MS software such as Java, Adobe] Internet content filtering can be bypassed by changing WLAN/browser settings Nearly 100 users have local admin rights Local administrator password not changed Recommendations: 1. Enhance end-point security controls 2. Enhance Internet content filtering 3. Address systems noted as malware- infected
  • 9. www.niiconsulting.com @kkmookhey Recommendation 1: Enhance end-point & gateway security controls As a media company and due to various software requirements, we understand that standard end-point security controls are difficult to implement. Yet we cannot stress enough the importance of protecting the end-point as that has become the primary target for attackers: a. Restrict the Internet access and block Skype / YouTube / Dropbox / Social Media b. Upgrade firewalls to Next Generation Firewalls c. Ensure patching process covers non-MS software such as Adobe and Java d. Remove local admin rights by working with the provider of Media software e. Block USB access and provide users with an alternate means of file sharing f. Enhance endpoint security to enforce conditional USB / Local Admin controls g. Evaluate and budget for DLP Priority: Critical
  • 11. www.niiconsulting.com @kkmookhey Two major decision points Choosing the right solution Choosing the right price
  • 12. www.niiconsulting.com @kkmookhey Case Study  Large Telco  On-going application security assessments  On-going source code reviews  Periodic penetration tests  Development done by vendors  WAF decision pending for a year…  Should they buy a WAF? Should they invest more in application security? Should they implement a GRC solution?
  • 13. www.niiconsulting.com @kkmookhey Vulnerability Statistics 0 10 20 30 40 50 60 70 High Medium Low The # of High/Medium vulnerabilities are stable – no significant trends emerge! Why?
  • 14. www.niiconsulting.com @kkmookhey Insights from data analytics  Vendor delays in fixing the issues  Multiple reassessments leads to the issues remaining open and overlapped in subsequent assessments  High level of exposure on the Internet  Multiple approaches adopted and strong focus on appsec in recent times
  • 15. www.niiconsulting.com @kkmookhey Hence… Strategy is two pronged 1. WAF and other virtual patching technologies should be implemented 2. Vendor management practices and contractual negotiation should have CISO involvement
  • 16. www.niiconsulting.com @kkmookhey Why you need your data  Surveys/Reports cover organizations across industries  Do not take into account nature of the organization’s current web app situation – vendor, in-house, legacy, COTSE, etc.  Do not take into account current level of maturity  Try to draw general conclusions from average/sum of all data
  • 18. www.niiconsulting.com @kkmookhey Economic Model for Information Security Parameter Value Turnover ₹1000 crores Profit-After-Tax (15%) ₹150 crores Number of customers 10 lakhs (0.1 crore) Profit per customer ₹1500 Number of customers that will go away in case of cyber-security incident 5% Profit reduction (financial impact) ₹7.5 crores Remediation costs (incident response, forensics, legal fees, if any) ₹20 lakhs Business growth projection 15% - 1.5 lakh new customers Future customer attrition 5% new customers won’t join Cost of lost future business ₹1.12 crores Total cost of the breach ₹8.8 crores
  • 20. www.niiconsulting.com @kkmookhey Other economic models Theft of intellectual property Market opportunity cost is much higher Cost of regulatory non-compliance Penalties to be paid to the regulator; or Cost of class-action lawsuit
  • 21. www.niiconsulting.com @kkmookhey Solving for the future? Are your investments future-proof?
  • 22. www.niiconsulting.com @kkmookhey On the horizon… Cloud adoption – only going to increase Mobility – moving towards mobile-first Shadow IT Big Data Social Media Access DevOps Internet of Things Deperimeterization Business environments are becoming increasingly VUCA
  • 24. www.niiconsulting.com @kkmookhey Evolving Role of Information Security More evangelist than checkpoint Embedding information security within the business Enabling the business to address information security risk Reporting structure outside of IT You will – or have already been – compromised; so be responsive You can’t protect everything – so strategize and prioritize