SlideShare a Scribd company logo
Information Security
Science
The Rational Approach to Disruptive Information Security
By Ravila White, CISSP, CISM, CISA, CIPP, GCIH, ITIL v.3
Making it better without making it complex
Disclaimer
This presentation and the concepts herein are
my opinions through private research, practice
and chatting with other professionals.
It is not the opinion of past, present or future
employers.
Agenda
 Checklist(s) – What is wrong about them…
 Understanding Disruption– It’s the driver
behind technology we must secure…
 How to be disruptive – NIST can help you
but…
Checklist(s)
What is wrong about them….
 Find a standard
 Find a best practice
 Perform a gap analysis
 Train our users
 All the boxes for the auditors are
checked
Going down the wrong path…
Why?
 The solution must meet the use case
 The solution must protect against real
threats
 Solutions must align to business
operations
Appearance is everything…
The reality is…
 Business is not linear
 Business is driven by innovation
 Business is driven by disruption
Knowing is not understanding. There is a great difference
between knowing and understanding: you can know a lot about
something and not really understand it.
[Charles Kettering]
How we got here..
 Not understand the mental model of our
organization
 Not adjusting our mental model
 Implementing mental models based on
checklists
Understanding Disruption
It’s the driver behind technology we must
secure…
Disruptive Technology and/or
Innovation
 Creating a new market or value network
 Improve a product or service
 Designing for a different set of consumers
“It represents a mindset—a rebellious instinct to discard old
business clichés and remake the market landscape. An
eagerness to deliberately target situations where the competition
is complacent and the customer has been consistently
overlooked or under-served.” [Luke Wilson]
“The potential for reinvention is all around us, and it’s an exciting time
to be thinking about how to structure (or restructure) your business,
your community, or your life in ways that create new value. Enjoy the
possibilities.” [Richard Branson - 1998]
Innovation Disrupted Market
 USB Flash drives
 Downloadable digital media
 Minicomputers
 Digital photography
 Steamboats
 Automobiles
 LCD
 GPS Navigation
 Floppy Disk drives
 CDs, DVDs
 Mainframes
 Chemical photography
 Sailing ships
 Rail transport
 CRT
 Navigational map (paper)
Harnessing Disruption
Examining the Outcome…
© Gene Bellinger, Durval Castro and Anthony
Mills - systems-thinking.org
How Mental Models Influence
 Business Process Modeling –
communicates intent and value to the
organization
 Enterprise Architecture – sets the context of
information security within the business
 Information Design – helps non-infosec
partners quickly orient themselves in a
complex environment
 Software Engineering– provides synthesis
of complex information into a whole
How to be disruptive
NIST can help you, but…
Identify and remove the inertia…
 Industry Standards
 Industry best practices
 Audit Checklists
 Industry jargon
Reframe your approach…
Reversal through ISO7498
 Authoritative
◦ sets the direction
◦ the business validates its decisions
◦ the business executes against
◦ the business captures resource
requirements
◦ the business verifies the activities
necessary to support a solution
 Historical
◦ Project plans
◦ RFIs and/or RFPs
Insert Rational Structure
 Result in deliverables to the business
 Contain sensitive information
Patterns of behavior…
Structured Rationalization
Credits & References
General Professional Influencers
 Disrupt: Think the Unthinkable to
Spark Transformation in Your
Business
 Google: www.Google.com
 The Visual Miscellaneum
 Change by Design
 Thinking Page: www.thinking.net
 Wikipedia: www.wikipedia.com
 Colleen F. Ponto, Ed.D
Copyright Information
Some works in this presentation have been
licensed under the Creative Common license
(CC). Please respect the license when using
the concepts or adapting them.
For more information please go here:
 www.creativecommons.org
Thank you…
Questions and Comments
Contact me via LinkedIn

More Related Content

Similar to The Rational Approach to Disruptive Information Security

Toolkit For Security in the Enterprise
Toolkit For Security in the EnterpriseToolkit For Security in the Enterprise
Toolkit For Security in the Enterprise
Ravila White
 
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information SecurityUsing Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
Ravila White
 
Putting the Business in Enterprise Information Security Architecture
Putting the Business in Enterprise Information Security ArchitecturePutting the Business in Enterprise Information Security Architecture
Putting the Business in Enterprise Information Security Architecture
Ravila White
 
The Art & Science of Simple Security
The Art & Science of Simple SecurityThe Art & Science of Simple Security
The Art & Science of Simple Security
Ravila White
 
Duke Pci T Raining Slides
Duke Pci T Raining SlidesDuke Pci T Raining Slides
Duke Pci T Raining Slides
Laney Dale
 
RW Keynote IDM2009
RW Keynote IDM2009RW Keynote IDM2009
RW Keynote IDM2009
racingsnake
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
aengelbert
 
CFITS Disaster Recovery 2009
CFITS Disaster Recovery 2009CFITS Disaster Recovery 2009
CFITS Disaster Recovery 2009
cfits
 
Data-Driven Design for User Experience
Data-Driven Design for User Experience Data-Driven Design for User Experience
Data-Driven Design for User Experience
Emi Kwon
 
Making Data Work: Organizational Practices for Getting Value from Information
Making Data Work:  Organizational Practices for Getting Value from InformationMaking Data Work:  Organizational Practices for Getting Value from Information
Making Data Work: Organizational Practices for Getting Value from Information
Alex Santana
 
How to Manage a UX Team
How to Manage a UX TeamHow to Manage a UX Team
How to Manage a UX TeamKatrina Alcorn
 
Action TI : Big Data at Microsoft and Dynamics 365 introduction
Action TI : Big Data at Microsoft and Dynamics 365 introductionAction TI : Big Data at Microsoft and Dynamics 365 introduction
Action TI : Big Data at Microsoft and Dynamics 365 introduction
Nicolas Georgeault
 
Power Of Visual Thinking
Power Of Visual ThinkingPower Of Visual Thinking
Power Of Visual Thinkingsmehro
 
Opportunities with data science
Opportunities with data scienceOpportunities with data science
Opportunities with data science
Ashiq Rahman
 
Dell B2B: APT by Brilliant Noise
Dell B2B: APT by Brilliant NoiseDell B2B: APT by Brilliant Noise
Dell B2B: APT by Brilliant Noise
Antony Mayfield
 
Including the User: How insights drive business #pswud2017
Including the User: How insights drive business #pswud2017Including the User: How insights drive business #pswud2017
Including the User: How insights drive business #pswud2017
Jeremy Johnson
 
[AIIM16] What Did AIIM16 Mean?
[AIIM16]  What Did AIIM16 Mean?[AIIM16]  What Did AIIM16 Mean?
[AIIM16] What Did AIIM16 Mean?
AIIM International
 
Thriving in the world of Big Data
Thriving in the world of Big DataThriving in the world of Big Data
Thriving in the world of Big Data
Livingstone Advisory
 
That soft, messy people factor in technology projects
That soft, messy people factor in technology projectsThat soft, messy people factor in technology projects
That soft, messy people factor in technology projects
rodmclaren
 
Making Agile Work for Design
Making Agile Work for DesignMaking Agile Work for Design
Making Agile Work for Design
Jonathan Follett
 

Similar to The Rational Approach to Disruptive Information Security (20)

Toolkit For Security in the Enterprise
Toolkit For Security in the EnterpriseToolkit For Security in the Enterprise
Toolkit For Security in the Enterprise
 
Using Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information SecurityUsing Pattern-based design to Drive Disruptive Information Security
Using Pattern-based design to Drive Disruptive Information Security
 
Putting the Business in Enterprise Information Security Architecture
Putting the Business in Enterprise Information Security ArchitecturePutting the Business in Enterprise Information Security Architecture
Putting the Business in Enterprise Information Security Architecture
 
The Art & Science of Simple Security
The Art & Science of Simple SecurityThe Art & Science of Simple Security
The Art & Science of Simple Security
 
Duke Pci T Raining Slides
Duke Pci T Raining SlidesDuke Pci T Raining Slides
Duke Pci T Raining Slides
 
RW Keynote IDM2009
RW Keynote IDM2009RW Keynote IDM2009
RW Keynote IDM2009
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
CFITS Disaster Recovery 2009
CFITS Disaster Recovery 2009CFITS Disaster Recovery 2009
CFITS Disaster Recovery 2009
 
Data-Driven Design for User Experience
Data-Driven Design for User Experience Data-Driven Design for User Experience
Data-Driven Design for User Experience
 
Making Data Work: Organizational Practices for Getting Value from Information
Making Data Work:  Organizational Practices for Getting Value from InformationMaking Data Work:  Organizational Practices for Getting Value from Information
Making Data Work: Organizational Practices for Getting Value from Information
 
How to Manage a UX Team
How to Manage a UX TeamHow to Manage a UX Team
How to Manage a UX Team
 
Action TI : Big Data at Microsoft and Dynamics 365 introduction
Action TI : Big Data at Microsoft and Dynamics 365 introductionAction TI : Big Data at Microsoft and Dynamics 365 introduction
Action TI : Big Data at Microsoft and Dynamics 365 introduction
 
Power Of Visual Thinking
Power Of Visual ThinkingPower Of Visual Thinking
Power Of Visual Thinking
 
Opportunities with data science
Opportunities with data scienceOpportunities with data science
Opportunities with data science
 
Dell B2B: APT by Brilliant Noise
Dell B2B: APT by Brilliant NoiseDell B2B: APT by Brilliant Noise
Dell B2B: APT by Brilliant Noise
 
Including the User: How insights drive business #pswud2017
Including the User: How insights drive business #pswud2017Including the User: How insights drive business #pswud2017
Including the User: How insights drive business #pswud2017
 
[AIIM16] What Did AIIM16 Mean?
[AIIM16]  What Did AIIM16 Mean?[AIIM16]  What Did AIIM16 Mean?
[AIIM16] What Did AIIM16 Mean?
 
Thriving in the world of Big Data
Thriving in the world of Big DataThriving in the world of Big Data
Thriving in the world of Big Data
 
That soft, messy people factor in technology projects
That soft, messy people factor in technology projectsThat soft, messy people factor in technology projects
That soft, messy people factor in technology projects
 
Making Agile Work for Design
Making Agile Work for DesignMaking Agile Work for Design
Making Agile Work for Design
 

Recently uploaded

Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 

Recently uploaded (20)

Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 

The Rational Approach to Disruptive Information Security

  • 1. Information Security Science The Rational Approach to Disruptive Information Security By Ravila White, CISSP, CISM, CISA, CIPP, GCIH, ITIL v.3 Making it better without making it complex
  • 2. Disclaimer This presentation and the concepts herein are my opinions through private research, practice and chatting with other professionals. It is not the opinion of past, present or future employers.
  • 3. Agenda  Checklist(s) – What is wrong about them…  Understanding Disruption– It’s the driver behind technology we must secure…  How to be disruptive – NIST can help you but…
  • 4. Checklist(s) What is wrong about them….
  • 5.  Find a standard  Find a best practice  Perform a gap analysis  Train our users  All the boxes for the auditors are checked Going down the wrong path…
  • 6. Why?  The solution must meet the use case  The solution must protect against real threats  Solutions must align to business operations
  • 8. The reality is…  Business is not linear  Business is driven by innovation  Business is driven by disruption Knowing is not understanding. There is a great difference between knowing and understanding: you can know a lot about something and not really understand it. [Charles Kettering]
  • 9. How we got here..  Not understand the mental model of our organization  Not adjusting our mental model  Implementing mental models based on checklists
  • 10. Understanding Disruption It’s the driver behind technology we must secure…
  • 11. Disruptive Technology and/or Innovation  Creating a new market or value network  Improve a product or service  Designing for a different set of consumers “It represents a mindset—a rebellious instinct to discard old business clichés and remake the market landscape. An eagerness to deliberately target situations where the competition is complacent and the customer has been consistently overlooked or under-served.” [Luke Wilson]
  • 12. “The potential for reinvention is all around us, and it’s an exciting time to be thinking about how to structure (or restructure) your business, your community, or your life in ways that create new value. Enjoy the possibilities.” [Richard Branson - 1998] Innovation Disrupted Market  USB Flash drives  Downloadable digital media  Minicomputers  Digital photography  Steamboats  Automobiles  LCD  GPS Navigation  Floppy Disk drives  CDs, DVDs  Mainframes  Chemical photography  Sailing ships  Rail transport  CRT  Navigational map (paper)
  • 14. Examining the Outcome… © Gene Bellinger, Durval Castro and Anthony Mills - systems-thinking.org
  • 15. How Mental Models Influence  Business Process Modeling – communicates intent and value to the organization  Enterprise Architecture – sets the context of information security within the business  Information Design – helps non-infosec partners quickly orient themselves in a complex environment  Software Engineering– provides synthesis of complex information into a whole
  • 16. How to be disruptive NIST can help you, but…
  • 17. Identify and remove the inertia…  Industry Standards  Industry best practices  Audit Checklists  Industry jargon
  • 19. Reversal through ISO7498  Authoritative ◦ sets the direction ◦ the business validates its decisions ◦ the business executes against ◦ the business captures resource requirements ◦ the business verifies the activities necessary to support a solution  Historical ◦ Project plans ◦ RFIs and/or RFPs
  • 20. Insert Rational Structure  Result in deliverables to the business  Contain sensitive information
  • 23. Credits & References General Professional Influencers  Disrupt: Think the Unthinkable to Spark Transformation in Your Business  Google: www.Google.com  The Visual Miscellaneum  Change by Design  Thinking Page: www.thinking.net  Wikipedia: www.wikipedia.com  Colleen F. Ponto, Ed.D
  • 24. Copyright Information Some works in this presentation have been licensed under the Creative Common license (CC). Please respect the license when using the concepts or adapting them. For more information please go here:  www.creativecommons.org
  • 25. Thank you… Questions and Comments Contact me via LinkedIn

Editor's Notes

  1. Presented at SecureWorld Expo Seattle by Ravila White
  2. Let’s discuss the current state of affairs facing information security architects. A point to note is use of the word enterprise has been mostly removed in their presentation. If you are an architect, you are more than likely in an environment that requires and currently utilized enterprise solutions.
  3. If you can’t find define the role, how can the business understand what services the architect will provide and how to engage them. When the business can not determine the need then the value is not assessed or appreciated as well.
  4. One of the biggest issues facing not just information security architecture but many information technology disciplines is a lack of common language and standards. This may seem a minor issue. However, it can cause confusion when a group of subject matter experts must reach a goal but they cannot because each person has their own idea of simple terms. As an exercise, ask people in your organization what a guideline or a framework is. Then ask them what a policy is. If you cannot agree on terminology, don’t expect to agree on what the role of the security architect is or how it should integrate in the business. Developing a common language from which everyone is working will go a long way toward moving architecture initiatives along. To set the floor of your taxonomy, use terms that are industry standard that easily integrated into the culture of your organization. This becomes especially important if your organization is global or international or has out-sourced some activities.
  5. We know we need to change. Lets discuss how can we do that without impacting the organizations we support and take the knowledge we have and channel it to greater success.
  6. This means that instead of isolating smaller and smaller parts of the system being studied, systems thinking works by expanding its view to take into account larger and larger numbers of interactions as an issue is being studied. This results in sometimes strikingly different conclusions than those generated by traditional forms of analysis, especially when what is being studied is dynamically complex or has a great deal of feedback from other sources, internal or external. Enterprise architecture and its sub architectures of which information security is a part must look at the big picture to provide successful solutions. Becoming myopic or blind to any part of the enterprise results in lose of functionality, protection and most importantly, user satisfaction. Information security architects must have systems thinking because information security and EA operate in a dichotomy. EA drives the business forward while information security may seemingly quash innovation as it must protect the business and provide assurance in a transparent manner. Transparency of information security cannot exist if the security architect does not understand the partner disciplines it supports or must integrate with. Additionally, information security must look to the business and EA to determine protections. If a protection is not required, then it should not be suggested. Information security architecture must be truly visionary. When it is visionary, it becomes a compliment of the system is protects. It is not complimentary when over engineered to complexity for those who must support it and those who use the resulting system. We can achieve systems thinking for the information security architect through diversification. Understand how to protect the flow of data is great. However, is applied differently depending on the type of information data and where it is flowing. For instance the solution for protecting the flow of electronic mail is different than the solution that protects the flow of transactional messages into and out of a data warehouse. A lack of understanding around data warehousing and information architecture could greatly impact usability if a one size fits all solution were approached. Diversification of knowledge is what makes a successful information security architect.
  7. In software development, middleware is used to support interoperability between disparate systems. For information security architecture innovation, non-infosec disciplines and practice can serve as the middleware to achieving success by supporting the business in a manner that is accepted. By learning at least two non-infosec practices in your organization, you are enabled to respond in a fashion that will allow you to easily communication with your business partners. This is how you move past being a analytical thinker to a systems thinker. Remember, analytics is more about focusing on points and is individualist in nature. Systems thinking is the aggregation of analytics around internal and external behaviors and interactions in a system. Of the recommended knowledge to gain, reverse engineering is perhaps the most valuable as it will enable you to gain a systems view of the information and guide your recommendations more accurately. Reverse engineering can tell you much about an environment. First and foremost it is an indicator of organizational maturity. Where standards are present, order is evident; where standards are absent, systemic chaos exists. Reverse engineering documentation is helpful as it can expose the lack of authoritative artifacts, the lack of supporting documentation and processes. Typically, if you lack documentation which means the organization may lack the maturity necessary to recover and continue operations in the aftermath of a disaster. Reverse engineering of a system is a learning tool as it will provide an understanding of how the technology is designed and how it operates. It can also help identify gaps in documentation or implementation. Reverse engineering from an architectural point of view is important as you must understand where you’ve been if you are to more accurately define where you should be.
  8. In software development, middleware is used to support interoperability between disparate systems. For information security architecture innovation, non-infosec disciplines and practice can serve as the middleware to achieving success by supporting the business in a manner that is accepted. By learning at least two non-infosec practices in your organization, you are enabled to respond in a fashion that will allow you to easily communication with your business partners. This is how you move past being a analytical thinker to a systems thinker. Remember, analytics is more about focusing on points and is individualist in nature. Systems thinking is the aggregation of analytics around internal and external behaviors and interactions in a system. Of the recommended knowledge to gain, reverse engineering is perhaps the most valuable as it will enable you to gain a systems view of the information and guide your recommendations more accurately. Reverse engineering can tell you much about an environment. First and foremost it is an indicator of organizational maturity. Where standards are present, order is evident; where standards are absent, systemic chaos exists. Reverse engineering documentation is helpful as it can expose the lack of authoritative artifacts, the lack of supporting documentation and processes. Typically, if you lack documentation which means the organization may lack the maturity necessary to recover and continue operations in the aftermath of a disaster. Reverse engineering of a system is a learning tool as it will provide an understanding of how the technology is designed and how it operates. It can also help identify gaps in documentation or implementation. Reverse engineering from an architectural point of view is important as you must understand where you’ve been if you are to more accurately define where you should be.
  9. Information security architecture benefits from systems thinking when the input of non-infosec disciplines results in the output clear communication, definition of scope, mapping of disparate entities to a whole entity that can respond to the complex demands of technology in the enterprise. Systems thinking also enables the security architect to make long-term recommendations and decisions that are sustainable as opposed to short-term fixes. Information Design is a crucial missing piece in the arsenal of many security professionals. It will help you present narratives or designs in a manner that is driven toward audience. The drawing you might provide to a director or above is much different than that drawing you’ll provide to an engineer or admin. Software engineering provides the synthesis around what we’ve discussed in the form of applying the concept of AGILE development to accelerate the top heavy and disparate approach of security architecture today.
  10. Thus far we’ve discussed the AS IS or current state of information security architecture. Critical gaps in the current approach and how they undermine the discipline has been examined. Thought share around remedies to the current state has been introduced in the Getting There section of the presentation. Now we are ready to synthesize the AS IS and the Getting there elements to put business in information security architecture and make it agile. Agile methods generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability, a set of engineering best practices that allow for rapid delivery of high-quality software, and a business approach that aligns development with customer needs and company goals.
  11. Business modeling like any process can be come arduous and waste time without its own set of controls. By containing it within a logic model, built-in controls are developed that drives the process to produce meaningful results. I have provided a link at the end of the presentation that can guide you through developing your own logic models. It can be quite useful in communicating complex data.
  12. One of the most important outputs of architecture are artifacts. According to TOGAF, artifact represents an individual model of a system or solution, which could potentially be re-used in a variety of contexts. An artifact is distinct from a deliverable, which is a contracted output from a project. In general cases, deliverables will contain artifacts and each artifact may exist in many deliverables. Drive the definement of artifacts to streamline solultion delivery. Here we’ve defined two types of artifacts. Authoritative and Historical. They have very different uses and the audiences differ as well.
  13. Considering the importance of artifacts, IT should agree upon the type of artifacts they will develop and their location. This is crucial if the security architect is to use the AS IS/TO BE methodology. If they cannot reference the past fairly accurately, visioning the future can become more time consuming. Artifacts are the ‘guts’ of the business and as such should be stored in a secure manner to only those that require access. Evangelize for your IT department where to store artifacts. Such a decision can make all the difference later on down the road when audits occurs or information management is addressed.
  14. Setting context defines the conceptual layer that will drive the parent-child relationship of taxonomy-based architectural program. Without establishing the parent-child relationship of your program, you will likely offer services that do not align with the business.
  15. At the end the of the day, you are already an expert with information security. Now its time to expand your horizons and add capabilities that will communicate simply what your mission, goals and activities are to non-information security professionals. Diversify your skill set to accomplish more.
  16. Something I’d like to encourage all of you do to…when presenting in the future, list not only your online and book references, but also your people credits. We all meet people who are pivotal in growing or knowledge or professionalism. Don’t forget to mention them.