2012 Ponemon Report: The State of Risk-Based Security Management

Post on 18-Dec-2014

2.300 views 0 download

Tags:

description

Download the full report here: www.Tripwire.com/Ponemon2012 Risk-based security management (RBSM) is rapidly gaining acceptance as an essential security practice. But how far along are organizations with it? Ponemon Institute and Tripwire teamed up to explore the state of RBSM in the US. Discover the study’s key findings: +Although organizations profess a strong commitment to RBSM, they’re taking little action +Those organizations with a formal approach to RBSM tend to walk the talk. +Most organizations implement the appropriate preventive controls, but neglect to implement sufficient detective controls. +Position level of the respondent in the organization affects how threats rank on their "Security Fright Index." +How perceptions of RBSM differ in the US, the UK, Germany and the Netherlands

Transcript of 2012 Ponemon Report: The State of Risk-Based Security Management

The State of Risk-Based Security Management (Global Report)

The State of Risk-Based Security Management

(Global Report)

The State of Risk-BasedSecurity ManagementDwayne Melancon, CTOCindy Valladares, Product Marketing

IT SECURITY & COMPLIANCE AUTOMATION

@TripwireInc #RiskyBiz2012

Today’s Speakers

Dwayne Melancon

Chief Technology Officer

@ThatDwayne

Cindy Valladares

Product Marketing Manager

@cindyv

IT SECURITY & COMPLIANCE AUTOMATION5

@TripwireInc #RiskyBiz2012

The State of Risk-Based Security Management 2012

Why The Interest in Risk-Based Security?

About The Study

Key Findings

Obstacles and Inhibitors

Recommendations

IT SECURITY & COMPLIANCE AUTOMATION

@TripwireInc #RiskyBiz2012

Interest in Risk Management is Spiking

Increasingly required to engage non-technical executives for budget

Habitual security spending not aligned with the business

More objective methods needed to allocate limited budgets

Scary things in the news, noticed by business guys

Compliance is driving the conversation around risk

IT SECURITY & COMPLIANCE AUTOMATION7

@TripwireInc #RiskyBiz2012

What is Risk-Based Security Management?

Let’s first define Risk

Risk = Probability (x) Impact

An approach that relates the costs of mitigating risks to the perceived value of an asset in the context of:• Threats

• Vulnerabilities

• Impacts to the business

Part of a wider Enterprise Risk Management system and specific to Information Security

The goal is to enable the business

IT SECURITY & COMPLIANCE AUTOMATION8

@TripwireInc #RiskyBiz2012

About The State of Risk-Based Security Management Report

Surveyed 2,145 individuals

Four countries: US, UK, Germany, Netherlands

Commissioned by Tripwire

Conducted by an independent research organization

IT SECURITY & COMPLIANCE AUTOMATION9

@TripwireInc #RiskyBiz2012

Demographics – By Industry

IT SECURITY & COMPLIANCE AUTOMATION10

@TripwireInc #RiskyBiz2012

Demographics – By Job Title

IT SECURITY & COMPLIANCE AUTOMATION11

@TripwireInc #RiskyBiz2012

What is Covered in the Report

Perceptions about risk-based security management (RBSM)

The relationship between RBSM maturity and security posture

The evolving role of the CISO

Comparison of the state of RBSM in various countries

IT SECURITY & COMPLIANCE AUTOMATION12

@TripwireInc #RiskyBiz2012

Top Findings

1. More talk than walk

2. Unbalanced approach to information and risk management

3. Lack of metrics to measure success

#1 – Lots of Talk. Starting to Walk.

13

IT SECURITY & COMPLIANCE AUTOMATION14

@TripwireInc #RiskyBiz2012

Stated Commitment to RBSM is High

77%

IT SECURITY & COMPLIANCE AUTOMATION15

@TripwireInc #RiskyBiz2012

Does a Formal Risk Management Strategy Exist?

IT SECURITY & COMPLIANCE AUTOMATION16

@TripwireInc #RiskyBiz2012

Does a Formal Risk Management Function or Program Exist?

IT SECURITY & COMPLIANCE AUTOMATION17

@TripwireInc #RiskyBiz2012

Deployments Range in RBMS Maturity

IT SECURITY & COMPLIANCE AUTOMATION18

@TripwireInc #RiskyBiz2012

Perceived Benefits of RBSM

IT SECURITY & COMPLIANCE AUTOMATION19

@TripwireInc #RiskyBiz2012

Importance of Benefits Differ by Region

IT SECURITY & COMPLIANCE AUTOMATION20

@TripwireInc #RiskyBiz2012

Summary: Starting to Walk

Most organizations are talking about risk-based security management

Most claim to be serious about it

Less than half have formal strategies or procedures in place

#2 – Unbalanced Approach to Risk & Security

21

IT SECURITY & COMPLIANCE AUTOMATION22

@TripwireInc #RiskyBiz2012

Perceived Risk vs Allocated Spending

Evidence of “habitual spending”, not risk-based security spending

IT SECURITY & COMPLIANCE AUTOMATION23

@TripwireInc #RiskyBiz2012

Existence of Common Preventive Controls

Setting expectations and making it easier to do the right things

IT SECURITY & COMPLIANCE AUTOMATION24

@TripwireInc #RiskyBiz2012

Existence of Common Detective Controls

Ensuring reality matches expectations … accountability

IT SECURITY & COMPLIANCE AUTOMATION25

@TripwireInc #RiskyBiz2012

Do the Steps for Assessing and Managing Security Risks Exist?

Basic Steps to Assessing and Managing Security Risk:

1. Identify the information that is key to the business

2. Categorize information according to its importance to the business

3. Identify threats to the information

4. Assess vulnerabilities to the systems that process the information

5. Assess the risks of loss or corruption of the information

6. Identify controls necessary to mitigate the risks

7. Implement the controls

8. Monitor controls continuously

IT SECURITY & COMPLIANCE AUTOMATION26

@TripwireInc #RiskyBiz2012

8 Steps for Assessing and Managing Security Risks

IT SECURITY & COMPLIANCE AUTOMATION27

@TripwireInc #RiskyBiz2012

Maturity Makes a Difference

Risk assessment and controls vary by level of RBSM maturity

IT SECURITY & COMPLIANCE AUTOMATION28

@TripwireInc #RiskyBiz2012

Most Are Missing Critical Steps of Risk-based Security Management

Basic Steps to Assessing and Managing Security Risk

1. Identify the information that is key to the business

2. Categorize information according to its importance to the business

3. Identify threats to the information

4. Assess vulnerabilities to the systems that process the information

5. Assess the risks of loss or corruption of the information

6. Identify controls necessary to mitigate the risks

7. Implement the controls

8. Monitor controls continuously

IT SECURITY & COMPLIANCE AUTOMATION29

@TripwireInc #RiskyBiz2012

Summary: Unbalanced Approach

Security resources are not aligned with the perceived risks• Over-investing in some areas, woefully underinvested in others

Preventive vs. Detective control implementation• Organizations making good progress on preventive controls, yet they are

• Behind on detective controls; which means

• They have good expectations, but no way to hold others accountable

Most have work to do on the critical last steps of RBSM

#3 – Lack of Metrics to Measure Success

30

IT SECURITY & COMPLIANCE AUTOMATION31

@TripwireInc #RiskyBiz2012

Use of Metrics to Measure Success

IT SECURITY & COMPLIANCE AUTOMATION32

@TripwireInc #RiskyBiz2012

What Is Being Measured?

IT SECURITY & COMPLIANCE AUTOMATION33

@TripwireInc #RiskyBiz2012

What Is Being Measured?

IT SECURITY & COMPLIANCE AUTOMATION34

@TripwireInc #RiskyBiz2012

Summary: No Metrics = No Success

Less than half of organizations are using metrics for RBSM

Many organizations are using “false flag” metrics• Cost of security program

• Number of vulnerabilities in the environment

Field Observations & Recommendations

35

IT SECURITY & COMPLIANCE AUTOMATION36

@TripwireInc #RiskyBiz2012

Configuration Quality:• % of configurations compliant with target security standards (risk-aligned)

• i.e. >95% in Critical; >75% in Medium

• number of unauthorized changes

• patch compliance by target area based on risk level• i.e. % of systems patched within 72 hours for Critical; …within 1 week for Medium

Control effectiveness:• % of incidents detected by an automated control

• % of incidents resulting in loss

• mean time to discover security incidents

• % of changes that follow change process

Security program progress:• % of staff (by business area) completing security training

• average scores (by business area) for security recall test

Snapshot: Examples Of Metrics That Are Working

IT SECURITY & COMPLIANCE AUTOMATION37

@TripwireInc #RiskyBiz2012

Investigating and adopting a repeatable framework• Careful - don’t over-study it!

Applying risk ranking/scoring methods

Engaging cross-functional “steering committees” to examine various risks• Strategic & Operational, Information Security, Financial,

Employment Practices, Intellectual Property, Physical, Legal, Regulatory, etc.

Prioritizing projects, actions, and investments to bias toward areas of highest risk and impact

Establishing Key Risk Indicators (KRI’s) and Key Risk Objectives (KRO’s) to measure progress

How Are Orgs Approaching This?

IT SECURITY & COMPLIANCE AUTOMATION38

@TripwireInc #RiskyBiz2012

“Boil the ocean” approaches

No executive sponsorship or “Tone at the Top”

No (or ineffective) metrics

Too much focus on cost

What Can Make the Move to Risk-Orientation Difficult?

IT SECURITY & COMPLIANCE AUTOMATION39

@TripwireInc #RiskyBiz2012

Recommendations: Risk-Based Security Management (RBSM)

Institute a formal RBSM program or function with a formal strategy

Ensure the appropriate balance of preventive and detective controls

Establish and use metrics to demonstrate program success

www.tripwire.comTripwire Americas: 1.800.TRIPWIRETripwire EMEA: +44 (0) 20 7382 5440Tripwire Japan: +812.53206.8610Tripwire Singapore: +65 6733 5051Tripwire Australia-New Zealand: +61 (0) 402 138 980

@TripwireInc #RiskyBiz201240

www.tripwire.com/ponemon2012www.tripwire.com/blog@TripwireInc

Dwayne Melancon@ThatDwayne

Cindy Valladares@cindyv