Develop a Security Operations Strategy

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Advertisements

The Challenge of IT-Business Alignment
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Kathy Corbiere Service Delivery and Performance Commission
Practical IT Research that Drives Measurable Results Manage Help Desk Staffing 1Info-Tech Research Group.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Get Started Bringing Order to Help Desk Request Chaos.
Practical IT Research that Drives Measurable Results 1Info-Tech Research Group Get Moving with Server Virtualization.
Info-Tech Research Group1 V3.1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services.
Plan for Application Consolidation. Successful application consolidation relies on assessment of the application portfolio to determine the best candidates.
Practical IT Research that Drives Measurable Results Make the Case for IP Telephony 1Info-Tech Research Group.
Practical IT Research that Drives Measurable Results Establish an Effective IT Steering Committee.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: Enterprise Content Management Suite ECM: A vendor marketing concept, not an.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Make the Decision to Upgrade to Microsoft Exchange 2010 It’s Time for a Change: Let’s Talk about Exchange Info-Tech's products.
Build an IT Strategy for the Small Enterprise
Drive a Robust Systems Strategy for HR to Achieve HR Objectives and Enable the Business Save time, optimize your resources, and engage the business by.
Integrate Threat Intelligence Into Your Security Operations
THINK DIFFERENT. THINK SUCCESS.
Build an Enterprise IT Security Training Program
Shadow Brokers – Details on Leaked Cyberintelligence Tools and Vulnerabilities A brief research note for Info-Tech’s members.
Vendor Landscape Plus: IP Telephony Vendors
Updating the Value Proposition:
Optimize the HR Department to Support the Organizational People Strategy Enhance your HR departmental structure, process, technology, and capability to.
Develop a Next-Gen Security Operations Program
Redesign IT Governance to Drive Optimal Business Results
Design an EA Strategy to Articulate the Value Proposition of the EA Function Maximize the likelihood of EA success by communicating EA’s expected contributions.
Become a Strategic CIO Create a personal development plan to take your CIO career to the next level. Info-Tech's products and services combine actionable.
Ensure Cloud Security in IaaS and PaaS Environments
Create Data Strategies for the Small Enterprise
Gain Control of Cloud Integration Strategies Before they Float Away
Prepare for a DRP Audit Assess your current DRP maturity, identify required improvements, and complete an audit-ready DRP summary document. Info-Tech's.
Bridge IT and the Business with Business Architecture
Develop a Next-Gen Security Operations Program
SAMPLE Develop a Comprehensive Competency Framework
Select an EA Tool Based on Business and User Need
Lead Strategic Decision Making With Service Portfolio Management
Build, Optimize, and Present a Risk-Based Security Budget
Optimize the BI Program for a Better ROI
Develop and Conduct Threat and Risk Assessments
Design & Build a User-Facing Service Catalog
Maximize Business Value from IT Through Benefits Realization
Develop and Document a Disaster Recovery Plan for the Small Enterprise
Improve Business Satisfaction by 10% Through Business Relationship Management Relationship management is the #1 driver of business satisfaction with IT.
Right-Size the Information Governance Program
Integrate Threat Intelligence Into Your Security Operations
Establish a Right-Sized Incident Management Process
Transforming IT Management
Manage Service Requests and Incidents
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Agenda Purpose for Project Goals & Objectives Project Process & Status Common Themes Outcomes & Deliverables Next steps.
Managing IT Risk in a digital Transformation AGE
GRC - A Strategic Approach
Define Your IT Strategy
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
KEY INITIATIVE Financial Data and Analytics
Presentation transcript:

Develop a Security Operations Strategy Transition from a security operations center to a threat collaboration environment. Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.© 1997-2017 Info-Tech Research Group

ANALYST PERSPECTIVE A reactive security operations program is no longer an option. The increasing sophistication of threats demands a streamlined yet adaptable mitigation and remediation process. Protect your assets by preparing for the inevitable; unify your prevention, detection, analysis, and response efforts and provide assurance to your stakeholders that you are making information security a top priority. Edward Gray, Consulting Analyst, Security, Risk & Compliance Info-Tech Research Group

Our understanding of the problem Chief Information Officer (CIO) Chief Information Security Officer (CISO) Chief Operating Officer (COO) Security / IT Management Security Operations Director / Security Operations Center (SOC) Network Operations Director / Network Operations Center (NOC) Systems Administrator Threat Intelligence Staff Security Operations Staff Security Incident Responders Vulnerability Management Staff Patch Management Enhance your security program by implementing and streamlining next-generation security operations processes. Increase organizational situational awareness through active collaboration between core threat teams, enriching internal security events with external threat intelligence and enhancing security controls. Develop a comprehensive threat analysis and dissemination process: align people, process, and technology to scale security to threats. Identify the appropriate technological and infrastructure-based sourcing decisions. Design a step-by-step security operations implementation process. Pursue continuous improvement: build a measurement program that actively evaluates program effectiveness. Board / Chief Executive Officer Information Owners (Business Directors/VP) Security Governance and Risk Management Fraud Operations Human Resources Legal and Public Relations Aid decision making by staying abreast of cyberthreats that could impact the business. Increase visibility into the organization’s threat landscape to identify likely targets or identify exposed vulnerabilities. Ensure the business is compliant with regularity, legal, and/or compliance requirements. Understand the value and return on investment of security operations offerings.

Executive summary Current security practices are disjointed, operating independently with a wide variety of processes and tools to conduct incident response, network defense, and threat analysis. These disparate mitigations leave organizations vulnerable to the increasing number of malicious events. Threat management has become resource intensive, requiring continuous monitoring, collection, and analysis of massive volumes of security event data, while juggling business, compliance, and consumer obligations. Security operations is no longer a center, but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape. Functional threat intelligence is a prerequisite for effective security operations – without it, security operations will be inefficient and redundant. Eliminate false positives by contextualizing threat data, aligning intelligence with business objectives, and building processes to satisfy those objectives. If you are not communicating, you are not secure. Collaboration eliminates siloed decisions by connecting people, processes, and technologies. You leave less room for error, consume fewer resources, and improve operational efficiency with a transparent security operations process. There is an onslaught of security data – generating information in different formats, storing it in different places, and forwarding it to different locations. The organization lacks a dedicated enterprise security team. There is limited resourcing available to begin or mature a security operations center. Many organizations are developing ad hoc security capabilities that result in operational inefficiencies, the misalignment of resources, and the misuse of their security technology investments. It is difficult to communicate the value of a security operations program when trying to secure organizational buy-in to gain the appropriate resourcing. There is limited communication between security functions due to a centralized security operations organizational structure. A unified security operations process actively transforms security events and threat information into actionable intelligence, driving security prevention, detection, analysis, and response processes, addressing the increasing sophistication of cyberthreats, and guiding continuous improvement. This blueprint will walk through the steps of developing a flexible and systematic security operations program relevant to your organization.

Data breaches are resulting in major costs across industries % of systems impacted by a data breach 1% No Impact 19% 1-10% impacted 41% 11-30% impacted 24% 31-50% impacted 15% >50% impacted % of customers lost from a data breach 61% Lost <20% 21% Lost 20-40% 8% Lost 40-60% 6% Lost 60-80% 4% Lost 80-100% 58% Lost <20% 25% Lost 20-40% 9% Lost 40-60% 5% Lost 60-80% 4% Lost 80-100% % of business opportunity lost from a data breach Average data breach costs per compromised record hit an all-time high of $217 (in 2015); $74 is direct cost (e.g. legal fees, technology investment) and $143 is indirect cost (e.g. abnormal customer churn). Source: Ponemon Institute, “2015 Cost of Data Breach Study: United States” Source: The Network, “ Cisco 2017 Security Capabilities Benchmark Study”

Persistent issues Of organizations say security operation teams have little understanding of each other’s requirements. Organizational barriers separating prevention, detection, analysis, and response efforts. Siloed operations limit collaboration and internal knowledge sharing. Lack of knowledgeable security staff. Human capital is transferrable between roles and functions and must be cross-trained to wear multiple hats. Failure to evaluate and improve security operations. The effectiveness of operations must be frequently measured and (re)assessed through an iterative system of continuous improvement. Of executives report that poor coordination leads to excessive labor and IT operational costs. Lack of standardization. Pre-established use cases and policies outlining tier-1 operational efforts will eliminate ad hoc remediation efforts and streamline operations. 38-100% Increase in efficiency after closing operational gaps with collaboration. Failure to acknowledge the auditor as a customer. Many compliance and regulatory obligations require organizations to have comprehensive documentation of their security operations practices. Source: Forbes, “The Game Plan for Closing the SecOps Gap”

The solution “Empower a few administrators with the best information to enable fast, automated responses.” – Ismael Valenzuela, IR/Forensics Technical Practice Manager, Foundstone® Services, Intel Security Insufficient security personnel resourcing has been identified as the most prevalent challenge in security operations… When an emergency security incident strikes, weak collaboration and poor coordination among critical business functions will magnify inefficiencies in the incident response (IR) process, impacting the organization’s ability to minimize damage and downtime. The solution: optimize your SOC. Info-Tech has seen SOCs with five analysts outperform SOCs with 25 analysts through tools and process optimization. Sources: Ponemon. "2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB).” Syngress. Designing and Building a Security Operations Center

Maintain a holistic security operations program Legacy security operations centers (SOCs) fail to address gaps between data sources, network controls, and human capital. There is limited visibility and collaboration between departments, resulting in siloed decisions that do not support the best interests of the organization. Prevent: Defense in depth is the best approach to protect against unknown and unpredictable attacks. Diligent patching and vulnerability management, endpoint protection, and strong human-centric security (amongst other tactics) are essential. Detect: There are two types of companies – those who have been breached and know it and those who have been breached and don’t know it. Ensure that monitoring, logging, and event detection tools are in place and appropriate to your organizational needs Analyze: Raw data without interpretation cannot improve security and is a waste of time, money, and effort. Establish a tiered operational process that not only enriches data but also provides visibility into your threat landscape. Respond: Organizations can’t rely on an ad hoc response anymore – don’t wait until a state of panic. Formalize your response processes in a detailed incident runbook in order to reduce incident remediation time and effort. Respond Analyze Detect Prevent Next-Gen Security Operations Security operations is part of what Info-Tech calls a threat collaboration environment, where members must actively collaborate to address cyberthreats affecting the organization’s brand, business operations, and technology infrastructure on a daily basis.

Info-Tech’s security operations blueprint ties together various initiatives Deliverables Integrate Threat Intelligence Into Your Security Operations Develop and Implement a Security Incident Management Program Design and Implement a Vulnerability Management Program Vulnerability Management Vulnerability management revolves around the identification, prioritization, and remediation of vulnerabilities. Vulnerability management teams hunt to identify which vulnerabilities need patching and remediating. Vulnerability Tracking Tool Vulnerability Scanning Tool RFP Template Penetration Test RFP Template Vulnerability Mitigation Process Template Maturity Assessment Tool Threat Intelligence RACI Tool Management Plan Template Threat Intelligence Policy Template Alert Template Alert and Briefing Cadence Schedule Threat Intelligence Threat intelligence addresses the collection, analysis, and dissemination of external threat data. Analysts act as liaisons to their peers, publishing actionable threat alerts, reports, and briefings. Threat intelligence proactively monitors and identifies whether threat indicators are impacting your organization. Operations Security operations include the real-time monitoring and analysis of events based on the correlation of internal and external data sources. This also includes incident escalation based on impact. Analysts are constantly tuning and tweaking rules and reporting thresholds to further help identify which indicators are most impactful during the analysis phase of operations. Maturity Assessment Tool Event Prioritization Tool Efficiency Calculator SecOps Policy Template In-House vs. Outsourcing Decision-Making Tool SecOps RACI Tool TCO & ROI Comparison Calculator Develop Foundational Security Operations Processes Incident Response Effective and efficient management of incidents involves a formal process of analysis, containment, eradication, recovery, and post-incident activities. IR teams coordinate root-cause analysis and incident gathering while facilitating post-incident lessons learned. Incident response can provide valuable threat data that ties specific indicators to threat actors or campaigns. Incident Management Policy Maturity Assessment Tool Incident Management RACI Tool Incident Management Plan Incident Runbook Prioritization Tool Various Incident Management Runbooks

This blueprint will… Phase 01 Phase 02 Phase 3a Phase 3b …better protect your organization with an interdependent and collaborative security operations program. Phase 01 Assess your operational requirements. Briefly assess your current prevention, detection, analysis, and response capabilities. Highlight operational weak spots that should be addressed before progressing. Phase 02 Optimize and further mature your security operations processes Develop a prioritized list of security-focused operational initiatives. Conduct a holistic analysis of your operational capabilities. Phase 3a Develop the process flow and specific interaction points between functions Define the operational interaction points between security-focused operational departments. Document the results in comprehensive operational interaction agreement. Phase 3b Test your current capabilities with a table top exercise Test your operational processes with Info-Tech’s security operations table-top exercise.

Info-Tech Research Group Helps IT Professionals To: Quickly get up to speed with new technologies Make the right technology purchasing decisions – fast Deliver critical IT projects, on time and within budget Manage business expectations Justify IT spending and prove the value of IT Train IT staff and effectively manage an IT department Sign up for free trial membership to get practical solutions for your IT challenges “Info-Tech helps me to be proactive instead of reactive – a cardinal rule in a stable and leading edge IT environment. - ARCS Commercial Mortgage Co., LP Toll Free: 1-888-670-8889 www.infotech.com