Figuring out CyberSecurity Return On Investment

Slides:



Advertisements
Similar presentations
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Advertisements

CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
SiteLock Internet Security: Big Threats for Small Business.
Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC.
Focused Mitigation Strategies to Protect Food Against Intentional Adulteration 1 Regulatory Impact Analysis Summary.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Introduction to Information Security
1 Figure 11-3: Risk Analysis Financially Sensible Protections  Risk analysis: Balance risks and countermeasture costs Enumeration of Assets  Assets:
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
15 years of Web Security © 2015 WhiteHat Security, Inc. Jeremiah Grossman Founder WhiteHat Security, Inc. The Rebellious Teenage Years.
BTS730 – Systems Analysis and Project Management Cost Management.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
COST BENEFITS OF IMPLEMENTING CREDIT CARD DATABASE TOKENIZATION USING FAIR CASE STUDY SHARED COURTESY OF RISKLENS CONFIDENTIAL - FAIR INSTITUTE
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
Quantifying Cyber Security Risk in Dollars and Cents to Optimize Budgets CRM008 Speakers: Chris Cooper, VP, Operational Risk Officer; RGA Reinsurance Company.
Threats & Challenges in the Digital World EY 2015 Global Information Security Survey.
Cybersecurity as a Business Differentiator
CYBERSECURITY SOLUTIONS
Your Partner for Superior Cybersecurity
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Overview and Services March 2015
Cybersecurity - What’s Next? June 2017
HOW MUCH RISK IS ASSOCIATED WITH IT HYGIENE USING FAIR?
Healthcare Cybersecurity: State of Industry
[Internal Use] for Check Point employees​
Comprehensive Security and Compliance at an Affordable Price.
Cloud Firewall.
Data Center Firewall.
Business At the Speed of Cyber
Compliance with hardening standards
Gelişmiş Tehdit Korumasının İnkar Edilemez 4 Gerçeği
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Cyber Protections: First Step, Risk Assessment
CSI Survey 2007 Tiffany Gorman
Unit 7 – Organisational Systems Security
بهترین راهکار را انتخاب کنید...
SAM GDPR Assessment <Insert partner logo here>
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Security Threats Severity Analysis
Cyber Trends and Market Update
Navigating Security Seas in a Small Ship with a Limited Crew
National Cyber Security
PGE Chris Nolke, Director of Cybersecurity
2016 GLOBAL MEETING © Voss of Norway AS.
Cyber Risk & Cyber Insurance - Overview
Security Metrics That Don’t Suck
Predicting Insider Threats (PIT)™
Forensic and Investigative Accounting
DATA BREACHES 6 4 , 9 3 There were…
Leading financial services provider
SECURITY IN THE DIGITAL AGE
CyberSecurity Strategy For Defendable ROI
Streamline your move to the cloud
Presentation transcript:

Figuring out CyberSecurity Return On Investment ISSA June Meeting

Need for a Common Language

The path forward Developing a ROI based Strategy to Cybersecurity Research Risks and Common Threat Sources Monetize Risks and Prioritize Threats Discuss and seek approval Review company asset at risks. Review community and market based security threat reports. Convert identified risks into monetary loss. Seek insurance premium or calculate annual probability of loss. Calculate costs to combat common and market threat sources Present risk reduction as annual cost savings to loss against the investment. Present investments in protections against top threat sources

Method 1: Analysis of Risks Cybersecurity investments return value as a Asset Risk Reduction action and a Breach containment reaction

Management of known Risks Risks A($30M), B($25M), and C($15M) is roughly $70M of the $131M total Risk. If the cost of a control is $4M for items A, B, and C. Then, the ROI is $70M/$4M Look for the Highest risks and costs of controls and/or cybersecurity insurance to bring the risks within tolerance.

Method 2: Estimating loss from peers and looking for sources IBM Security/ Ponemon 2018 Cost of Breach Report On Average in the US, you have 13.5% probability each year of breach and average cost of $7.91M or $1M/year average

Small businesses have a worst experience The U.S’ National Cyber Security Alliance found that 60 percent of small companies are unable to sustain their businesses over six months after a cyber attack. Ponemon 2017 State of Cybersecurity in SMBs The average cost due to damage or theft of IT assets and infrastructure increased from $879,582 to $1,027,053. The average cost due to disruption to normal operations increased from $955,429 to $1,207,965.

What does the future look like? Total global value at risk to Cybercrime over the next 5 years Accenture 2019 Cost of Cybercrime Study For an average G2000 company—with 2018 revenues of US$20 billion—the value at risk translates into an average of 2.8 percent of revenues, or US$580 million, each year for the next five years. Global value at risk to Cybercrime by Industry over the next 5 years On Average in the US during the next 5 years, you have 13.5% probability each year of loss equal to 2.8% of future revenues. This doesn’t include existing risks! However, we may be able to use this information to determine unknown existing risks in a careful manner.

Breach - Asset Category What are the sources of Loss? Breach - Threat Actions Breach - Asset Category Verizon’s 2019 Data Breach Investigations Report Use percentages to derive Loss mitigation against expenses

Invest to reduce Loss from attacks Leverage 2FA or MFA Educate users against social engineering attacks – 20% of Loss Leverage next generation endpoint protections Verizon’s 2019 Data Breach Investigations Report Endpoint – 30% of Loss “Training employees to think and act with security in mind is the most underfunded activity in cybersecurity budgets.” Accenture Ninth Annual Cost of Cybercrime Study

Invest to reduce Loss from attacks Obvious stuff: Audit and patch OS 2019 Trustwave Global Security Report Routinely scan internet facing applications for vulnerabilities Audit server configurations of Dev-Ops Servers and Web Applications – 65% of loss Leverage Web Application firewalls with threat feeds and patterns

Invest to reduce Expense when a Breach occurs or in process Accenture 2019 Cost of Cybercrime Study I don’t really have any monetary statistics yet to calculate direct ROI on these investments. 2018 IBM and Ponemon Cost of Breach Report