Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
Understanding secure data erasure and end-of-lifecycle IT asset management.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Copyright Security-Assessment.com 2006 Protecting The Data Data security, compliance, disclosure requirements and what can happen if you get it wrong Presented.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Agenda Reality check Who are you hiring Primary Source Verification Facts How PSV helps communities Conclusion.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
Our Technology Comes with People Disaster Recovery Planning Glenn Lytle, Vice President Sales, Lumos Networks July 28,
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 Copyright © 2008 Accenture All Rights Reserved. U.S. Insurance Company Mergers & Acquisitions Services; Product/Policy/Billing Trans Services Client.
Embracing IP Multimedia Services for Strategic Business Advantage Rick Seeto VP & GM Enterprise Networks, Asia Pacific.
1Copyright Jordan Lawrence. All rights reserved. Annual In-House Symposium Practical Steps to Minimize Privacy Risks: Understanding The Intersection.
[Name / Title] [Date] Effective Threat Protection Strategies.
Overview of Cybercrime
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
BUSINESS B1 Information Security.
Revision Lecture Risk Management. Exam There will be 2 and a half questions from the topics operational risk, market risk, foreign exchange risk, interest.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
R L Captive Solutions Cost Control Presentation by Travis Lantis R L Consulting, LLC.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
To protect the confidential and proprietary information included in this material, it may not be disclosed or provided to any third parties without the.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
The 3 rd Younger Members Convention Matthew Farraker - Aon Consulting Do We Need Actuaries In A DC World?
Checking Accounts. What is a checking account? A bank account that allows easy access to the funds. You can use your checking account to pay bills. With.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Records Management Benchmarking: Choosing a Standard Presentation by Martin Bradley.
The State of Computer & Data Security in Corporations Independent Survey.
Law College 1 Techno-Legal Security For Information Assets Naavi August 29, 2003.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
TRUST, Washington, D.C. Meeting January 9–10, 2006 The TRUST Agenda: Convergence of Technical and Policy Issues Fred B. Schneider Chief Scientist.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
COST BENEFITS OF IMPLEMENTING CREDIT CARD DATABASE TOKENIZATION USING FAIR CASE STUDY SHARED COURTESY OF RISKLENS CONFIDENTIAL - FAIR INSTITUTE
Using e-assessments Dublin – 13 October, 2005 Suzana Lopes – Director, Sales and Marketing Assessment Tomorrow.
Computer Security Sample security policy Dr Alexei Vernitski.
Ponemon Institute© Private & Confidential ReportPage 1 State of the Endpoint Survey Analysis of Global Results Briefing for Lumension October 30, 2009.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Principal ® Retirement Plus For financial professional use only. Not for distribution to the public. [Presenter Name] [Presenter Title] [Date] We help.
Vodafone Business Cloud
Welcome to the ICT Department Unit 3_5 Security Policies.
Cybersecurity as a Business Differentiator
Distributed Asset Management Making The Business Case
Chapter 3: IRS and FTC Data Security Rules
Information Security: Risk Management or Business Enablement?
Business Impact Analysis 101
INFORMATION SYSTEMS SECURITY and CONTROL
Mohammad Alauthman Computer Security Mohammad Alauthman
Chapter 5 Computer Security
Leading financial services provider
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP Real Life Information Security Bringing cost-benefit analysis into risk management

OWASP 2 Hewitt Associates  Human Resources Outsourcing  ~25’000 employees worldwide  Highly sensitive clients’ data

OWASP 3 HRO Market  Not purely financial  Mostly B2B  Highly competitive  Stay competitive  Stay flexible

OWASP 4 Shepherds or policemen?  Very high pressure from business  No „one size fits all” approach  Lessons learnt  Talk to business  Have real arguments  Talk business  Where do all these numbers come from?

OWASP 5 From the past Source: DatalossDB.org

OWASP 6 From market analytics  ~$100 USD per record  No actual abuse required  „Losing control” is the bad word  How much to spend and where to stop? Source: Ponemon Institute, „2008 Annual Study: Cost of Data Breach”

OWASP 7 From others’ fines Source: FSA, 22 July 2009

OWASP 8 From Risk Analysis  Risk = Potential Loss * Threat Probability  Potential Loss ~ Asset Cost, Brand Value...

OWASP 9 When Risk Analysis makes sense? Control Cost << Asset Cost Source: Flickr (edou а rd)

OWASP 10 What makes Control cost?  Roll-out cost  Obvious  Change cost  Not so obvious  Management cost  Not so obvious  End-user usage cost  Largely ignored  Especially if outside Source: Flickr (d а veme)

OWASP 11 Potential loss → Control → Real loss

OWASP 12 Case studies

OWASP 13 Qualified Certificate in ZUS*  ZUS costs  Roll-out = ?  Administration = ?  Taxpayer costs (245’000 QC’s)  million PLN – one-time  ~40 million PLN – annual QC renewal  Future costs  Attribute certificates (ZUS & taxpayers) = ?  „e-PUAP trusted profiles” (ZUS) = ? Source: Money.pl, ZUS * ZUS = Polish public pensions provider

OWASP 14 Invoicing  What’s the cost of invoicing?  People, paper, printing, postal, processing  Average €1,4 per paper invoice Ultimate solution  Give up VAT When e-invoicing makes sense? »Electronic invoice TCO << Paper invoice TCO »Theory: €0,4 versus €1,4 »Key word: TCO Sources: EU MEMO/00/85

OWASP 15 E-Invoicing in Europe  Denmark  OCES & others allowed  OCES: Quite simple origin & integrity authentication  OCES: Proportional to e- invoicing risks Around 66% of all invoices are e-invoices  Poland  Only QES & EDI allowed  EDI: supermarkets only  QES: Not designed for automatic signature  QES: More legal that real security Around 5% of companies use e- invoicing Sources: EEI 2007, ITST, OECD; GUS 2008

OWASP 16 Risk Management in e-banking Auth method Num ber IndividualCorporate Millions of clients High non- repudiation needs SMS15 ↑ Usable, ↓ Big cost ↓ Repudiation Token11 ↓ Big cost ↓ Repudiation TAN7 ↓ Low security, ↑ Low cost ↓ Repudiation Smartc ard 2 ↓ Not usable, ↓ Big cost ↑ Non- repudiation Source: Bankier.pl report, October 2009 (selected data only)

OWASP 17 Laffer’s curve in security Source: Wikipedia

OWASP 18 Mayfield’s Paradox Source: ISACA, „Mathematical Proofs of Mayfield's Paradox”, 2001

OWASP 19 How to?

OWASP 20 Pitfall of „One-size fits all” approach

OWASP 21 Source: Willem Duiff, GE (SASMA 2009)

OWASP 22 Control questions Before deploying a new solution  Do my controls help, instead of breaking process?  How do my controls help business do its work? Before asking for new funding  What we earned on last project?

OWASP 23 Is security a cost? Security is an investment to prevent losses  Spend $100k to prevent losing $1m = 10x benefit  NOT: „Security again spent $100k”  YES: „Security helped save $1M for just $100k”

OWASP 24 How FDE saves money  Office break-in  Four laptops stolen  All with full-disk encryption  Cost of incident – zero  Hardware – insurance  Data confidentality – able to prove to client  Data availability – backups & network drives  Where’s ROI of FDE?  No $$$ in fines  No $$ in breach notification  No $? in brand damage

OWASP 25 Building a consistent security policy #1  Should people should take their laptops home?  Isn’t that increasing risk of theft?  Laptop theft  Lose laptop ($)  Lose data ($$$) Source: Flickr ( а resnick)

OWASP 26 Building a consistent security policy #2  Laptop at home  Work from home  Disaster recovery, business continuity  Examples: UK snow (2009), London flood (2009), Hemel Hempstead explosion (2005)  Need to prevent the other risks Source: Wikipedia

OWASP 27 Building a consistent security policy #3  End-user message  „Always take your laptop home”  FDE is standard, non-optional proces

OWASP 28 Things we learned when talking to bussiness  Avoid „weasel talk” and buzzwords  „Some attacks exist that might pose a significant risk...” Use as much facts and numbers as possible  Do use industry reports  Be careful with vendor reports  „How spam filtering helps preventing global warming”  Filter them through your company’s reality check  Learn from historic incidents in your organisation Perform periodic review of your controls  Make sure at the old threat is still there  Make sure no new threats appeared

OWASP 29 Questions?  Questions, comments  