SlideShare une entreprise Scribd logo
1  sur  23
Session ID:
Session Classification:
Ben Rothke, CISSP, CISA
Information Security
Wyndham Worldwide Corp.
STU-R35B
Intermediate
The Five Habits of Highly
Secure Organizations
► Discussion of effective information security habits,
characteristics and practices
► great practices of security-conscious companies
► not directly related to ITIL, ISO 17799, etc.
► based on my past experience at a large spectrum of Fortune 500
and Global 2000 companies
► primarily financial services, pharmaceutical, aviation and
healthcare
Agenda
► Computer security is simply attention to detail and good
design
► focusing on the five habits of this presentation will enable
you to ensure your organizations data assets are
secured
► rather than blindly wasting your budget on security appliances
that do nothing more that look cool in a rack
Why it’s important you are here
► Effective infosec is built on risk management, good
business practices and project management
► while the mathematics of cryptography is rocket science, most
aspects of information security are not
► successful information security programs have all
occurred by focusing on security from a framework of
risk mitigation
► cost of security hardware and software purchased has
absolutely no corresponding effect to the level of security
Key Take Away Thoughts
1. CISO
2. Risk Management
3. Invests in people, not products
4. Policies and Procedures
5. Awareness and Training
The five habits
► Accountants achieve efficiency and effectiveness under
the guidance and coordination of a CFO
► security teams will reach their optimal levels under a CISO
► infosec is more than a single technology. It involves:
► physical, psychological and legal aspects, such as training,
encouraging, enforcing and prosecuting
► strategic planning, skilled negotiating and practical problem
solving
► only an individual with strong business savvy and security
knowledge can oversee security planning, implement
policies and select measures appropriate to business
requirements - that person is the CISO
Habit #1 – CISO
► Characteristics of a great CISO
► deep understanding of technology, combined with understanding
of the organizations function, politics and business drivers
► gold medal CISO: Electrical engineer with an MBA
► silver medal CISO: NSA veteran with corporate experience
► never a yes-man to the CxO or Board of Directors
► invests in people, not technology
► corollary: vendors intimidated by CISO due to technical prowess
► not intimidated by a screaming SVP trying to force
firewall admin to violate policy
► but also willing to evaluate the policy to determine whether it is
reasonable
CISO
► CISO works at the executive level
► serves on the executive council or equivalent
► be on CIO’s architectural strategy council or equivalent
► direct or dotted-line manager of all information security staff
► without executive level control, will face difficulty when
bridging the gap between business process demands
and security technology requirements
► CISO at the non-executive level – expect Spaf’s Law:
► “if you have responsibility for security but have no authority to set
rules or punish violators, your own role in the organization is to
take the blame when something big goes wrong”
► Prof. Gene Spafford - CS Dept. - Purdue University
CISO
► How management often perceives risk
► risk = evil hacker
Habit #2 – Risk Management
This is risk management…
Backup tapes
Hackers
Risk matrix
Software Patches
Power grid
Data center
Token
management
Political
Malicious end-users
Customers
Regulatory
compliance
Contractors
Telco
Revocation
processes
Terrorists
Legal
liability
Unions
External
Environmental
DR/BCP
Internal
External
Unhappy
customers
Physical
security
Disgruntled employees
Operations test
Consultants
Third-party
Clients
Operational
Audit
Lack of budget
Vendor bankruptcy
Vulnerabilities
Forensics
Crypto keys
Lack of staff
Fraud
Poor risk assessment
Hactivists
Spyware
Blogs
Insecure software
Wireless
Google
Documentation
Organized crime
China
India
Illegal downloads
Web-scripting
Viruses
Worms
Malicious software
Rogue employee
Windows
VoIP
Social engineering
App dev
practices
Malware
Background checks
Database
Data destruction
Hardware
Procedural violations
phishing
► comprehensive risk management program must be
created around these four areas:
1. Identification
2. Analysis
3. Mitigation
4. Monitoring
Risk Management
► People, not products
► huge mistake companies make is expecting security products to
solve their security problems
► they buy myriad products without being able to answer:
► what is your security problem and how do you expect this
security product to solve it?
► why you are buying a product?
► create detailed requirements for its use
► processes and procedures
► metrics to measure its effectiveness and value
Habit #3 – People, not products
► Vendors want you to think their product is the best; but
all products are for the most part indistinguishable
► by the time a product hits version 3, competition has matched it
feature for feature
► observation: most established COTS security products
are essentially indistinguishable from each other and can
achieve what most organizations require:
► Check Point vs. Cisco
► eEye vs. McAfee
► don’t obsess on the products. Focus on your staff,
internal procedures and specific requirements
The big lie of security products
► Comprehensive security policies are required to map
abstract security concepts to your real world
implementation of your security products
► policy defines the aims and goals of the business
► no policies = no information security…. and
► no policies enforcement = no information security
Habit #4 - Policies & Procedures
► SOP’s ensure Chicago firewall admin builds & configures
corporate firewalls in the same manner as Tokyo admin
► immense benefits of Standard Operating Procedures
► standardize operations among divisions and departments
► reduce confusion
► designate responsibility
► improve accountability of personnel
► record the performance of all tasks and their results
► reduce costs
► reduce liability
Information security procedures
► Organizations that take the time and effort to create
infosec SOP’s demonstrate their commitment to security
► by creating SOP’s, costs are drastically lowered (greater ROI),
and their level of security is drastically increased
► another example: Aviation industry lives and dies
(literally) via their SOP’s
► SOP’s are built into job requirements and regulations
► today’s airplanes are far too complex to maintain and operate
without SOP’s
► information security might not be as complex as a Boeing 777,
but it still requires appropriate SOP’s
Information Security SOP
► Users who read and trust the Weekly World News will
invariably choose an insecure Java applet over security
► information security and associated risks aren’t intuitive
► invest in training users to properly use the tools given to them
► effective information security training and awareness
effort can’t be initiated without first writing information
security policies
Habit #5 – Awareness & Training
► Awareness defines the rules for computer use
► users must be clearly educated as to what acceptable
use means
► define exactly what a confidential document is
► what is a good password?
► what emails should be forwarded?
► can I set up my own wireless network?
Awareness and Training
Image source: www.secureit.utah.edu/images/ISA/isa_banner2009.gif
► Dark moment in computer security awareness #358
► 1998 – US President Bill Clinton and Irish Prime Minister Bertie
Ahern used digital signature technology to append their personal
signatures to a statement endorsing broad e-commerce policy
concerns
► Clinton and Ahern are videotaped entering the passphrase for
their private keys
► at the conclusion of the ceremony, they swap the smart cards
that contain their private keys
Awareness and Training
► Security Engineering: A Guide to Building Dependable
Distributed Systems
► Ross Anderson
► Free digital copy http://www.cl.cam.ac.uk/~rja14/book.html
► Information Risk and Security
► Edward Wilding
► NIST Information Security Handbook: A Guide for
Managers
► http://csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07-2007.pdf
► Security Strategy: From Requirements to Reality
► Bill Stackpole and Eric Oksendahl
Required reading
► Bruce Schneier / Marcus Ranum
► Two really smart guys who understand security and risk, and
don’t believe in the common wisdom of security pixie dust
► visit their web sites – www.schneier.com / www.ranum.com
► Crypto-Gram – Schneier’s monthly e-mail newsletter
► http://www.schneier.com/crypto-gram.html
Required listening
► Effective information security takes:
► hard work
► leadership
► commitment
► knowledge
► responsibility
► dedication
► when implemented in the 5 habits, those are the
characteristics of highly secure organizations
Summary
Ben Rothke, CISSP CISA
Manager – Information Security
Wyndham Worldwide
Corporation
www.linkedin.com/in/benrothke
www.twitter.com/benrothke
www.slideshare.net/benrothke

Contenu connexe

Tendances

Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&AMatt Tortora
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. ManufacturingIgnyte Assurance Platform
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureInfosec
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseShivamSharma909
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills AuditVilius Benetis
 
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPRHow an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPRPECB
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?Jonathan Sinclair
 

Tendances (20)

Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&A
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident response
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
 
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPRHow an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
How an ISO/IEC 27001 Based ISMS Will Support the EU GDPR
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
Soc
SocSoc
Soc
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 

Similaire à Five Habits of Highly Secure Organizations

Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystemkpatrickwheeler
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptxrabeetkashif
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...NRBsanv
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - GuidelinesPedro Espinosa
 
Risk Management
Risk ManagementRisk Management
Risk Managementijtsrd
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for SuccessCitrix
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITYRazorpoint Security
 
News letter June 11
News letter June 11News letter June 11
News letter June 11captsbtyagi
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnelDhani Ahmad
 
Gartner Information Security Summit Brochure
Gartner Information Security Summit BrochureGartner Information Security Summit Brochure
Gartner Information Security Summit Brochuretrunko
 
111.pptx
111.pptx111.pptx
111.pptxJESUNPK
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 

Similaire à Five Habits of Highly Secure Organizations (20)

Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Gartner Information Security Summit Brochure
Gartner Information Security Summit BrochureGartner Information Security Summit Brochure
Gartner Information Security Summit Brochure
 
111.pptx
111.pptx111.pptx
111.pptx
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 

Plus de Ben Rothke

Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceBen Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke
 
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke   Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke   Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssBen Rothke
 
Ben Rothke RSA PK 2010
Ben Rothke   RSA PK 2010Ben Rothke   RSA PK 2010
Ben Rothke RSA PK 2010Ben Rothke
 

Plus de Ben Rothke (20)

Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke   Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke   Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
 
Ben Rothke RSA PK 2010
Ben Rothke   RSA PK 2010Ben Rothke   RSA PK 2010
Ben Rothke RSA PK 2010
 

Dernier

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 

Dernier (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 

Five Habits of Highly Secure Organizations

  • 1. Session ID: Session Classification: Ben Rothke, CISSP, CISA Information Security Wyndham Worldwide Corp. STU-R35B Intermediate The Five Habits of Highly Secure Organizations
  • 2. ► Discussion of effective information security habits, characteristics and practices ► great practices of security-conscious companies ► not directly related to ITIL, ISO 17799, etc. ► based on my past experience at a large spectrum of Fortune 500 and Global 2000 companies ► primarily financial services, pharmaceutical, aviation and healthcare Agenda
  • 3. ► Computer security is simply attention to detail and good design ► focusing on the five habits of this presentation will enable you to ensure your organizations data assets are secured ► rather than blindly wasting your budget on security appliances that do nothing more that look cool in a rack Why it’s important you are here
  • 4. ► Effective infosec is built on risk management, good business practices and project management ► while the mathematics of cryptography is rocket science, most aspects of information security are not ► successful information security programs have all occurred by focusing on security from a framework of risk mitigation ► cost of security hardware and software purchased has absolutely no corresponding effect to the level of security Key Take Away Thoughts
  • 5. 1. CISO 2. Risk Management 3. Invests in people, not products 4. Policies and Procedures 5. Awareness and Training The five habits
  • 6. ► Accountants achieve efficiency and effectiveness under the guidance and coordination of a CFO ► security teams will reach their optimal levels under a CISO ► infosec is more than a single technology. It involves: ► physical, psychological and legal aspects, such as training, encouraging, enforcing and prosecuting ► strategic planning, skilled negotiating and practical problem solving ► only an individual with strong business savvy and security knowledge can oversee security planning, implement policies and select measures appropriate to business requirements - that person is the CISO Habit #1 – CISO
  • 7. ► Characteristics of a great CISO ► deep understanding of technology, combined with understanding of the organizations function, politics and business drivers ► gold medal CISO: Electrical engineer with an MBA ► silver medal CISO: NSA veteran with corporate experience ► never a yes-man to the CxO or Board of Directors ► invests in people, not technology ► corollary: vendors intimidated by CISO due to technical prowess ► not intimidated by a screaming SVP trying to force firewall admin to violate policy ► but also willing to evaluate the policy to determine whether it is reasonable CISO
  • 8. ► CISO works at the executive level ► serves on the executive council or equivalent ► be on CIO’s architectural strategy council or equivalent ► direct or dotted-line manager of all information security staff ► without executive level control, will face difficulty when bridging the gap between business process demands and security technology requirements ► CISO at the non-executive level – expect Spaf’s Law: ► “if you have responsibility for security but have no authority to set rules or punish violators, your own role in the organization is to take the blame when something big goes wrong” ► Prof. Gene Spafford - CS Dept. - Purdue University CISO
  • 9. ► How management often perceives risk ► risk = evil hacker Habit #2 – Risk Management
  • 10. This is risk management… Backup tapes Hackers Risk matrix Software Patches Power grid Data center Token management Political Malicious end-users Customers Regulatory compliance Contractors Telco Revocation processes Terrorists Legal liability Unions External Environmental DR/BCP Internal External Unhappy customers Physical security Disgruntled employees Operations test Consultants Third-party Clients Operational Audit Lack of budget Vendor bankruptcy Vulnerabilities Forensics Crypto keys Lack of staff Fraud Poor risk assessment Hactivists Spyware Blogs Insecure software Wireless Google Documentation Organized crime China India Illegal downloads Web-scripting Viruses Worms Malicious software Rogue employee Windows VoIP Social engineering App dev practices Malware Background checks Database Data destruction Hardware Procedural violations phishing
  • 11. ► comprehensive risk management program must be created around these four areas: 1. Identification 2. Analysis 3. Mitigation 4. Monitoring Risk Management
  • 12. ► People, not products ► huge mistake companies make is expecting security products to solve their security problems ► they buy myriad products without being able to answer: ► what is your security problem and how do you expect this security product to solve it? ► why you are buying a product? ► create detailed requirements for its use ► processes and procedures ► metrics to measure its effectiveness and value Habit #3 – People, not products
  • 13. ► Vendors want you to think their product is the best; but all products are for the most part indistinguishable ► by the time a product hits version 3, competition has matched it feature for feature ► observation: most established COTS security products are essentially indistinguishable from each other and can achieve what most organizations require: ► Check Point vs. Cisco ► eEye vs. McAfee ► don’t obsess on the products. Focus on your staff, internal procedures and specific requirements The big lie of security products
  • 14. ► Comprehensive security policies are required to map abstract security concepts to your real world implementation of your security products ► policy defines the aims and goals of the business ► no policies = no information security…. and ► no policies enforcement = no information security Habit #4 - Policies & Procedures
  • 15. ► SOP’s ensure Chicago firewall admin builds & configures corporate firewalls in the same manner as Tokyo admin ► immense benefits of Standard Operating Procedures ► standardize operations among divisions and departments ► reduce confusion ► designate responsibility ► improve accountability of personnel ► record the performance of all tasks and their results ► reduce costs ► reduce liability Information security procedures
  • 16. ► Organizations that take the time and effort to create infosec SOP’s demonstrate their commitment to security ► by creating SOP’s, costs are drastically lowered (greater ROI), and their level of security is drastically increased ► another example: Aviation industry lives and dies (literally) via their SOP’s ► SOP’s are built into job requirements and regulations ► today’s airplanes are far too complex to maintain and operate without SOP’s ► information security might not be as complex as a Boeing 777, but it still requires appropriate SOP’s Information Security SOP
  • 17. ► Users who read and trust the Weekly World News will invariably choose an insecure Java applet over security ► information security and associated risks aren’t intuitive ► invest in training users to properly use the tools given to them ► effective information security training and awareness effort can’t be initiated without first writing information security policies Habit #5 – Awareness & Training
  • 18. ► Awareness defines the rules for computer use ► users must be clearly educated as to what acceptable use means ► define exactly what a confidential document is ► what is a good password? ► what emails should be forwarded? ► can I set up my own wireless network? Awareness and Training Image source: www.secureit.utah.edu/images/ISA/isa_banner2009.gif
  • 19. ► Dark moment in computer security awareness #358 ► 1998 – US President Bill Clinton and Irish Prime Minister Bertie Ahern used digital signature technology to append their personal signatures to a statement endorsing broad e-commerce policy concerns ► Clinton and Ahern are videotaped entering the passphrase for their private keys ► at the conclusion of the ceremony, they swap the smart cards that contain their private keys Awareness and Training
  • 20. ► Security Engineering: A Guide to Building Dependable Distributed Systems ► Ross Anderson ► Free digital copy http://www.cl.cam.ac.uk/~rja14/book.html ► Information Risk and Security ► Edward Wilding ► NIST Information Security Handbook: A Guide for Managers ► http://csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07-2007.pdf ► Security Strategy: From Requirements to Reality ► Bill Stackpole and Eric Oksendahl Required reading
  • 21. ► Bruce Schneier / Marcus Ranum ► Two really smart guys who understand security and risk, and don’t believe in the common wisdom of security pixie dust ► visit their web sites – www.schneier.com / www.ranum.com ► Crypto-Gram – Schneier’s monthly e-mail newsletter ► http://www.schneier.com/crypto-gram.html Required listening
  • 22. ► Effective information security takes: ► hard work ► leadership ► commitment ► knowledge ► responsibility ► dedication ► when implemented in the 5 habits, those are the characteristics of highly secure organizations Summary
  • 23. Ben Rothke, CISSP CISA Manager – Information Security Wyndham Worldwide Corporation www.linkedin.com/in/benrothke www.twitter.com/benrothke www.slideshare.net/benrothke