SlideShare a Scribd company logo
1 of 35
Effectively Communicating With
Your CFO

Gene Kim
SecureWorld Dallas
October 10, 2012



Session ID:

                     @RealGeneKim, genek@realgenekim.me
You are only as smart as the
               average
of the top 5 people you hang out with




                  2
                      @RealGeneKim, genek@realgenekim.me
My Background




      3
          @RealGeneKim, genek@realgenekim.me
Visible Ops: Playbook of High Performers

 The IT Process Institute has
  been studying high-performing
  organizations since 1999
   What is common to all the high
    performers?
   What is different between them
    and average and low
    performers?
   How did they become great?
 Answers have been codified in
  the Visible Ops Methodology


                                                   www.ITPI.org
                                @RealGeneKim, genek@realgenekim.me
Agenda
 Introductions
 Results of the “marriage counseling” questioning
  (10m)
 Share with you my “top things I wish someone
  showed me ten years ago”
    ITPI: IT Controls Benchmark Results: controls vs.
     performance (5m)
    Gartner: Paul Proctor/Michael Smith Risk Adjusted Value
     Model: KPIs, KRIs and information security linkage (5m)
    Ebay: Dave Cullinane: Infosec risk management (5m)
 Open up for what works for you


                              5
                                    @RealGeneKim, genek@realgenekim.me
The Marriage Counseling Questions
 What about the business view of IT causes you
  to feel uncomfortable?
 In your interactions with the business, what
  situations don’t feel right to you?




                              @RealGeneKim, genek@realgenekim.me
Gene’s Study of High
Performing IT Organizations




             7
                 @RealGeneKim, genek@realgenekim.me
Since 1999, We’ve Benchmarked 1500+
IT Organizations




                                   Source: EMA (2009)
                                   Source: IT Process Institute (2008)
                        @RealGeneKim, genek@realgenekim.me
High Performing IT Organizations
 High performers maintain a posture of compliance
     Fewest number of repeat audit findings
     One-third amount of audit preparation effort
 High performers find and fix security breaches faster
     5 times more likely to detect breaches by automated control
     5 times less likely to have breaches result in a loss event
 When high performers implement changes…
       14 times more changes
       One-half the change failure rate
       One-quarter the first fix failure rate
       10x faster MTTR for Sev 1 outages
 When high performers manage IT resources…
     One-third the amount of unplanned work
     8 times more projects and IT services
     6 times more applications


                                                                    Source: IT Process Institute, 2008


                                                 @RealGeneKim, genek@realgenekim.me
2007: Three Controls Predict 60% Of
Performance

 To what extent does an organization define,
  monitor and enforce the following?
   Standardized configuration strategy
   Process discipline
   Controlled access to production systems




                                @RealGeneKim, genek@realgenekim.me
                                                 Source: IT Process Institute, 2008
“Marriage Counseling”
Questions to CEOs, CIOs, CISOs




              11
                   @RealGeneKim, genek@realgenekim.me
The Marriage Counseling Questions
 What about the business view of IT causes you
  to feel uncomfortable?
 In your interactions with the business, what
  situations don’t feel right to you?




                                         Source: Gene Kim 2012


                              @RealGeneKim, genek@realgenekim.me
CEO Pains
 If IT fails I don't know why, if IT succeeds I don't know why.
 By managing inputs and outputs, I can hold any area of the business accountable –
  except for IT
 I have difficulties holding IT accountable -- IT is often “slippery” (blaming everyone,
  especially vendors and suppliers)
 I do not have a detailed understanding around the ROI of the IT investments I make.
 I need more assurance than my trust in the IT managers.
 Failures in IT are often catastrophic and are followed by expensive new projects.
 When catastrophic failures in IT happen, I hear “I told you so”
 I have no insight into IT productivity or human resource utilization
 (aside: Waiting projects imply that service delivery is too slow).
 Large investments in IT projects that eventual fail; without warning.
 I need data to make informed decisions about IT.
 I do not think IT knows how to manage risk well.



                                                                         Source: Gene Kim 2012

                                              13
                                                        @RealGeneKim, genek@realgenekim.me
CIO Pains
   No visibility into what is actually going on in IT, have to rely on rumors (word on the street).
   No sense of security; events in IT seem random that could cause me to lose my job.
   The complexity of IT defies detailed understanding; as a result decisions are often made
    based on trust or "the best story"
   Can communicate expense of IT but cannot calculate value.
   Product managers and business people control/drive IT projects with inadequate technical
    knowledge.
   Cannot isolate who is responsible for IT failures; is it the business, IT, or the tools.
   I often have to rely on the CEO trust to decide to "pitch" a project.
   I have to rely on my credibility to get projects funded.
   Uncoordinated dependencies
   CIOs has reverse leverage :everyone can make a mistake so big that can is small to them,
    but huge to you – one DBA can light fuses that take years to detonate and destroy the
    business (accidentally have reliance on a report that turns into a journal entry)




                                                                            Source: Gene Kim 2012

                                                  14
                                                            @RealGeneKim, genek@realgenekim.me
CISO Pains
   Growing compliance requirements consumes more cycles every day.
   Management seems to make poor decisions despite the risks I articulate
   Insufficient resources/Cannot respond quickly enough
   Need more data to communicate up succinctly
   I am perceived to slow down business agility
   I have to get projects approved with persuasion rather than data/facts
   Last minute projects are able to bypass controls
   (implies that doing it with controls takes too long)
   Cannot isolate the real risk areas
   We find more than can be fixed
   Management falsely believes that compliance equals security
   Seems like revenue trumps controls
   When we apply risk management processes, the probability of bad things happening are
    so low that management always chooses to "accept the risk" -- and therefore we can't get
    budget.
   I have to get projects approved with persuasion rather than data/facts

                                                                       Source: Gene Kim 2012

                                                 15
                                                           @RealGeneKim, genek@realgenekim.me
Paul Proctor, Michael Smith
          Gartner
Risk-Adjusted Value Model




             16
                  @RealGeneKim, genek@realgenekim.me
17
     @RealGeneKim, genek@realgenekim.me
18
     @RealGeneKim, genek@realgenekim.me
19
     @RealGeneKim, genek@realgenekim.me
20
     @RealGeneKim, genek@realgenekim.me
Want more information on RVM?
 Contact Paul Proctor, Chief of Research, Risk
  and Security, Gartner, Inc.
  (mailto:paul.proctor@gartner.com)

  or your Gartner rep




                        21
                             @RealGeneKim, genek@realgenekim.me
Dave Cullinane’s
Security IRM Slides




         22
              @RealGeneKim, genek@realgenekim.me
Risk Grid Calculation

  High                                                   Significant DR Event
> $100M                                                                                    Criminal Activity
                  Data Breach




                                            Regulatory Action
 Medium
$50-$100M                                                         Operations Security
   Impact




                                                                                   SW / Site Security



   Low
  <$50M
                            Audit Failure


                 Low <33%                        Medium 33-66%                           High >66%
                                                                                Source: David Cullinane
                                              Probability
                                                                @RealGeneKim, genek@realgenekim.me
Information Security Risk

Risk               Security Risk Curve




                                                    Source: David Cullinane

                                                 Investment
                                         @RealGeneKim, genek@realgenekim.me
Information Security Risk Tolerance

Risk               Security Risk Curve




                           Initial Risk Profile


       $300M




                                                             Source: David Cullinane
                $10M
                25HC                                      Investment
                                                  @RealGeneKim, genek@realgenekim.me
Information Security Risk Tolerance

Risk               Security Risk Curve




                           initial Risk Profile


       $300M



                                                       Adjusted Risk
                                                      Profile with new
                                                       funding levels
       $140M




                                                                 Source: David Cullinane
                $10M                      $20M
                25HC                      50HC              Investment
                                                  @RealGeneKim, genek@realgenekim.me
Information Security Risk Tolerance

Risk              Security Risk          China
                     Curve                                                   eCrime Threat
                                                                            Surface/Attacks

                                                 Russia (RBN)



                                                                E. Europe

       $300M

                                                                        Brazil




       $140M




                                                        Source: David Cullinane
                $10M              $20M
                25HC              50HC             Investment
                                           @RealGeneKim, genek@realgenekim.me
Information Security Risk Tolerance

Risk              Security Risk          China
                     Curve                                                   eCrime Threat
                                                                            Surface/Attacks

                                                 Russia (RBN)



                                                                E. Europe

       $300M

                                                                        Brazil




       $140M


                                                                        Added Savings
                                                                        from Process
                                                                        improvement
                                                        Source: David Cullinane
                $10M              $20M
                25HC              50HC             Investment
                                           @RealGeneKim, genek@realgenekim.me
Information Security Risk Tolerance

Risk                Security Risk          China
                       Curve                                                   eCrime Threat
                                                                              Surface/Attacks

                                                   Russia (RBN)



                                                                  E. Europe

          $300M

                                                                          Brazil




          $140M


           $60M                                                           Added Savings
                                                                          from Process
2009 Target                                                               improvement
                                                          Source: David Cullinane
Risk Profile
                  $10M              $20M
                  25HC              50HC             Investment
                                             @RealGeneKim, genek@realgenekim.me
Risk of multiple businesses
                      Need to Focus Here
   Financial Impact




                                                     A
                                                                  B

                                                      C       D        E


$100M
                                                          F




                                                                      Legend:
                                                                      Size – Importance to
                                                                      company
                                                                      Color – Effectiveness of
                                                                             Security controls
                                                              Source: David Cullinane

                                 Data at Risk
                                                @RealGeneKim, genek@realgenekim.me
Next Generation IRM




                        Source: David Cullinane

        31
             @RealGeneKim, genek@realgenekim.me
Left Top: Current Controls
   Environment as noted using
   Cobit Assessment criteria.
   Scores reflect support levels
   based on existing budgets.

   Left Bottom: Controls
   Environment as noted using
   Cobit Assessment criteria after
   budget cuts. Scores reflect
   decreased support levels due to
   less resources.


                 Effective Controls




           Source: David Cullinane
                 No Controls

@RealGeneKim, genek@realgenekim.me
• Circles sized according to importance to company
• Ability to measure control effectiveness and see impact                              Risk:
• Ability to determine best expenditure of limited funds to maximize ROSI               High

                                                                 Source: David CullinaneMedium
                                                                                        Low
                                                   @RealGeneKim, genek@realgenekim.me
When IT Fails: The Novel and The DevOps
  Cookbook


                               Coming in July 2012


                               “In the tradition of the best MBA case studies, this
                                book should be mandatory reading for business
                                and IT graduates alike.”
                                Paul Muller, VP Software Marketing, Hewlett-
                                Packard


Gene Kim, Tripwire founder,
                               “The greatest IT management book of our
Visible Ops co-author           generation.”
                                Branden Williams, CTO Marketing, RSA




                                                  @RealGeneKim, genek@realgenekim.me
When IT Fails: The Novel and The DevOps
  Cookbook

                               Our mission is to positively affect the
                                lives of 1 million IT workers by 2017

                               If you would like the “Top 10 Things
                                Infosec Needs To Know About DevOps,”
                                sample chapters and updates on the
                                book:

Gene Kim, Tripwire founder,
Visible Ops co-author
                                  Sign up at http://itrevolution.com
                                  Email genek@realgenekim.me
                                  Hand me a business card



                                                 @RealGeneKim, genek@realgenekim.me

More Related Content

What's hot

SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aSecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aGene Kim
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKimGene Kim
 
2012 05 corp fin 1c
2012 05 corp fin 1c2012 05 corp fin 1c
2012 05 corp fin 1cGene Kim
 
2011 06 15 velocity conf from visible ops to dev ops final
2011 06 15 velocity conf   from visible ops to dev ops final2011 06 15 velocity conf   from visible ops to dev ops final
2011 06 15 velocity conf from visible ops to dev ops finalGene Kim
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesGene Kim
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?Gene Kim
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?Gene Kim
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!Gene Kim
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...Gene Kim
 
When IT Fails: A Business Novel - ITSM Academy Webinar
When IT Fails: A Business Novel - ITSM Academy WebinarWhen IT Fails: A Business Novel - ITSM Academy Webinar
When IT Fails: A Business Novel - ITSM Academy WebinarITSM Academy, Inc.
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience ReportGene Kim
 
Tui the phoenix project book review
Tui the phoenix project book reviewTui the phoenix project book review
Tui the phoenix project book reviewRudiger Wolf
 
2012 SxSW When IT Says No by Gene Kim
2012 SxSW When IT Says No by Gene Kim2012 SxSW When IT Says No by Gene Kim
2012 SxSW When IT Says No by Gene KimGene Kim
 
SecureWorld: Security is Dead, Rugged DevOps 1f
SecureWorld:  Security is Dead, Rugged DevOps 1fSecureWorld:  Security is Dead, Rugged DevOps 1f
SecureWorld: Security is Dead, Rugged DevOps 1fGene Kim
 
Why Everyone Needs DevOps Now - Gene Kim
Why Everyone Needs DevOps Now - Gene KimWhy Everyone Needs DevOps Now - Gene Kim
Why Everyone Needs DevOps Now - Gene KimDynatrace
 
DevOps State of the Union 2015
DevOps State of the Union 2015DevOps State of the Union 2015
DevOps State of the Union 2015Ernest Mueller
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)Gene Kim
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)Gene Kim
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was ReleasedGene Kim
 

What's hot (20)

SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aSecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKim
 
2012 05 corp fin 1c
2012 05 corp fin 1c2012 05 corp fin 1c
2012 05 corp fin 1c
 
2011 06 15 velocity conf from visible ops to dev ops final
2011 06 15 velocity conf   from visible ops to dev ops final2011 06 15 velocity conf   from visible ops to dev ops final
2011 06 15 velocity conf from visible ops to dev ops final
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
 
When IT Fails: A Business Novel - ITSM Academy Webinar
When IT Fails: A Business Novel - ITSM Academy WebinarWhen IT Fails: A Business Novel - ITSM Academy Webinar
When IT Fails: A Business Novel - ITSM Academy Webinar
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
 
Tui the phoenix project book review
Tui the phoenix project book reviewTui the phoenix project book review
Tui the phoenix project book review
 
2012 SxSW When IT Says No by Gene Kim
2012 SxSW When IT Says No by Gene Kim2012 SxSW When IT Says No by Gene Kim
2012 SxSW When IT Says No by Gene Kim
 
SecureWorld: Security is Dead, Rugged DevOps 1f
SecureWorld:  Security is Dead, Rugged DevOps 1fSecureWorld:  Security is Dead, Rugged DevOps 1f
SecureWorld: Security is Dead, Rugged DevOps 1f
 
Why Everyone Needs DevOps Now - Gene Kim
Why Everyone Needs DevOps Now - Gene KimWhy Everyone Needs DevOps Now - Gene Kim
Why Everyone Needs DevOps Now - Gene Kim
 
DevOps State of the Union 2015
DevOps State of the Union 2015DevOps State of the Union 2015
DevOps State of the Union 2015
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)
 
DevOps and Audit
DevOps and AuditDevOps and Audit
DevOps and Audit
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released
 

Viewers also liked

2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"Gene Kim
 
секреты научного текста
секреты научного текстасекреты научного текста
секреты научного текстаekaterina7
 
ICF Conference 2012 - Host Intro Speech
ICF Conference 2012 - Host Intro SpeechICF Conference 2012 - Host Intro Speech
ICF Conference 2012 - Host Intro SpeechPaul Dumitru
 
GpsLatitude Technology
GpsLatitude TechnologyGpsLatitude Technology
GpsLatitude TechnologyHarvey Kaye
 
Conferința ICF 2013 București
Conferința ICF 2013 BucureștiConferința ICF 2013 București
Conferința ICF 2013 BucureștiPaul Dumitru
 
Equipo 3 formula costo de inversion en automatizacion
Equipo 3 formula costo de inversion en automatizacionEquipo 3 formula costo de inversion en automatizacion
Equipo 3 formula costo de inversion en automatizacionJose Manuel de la Cruz Castro
 
Basepin solutions
Basepin solutionsBasepin solutions
Basepin solutionscitemgr
 
Mecanismes de transmissio circular
Mecanismes de transmissio circularMecanismes de transmissio circular
Mecanismes de transmissio circularSusana Valls Andreu
 
2011 03 14 dev ops meetup - top lessons creating dev-ops super-tribes 2b
2011 03 14   dev ops meetup - top lessons creating dev-ops super-tribes 2b2011 03 14   dev ops meetup - top lessons creating dev-ops super-tribes 2b
2011 03 14 dev ops meetup - top lessons creating dev-ops super-tribes 2bGene Kim
 
Mecanismes de transmissio circular
Mecanismes de transmissio circularMecanismes de transmissio circular
Mecanismes de transmissio circularSusana Valls Andreu
 
광고와 뉴미디어5
광고와 뉴미디어5광고와 뉴미디어5
광고와 뉴미디어5Chaenam, Jun
 
PROYECTO PROPUESTA PARA APERTURA DE DOS NUEVAS LICENCIATURAS
PROYECTO PROPUESTA PARA APERTURA DE DOS NUEVAS LICENCIATURASPROYECTO PROPUESTA PARA APERTURA DE DOS NUEVAS LICENCIATURAS
PROYECTO PROPUESTA PARA APERTURA DE DOS NUEVAS LICENCIATURASJose Manuel de la Cruz Castro
 

Viewers also liked (20)

Exposición proyecto Ensilaje de Maiz
Exposición proyecto Ensilaje de MaizExposición proyecto Ensilaje de Maiz
Exposición proyecto Ensilaje de Maiz
 
2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"2011 09 18 United "Platitudes, reality and promise"
2011 09 18 United "Platitudes, reality and promise"
 
секреты научного текста
секреты научного текстасекреты научного текста
секреты научного текста
 
ICF Conference 2012 - Host Intro Speech
ICF Conference 2012 - Host Intro SpeechICF Conference 2012 - Host Intro Speech
ICF Conference 2012 - Host Intro Speech
 
GpsLatitude Technology
GpsLatitude TechnologyGpsLatitude Technology
GpsLatitude Technology
 
[Cicle de subvencions 2010] financament privat
[Cicle de subvencions 2010] financament privat[Cicle de subvencions 2010] financament privat
[Cicle de subvencions 2010] financament privat
 
Conferința ICF 2013 București
Conferința ICF 2013 BucureștiConferința ICF 2013 București
Conferința ICF 2013 București
 
Projects
ProjectsProjects
Projects
 
Equipo 3 formula costo de inversion en automatizacion
Equipo 3 formula costo de inversion en automatizacionEquipo 3 formula costo de inversion en automatizacion
Equipo 3 formula costo de inversion en automatizacion
 
Actividad 2 preguntas de analisis presentation
Actividad 2 preguntas de analisis presentationActividad 2 preguntas de analisis presentation
Actividad 2 preguntas de analisis presentation
 
Basepin solutions
Basepin solutionsBasepin solutions
Basepin solutions
 
Produccion antigua
Produccion antiguaProduccion antigua
Produccion antigua
 
Mecanismes de transmissio circular
Mecanismes de transmissio circularMecanismes de transmissio circular
Mecanismes de transmissio circular
 
2011 03 14 dev ops meetup - top lessons creating dev-ops super-tribes 2b
2011 03 14   dev ops meetup - top lessons creating dev-ops super-tribes 2b2011 03 14   dev ops meetup - top lessons creating dev-ops super-tribes 2b
2011 03 14 dev ops meetup - top lessons creating dev-ops super-tribes 2b
 
Mecanismes de transmissio circular
Mecanismes de transmissio circularMecanismes de transmissio circular
Mecanismes de transmissio circular
 
Maquines simples
Maquines simplesMaquines simples
Maquines simples
 
광고와 뉴미디어5
광고와 뉴미디어5광고와 뉴미디어5
광고와 뉴미디어5
 
Kisah nanokarbon
Kisah nanokarbonKisah nanokarbon
Kisah nanokarbon
 
PROYECTO PROPUESTA PARA APERTURA DE DOS NUEVAS LICENCIATURAS
PROYECTO PROPUESTA PARA APERTURA DE DOS NUEVAS LICENCIATURASPROYECTO PROPUESTA PARA APERTURA DE DOS NUEVAS LICENCIATURAS
PROYECTO PROPUESTA PARA APERTURA DE DOS NUEVAS LICENCIATURAS
 
passU
passUpassU
passU
 

Similar to SecureWorld - Communicating With Your CFO

The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursSurfWatch Labs
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
cybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-mattcybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-mattYigal Behar
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesSeqrite
 
Security from Compliance or Compliance from Security?--Metrics are the key
Security from Compliance or Compliance from Security?--Metrics are the keySecurity from Compliance or Compliance from Security?--Metrics are the key
Security from Compliance or Compliance from Security?--Metrics are the keyAlan Covell
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
Security Everywhere in the Digital Economy
Security Everywhere in the Digital EconomySecurity Everywhere in the Digital Economy
Security Everywhere in the Digital EconomyConnected Futures
 
The only way to survive is to automate your SOC
The only way to survive is to automate your SOCThe only way to survive is to automate your SOC
The only way to survive is to automate your SOCRoberto Sponchioni
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteDave Steer
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSRandall Chase
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Strategic Treasurer
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyAIIM International
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Patrick Florer
 

Similar to SecureWorld - Communicating With Your CFO (20)

The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
cybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-mattcybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-matt
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
 
Security from Compliance or Compliance from Security?--Metrics are the key
Security from Compliance or Compliance from Security?--Metrics are the keySecurity from Compliance or Compliance from Security?--Metrics are the key
Security from Compliance or Compliance from Security?--Metrics are the key
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
Security Everywhere in the Digital Economy
Security Everywhere in the Digital EconomySecurity Everywhere in the Digital Economy
Security Everywhere in the Digital Economy
 
The only way to survive is to automate your SOC
The only way to survive is to automate your SOCThe only way to survive is to automate your SOC
The only way to survive is to automate your SOC
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
 
The software-security-risk-report
The software-security-risk-reportThe software-security-risk-report
The software-security-risk-report
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12
 

More from Gene Kim

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Gene Kim
 
2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity ConferenceGene Kim
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsGene Kim
 
Kevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementKevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementGene Kim
 
2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns DistilledGene Kim
 
United2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksUnited2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksGene Kim
 
Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed
Security is Dead. Long Live Rugged DevOps: IT at Ludicrous SpeedSecurity is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed
Security is Dead. Long Live Rugged DevOps: IT at Ludicrous SpeedGene Kim
 
2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1aGene Kim
 

More from Gene Kim (8)

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
 
2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
 
Kevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementKevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process Improvement
 
2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled
 
United2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksUnited2012 Rugged DevOps Rocks
United2012 Rugged DevOps Rocks
 
Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed
Security is Dead. Long Live Rugged DevOps: IT at Ludicrous SpeedSecurity is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed
Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed
 
2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a
 

SecureWorld - Communicating With Your CFO

  • 1. Effectively Communicating With Your CFO Gene Kim SecureWorld Dallas October 10, 2012 Session ID: @RealGeneKim, genek@realgenekim.me
  • 2. You are only as smart as the average of the top 5 people you hang out with 2 @RealGeneKim, genek@realgenekim.me
  • 3. My Background 3 @RealGeneKim, genek@realgenekim.me
  • 4. Visible Ops: Playbook of High Performers  The IT Process Institute has been studying high-performing organizations since 1999  What is common to all the high performers?  What is different between them and average and low performers?  How did they become great?  Answers have been codified in the Visible Ops Methodology www.ITPI.org @RealGeneKim, genek@realgenekim.me
  • 5. Agenda  Introductions  Results of the “marriage counseling” questioning (10m)  Share with you my “top things I wish someone showed me ten years ago”  ITPI: IT Controls Benchmark Results: controls vs. performance (5m)  Gartner: Paul Proctor/Michael Smith Risk Adjusted Value Model: KPIs, KRIs and information security linkage (5m)  Ebay: Dave Cullinane: Infosec risk management (5m)  Open up for what works for you 5 @RealGeneKim, genek@realgenekim.me
  • 6. The Marriage Counseling Questions  What about the business view of IT causes you to feel uncomfortable?  In your interactions with the business, what situations don’t feel right to you? @RealGeneKim, genek@realgenekim.me
  • 7. Gene’s Study of High Performing IT Organizations 7 @RealGeneKim, genek@realgenekim.me
  • 8. Since 1999, We’ve Benchmarked 1500+ IT Organizations Source: EMA (2009) Source: IT Process Institute (2008) @RealGeneKim, genek@realgenekim.me
  • 9. High Performing IT Organizations  High performers maintain a posture of compliance  Fewest number of repeat audit findings  One-third amount of audit preparation effort  High performers find and fix security breaches faster  5 times more likely to detect breaches by automated control  5 times less likely to have breaches result in a loss event  When high performers implement changes…  14 times more changes  One-half the change failure rate  One-quarter the first fix failure rate  10x faster MTTR for Sev 1 outages  When high performers manage IT resources…  One-third the amount of unplanned work  8 times more projects and IT services  6 times more applications Source: IT Process Institute, 2008 @RealGeneKim, genek@realgenekim.me
  • 10. 2007: Three Controls Predict 60% Of Performance  To what extent does an organization define, monitor and enforce the following?  Standardized configuration strategy  Process discipline  Controlled access to production systems @RealGeneKim, genek@realgenekim.me Source: IT Process Institute, 2008
  • 11. “Marriage Counseling” Questions to CEOs, CIOs, CISOs 11 @RealGeneKim, genek@realgenekim.me
  • 12. The Marriage Counseling Questions  What about the business view of IT causes you to feel uncomfortable?  In your interactions with the business, what situations don’t feel right to you? Source: Gene Kim 2012 @RealGeneKim, genek@realgenekim.me
  • 13. CEO Pains  If IT fails I don't know why, if IT succeeds I don't know why.  By managing inputs and outputs, I can hold any area of the business accountable – except for IT  I have difficulties holding IT accountable -- IT is often “slippery” (blaming everyone, especially vendors and suppliers)  I do not have a detailed understanding around the ROI of the IT investments I make.  I need more assurance than my trust in the IT managers.  Failures in IT are often catastrophic and are followed by expensive new projects.  When catastrophic failures in IT happen, I hear “I told you so”  I have no insight into IT productivity or human resource utilization  (aside: Waiting projects imply that service delivery is too slow).  Large investments in IT projects that eventual fail; without warning.  I need data to make informed decisions about IT.  I do not think IT knows how to manage risk well. Source: Gene Kim 2012 13 @RealGeneKim, genek@realgenekim.me
  • 14. CIO Pains  No visibility into what is actually going on in IT, have to rely on rumors (word on the street).  No sense of security; events in IT seem random that could cause me to lose my job.  The complexity of IT defies detailed understanding; as a result decisions are often made based on trust or "the best story"  Can communicate expense of IT but cannot calculate value.  Product managers and business people control/drive IT projects with inadequate technical knowledge.  Cannot isolate who is responsible for IT failures; is it the business, IT, or the tools.  I often have to rely on the CEO trust to decide to "pitch" a project.  I have to rely on my credibility to get projects funded.  Uncoordinated dependencies  CIOs has reverse leverage :everyone can make a mistake so big that can is small to them, but huge to you – one DBA can light fuses that take years to detonate and destroy the business (accidentally have reliance on a report that turns into a journal entry) Source: Gene Kim 2012 14 @RealGeneKim, genek@realgenekim.me
  • 15. CISO Pains  Growing compliance requirements consumes more cycles every day.  Management seems to make poor decisions despite the risks I articulate  Insufficient resources/Cannot respond quickly enough  Need more data to communicate up succinctly  I am perceived to slow down business agility  I have to get projects approved with persuasion rather than data/facts  Last minute projects are able to bypass controls  (implies that doing it with controls takes too long)  Cannot isolate the real risk areas  We find more than can be fixed  Management falsely believes that compliance equals security  Seems like revenue trumps controls  When we apply risk management processes, the probability of bad things happening are so low that management always chooses to "accept the risk" -- and therefore we can't get budget.  I have to get projects approved with persuasion rather than data/facts Source: Gene Kim 2012 15 @RealGeneKim, genek@realgenekim.me
  • 16. Paul Proctor, Michael Smith Gartner Risk-Adjusted Value Model 16 @RealGeneKim, genek@realgenekim.me
  • 17. 17 @RealGeneKim, genek@realgenekim.me
  • 18. 18 @RealGeneKim, genek@realgenekim.me
  • 19. 19 @RealGeneKim, genek@realgenekim.me
  • 20. 20 @RealGeneKim, genek@realgenekim.me
  • 21. Want more information on RVM?  Contact Paul Proctor, Chief of Research, Risk and Security, Gartner, Inc. (mailto:paul.proctor@gartner.com) or your Gartner rep 21 @RealGeneKim, genek@realgenekim.me
  • 22. Dave Cullinane’s Security IRM Slides 22 @RealGeneKim, genek@realgenekim.me
  • 23. Risk Grid Calculation High Significant DR Event > $100M Criminal Activity Data Breach Regulatory Action Medium $50-$100M Operations Security Impact SW / Site Security Low <$50M Audit Failure Low <33% Medium 33-66% High >66% Source: David Cullinane Probability @RealGeneKim, genek@realgenekim.me
  • 24. Information Security Risk Risk Security Risk Curve Source: David Cullinane Investment @RealGeneKim, genek@realgenekim.me
  • 25. Information Security Risk Tolerance Risk Security Risk Curve Initial Risk Profile $300M Source: David Cullinane $10M 25HC Investment @RealGeneKim, genek@realgenekim.me
  • 26. Information Security Risk Tolerance Risk Security Risk Curve initial Risk Profile $300M Adjusted Risk Profile with new funding levels $140M Source: David Cullinane $10M $20M 25HC 50HC Investment @RealGeneKim, genek@realgenekim.me
  • 27. Information Security Risk Tolerance Risk Security Risk China Curve eCrime Threat Surface/Attacks Russia (RBN) E. Europe $300M Brazil $140M Source: David Cullinane $10M $20M 25HC 50HC Investment @RealGeneKim, genek@realgenekim.me
  • 28. Information Security Risk Tolerance Risk Security Risk China Curve eCrime Threat Surface/Attacks Russia (RBN) E. Europe $300M Brazil $140M Added Savings from Process improvement Source: David Cullinane $10M $20M 25HC 50HC Investment @RealGeneKim, genek@realgenekim.me
  • 29. Information Security Risk Tolerance Risk Security Risk China Curve eCrime Threat Surface/Attacks Russia (RBN) E. Europe $300M Brazil $140M $60M Added Savings from Process 2009 Target improvement Source: David Cullinane Risk Profile $10M $20M 25HC 50HC Investment @RealGeneKim, genek@realgenekim.me
  • 30. Risk of multiple businesses Need to Focus Here Financial Impact A B C D E $100M F Legend: Size – Importance to company Color – Effectiveness of Security controls Source: David Cullinane Data at Risk @RealGeneKim, genek@realgenekim.me
  • 31. Next Generation IRM Source: David Cullinane 31 @RealGeneKim, genek@realgenekim.me
  • 32. Left Top: Current Controls Environment as noted using Cobit Assessment criteria. Scores reflect support levels based on existing budgets. Left Bottom: Controls Environment as noted using Cobit Assessment criteria after budget cuts. Scores reflect decreased support levels due to less resources. Effective Controls Source: David Cullinane No Controls @RealGeneKim, genek@realgenekim.me
  • 33. • Circles sized according to importance to company • Ability to measure control effectiveness and see impact Risk: • Ability to determine best expenditure of limited funds to maximize ROSI High Source: David CullinaneMedium Low @RealGeneKim, genek@realgenekim.me
  • 34. When IT Fails: The Novel and The DevOps Cookbook  Coming in July 2012  “In the tradition of the best MBA case studies, this book should be mandatory reading for business and IT graduates alike.” Paul Muller, VP Software Marketing, Hewlett- Packard Gene Kim, Tripwire founder,  “The greatest IT management book of our Visible Ops co-author generation.” Branden Williams, CTO Marketing, RSA @RealGeneKim, genek@realgenekim.me
  • 35. When IT Fails: The Novel and The DevOps Cookbook  Our mission is to positively affect the lives of 1 million IT workers by 2017  If you would like the “Top 10 Things Infosec Needs To Know About DevOps,” sample chapters and updates on the book: Gene Kim, Tripwire founder, Visible Ops co-author  Sign up at http://itrevolution.com  Email genek@realgenekim.me  Hand me a business card @RealGeneKim, genek@realgenekim.me

Editor's Notes

  1. 4 square picture of where eBay Marketplaces; Corporate IT; and Adjacencies exist utilizing two biggest security &amp; availability risk factors: Financial Impact (associated with availability) and Data at Risk (associated with confidentiality and the potential to disclose or make whole to customers and/or employees)The color represents control effectiveness as determined by: Assessments conducted by GIS; Internal Audit; PwC; external consultants related to security controls and our ability to mitigate against threat environment.