The Manager’s Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security
()
About this ebook
Is security management changing so fast that you can’t keep up? Perhaps it seems like those traditional “best practices” in security no longer work? One answer might be that you need better best practices! In their new book, The Manager’s Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security, two experienced professionals introduce ESRM. Their practical, organization-wide, integrated approach redefines the securing of an organization’s people and assets from being task-based to being risk-based.
In their careers, the authors, Brian Allen and Rachelle Loyear, have been instrumental in successfully reorganizing the way security is handled in major corporations. In this ground-breaking book, the authors begin by defining Enterprise Security Risk Management (ESRM):
“Enterprise security risk management is the application of fundamental risk principles to manage all security risks − whether information, cyber, physical security, asset management, or business continuity − in a comprehensive, holistic, all-encompassing approach.”
In the face of a continually evolving and increasingly risky global security landscape, this book takes you through the steps of putting ESRM into practice enterprise-wide, and helps you to:
- Differentiate between traditional, task-based management and strategic, risk-based management.
- See how adopting ESRM can lead to a more successful security program overall and enhance your own career. .
- Prepare your security organization to adopt an ESRM methodology. .
- Analyze and communicate risks and their root causes to all appropriate parties. .
- Identify what elements are necessary for long-term success of your ESRM program. .
- Ensure the proper governance of the security function in your enterprise. .
- Explain the value of security and ESRM to executives using useful metrics and reports. .
Throughout the book, the authors provide a wealth of real-world case studies from a wide range of businesses and industries to help you overcome any blocks to acceptance as you design and roll out a new ESRM-based security program for your own workplace.
Brian J. Allen, Esq., CISSP, CISM, CPP, CFE
Brian J. Allen has more than 20 years’ experience in virtually every aspect of the security field. He most recently held the position of Chief Security Officer (CSO) with Time Warner Cable (TWC), a leading multinational provider of telecommunications, information, and entertainment services headquartered in New York City. In this role, he was responsible for protecting TWC’s assets worldwide, coordinating the company’s crisis management and business continuity management (BCM) programs, managing TWC’s cybersecurity policy and leading its security risk management program. He managed the company’s security policy and relations with law enforcement and government authorities, as well as all customer security risk issues, oversaw internal and external investigations, and headed the company’s workplace violence program. Before joining TWC in January 2002, he was Director of the Office of Cable Signal Theft at the National Cable and Telecommunications Association in Washington, D.C., and the owner of ACI Investigations, a multimillion-dollar provider of security guard, investigations, and consulting services. Brian earned his Bachelor of Science degree in criminal justice from Long Island University and received his Juris Doctor degree from Touro Law Center in New York. He is a member of the New York State Bar Association, a Certified Protection Professional (CPP) with ASIS, a Certified Information Systems Security Professional (CISSP) with ISC2, a Certified Fraud Examiner (CFE) with the ACFE and a Certified Information Security Manager (CISM) with ISACA. Brian is also a member of the International Security Management Association and the Association of Threat Assessment Professionals. Brian is an Adjunct Professor at the University of Connecticut, School of Business MBA Program and is active in industry organizations. He served as a member of the Communications Infrastructure Reliability and Interoperability Council (CSRIC), an FCC appointed position, and co-chaired its working group on Cybersecurity Best Practices and the Cybersecurity Framework. He is also one of four elected communications company representatives to serve on the Executive Committee of the US Communications Sector Coordinating Council (CSCC). He works with the Cross Sector Cybersecurity Working Group, established by the U.S. Department of Homeland Security (DHS) under the Critical Infrastructure Partnership Advisory Council. Brian has served on the board of directors of ASIS International, and the board of trustees of ASIS International’s Foundation. He is currently a member of the Board of Directors of the Domestic Violence Crisis Center in Connecticut.
Related to The Manager’s Guide to Enterprise Security Risk Management
Related ebooks
Building Effective Cybersecurity Programs: A Security Manager’s Handbook Rating: 4 out of 5 stars4/5Information Security Risk Management for ISO 27001/ISO 27002, third edition Rating: 4 out of 5 stars4/5ISO27001/ISO27002:2013: A Pocket Guide Rating: 4 out of 5 stars4/5Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Rating: 0 out of 5 stars0 ratingsRisk Management and Information Systems Control Rating: 5 out of 5 stars5/5Cyber Security Risk Management A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsSecurity and Risk Management: CISSP, #1 Rating: 4 out of 5 stars4/5Nine Steps to Success: An ISO27001:2013 Implementation Overview Rating: 1 out of 5 stars1/5ISO 27001 Controls – A guide to implementing and auditing Rating: 5 out of 5 stars5/5Application Security in the ISO27001 Environment Rating: 0 out of 5 stars0 ratingsInformation Security Risk Management for ISO27001/ISO27002 Rating: 4 out of 5 stars4/5Cyber Threat Hunting A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsApplication security in the ISO27001:2013 Environment Rating: 4 out of 5 stars4/5Building an Effective Cybersecurity Program, 2nd Edition Rating: 0 out of 5 stars0 ratingsFundamentals of Adopting the NIST Cybersecurity Framework Rating: 0 out of 5 stars0 ratingsCybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents Rating: 0 out of 5 stars0 ratingsInformation Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratingsWe Need To Talk: 52 Weeks To Better Cyber-Security Rating: 0 out of 5 stars0 ratingsHow Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsThe Manager’s Guide to Risk Assessment: Getting it Right Rating: 3 out of 5 stars3/5Security Operations Center - SIEM Use Cases and Cyber Threat Intelligence Rating: 0 out of 5 stars0 ratingsRisk Management Simplified: A Definitive Guide For Workplace and Process Risk Management Rating: 5 out of 5 stars5/5Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization Rating: 0 out of 5 stars0 ratingsThe Chief Information Security Officer: Insights, tools and survival skills Rating: 1 out of 5 stars1/5Destination CISSP Rating: 0 out of 5 stars0 ratings
Business For You
Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5Never Split the Difference: Negotiating As If Your Life Depended On It Rating: 4 out of 5 stars4/5Tools Of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers Rating: 4 out of 5 stars4/5Crucial Conversations: Tools for Talking When Stakes are High, Third Edition Rating: 4 out of 5 stars4/5Crucial Conversations Tools for Talking When Stakes Are High, Second Edition Rating: 4 out of 5 stars4/5The Five Dysfunctions of a Team: A Leadership Fable, 20th Anniversary Edition Rating: 4 out of 5 stars4/5Capitalism and Freedom Rating: 4 out of 5 stars4/5Collaborating with the Enemy: How to Work with People You Don't Agree with or Like or Trust Rating: 4 out of 5 stars4/5On Writing Well, 30th Anniversary Edition: An Informal Guide to Writing Nonfiction Rating: 4 out of 5 stars4/5Law of Connection: Lesson 10 from The 21 Irrefutable Laws of Leadership Rating: 4 out of 5 stars4/5Summary of J.L. Collins's The Simple Path to Wealth Rating: 5 out of 5 stars5/5Company Rules: Or Everything I Know About Business I Learned from the CIA Rating: 4 out of 5 stars4/5The Richest Man in Babylon: The most inspiring book on wealth ever written Rating: 5 out of 5 stars5/5Money. Wealth. Life Insurance. Rating: 5 out of 5 stars5/5The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5Buy, Rehab, Rent, Refinance, Repeat: The BRRRR Rental Property Investment Strategy Made Simple Rating: 5 out of 5 stars5/5The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers Rating: 4 out of 5 stars4/5Confessions of an Economic Hit Man, 3rd Edition Rating: 5 out of 5 stars5/5Financial Words You Should Know: Over 1,000 Essential Investment, Accounting, Real Estate, and Tax Words Rating: 4 out of 5 stars4/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5Robert's Rules Of Order Rating: 5 out of 5 stars5/5Set for Life: An All-Out Approach to Early Financial Freedom Rating: 4 out of 5 stars4/5The Energy Bus: 10 Rules to Fuel Your Life, Work, and Team with Positive Energy Rating: 3 out of 5 stars3/5Good to Great: Why Some Companies Make the Leap...And Others Don't Rating: 4 out of 5 stars4/5High Conflict: Why We Get Trapped and How We Get Out Rating: 4 out of 5 stars4/5Limited Liability Companies For Dummies Rating: 5 out of 5 stars5/5
Reviews for The Manager’s Guide to Enterprise Security Risk Management
0 ratings0 reviews
Book preview
The Manager’s Guide to Enterprise Security Risk Management - Brian J. Allen, Esq., CISSP, CISM, CPP, CFE
Part 1
What Is Enterprise Security Risk Management (ESRM)
and How Can It Help You?
This part will help you to:
Understand what is meant by Enterprise Security Risk Management.
Explain the difference between traditional, task-based management and strategic, risk-based management.
Understand and overcome some of the blocks to effective relationships with enterprise leaders.
See how adopting ESRM can lead to a more successful security program overall and enhance your own career.
1
What is Enterprise Security Risk Management (ESRM)?
As a security practitioner, you know the world is a risky place, and you know it’s becoming more risk filled all the time. Hardly a day goes by without headlines about a workplace shooting, a data breach, a cyber-attack, or some other security failure that has exposed an enterprise and its assets -human, physical, and intangible - to some kind of serious risk. Whatever your security role, and no matter how far along you are in your security career, it’s your responsibility to protect your enterprise, and its assets, against these high-profile threats, and many others that are only beginning to emerge and be recognized. These changes in the security risk environment, and the urgent changes they require in your work as a security practitioner, are the reason we wrote this book.
This book is about an approach to security that’s new and yet familiar, radical and yet practical: enterprise security risk management (ESRM).
1.1 ESRM Defined
We’ll be discussing the meaning and implications of ESRM in depth throughout this book, but let’s begin at the beginning, with a simple, straightforward definition of the term:
Enterprise security risk management is the application of fundamental risk principles to manage all security risks - whether information, cyber, physical security, asset management, or business continuity - in a comprehensive, holistic, all-encompassing approach.
To break that down further, we can look at the individual parts of the definition.
1.1.1 Enterprise
An enterprise is a business or company.
This can be a:
Public, state or government run organization.
A privately held, family company.
A not-for-profit organization providing goods, services, or other non-profit activities.
A stockholder controlled corporation.
Any other organization that exists to fulfill a purpose defined by that organization.
When we reference business, organization, company, or any similar term in this book, we are referring to any or all of the above - an enterprise.
1.1.2 Security Risk
Security risk is anything that threatens harm to the enterprise, its mission, its employees, customers, or partners, its operations, its reputation.
That can mean:
A troubled employee with a gun.
An approaching hurricane.
A computer hacker in another country.
A dissatisfied customer with a social media account and too much time on his or her hands.
And, of course, many more.
Security risks take many different forms, and new ones are being introduced all the time. Recognizing those risks, making them known to the enterprise, and helping your internal functional business partners mitigate them is central to the ESRM philosophy.
1.1.3 Risk Principles
The definition of ESRM states that risks are managed through fundamental risk principles. Here, we’ll reference an already existing body of knowledge on how to manage all types of risk, and apply it specifically to the security function. There are well-established, fundamental risk principles -principles that have been tested and found effective over many years, in many different enterprises, and in many different industries - that can be used to manage risks of all types.
The International Organization for Standardization, in standard ISO 31000:2009 - Risk management - Principles and guidelines, and the American National Standards Institute, in their standard document ANSI/ASIS/RIMS RA.1-2015 - Risk Assessment, both outline similar, highly effective, standards for risk management. A few examples of key principles from the ISO standard 31000 (2009) are that risk management should:
Be part of the decision-making process.
Be transparent and inclusive.
Be dynamic, iterative, and responsive to change.
Be capable of continual improvement and enhancement.
Again, these are just a few snippets from the standard. The entire standard is voluminous and comprehensive and we’ll describe more from this risk standard and others in the course of this book to give you a road map showing how to use these fundamental principles of risk management and apply them to the security risks you are responsible for managing.
1.2 How is ESRM Different from Traditional Security?
The description of ESRM above may sound somewhat like what you and your security organization are already doing - and the fact is, you probably are already doing some parts of it.
So let’s take a look at what makes ESRM such a radical departure from traditional, conventional
security. To do that, we need a baseline understanding of what traditional security is - and what it is not.
These days, security practitioners are often too busy dealing with threats and vulnerabilities and other urgent operational problems to ask themselves basic questions about what they do and why they do it.
Questions like:
What is my role in the business environment, beyond the specific security tasks I’ve been assigned?
Why are the tasks I do every day necessary for the enterprise?
How is what I do perceived in the organization?
What is the mission my department is chartered to accomplish?
That’s a serious problem, because in security, as in every other business discipline, if you aren’t sure what you’re trying to accomplish - why you’re doing what you’re doing - you can’t be sure you’re doing it right. And, just as important, you can’t be sure that you’re being recognized by the management in your organization as doing it right.
1.2.1 Traditional Corporate Security Scenarios: Something is Missing
One thing we’ve learned in our years as security professionals is that there are a lot of different ways to do security.
Some are good, some are bad, most are a bit of both - and all can teach us something about how to do things better. We’ve talked to a lot of security managers and practitioners in our time, at conferences, seminars, and other industry events, and we’ve learned about a lot of different approaches to security. Here are just a few things we’ve heard about:
Security programs that seem to work successfully in their business environments, even though they’re run largely on instinct or experience rather than as formalized processes that could be extended into new areas.
Security practitioners who feel like outsiders in the enterprise, because they’re only called in when they’re needed
- when something’s gone wrong - not before.
Security managers who spend all their time performing tactical functions - responding to incidents, implementing password controls, installing and monitoring video or access systems - instead of developing strategies.
Security programs that fail because they don’t have the participation and support that they need from the rest of the enterprise.
Security managers who are blindsided
by security problems they weren’t even aware existed - but are still expected to take the blame for.
There’s a lot wrong here, and we’ll be talking throughout this book about exactly what makes these things wrong and what you, as the security practitioner, can do about it. But for now, we’d like to talk about one key component that’s missing from all these scenarios: consistency. In ESRM terms, consistency has two fundamental meanings:
Consistency in applying a security risk management philosophy to every part of the security function and to the thought processes applied to all security decision-making.
Consistency in how security roles and responsibilities are communicated to, and understood by, the internal strategic partners who are so critical to the success of an ESRM program.
Bringing consistency to your security program is essential to ensuring that all your stakeholders across the enterprise understand exactly what to expect from you as a security professional and from your security program, recognize and appreciate security’s roles in the enterprise and its business value, and rely on you and your team to perform your roles as trusted business partners.
Consistency is driven by:
Following known, documented, well communicated, practices.
Remembering the proper steps of all security activities and processes.
Always understanding the true role of the security professional as manager of security risk.
Incorporating that understanding and philosophy into your everyday thought processes as the security manager.
Consistency in your security program offers many benefits, but none is more important than earning the trust of the business. When your strategic partners in the enterprise can see that you perform all your security work in a consistent manner and treat all aspects of security risk with a consistent approach, they’ll understand that they can rely on you to practice your security discipline in a balanced way with their best interests in mind. This is a key advantage that practicing security in the ESRM model will bring.
1.3 What is ESRM? - A Closer Look
Let’s take a closer look at exactly what ESRM is, and what it means for you as a security practitioner, and for everyone else impacted by this world of new and rapidly changing risks we all live in. And let’s begin by building on the basic definition of ESRM that we’ve already offered:
Enterprise security risk management is the application of fundamental risk principles to manage all security risks - whether information, cyber, physical security, asset management, investigations, or business continuity - in a comprehensive, holistic, all-encompassing approach.
What does this mean in practice? It means that ESRM represents a fundamental change in the way enterprises - and organizations and individuals within those enterprises - conduct some of their most business-critical operations. That takes time, commitment, and above all a process: an ongoing life cycle.
The ESRM life cycle is similar to other risk management cycles that you may already be familiar with such as the following:
The International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) risk management cycle, for example, calls for risks to be identified, analyzed, treated, and monitored (2009).
The US Department of Commerce’s National Institute of Standards and Technology (NIST) outlines a risk cycle - specific to cybersecurity and information security - in its Guide for Conducting Risk Assessments (2012) that calls for assessing risk, responding to it, and monitoring the results.
The COBIT 5 model from the international professional association ISACA has a very similar implementation life cycle that includes recognizing needs (risks, in other words), defining desired state (planning mitigations) and monitoring outcomes (ongoing risk assessment).
As we’ve already explained, most of the basic, underlying concepts of ESRM are not new, and these other models have distinct similarities to ESRM. But the ESRM model has differences -differences that are critically important to security practitioners and to how they can run their security programs more effectively.
1.3.1 The Phases of the ESRM Life Cycle
In section 4 of this book, we’ll do a deep exploration of all of the phases of the ESRM life cycle, but let’s take a quick look at the model in Figure 1-1 to give you an idea of what we mean.
• Identify and prioritize assets:
Identifying, understanding, and prioritizing the assets of an organization that need protection.
Identify and prioritize risks: Identifying, understanding, and prioritizing the security threats the enterprise and its assets face - both existing and emerging - and, critically, the impacts and exposures associated with those threats.
Mitigate prioritized risks: Taking the necessary, appropriate, and realistic steps to protect against the most serious security threats and risks.
Improve and advance: Conducting incident response and review - learning from both successes and failures - and applying the lessons learned to advance the program.
This is a life cycle, but not necessarily a linear one. All of these functions are critical to protecting the enterprise - and all of them must be conducted simultaneously and on an ongoing basis. (That’s why they’re shown as a circle in our diagram.) Even more important, the ESRM life cycle requires ongoing commitment, not only from the security practitioner and the security organization, but also from stakeholders throughout the enterprise. It’s only with that commitment, and thorough, consistent application across the enterprise, that ESRM can deliver on its true promise to protect the business and its assets.
1.3.2 Managing Risk in a Life Cycle
Part of applying the ESRM model - and one of the ways it differs from other models - is that the cycle requires you, as a security practitioner, to manage security risks both proactively and reactively. ASIS International’s CSO Roundtable group (2015) published some of the earliest papers on the topic of ESRM, stressing this same idea that ESRM is:
Proactive - continuously assess the full scope of security-related risks to protected assets.
Reactive - respond to security incidents, mitigate the impact, and then assess residual risk to minimize exposure to recurrence, while learning how a risk may have changed and could affect the risk assessment progress and thinking all over again.
ESRM is a simple yet powerful management practice that enables the security professional to engage with the business, partner with the business, and guide the business through a comprehensive security risk management and security risk decision-making process. This enables the security professional and the strategic partner in the organization to work together to develop security strategy and accept risks that are acceptable to the business.
It’s almost impossible to overstate the importance of that last phrase: acceptable to the business. Security and risk decisions must always be fully aligned with the needs and the objectives of the business, so that the business - not the security organization - can make sound, informed security risk decisions. Security practitioners don’t always fully recognize that businesses need to take risks to be successful. ESRM principles can help the business take advantage of these risks, and can actually add real value to the business by doing so.
1.4 What ESRM Is - and What It Is Not
To truly succeed, every business function needs to fully understand why it exists and what it needs to do for the business it operates in, and security is no exception. (Make no mistake, security is a business function too, and your success depends on your recognizing that fact.) The ESRM philosophy provides a simple, effective way to frame the mission and goals of the security organization - for ourselves as security practitioners, for the people in our security organizations working to achieve those goals, and for business leaders. Let’s begin by defining them for our own purposes.
1.4.1 ESRM Mission and Goals
As we mentioned before, the CSO Roundtable published an early description of ESRM in 2015. In it, they offered a simple, actionable definition of these concepts:
The mission of ESRM is to identify, evaluate, and mitigate the impact of security risks to the business, with prioritized protective activities that enable the business to advance its overall mission.
The goals of ESRM are to engage with the business to establish organizational policies, standards, and procedures to identify and manage security risks to the enterprise.
There’s nothing terribly difficult for the security practitioner to understand about any of this. Essentially,