Build A Security Roadmap
Build A Security Roadmap
Presented by
Introduction
Carlos Rivera
Principal Research
Advisor, Security &
Privacy
Isabelle Hertanto
Principal Research While easy to develop, security plans blindly
Director, Security &
Privacy following best practices are unlikely to win over
many stakeholders. To be truly successful, an
information security strategy needs to be
holistic, risk-aware, and business-aligned.
Cameron Smith
Research Lead,
Security & Privacy
• The cost of a breach is higher The shift to remote work exposes organizations to
when remote work is involved. more costly cyber incidents than ever before.
• Prioritize gap-closing initiatives to create a • Let Info-Tech do the work for you. With completed deliverables, have
living security strategy roadmap.
tangible documents to convey your business needs.
• Pivot and change prioritization to meet the needs of your security deficits.
Info-Tech Research Group 7
Do you have a security strategy?
Info-Tech’s approach
Governance
ISO Leadership Culture Direction and Review
27000 Information Security Security Culture and Security Risk Security Compliance
Program Awareness Management Management
series
Organizational Structure Security Policies Security Audit
CIS Critical
Controls Security Prevention
Management
Malicious Code Vendor Risk
Data Security & Privacy Physical Security
Protection Management
NIST 800-
53 Application Security Cloud Security
Security
Target
Alignment Time Frame
Maturity
Goals
Maturity Security
Model Framework
Prioritization
Initiative List Task List Gantt Chart
Methodology
Current
2.1
OPTIMIZED 05
An optimized security
MANAGED 04 program is based on
Managed security strong risk
DEFINED 03 programs have robust management practices,
A defined security governance and including the
DEVELOPING 02 program is holistic, metrics processes. production of key risk
Developing security documented, and Management and indicators (KRIs).
AD HOC 01 programs can be proactive. At least board-level metrics for Individual security
Initial/ad hoc security effective at what they some governance is in the overall program are services are optimized
programs are reactive. do but are not holistic. place, however, metrics produced. These are using key performance
Lacking strategic Governance is largely are often rudimentary reviewed by business indicators (KPIs) that
vision, these programs absent. These and operational in leaders and drive continually measure
are less effective and programs tend to rely nature. These security decisions. service effectiveness
less responsive to the on the talents of programs still often rely More mature risk and efficiency.
needs of the business. individuals rather than on best practices rather management practices
a cohesive plan. than strong risk take the place of best
management. practices.
Roadmap Execution Waves
Security initiatives are prioritized and assigned to execution waves, as described below.
These waves are then mapped into a Gantt chart to create the security roadmap.
WAVE 0
“In flight” initiatives; projects already in process
3
WAVE 1
“Must do” initiatives; quick wins and foundational
priorities
WAVE 2 2
“Should do” initiatives; strategic priorities
WAVE 3 1
“Could do” initiatives; lower value or higher cost
WAVE 4 0
“Won’t do” initiatives; costs outweigh benefits
How do we prioritize
our initiatives?
Top Security Priorities and Constraints 2022
Survey results
Survey respondents were asked to force-rank their security Talent management is both the #1 priority and the top
priorities. obstacle facing security leaders in 2022.
Among the priorities chosen most frequently as #1 were Unsurprisingly, the ever-changing environment in a world
talent management, addressing ransomware threats, and emerging from a pandemic and budget constraints are
securing hybrid/remote work. also top obstacles.
This step is important to understand how the initiative supports the business goals 1
identified earlier.
Define costing criteria
1. On the Setup tab of the Information Security Gap Analysis Tool, 1 2
enter high, medium, and low ranges for initial and ongoing
costs and efforts.
a) Initial costs are one-time, upfront capital investments
(e.g. hardware and software costs, project-based
consulting fees, training).
b) Ongoing cost is any annually recurring operating
expenses that are new budgetary costs (e.g. licensing,
maintenance, subscription fees).
c) Initial staffing in hours is total time in person hours
required to complete a project. It is not total elapsed
time but dedicated time. Consider time required to Make sure that your ranges allow for differentiation between
gather requirements and to design, test, and implement initiatives to enable prioritization. For instance, if you set your
the solution. ranges too low, all your initiatives will be assessed as high cost,
providing no help when you must prioritize them.
d) Ongoing staffing in FTEs is the ongoing average effort
required to support that initiative after implementation.
2. In addition to ranges, provide an average for each. These will
be used to calculate estimated total costs for the roadmap.
Define benefits criteria
1
1. On the Setup tab of the Information Security Gap Analysis
Tool, enter high, medium, and low values for the Alignment
with Business Benefit.
If you change these values, you may need to override the Some organizations prefer to use the “Security Benefit” criteria to
calculated values in the prioritization tab. demonstrate how well each initiative supports specific
2. Enter a high, medium, and low value for the Security Benefit. compliance goals.
If you have actual costs available, you can optionally enter them under the Detailed Cost Estimates columns.
2. Enter the estimated benefits, also using the criteria defined earlier.
The Alignment with Business benefit will be automatically populated, but you can override this value using the drop-
down list if desired.
1 2
Assign initiatives to
execution waves 01 MUST DO 02 SHOULD DO
1. Using sticky flip chart sheets, create four sheets and label them
according to the four execution waves:
This will allow you more granular control over the final 1 2
prioritization, especially where dependencies require extra
granularity.
Thank You!
Please tell us what you think on
the Info-Tech LIVE mobile app