An information security program consists of documented policies, procedures, guidelines and standards to effectively manage security controls and ensure confidentiality, integrity and availability of data. Developing a security program requires understanding assets, risks, regulations and implementing people, processes and technologies like access management, incident response and monitoring. The key is to focus on the overall program, align it with business objectives, enforce policies, manage risk, apply layered defenses, establish a security culture and measure effectiveness.
An information security program consists of documented policies, procedures, guidelines and standards to effectively manage security controls and ensure confidentiality, integrity and availability of data. Developing a security program requires understanding assets, risks, regulations and implementing people, processes and technologies like access management, incident response and monitoring. The key is to focus on the overall program, align it with business objectives, enforce policies, manage risk, apply layered defenses, establish a security culture and measure effectiveness.
An information security program consists of documented policies, procedures, guidelines and standards to effectively manage security controls and ensure confidentiality, integrity and availability of data. Developing a security program requires understanding assets, risks, regulations and implementing people, processes and technologies like access management, incident response and monitoring. The key is to focus on the overall program, align it with business objectives, enforce policies, manage risk, apply layered defenses, establish a security culture and measure effectiveness.
An information security program consists of documented policies, procedures, guidelines and standards to effectively manage security controls and ensure confidentiality, integrity and availability of data. Developing a security program requires understanding assets, risks, regulations and implementing people, processes and technologies like access management, incident response and monitoring. The key is to focus on the overall program, align it with business objectives, enforce policies, manage risk, apply layered defenses, establish a security culture and measure effectiveness.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 41
Developing Security Program
Kuliah 6 Outline Culture is Essential in Securing the assets What is Information Security Program Infosec Elements How to Create Infosec Program Securing the Human
We want to build a solid team
Information Security Governance Before we start A blame culture encourages poor security A culture of blame and fear when it comes to security means end users won’t tell you if they are using an unsanctioned app, have clicked on a malicious link or have seen unusual activity until it’s too late Security teams should empower users with a culture of personal responsibility so that they treat data security in the same way they approach other company policies like health and safety. What would you do, if you get this message What it should be How it should be What is a Security Program? A security program is the entirety of an organization’s security policies, procedures, tools and controls Essentially, the security program is the full, multi- faceted security strategy and governance that protects the organization’s sensitive data and capabilities What is an Information Security Program? A security program is a documented set for organization’s information security policies, procedures, guidelines, and standards Your security program should provide a roadmap for effective security management practices and controls Having a strong security program helps your organization ensure the confidentiality, integrity, and availability of client and customer information, as well as the organization’s private data through effective security management practices and controls The Journey to Secure The design of a successful information security program typically takes a team of experts with a wide range of experience Ideally, that design should carefully consider the value of your data and systems, the threats they face (malware, ransomware, internal, Internet-based etc.), your budget, compliance or regulatory obligations, risk tolerance and a framework or standard of best practices in your industry Security Program Purpose A formalized security program provides a documented set for organization security policies, procedures, guidelines, and standards. Security programs are critical to proactively protecting data while maintaining compliance with best practice and regulatory requirements, as well as customer standards. Security Program Purpose Today, the risk and frequency of incidents and breaches are higher than ever before Breaches affect large numbers of financial organizations, healthcare organizations, public-sector entities, as well as organizations in any industry Effectively maintained and adaptable security programs both mitigate potential risks in an organization’s environment and can respond to incidents quickly. Why should we have Infosec Program A solid infosec program is an essential component of running a business in the digital age Without a security program, you leave your company, customers, and data at risk Security Program Posture Security Program Posture An organization's security posture (or cybersecurity posture) is the collective security status of all software, hardware, services, networks, information, vendors and service providers Your security posture encompasses information security (InfoSec), data security, network security, penetration testing, security awareness training to prevent social engineering attacks, vendor risk management, vulnerability management, data breach prevention and other security controls. Why is your security posture important? Your organization's security posture is important because it has an inverse relationship with cybersecurity risk. As your security posture improves, cybersecurity risk decreases. Cybersecurity risk is the probability of exposure or loss resulting from cyber attacks, data breaches and other cyber threats. A more encompassing definition is the potential loss or harm to an IT infrastructure's or IT asset's confidentiality, integrity or availability Know the regulations / laws These regulations often outline what data must be protected (personally identifiable information, protected health information and sensitive data) and suggest security controls, e.g. encryption, access control or the principle of least privilege. Laws Related to Security (assignment) Reducing cybersecurity risk and ensuring data privacy is now more important than ever before driven by general data protection laws like GDPR, LGPD, PIPEDA and CCPA, as well as industry specific regulation like GLBA, FISMA, CPS 234, the NYDFS Cybersecurity Regulation and HIPAA
Hack for kids
NSA FOR KIDS How to determine your security posture Cybersecurity risk assessments allow security professionals to understand what data you have, what infrastructure you have and the value of the assets you are trying to protect. Common questions asked during security assessments include: • What data do we collect? • How and where are we storing this data? • How do we protect and document the data? • How long do we keep data? • Who has access internally and externally to the data? • Is the place we are storing the data properly secured? Assessment Parameters Parameters for the assessment by asking the following questions: • What is the purpose of the assessment? • What is the scope of the assessment? • Are there any priorities or constraints I should be aware of that could affect the assessment? • Who do I need access to get the information I need? • What risk methodology is used for risk analysis? Measure Cyber Risk Point in time security assessments are expensive, static and subjective while the number of cybercrimes is increasing in raw numbers, sophistication and impact Security ratings provide real-time, non-intrusive measurement of your organization's security posture allowing your security team to continuously monitor for security issues and instantly understand your most at risk assets Security ratings are a quantitative measurement of your organization's security posture, just like how a credit rating measures lending quality. As your organization's security rating improves so too does your security posture By using security ratings, you can greatly increase your organization's ability to meet and maintain compliance with regulation while meeting business objective The Lifecycle of a Security Program Discovery ◦ The first step is understanding what you have, what you need and what you need to protect ◦ Risk assessments, gap analyses, security testing are all helpful in this initial planning phase to understand your next steps, accurate resource allocation and budgets going forward Development ◦ With a full plan in place, a team can begin building your security controls, implementing cybersecurity technology or tools and writing your policies and procedures Operation/Business as Usual ◦ Once your security program is in place and fully functioning, your data, systems and users will be protected by a robust system for mitigating risks, alerting your team to threats and preventing breaches that put your business at risk The Lifecycle of a Security Program • Plan and organize • Implement • Operate and maintain • Monitor and evaluate Why Life Cycle • Written policies and procedures that are not mapped to and supported by security activities • Severe disconnect and confusion between the different individuals throughout the organization attempting to protect company assets • To assess progress and ROI of spending and resource allocation • Understand the security program deficiencies and having a standardized way of improving upon the deficiencies • No assurance of compliance to regulations, laws or policies • Not relying fully on technology as all security solutions • Patchwork of point solutions and no holistic enterprise solution Developing InfoSec Program Developing an Information Security Program requires a well-structured plan that should include people, processes, and technology Information security focuses on the protection of information and information assets Focusing on key concepts such as Confidentiality, Availability, Integrity, Privacy, Authentication, Authorization and Availability Developing InfoSec Program These concepts depend on the design, development, implementation and management of technological solutions and processes Information security requires strategic, tactical, and operational planning In order to support these plans, a set of components such as: ◦ prevention and detection mechanisms, ◦ access management, ◦ incident response, ◦ privacy and compliance, ◦ risk management, ◦ audit and monitoring, and ◦ business continuity planning, are often the key to a successful security program Developing InfoSec Program Developing an infosec program could be an overwhelming task as it requires support, resources, and time Building a strong and sustainable infosec program requires having the right talent and tools Partnering with a security solutions service provider will help us ensure the proper execution of your strategic goals In most cases, seasoned information security professionals have vast experience successfully developing and implementing security programs to strengthen an organization’s security posture The key components to successfully implementing 1. Focus on the Information Security Program as a whole 2. Align your security program with your organization’s mission and business objectives 3. Implement meaningful and enforceable infosec policies and procedures 4. Develop a security risk management program 5. Apply defense-in-depth measures: Assess the security controls to identify and manage risk 6. Establish a culture of security: Develop a sound Security Awareness program 7. Measure your Information Security Program by developing meaningful metrics 8. Develop and implement an Incident Response Plan: Train your staff and test your plan periodically 9. Continuous monitor: Deploy tools and solutions to monitor your infrastructure 10. Review your plan at least annually: Anticipate, innovate, and adapt Infosec programs need to: • Establish a benchmark for security • Measure against that benchmark • Enable informed decision making • Support the execution of decisions. Security Education, Training, and Awareness (SETA) • Improving employees' security related behavior
• Informing employees where to report violations and
incidents
• Enabling the organization to hold employees
accountable for their actions Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program Organizations have invested a tremendous amount of money and resources into securing technology, but little if anything into securing their workforce. As a result, people, not technology, have become the most common target for cyber attackers. The most effective way to secure the human element is to establish a high-impact security awareness program that ◦ goes beyond just compliance and changes behaviors and ultimately creates a secure culture. We should • Identify the maturity level of your existing awareness program and the steps to take it to the next level • Differentiate between awareness, education and training • Differentiate variables of risk and how they apply to managing human risk and security awareness training • People are vulnerable and how cyber attackers are actively exploiting these vulnerabilities • Gain and maintain long-term leadership support for your program • Identify the different targets of your awareness program • Characterize the culture of your organization and determine the most effective communication methods for that culture • Identify, measure and prioritize your human risks • Design and implement key metrics to measure the impact of each stage of your awareness program, to include measuring compliance, behaviors and culture Security Awareness Training It is the process of providing formal security education to the users / employees about a variety of information security threats and the company’s policies and procedures for addressing them Topics covered in security awareness training often expand beyond the digital world and discuss physical security and how employees can keep themselves and loved ones secure (security culture) Such training can take a variety of forms but is most often presented in an online or computer-based format How Should Training Be Approached? The mission of a good training program should be providing concise, actionable, and memorable advice about how to reduce risks related to cybersecurity and information technology, whether digital or physical Security skills developed on the job will also carry over into better cyber hygiene habits at home or if working remote from elsewhere
Annual Employee Awareness Training Is Not Enough
Infosec Program Posture Defensive: defend Infosys from potential or active attacks Management: manage day by day security operations Offensive: assess for threats and vulnerabilities Infosec Position Infosec analyst Infosec officer Infosec engineer, etc. We need people who can do the job and can get along with others We not need people with only hard skill, but we want them to have written and verbal communication skills, problem solving skills with ethic as important attributes We are strong together Videos The Cyber Skills Gap | Chris Silvers | TEDxElonUniversity – YouTube Security Program Elements – YouTube Securing The Human - YouTube Quote Learn how to learn Quote “We discovered in our research that insider threats are not viewed as seriously as external threats, like a cyberattack. But when companies had an insider threat, in general, they were much more costly than external incidents. This was largely because the insider that is smart has the skills to hide the crime, for months, for years, sometimes forever." — Dr. Larry Ponemon, Chairman, Ponemon Institute, at SecureWorld Boston