Data-Driven Security

18
Data-Driven Security The Key to Determining What Works – and What Doesn’t

Transcript of Data-Driven Security

Page 1: Data-Driven Security

Data-Driven SecurityThe Key to Determining What Works

– and What Doesn’t

Page 2: Data-Driven Security

Who We Are

• Specialty non-profit academic pediatric institution

• 371 licensed beds• $2 billion annual revenue• Seattle Children’s Research

Institute - #5 in NIH pediatric funding

Page 3: Data-Driven Security

Who We Are Not

• In the business of information security

• Flush with resources• Security is waste

Page 4: Data-Driven Security

How Information Security Management is Typically

Performed

• Compliance-driven static checklists

• “Best Practices”• Crisis-driven culture that lauds

breakers over builders

Page 5: Data-Driven Security

We Know A Better Way

• Apply scientific rigor to security risk management

• Provide decision makers with credible information

“…the conscientious, explicit, and judicious use of current best evidence in making decisions about the care of individual patients” – Sacket, et all.

Page 6: Data-Driven Security

What is Data-Driven Security?

Domain Expertise

Data Management Programming Statistics Visualization

Page 7: Data-Driven Security

Framing the Question

• Identify stakeholders• Clarify problem to solve• Understand constraints and

limitations• Identify resources available

Page 8: Data-Driven Security

Performing the Analysis

• Open methodology• Search for insight vs. The Truth™

Page 9: Data-Driven Security

Presenting the Results

• First principles – Do No Harm• Understand and Communicate the

Story• The “So What” moment

Page 10: Data-Driven Security

Applied Examples

Vulnpryer Atlas Evaluator

Page 11: Data-Driven Security

Vulnpryer

• Vulnerability Prioritization• “Patch This Before That”• Tailored to our threat model

Open Source!https://github.com/SCH-CISM/vulnpryer

Page 12: Data-Driven Security

Atlas

• Source of truth for application risk• FAIR-based application risk

assessment• Enables prioritization across

• Team• Directorate• Departmental

• Both strategic and tactical

Page 13: Data-Driven Security

Evaluator

• Program level security risk assessment

• FAIR-based strategic risk assessment

• Combines• Expert opinion• Real world data• Statistical sampling

Page 14: Data-Driven Security
Page 15: Data-Driven Security

Outcomes

• Improved response capabilities• Standardized conversations on risk• Prioritized resource allocation• Reduced work on non-productive

activities

Page 16: Data-Driven Security

How to Get Started

• Identify your pain points• Formulate the question• Create a hypothesis• Gather data• Test your hypothesis• Act with your increased knowledge!

Page 17: Data-Driven Security

David F. SeverskiSeattle Children’s

@DSeverski

Page 18: Data-Driven Security

References

Internal• CPI and Lean efforts• Biostatisticians

External• The New School of Information Security• Visualization Workshops• Stephen Few, Perceptual Edge

• Data-Driven Security• The Book!• The Podcast!

• How to Measure Anything & The Failure of Risk Management