Managing an Information Security Program in a...

26
Managing an Information Security Program in a Difficult Market Dealing with Trends and Facing Reality Anish Bhimani ª 2008 JPMorgan Chase & Co. All Rights Reserved. CONFIDENTIAL AND PROPRIETARY TO JPMORGAN CHASE & CO.

Transcript of Managing an Information Security Program in a...

Page 1: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

Managing an Information Security Program in a Difficult Market

Dealing with Trends and Facing Reality

Anish Bhimani

2008 JPMorgan Chase & Co. All Rights Reserved.

CONFIDENTIAL AND PROPRIETARYTO JPMORGAN CHASE & CO.

Page 2: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

Major Trends 2008-2009

• Increased Regulatory Scrutiny• Increased focus of attacks on specific targets• Increased media awareness about privacy and

threats to reputational risk• The “extended enterprise”• The evolution of “security” into risk

management

Page 3: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

Major Trends 2008-2009

• Increased Regulatory Scrutiny• Increased focus of attacks on specific targets• Increased media awareness about privacy and

threats to reputational risk• The “extended enterprise”• The evolution of “security” into risk

management

•…And a rapidly changing market and financial landscape

Page 4: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

A Dose of Reality

• Financial realities have changes• Increasing push to rationalize IT spend

• How to balance the need to reduce risk with the need to be fiscally responsible?

• In good times as well as in bad0

20

40

60

80

100

120

140

2005 2006 2007 2008 20090

100

200

300

400

500

600

700

800

Page 5: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

Striking the Right BalancePRODUCTIVITY

QUALITY

CONTROLS

•Efficient Operations•Location Strategy•Automation•Investment Prioritization

•Regulatory Compliance•Privacy / Reputational Risk•Identity & Access Management•3rd party risk / extended enterprise•Linkage with Business Controls

•Service Delivery•Instrumentation•Customer/Channel Impact

Page 6: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

Driving Productivity in IT Security

• Overall security budgets are going down, but security investments are going up

• Greater spend does not necessarily equal more security

• Spend less on security without compromising controls

Page 7: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

Driving Productivity in IT Security

• Practice zero-based budgeting• Get more efficient with operations• Prioritize risk projects• “Fix the plumbing” – eliminate variance• Leverage a small set of meaningful metrics

Page 8: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

Productivity: Automate and streamline the commodities

• Apply the same rigor to security operations that we do to general IT Operations• Strong operational metrics and audit trails• Standardization and globalization of processes• Ruthless focus on efficiency

• Must take the time to use what we’ve deployed to enable smart risk-based decisions• Provide data to the people that can action it, and make an

informed decision

• Areas of focus: Identity & Access Mgmt, Security Information Mgmt, Vulnerability Mgmt

Page 9: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

Productivity: Prioritizing Risk Projects

• You can’t do everything

• Focus on manageable, bite-size chunks

• Prioritize based on value-added and achievability

Ris

k R

educ

tion

Achievability

Achievability / Impact Quadrant

(ILLUSTRATIVE ONLY)

Low High

High

Encryption

Virus Management

Monitoring Service (Perimeter)

Remote Computing

Awareness

Information Owner Identification

Secure Perimeter Infrastructure

VulnerabilityManagement

Infrastructure Secure Builds

Change Event Management

Source Code Management

ID Admin Tools & Processes

ID Recertification (Application)

ID Recertification (Platform)

Infrastructure Monitoring Solutions

Privileged Access Control (Infra.)

Privileged Access Control (App)

Environment Separation

Monitoring Service (Internal)

OSP Review

Infrastructure Logical Access Solutions

Application Development

Data Privacy

Page 10: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

Productivity: Fix the Plumbing

“90% of vision is execution, and 90% of execution is communication.”- Ed Miller, President, AXA Financial

• How many server builds are there in the company?

• How many users with local admin rights?• Are those controls really deployed to 100% of

the environment?

Page 11: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

Productivity: Leverage Meaningful Metrics

• Metrics can provide great visibility into core successes, issues, and an organization’s risk posture

• “What gets measured, gets done.”- W. Edwards Deming

• But they can also be completely misused and misinterpreted

• “I think the reason many people drift away from baseball is that you have to realize that a great portion of the sport’s traditional knowledge is hokum.”

- Bill James, quoted in Moneyball

Page 12: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

Productivity: Leverage Meaningful Metrics

• Avoid the perils and pitfalls of metrics• Pitfall #1: Measuring the wrong thing• Pitfall #2: Not understanding the audience• Pitfall #3: Aggregating too much data• Pitfall #4: Artificial Accuracy• Pitfall #5: Ascribing the wrong message• Pitfall #6: Over-report, underdeliver

Page 13: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

Risk Area Major Initiative

• Regulatory Scrutiny• Increasingly Targeted

Attacks• Privacy & Reputational

Risk

• Identity & Access Management

• “Extended Enterprise”

• Evolution of Security into Risk Management

• Automated Compliance• Change in Protection

Models• Data Management and

Risk Avoidance• Automation & Role-

based Access• “Virtual Desktop” and

3rd party assessments• Linkage with other risk

disciplines

Areas of Focus for 2008

Page 14: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#1: Increased Regulatory Scrutiny

• The past few years have seen an increase in regulations and compliance requirements

• Gramm-Leach-Bliley compliance• FFIEC Guidance on Authentication• Interagency White Paper• Breach notification statutes• Sarbanes-Oxley

• This has required more rigor of existing programs

Page 15: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#1: Increasing Regulatory Scrutiny

• Moving from manual assessments to “continuous assessment”, automating where possible

BUSINESS INITIATIVES

CONTROLS

ASSESSABLE ENTITIES

TOOLS

RISK SCORE

Page 16: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#2: Increased Focus of AttacksD

amag

eBreadth of impact

Viruses

(1990 – present)

Worms

(2000 – present)

Phishing & Pharming

(2003 – present)

Spearphishing &Spyware

(2006)

Page 17: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#3: Privacy and Reputational Risk

§ Cover all data, initial focus on PII§ Balance reduction in risk and

achievability§ Slow down the velocity of

leakage of confidential data§ Combination of awareness,

technology, and process controls

Data Protection Initiative

When data leaves the firm

When data is on portable media

When data is widely available

Area

s of

Foc

us

Page 18: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#3: Privacy and Reputational Risk (cont’d)

• Prioritize efforts based on reducing potential “velocity” of data leakage

• Migration to tapeless backup • Core-to-Bunker, Remote-to-Core

• Controls on portable devices• Laptop encryption• Removable media controls

• Filtering of Personably Identifiable Information (PII)• Email, FTP, HTTP filtering at gateways• Discovery of PII on fileshares

• Application PII remediation

Page 19: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#4: Identity & Access Management

• Majority of SOX findings across the industry are in this space

• Privileged access• Access certification• Offboarding / Transfers

• Significant employee impact• Onboarding• General provisioning• Complicated and not well-understood

• Is it an operations group or a security group?

Page 20: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#4: Identity & Access Management (cont’d)

Component LevelAccess Request

Role Level Access Request

Rule Driven Access (No Request Required)

Low High

Low

Hig

h

ScalabilityCost Saving

Ease

of

Use

Audi

tabi

lity

Component Level Access Request With Links To Automation

Page 21: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#5: The Extended Enterprise

• Companies have become hopelessly “entangled”

• “Deperimeterization” of the corporate network• The rise of the Outside Service Provider

• Third-party dependencies abound • Most large organizations have Outside Service

Provider (OSP) programs• Focused on assessments and contractual clauses

• Re-evaluate “network-centric” security• Need to migrate to application- and data-centric

views

Page 22: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#5: The Extended Enterprise (cont’d)

• Trend towards alternative desktops• Don’t assume a Windows-based PC• “Anywhere Access”

• Increasingly mobile workforce• Access from non-corporate PCs• BC/DR support for power users

• “Ad hoc” connections• Shared suppliers

Page 23: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#6: The Evolution of “Security”Into Risk Management

You want a valve that doesn’t leak, and you do everything possible to try to develop one. But the real world provides you with a leaky valve. You have to determine how much leaking you can tolerate.”

- Arthur Rudolph, creator of the Saturn V rocket.

Page 24: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#6: The Evolution of “Security” Into Risk Management (cont’d)

• Need to align with other, more visible firmwide programs• Operational Risk• Regulatory Compliance• Demand Management and Metrics• Partnership with IT Audit• LOB presence and execution is a must

Page 25: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#6: The Evolution of “Security” Into Risk Management

• 2004 view:• We’re headed for a schism

• Engineering and Operations will move into IT• Policy and Strategy will remain separate

• Job will split between Risk Management and IT• CISO role will morph into a “deputy risk

manager”• Focus on maturing the discipline of IT Risk

Page 26: Managing an Information Security Program in a …cdn.ttgtmedia.com/searchFinancialSecurity/downloads/...deployed to enable smart risk-based decisions • Provide data to the people

#6: The Evolution of “Security” Into Risk Management

• 2008 view:• The schism has happened• IT security has “grown up” – seat at the table• Must apply traditional IT management rigor in order

to be given the chance to succeed at executing strategy

“If you don’t like change, you’ll like irrelevance even less”• Tom Peters