© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Stop looking for the silver bullet, start thinking like a bad guyJames Blake CISSP CISM CCSK GCIH ITIL-F Lead Auditor Practice Manager EMEAHP Security Intelligence & Operations Consulting
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2
HP Security Intelligence & Operations ConsultingThe best in the world at building state of the art Security Operations Capabilities / Cyber Defense programs since 2009.
Experience:• 47+ SOC Builds• 130+ SOC Assessments & Improvement Roadmaps• 55+ SIOC Consultants worldwide• Over 275 years of cumulative SOC experience
Solution Approach: • Business/Risk Alignment People, Process, & Technology
Accelerated Success: • Mature Project Methodology• Best Practices• Extensive Intellectual Capital
OperationalExcellence
Risk Alignment
Controls monitoring
Staffing & Training
App monitoringAnalytics
Processes & Procedures
App
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3
Security Operations Maturity Assessment
168Business alignment
People
Process
Technology Roadmap
118assessments
87companies
18countries
6continents
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4
State of Security Operations 2015 At-a-GlanceAverage SOC CMMI Level
1.5520%SOCs failing to achieve minimum monitoring capabilities
Telecom
TechnologyMost mature vertical
Least mature vertical
87%SOCs not achieving recommended
maturity level
#1 Problem Finding and retaining staff
Sharing of threat intelligence
Most effective reporting line for SOCs
Legal or GRCCloud Use Cases entering SOC
Mentoring & On-the-Job training more effective than certification
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.19
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.22
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.23
Risk Management
Business Enablement
Technical Architecture
Operational Excellence
The CISO Agenda – Are you operating in all four?
12
• Intellectual Property Protection• Insider Threats• Consumerization of IT• Business Continuity *
• Mergers, Sourcing and Workforce Changes* • Support for Rapidly Changing Business • Need for Improved Business Intelligence • Building Robust Continuity Plans• Deliver First & Best (Products & Services)• Focus on New Revenue Streams• Agile development *
• Vendor and 3rd Party Management • Executive Reporting and Metrics • Asset and Configuration Management• Awareness and Training• App, Infrastructure & Code Review• Executing on Fortify
• “Cloud” Computing• Data Loss Prevention• SIEM Platforms & Programs• Disaster recovery• Emerging Technologies
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.24
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.25
Cyber Security & Resilience
Current Trends: Not “If”... “When”
Controls
>90% Breaches
Avoidable
Patch, OS, AV, Identity, Monitoring
HygieneAPT APT
Low/ModerateHigh HighResource
Evolution of Cyber Threat
Hacktivist Motivation: Disruptive
Criminal Motivation: Financial
Year 2000 Year 2014
Espionage Motivation: IP Theft
Industry Threat Mitigation
Finding a balance between Security Hygiene & Threats
19
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.26
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.27
0 1 2 3 4 5
Governance
Plan & Budget
Organization
Controls
Awareness
Process
Engineering
Current
Program Area Maturity Levels
Target
Threat Management
Response
Risk Assessment
Illustrative: Not Actual Data
Program Benchmarks
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.28
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.29
Our Service Line View
Aligning our business to deliver a seamless and connected customer experience
Risk Management
Threat and Vulnerability Management
Access Management
Corporate Security and Risk Incident Management
ISRM Monitoring
11
Top Related