SlideShare a Scribd company logo
#RSAC
SESSION ID:SESSION ID:
#RSAC
John Pescatore
CXO-T11 - Briefing the Board: Lessons
Learned from CISOs and Directors
CXO-T11
Director, Emerging Security Trends
SANS Institute
@john_pescatore
Alan Paller
Research Director
SANS Institute
#RSAC
“Obviously, some people here
do not appreciate the gravity
of our situation.”
#RSAC
Measuring the Right Things –
Having Something Business
Relevant to Say to the Board
John Pescatore, SANS
#RSAC
Driving Security Change By Communicating Upwards
We mostly know what to do in security,
and we can learn how to do our part.
The biggest obstacle to success is getting
others to do their part.
Support from above is the most powerful
force to break through.
Goal: Learn how to inform CEOs and
Boards and convince them to back
strategies to drive change.
#RSAC
What (Actually) Works?
Separate the hype from the reality of
briefing the board
John and Alan’s centuries years of
experience
Discussions with Directors and CISOs
Sessions in Scottsdale AZ, San Diego,
Washington DC (2)
#RSAC
Why Do Some Do Better Than Others?
980 breaches in 2016
What did the other 9,020 of the F10000 do
differently?
(781 in 2015)
On average, 36K records exposed per
breach
What did those who limited breach size do
differently?
(Average = 215K in 2015)
Almost invariably, the organizations with
the least cyber incident impact have the
strongest CISOs and security teams.
Source: Identity Theft Resource Center
#RSAC
Characteristics of Cybersecurity Success
Understand vulnerabilities and threats – critical table stakes
Know demands of particular industry/vertical/organization
Balancing demands
Reduce threat impact to business
Reduce security impact to business
Ability to effectively communicate and drive action
Within the team
Across the organization
Upwards
Measurable results, connecting action to change to business benefit.
#RSAC
Shellye Archambeau
Director Verizon,
Nordstrom
Steve Martino
VP CISO Cisco
Kim Jones
CISO Vantiv
Gary Hayslip
CISO City of San Diego
Jason Callahan
CISO Illumina
#RSAC
Nick Fick
Director Dartmouth
University
Suzanne Vautrinot
Director Wells Fargo,
Symantec
Josh Davis
Qualcomm
#RSAC
REPLACESLIDE
#RSAC
Avoiding the same old noise…
#RSAC
Focus on protecting the
business first
Effectively and efficiently
and quickly
Make sure the solution isn’t
worse than the problem
Business benefits, not
security features
Is it Safe Enough for Us to
Self-insure?
#RSAC
Useful Security Metrics Can:
Drive change
Increase efficiency
Increase effectiveness
Give Warning
Action Required
Investment Required
Demonstrate Value
Compete for funds
Motivate workforce
Give the clueless a busy box
#RSAC
Delivering Security Efficiency and Effectiveness
Decrease the cost of dealing with
known threats
Decrease the impact of residual risks
Decrease the cost of demonstrating
compliance
Reduce business damage due to
security failures
Maintaining level of protection with
less EBITDA impact
Increase the speed of dealing with a
new threat or technology
Decrease the time required to secure
a new business application, partner,
supplier
Reducing incident cost
Less down time
Fewer customer defections Security as
a competitive business factor
Efficiency Effectiveness
#RSAC
Steve Martino, VP InfoSec, Cisco
#RSAC
Sources of Examples
#RSAC
Some Real World Examples
Healthcare – Building Security in Maturity Model (BSIMM) increase in
secure app dev life cycle reduced time to market for new app by 30%
and reduced software development costs by 15%
Higher Ed - Intrusion Detection Rate increased 46%, corrective actions
costs decreased 35%
Financial – reduced PC reimaging due to malware from 4 per week to
1 every 3 months, and will enable the use free of AV on desktops
Services – firewall policy management tools enabled existing staff to
reduced new connectivity approval from 2 weeks to 1 day.
#RSAC
Source: Kim Jones, Vantiv CISO at SANS Scottsdale AZ CISO Hot Topics Session
#RSAC
Alan Paller
The SANS Institute
paller@sans.org
AUGUST 2016, WASHINGTON, DC
Copyright 2016. SANS Institute
So You Just Got Invited To Brief the
Board of directors on Security
#RSAC
The Situation
The CIO emails the CISO saying that Board of Directors
is meeting next week; they want to be briefed on
cybersecurity. You, the CISO, are on the agenda.
A big opportunity? Perhaps.
A high risk moment? Most certainly.
#RSAC
In Their Own Words
Shellye Archambeau
Member of the Board of Directors of
Verizon
Arbitron
Nordstrom
CEO of MetricStream
Answers the questions:
What does the board want to hear in your briefing,
and what defines success for you?
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
Examples of BAD Slides ACTUALLY USED
IN A FEDERAL Executive BOARD BRIEFING
#RSAC
Agency IT Risk Management (AITRM) Program
ISCM is a risk-based strategy to maintain ongoing awareness
of information security, vulnerabilities, and threats to support
organizational risk management decisions.
Agency’s ISCM Strategy organizes the tools, processes, and
information enabled by CDM and RISCS for an effective risk
management framework.
Section I: Agency Cybersecurity Program Updates
In FY15, Agency updated its ISCM Strategy to align with
new risk management projects and to reinforce an
enterprise solution
Agency ISCM Strategy is 100% compliant with NIST
ISCM and ongoing authorization guidance
As the Agency IT Risk Management program matures,
Agency will revise its ISCM Concept of Operations
#RSAC
Agency IT Risk Management (AITRM) Program
AITRM integrates technical capabilities, reporting
requirements, management processes, and the roles and
responsibilities essential to mitigating risk, improving risk
posture, and enabling risk-based decision making.
AITRM Program integrates risk information from multiple
sources to enable an Agency-level, multi-tiered risk
management approach:
Section I: Agency Cybersecurity Program Updates
CDM tools
RISCS modules
SOC Incident Management System data
Federal compliance metrics (e.g. FISMA)
IT Security Awareness & Training Center
(ITSATC) compliance data
#RSAC
Four CISOs Who Found Effective Paths
Approaches that have worked:
#RSAC
CISO 1: Board Briefing
Plus:
1) FBI Director to validate the
immediacy of the risk
2) CISO of a well known industry
leader as a benchmark
Validated metrics of software security
#RSAC
CISO 2: Top Management Update
Continuous quarterly gap analysis vs the 20 Critical Controls
Critical control category
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
QW
Level 2
Level 3
Level 4
Compliant
Compliant In Spirit
Work in Progress
Not appropriate for our culture
Gap with no current plan
Plus: Continuous:
1) Mean time to
Detect Incidents”
and “Mean time to
Contain Incidents
2) 4 key automated
vulnerability
metrics – rolled up
quarterly
#RSAC
CISO 3: Reporting to Cabinet Secretary & Congress
90% risk reduction
over 12 months
0.0
200.0
400.0
600.0
800.0
1,000.0
1,200.0
6/1/2008 7/21/2008 9/9/2008 10/29/2008 12/18/2008 2/6/2009 3/28/2009 5/17/2009 7/6/2009 8/25/2009
Domestic Sites Foreign Sites
89%
Reduction
90%
Reduction
#RSAC
To be credible to management, metrics must be
“authoritative and important and reliably measured”
How can you prove your metrics are authoritative
and important (and reliably measured)?
“Offense informs defense!”
The big idea:
#RSAC
Who Understands Offense?
Would they be willing to combine their knowledge of attacks
and offense to define the most important defensive
investments CIOs must make to block all known attacks?
NSA Red Teams
NSA Blue Teams
DoD Cyber Crime Center (DC3)
US-CERT
Top Commercial Pen Testers
Top Forensics Teams
JTF-GNO
Air Force OSI
Army Research Lab.
Dept. of Energy National Laboratories
Sandia
Los Alamos
#RSAC
CISO 4: Major Utility
Let’s start with the results:
The Chairman of the Board told the CIO: “That’s
the first time a security person has made sense.”
And then he made the CISO’s budget “base”
meaning it is funded automatically just like
emergency power line repairs.
#RSAC
20 Critical Security Controls
Sample Red/Yellow/Green Metric
1 2
3
4
5
6
7
8
9
101112
13
14
15
16
17
18
19
20
Protection From the Most Likely Attack Vectors
Prevention
Detection & Response
Identity, Access, Governance & Architecture
#RSAC
Auditor Buy-in
ONE More benefit from using the
validated critical controls
#RSAC
Summary
CISO’s perspective doesn’t necessarily match
the Board of Directors’ perspective
What do I need to do? How much is enough? Whom can I trust
to answer those questions?
What seems to work:
Externally validated, prioritized framework (the Critical
Controls) with a 3-year plan
Continuously showing improvement in important metric
#RSAC
When You Get Back to Work
Make sure you are collecting the right security metrics so you can demonstrate
value, improvement, danger – and connection to business goals.
Take advantage of any transitions coming:
Moving to Windows 10, cloud services, mobile apps, agile dev, etc.
M&A, re-org, new C-level management.
Audit results
Prioritize by business impact – shoot for a near term win.
Change something!
Communicate upwards.
Successes
Strategic Obstacles
Recommendations
#RSAC
Resources
SANS What Works: https://www.sans.org/critical-security-controls/case-studies
CIS Critical Security Controls: https://www.cisecurity.org/critical-controls.cfm
By three methods we may learn Wisdom:
1. By reflection, which is noblest
2. By imitation, which is easiest
3. By experience, which is the bitterest
– Confucius

More Related Content

PPTX
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
PDF
Introduction to Cybersecurity
Krutarth Vasavada
 
PDF
Governance of security operation centers
Brencil Kaimba
 
PDF
Cybersecurity roadmap : Global healthcare security architecture
Priyanka Aash
 
PPTX
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
PDF
Cyber Security Maturity Assessment
Doreen Loeber
 
PPSX
Board and Cyber Security
Leon Fouche
 
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
Shah Sheikh
 
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Introduction to Cybersecurity
Krutarth Vasavada
 
Governance of security operation centers
Brencil Kaimba
 
Cybersecurity roadmap : Global healthcare security architecture
Priyanka Aash
 
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
Cyber Security Maturity Assessment
Doreen Loeber
 
Board and Cyber Security
Leon Fouche
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Shah Sheikh
 

What's hot (20)

PPTX
SIEM presentation final
Rizwan S
 
PPTX
SIEM : Security Information and Event Management
SHRIYARAI4
 
PPTX
Security Operation Center - Design & Build
Sameer Paradia
 
PPTX
How to implement NIST cybersecurity standards in my organization
Exigent Technologies LLC
 
PDF
Cybersecurity risk management 101
Srinivasan Vanamali
 
PPTX
Critical Capabilities for MDR Services - What to Know Before You Buy
Fidelis Cybersecurity
 
PDF
Need of SIEM when You have SOAR
Siemplify
 
PPTX
Security Information and Event Managemen
S Periyakaruppan CISM,ISO31000,C-EH,ITILF
 
PPTX
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
PDF
What is SIEM? A Brilliant Guide to the Basics
Sagar Joshi
 
PPTX
Chapter 4: Governance and Risk Management
Nada G.Youssef
 
PPTX
Cybersecurity Risk Management Framework Strategy Workshop
Life Cycle Engineering
 
PPTX
Security operation center
MuthuKumaran267
 
PPTX
Security operation center (SOC)
Ahmed Ayman
 
PPTX
SOC and SIEM.pptx
SandeshUprety4
 
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
PDF
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
Priyanka Aash
 
PPT
SOC presentation- Building a Security Operations Center
Michael Nickle
 
PPTX
Banks and cybersecurity v2
Semir Ibrahimovic
 
PPTX
Cybersecurity Risk Management Tools and Techniques (1).pptx
ClintonKelvin
 
SIEM presentation final
Rizwan S
 
SIEM : Security Information and Event Management
SHRIYARAI4
 
Security Operation Center - Design & Build
Sameer Paradia
 
How to implement NIST cybersecurity standards in my organization
Exigent Technologies LLC
 
Cybersecurity risk management 101
Srinivasan Vanamali
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Fidelis Cybersecurity
 
Need of SIEM when You have SOAR
Siemplify
 
Security Information and Event Managemen
S Periyakaruppan CISM,ISO31000,C-EH,ITILF
 
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
What is SIEM? A Brilliant Guide to the Basics
Sagar Joshi
 
Chapter 4: Governance and Risk Management
Nada G.Youssef
 
Cybersecurity Risk Management Framework Strategy Workshop
Life Cycle Engineering
 
Security operation center
MuthuKumaran267
 
Security operation center (SOC)
Ahmed Ayman
 
SOC and SIEM.pptx
SandeshUprety4
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
Priyanka Aash
 
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Banks and cybersecurity v2
Semir Ibrahimovic
 
Cybersecurity Risk Management Tools and Techniques (1).pptx
ClintonKelvin
 
Ad

Similar to Briefing the board lessons learned from cisos and directors (20)

PDF
Make IR Effective with Risk Evaluation and Reporting
Priyanka Aash
 
PDF
Less tech more talk the future of the ciso role
Priyanka Aash
 
PDF
The five secrets of high performing cisos
Priyanka Aash
 
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
PDF
The Measure of Success: Security Metrics to Tell Your Story
Priyanka Aash
 
PDF
The Measure of Success: Security Metrics to Tell Your Story
Priyanka Aash
 
PPTX
Cyber Risk Management in 2017 - Challenges & Recommendations
Ulf Mattsson
 
PPTX
CapTech Talks Webinar Jan 2025 Dewayne Hart.pptx
CapitolTechU
 
PDF
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Mark Simos
 
PDF
Rapid Threat Modeling Techniques
Priyanka Aash
 
PDF
From Cave Man to Business Man, the Evolution of the CISO to CIRO
Priyanka Aash
 
PPTX
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
SeniorStoryteller
 
PDF
No more security empires - The ciso as an individual contributor
Priyanka Aash
 
PDF
The 7 Factors of CISO Impact at RSA 2015
IANS
 
PDF
IANS 2015 RSA Presentation
Andrew Sanders
 
PDF
DevSecOps - Building continuous security into it and app infrastructures
Priyanka Aash
 
PDF
Introduction and a Look at Security Trends
Priyanka Aash
 
PDF
Opening the Door to DoD Perspectives on Cyber Threat Intelligence
Priyanka Aash
 
PDF
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
 
PDF
CISO_Paper_Oct27_2015
Scott Smith
 
Make IR Effective with Risk Evaluation and Reporting
Priyanka Aash
 
Less tech more talk the future of the ciso role
Priyanka Aash
 
The five secrets of high performing cisos
Priyanka Aash
 
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
The Measure of Success: Security Metrics to Tell Your Story
Priyanka Aash
 
The Measure of Success: Security Metrics to Tell Your Story
Priyanka Aash
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Ulf Mattsson
 
CapTech Talks Webinar Jan 2025 Dewayne Hart.pptx
CapitolTechU
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Mark Simos
 
Rapid Threat Modeling Techniques
Priyanka Aash
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
Priyanka Aash
 
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
SeniorStoryteller
 
No more security empires - The ciso as an individual contributor
Priyanka Aash
 
The 7 Factors of CISO Impact at RSA 2015
IANS
 
IANS 2015 RSA Presentation
Andrew Sanders
 
DevSecOps - Building continuous security into it and app infrastructures
Priyanka Aash
 
Introduction and a Look at Security Trends
Priyanka Aash
 
Opening the Door to DoD Perspectives on Cyber Threat Intelligence
Priyanka Aash
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
 
CISO_Paper_Oct27_2015
Scott Smith
 
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
PDF
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
PDF
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
PDF
Keynote : Presentation on SASE Technology
Priyanka Aash
 
PDF
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
PDF
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
PDF
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
Keynote : Presentation on SASE Technology
Priyanka Aash
 
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 
Redefining Cybersecurity with AI Capabilities
Priyanka Aash
 
Demystifying Neural Networks And Building Cybersecurity Applications
Priyanka Aash
 
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
Priyanka Aash
 
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
Priyanka Aash
 

Recently uploaded (20)

PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 

Briefing the board lessons learned from cisos and directors

  • 1. #RSAC SESSION ID:SESSION ID: #RSAC John Pescatore CXO-T11 - Briefing the Board: Lessons Learned from CISOs and Directors CXO-T11 Director, Emerging Security Trends SANS Institute @john_pescatore Alan Paller Research Director SANS Institute
  • 2. #RSAC “Obviously, some people here do not appreciate the gravity of our situation.”
  • 3. #RSAC Measuring the Right Things – Having Something Business Relevant to Say to the Board John Pescatore, SANS
  • 4. #RSAC Driving Security Change By Communicating Upwards We mostly know what to do in security, and we can learn how to do our part. The biggest obstacle to success is getting others to do their part. Support from above is the most powerful force to break through. Goal: Learn how to inform CEOs and Boards and convince them to back strategies to drive change.
  • 5. #RSAC What (Actually) Works? Separate the hype from the reality of briefing the board John and Alan’s centuries years of experience Discussions with Directors and CISOs Sessions in Scottsdale AZ, San Diego, Washington DC (2)
  • 6. #RSAC Why Do Some Do Better Than Others? 980 breaches in 2016 What did the other 9,020 of the F10000 do differently? (781 in 2015) On average, 36K records exposed per breach What did those who limited breach size do differently? (Average = 215K in 2015) Almost invariably, the organizations with the least cyber incident impact have the strongest CISOs and security teams. Source: Identity Theft Resource Center
  • 7. #RSAC Characteristics of Cybersecurity Success Understand vulnerabilities and threats – critical table stakes Know demands of particular industry/vertical/organization Balancing demands Reduce threat impact to business Reduce security impact to business Ability to effectively communicate and drive action Within the team Across the organization Upwards Measurable results, connecting action to change to business benefit.
  • 8. #RSAC Shellye Archambeau Director Verizon, Nordstrom Steve Martino VP CISO Cisco Kim Jones CISO Vantiv Gary Hayslip CISO City of San Diego Jason Callahan CISO Illumina
  • 9. #RSAC Nick Fick Director Dartmouth University Suzanne Vautrinot Director Wells Fargo, Symantec Josh Davis Qualcomm
  • 11. #RSAC Avoiding the same old noise…
  • 12. #RSAC Focus on protecting the business first Effectively and efficiently and quickly Make sure the solution isn’t worse than the problem Business benefits, not security features Is it Safe Enough for Us to Self-insure?
  • 13. #RSAC Useful Security Metrics Can: Drive change Increase efficiency Increase effectiveness Give Warning Action Required Investment Required Demonstrate Value Compete for funds Motivate workforce Give the clueless a busy box
  • 14. #RSAC Delivering Security Efficiency and Effectiveness Decrease the cost of dealing with known threats Decrease the impact of residual risks Decrease the cost of demonstrating compliance Reduce business damage due to security failures Maintaining level of protection with less EBITDA impact Increase the speed of dealing with a new threat or technology Decrease the time required to secure a new business application, partner, supplier Reducing incident cost Less down time Fewer customer defections Security as a competitive business factor Efficiency Effectiveness
  • 15. #RSAC Steve Martino, VP InfoSec, Cisco
  • 17. #RSAC Some Real World Examples Healthcare – Building Security in Maturity Model (BSIMM) increase in secure app dev life cycle reduced time to market for new app by 30% and reduced software development costs by 15% Higher Ed - Intrusion Detection Rate increased 46%, corrective actions costs decreased 35% Financial – reduced PC reimaging due to malware from 4 per week to 1 every 3 months, and will enable the use free of AV on desktops Services – firewall policy management tools enabled existing staff to reduced new connectivity approval from 2 weeks to 1 day.
  • 18. #RSAC Source: Kim Jones, Vantiv CISO at SANS Scottsdale AZ CISO Hot Topics Session
  • 19. #RSAC Alan Paller The SANS Institute [email protected] AUGUST 2016, WASHINGTON, DC Copyright 2016. SANS Institute So You Just Got Invited To Brief the Board of directors on Security
  • 20. #RSAC The Situation The CIO emails the CISO saying that Board of Directors is meeting next week; they want to be briefed on cybersecurity. You, the CISO, are on the agenda. A big opportunity? Perhaps. A high risk moment? Most certainly.
  • 21. #RSAC In Their Own Words Shellye Archambeau Member of the Board of Directors of Verizon Arbitron Nordstrom CEO of MetricStream Answers the questions: What does the board want to hear in your briefing, and what defines success for you?
  • 22. #RSAC
  • 23. #RSAC
  • 24. #RSAC
  • 25. #RSAC
  • 26. #RSAC
  • 27. #RSAC
  • 28. #RSAC
  • 29. #RSAC
  • 30. #RSAC Examples of BAD Slides ACTUALLY USED IN A FEDERAL Executive BOARD BRIEFING
  • 31. #RSAC Agency IT Risk Management (AITRM) Program ISCM is a risk-based strategy to maintain ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. Agency’s ISCM Strategy organizes the tools, processes, and information enabled by CDM and RISCS for an effective risk management framework. Section I: Agency Cybersecurity Program Updates In FY15, Agency updated its ISCM Strategy to align with new risk management projects and to reinforce an enterprise solution Agency ISCM Strategy is 100% compliant with NIST ISCM and ongoing authorization guidance As the Agency IT Risk Management program matures, Agency will revise its ISCM Concept of Operations
  • 32. #RSAC Agency IT Risk Management (AITRM) Program AITRM integrates technical capabilities, reporting requirements, management processes, and the roles and responsibilities essential to mitigating risk, improving risk posture, and enabling risk-based decision making. AITRM Program integrates risk information from multiple sources to enable an Agency-level, multi-tiered risk management approach: Section I: Agency Cybersecurity Program Updates CDM tools RISCS modules SOC Incident Management System data Federal compliance metrics (e.g. FISMA) IT Security Awareness & Training Center (ITSATC) compliance data
  • 33. #RSAC Four CISOs Who Found Effective Paths Approaches that have worked:
  • 34. #RSAC CISO 1: Board Briefing Plus: 1) FBI Director to validate the immediacy of the risk 2) CISO of a well known industry leader as a benchmark Validated metrics of software security
  • 35. #RSAC CISO 2: Top Management Update Continuous quarterly gap analysis vs the 20 Critical Controls Critical control category 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 QW Level 2 Level 3 Level 4 Compliant Compliant In Spirit Work in Progress Not appropriate for our culture Gap with no current plan Plus: Continuous: 1) Mean time to Detect Incidents” and “Mean time to Contain Incidents 2) 4 key automated vulnerability metrics – rolled up quarterly
  • 36. #RSAC CISO 3: Reporting to Cabinet Secretary & Congress 90% risk reduction over 12 months 0.0 200.0 400.0 600.0 800.0 1,000.0 1,200.0 6/1/2008 7/21/2008 9/9/2008 10/29/2008 12/18/2008 2/6/2009 3/28/2009 5/17/2009 7/6/2009 8/25/2009 Domestic Sites Foreign Sites 89% Reduction 90% Reduction
  • 37. #RSAC To be credible to management, metrics must be “authoritative and important and reliably measured” How can you prove your metrics are authoritative and important (and reliably measured)? “Offense informs defense!” The big idea:
  • 38. #RSAC Who Understands Offense? Would they be willing to combine their knowledge of attacks and offense to define the most important defensive investments CIOs must make to block all known attacks? NSA Red Teams NSA Blue Teams DoD Cyber Crime Center (DC3) US-CERT Top Commercial Pen Testers Top Forensics Teams JTF-GNO Air Force OSI Army Research Lab. Dept. of Energy National Laboratories Sandia Los Alamos
  • 39. #RSAC CISO 4: Major Utility Let’s start with the results: The Chairman of the Board told the CIO: “That’s the first time a security person has made sense.” And then he made the CISO’s budget “base” meaning it is funded automatically just like emergency power line repairs.
  • 40. #RSAC 20 Critical Security Controls Sample Red/Yellow/Green Metric 1 2 3 4 5 6 7 8 9 101112 13 14 15 16 17 18 19 20 Protection From the Most Likely Attack Vectors Prevention Detection & Response Identity, Access, Governance & Architecture
  • 41. #RSAC Auditor Buy-in ONE More benefit from using the validated critical controls
  • 42. #RSAC Summary CISO’s perspective doesn’t necessarily match the Board of Directors’ perspective What do I need to do? How much is enough? Whom can I trust to answer those questions? What seems to work: Externally validated, prioritized framework (the Critical Controls) with a 3-year plan Continuously showing improvement in important metric
  • 43. #RSAC When You Get Back to Work Make sure you are collecting the right security metrics so you can demonstrate value, improvement, danger – and connection to business goals. Take advantage of any transitions coming: Moving to Windows 10, cloud services, mobile apps, agile dev, etc. M&A, re-org, new C-level management. Audit results Prioritize by business impact – shoot for a near term win. Change something! Communicate upwards. Successes Strategic Obstacles Recommendations
  • 44. #RSAC Resources SANS What Works: https://www.sans.org/critical-security-controls/case-studies CIS Critical Security Controls: https://www.cisecurity.org/critical-controls.cfm By three methods we may learn Wisdom: 1. By reflection, which is noblest 2. By imitation, which is easiest 3. By experience, which is the bitterest – Confucius