risk assessment - where security meets compliance caroline r. hamilton, ceo riskwatch, inc

37
Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc.

Upload: dortha-preston

Post on 25-Dec-2015

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Risk Assessment - Where Security Meets

Compliance

Caroline R. Hamilton, CEORiskWatch, Inc.

Page 2: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

3 New Watchwords

1. Governance

2. Risk

3. Compliance

Page 3: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc
Page 4: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

TJMAXX

• TJX discovered the intrusion in December and reported it to authorities in the U.S. and Canada as well as the major credit card companies and its payment processors. At the request of law enforcement, the breach was kept quiet until Wednesday, TJX said.

• The breach appears broad. In Massachusetts, 28 banks have been contacted by credit card companies indicating that some of their customers have had personal information that may have been exposed, the Massachusetts Bankers Association said in a statement Thursday. That number is likely to grow as more banks report into the association, it said.

Page 5: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Governance, Risk & Compliance

Compliance

Sarbanes Oxley has increased the accountability of management

New regulations for financial institutions require every institution complete a risk analysis by December 2006

Risk - Physical Security

Increase in terrorism around the world has hit multi-nationals

Cargo security now requires risk analysis

Workplace violence continues to affect U.S. companies

Concept of Integrated, Holistic Security

Governance - Information Technology

IT has become the important part of most organizations

New international standards require more IT risk analysis

Page 6: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

New Requirements for Security Risk Assessments

Based on Published Standards

Governments are instituting requirements or expecting that companies will perform security risk assessments. Assessments can include identification of threats, vulnerabilities, and — based on both — an analysis of security gaps and mitigation strategies. Some of the assessment requirements also require that companies identify the most critical assets and propose plans to protect core business functions and human assets.

Page 7: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Compliance Regulations, Standards and Guidelines

Financial & Regulatory Compliance GLBA (Gramm Leach Bliley Act)FFIEC Audit Framework for Information

Security and for Risk AnalysisCalifornia SB 1386 (Identity Theft)Bank Secrecy Act (BSA)PCI Data Security StandardSarbanes Oxley Act

HIPAAHealth Insurance Portability and

Accountability Act of 1996

Utilities

NERC – CIP 002-009(North American Electric Reliability Council) Critical Infrastructure Protection

Nuclear Power Generators NRC (Nuclear Regulatory Commission) &NEI (Nuclear Energy Institute)

PHYSICAL SECURITY

Army Field Manual Best Practices FEMA 426 – Protecting Buildings Against

TerrorismC-TPAT (Customs Trade Partnership Again

Terrorism)

FEMA 426 – School Security GuidelinesNFPA Maritime & Port Security – ISPS, MTSA

Information Security/ISO 17799NIST 800-26, NIST 800-53ISO/IEC 1779:2005ISO/IEC 27001Office of Management and Budget

(OMB) A-123, A-124, A-127, and A-130

COBIT 4

Page 8: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Mapping to Audit

• Must map to audit Guidelines – ISACA(ASIS partner organization)

• Every Vulnerability or Risk AssessmentEnds Up with Corporate Management – CFO or IG

• Executives are being held PERSONALLY ACCOUNTABLE and need the assessments to demonstrate Due Care

Page 9: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

APPROACH TO GOOD SECURITY

“The approach to good security is fundamentally similar regardless of the assets being protected. As GAO has previously reported for homeland security and information systems security, applying risk management principles can provide a sound foundation for effective security whether the assets are information, operations, people, or facilities. These principles, which have been followed by members of the intelligence and defense community for many years, can be reduced to five basic steps:

GAO-02-687T National Security

Page 10: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

ELEMENTS OF RISK ASSESSMENT VS. COMPLIANCE ASSESSMENT

ASSETS

THREATS

VULNERABILITIES

LOSSES

SAFEGUARDS

Page 11: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

What Is Risk Assessment compared to a Site Survey ?

A process used to determine what controls are neededto protect critical or sensitive assets adequately & cost-effectively

The process examines five variable functions:1. Specific Assets to be protected (value)

2. Potential Threats to the various assets

3. Vulnerabilities that would allow the threats to materialize

4. Kinds of Losses that the threats could cause

5. Safeguards that would reduce the loss or eliminate the threats

Page 12: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

The Risk Assessment Process

Respondents

Automated Survey

Management

Analyst

Process Manageme

nt

Data Aggregatio

n & Analysis

Content(Rules &

Data)

Risk Analysis

Customization Reporting

Page 13: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Estimating Asset Values

Page 14: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

FINDING THREAT DATA OR INPUT YOUR OWN ORGANIZATIONAL DATA SUCH AS INCIDENT

REPORT DATA

• Quantified threat data is hard to find.• Categories of Threats:

Natural Disasters, Criminal Activity Terrorism, Theft, Systems Failures

• Collect data from Web Sources, government data, weather data, crime casts, global info services, access control systems, incident logs.

• Use data from internally collected sources

Page 15: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Standard Threat Data or Enter your own Site Specific Incident Data

Page 16: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Discovering Vulnerabilities

• Vulnerabilities specific by organization

• Can be completed only by the analyst

• Or include key individuals

• Web-Based surveys increase accuracy and

speed of survey collection & aggregation

Page 17: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Question answers map up to over forty customizable vulnerability areas

Page 18: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

• Questions Follow Audit Format

• Control Standard matches Question

• Analyst Sets Threshold for Compliance

• Questions Validate Compliance with Standards

• Analyst can Add, Delete or Modify Questions

Analysts Can Customize Questions or Add New Questions

Page 19: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

SAMPLE QUESTION CREATION ELEMENTS

Page 20: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Use of Server-Based Questionnaires Make it Easy to Collect Information

Page 21: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc
Page 22: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Including all Relevant Safeguards and Controls

•Alarm Systems•Background Checks•Barriers•Biometric Controls•Bomb Threat Procedures•Bomb Detection & Identification•CCTV Cameras•Disaster Recovery Planning•Emergency Response Planning•Entry Controls•Fire Controls

•Guard Services•Incident Reporting•Incident Response•Intrusion Detection•Lock & Key Controls•Monitoring Systems•Risk Assessment•Security Planning•Security Policies•Security Staff•Technical Surveillance•Training Programs•Visitor Controls

Page 23: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Controls with default values for implementation and life cycles

Page 24: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Equipment

Generators

Facility

Staff

Patients

Security

Personnel

Reputation

Related Loss

Direct Loss

Disruption

Injury

Intangibles

Loss of Life

Accident

Fire

Vandalism

Power Loss

Theft

Workplace Viol

Homicide

Personnel Screening

Controlled Areas

Personnel ID

Key Controls

No Security Plan

Observation

Doors

Construction

Asset VulnerabilityThreatLoss

Data Aggregation & Analysis

Incident Class Inciden

tConditioned Incident

Degree of Seriousness

Risk = Asset Loss Threat Vulnerability

Page 25: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

WRITING REPORTS

• Data which can be benchmarked

• Making sure you include audit trails

• Use of recognized statistical probability models

• Includes both current and new directives

• Creating management level reports

Page 26: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

MITIGATION STRATEGIES

1. Accept Risk

2. Transfer Risk

2. Mitigate Risk

3. Better Risk Reactions

5. Dealing with Residual Risk

Page 27: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

EASY TO UNDERSTAND GRAPHS ILLUSTRATE OVERALL

COMPLIANCE VS. NON-COMPLIANCE

46%

54%

Compliant Non-Compliant

Page 28: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

VULNERABILITY DISTRIBUTION CHART SHOWS THE WEAKNESSES IN THE

CURRENT SECURITY PROFILE

Non Compliant Answers by Question Category

6%

7%

4%

9%9% 9%

11%

12%

18%4%11% Entry Control

Internal Bldg Security

General

Integrated Systems

Bldg Security

Parking Structures

Security Guards

Loading Dock

Lobby Control

Perimeter/Intrusion Detection

Remaining

Page 29: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Survey Answers Can be Shown by Job Title, or by Individual Name

Non Compliant Answers by Respondent

1%0%0%2%4%9%

9%

12%

17%

21%

25%

internal1

guard

internal2

badging

external

delivery

personnel

safety

recovery

Remaining

Page 30: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Shows the Annual Loss Expectancy By Threat

ALE by Threat

4%3%

4% 4% 5%

10%10%

7%

8%

6% 6%

33%Communications Loss

Arson

Explosions Major

Theft - Company Property

Vandalism

Assault, Simple

Sabotage/Terrorist

Explosions Minor/Mail-Bomb

Cold/Frost/Snow

Flooding/Water Damage

Sabotage/Disgruntled Employee

Remaining

Page 31: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Loss Expectancy is Also Shown by Asset Category Impact

25%

50%

0%0%0%3%4%

18%

0%0%0%

Facilities/Buildings

Personnel

Communications Equipment

Office Equipment

Computer Hardware

Electronic Equipment

Remaining

Page 32: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Reports Can Include Loss Protection by Threat Category

0% 10% 20% 30% 40% 50% 60% 70% 80%

Assault , Simple

Activist

Assault , Aggravated

Assault , Sexual

Kidnapping

Vandalism

Homicide

Stalking

Burglary/Break In

Robbery

Remaining

Loss Protection by Threat

Page 33: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

How to Calculate Return on Investment to Support Proper Budgeting for Security.

In this example, finishing and updating the Disaster Recovery Plan had a 2000-1 ROI – that means for every dollar spent on updating

the plan – the organization saves $2,000,000

1. Finish Disaster Recovery Plan 2000:1

2. Finish the Security Plan 1200:1

3. Complete Security Training 943:1

Page 34: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Security Controls are Listed Recommended by Return On Investment

0.0 0.5 1.0 1.5 2.0 2.5

ID Infrared Motion Detectors

GD Policy/Procedure

GD Patrol/Tour Reporting

CN Steel Bars/Grills

BR Policy/Procedure

LK Policy/Procedure

FR Marshal/Brigade

ID Magnetic/Contact Switches

ID UPS Dedicated

EC Biometric Access

Return on Investment (10% Discount)

Page 35: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

0.0% 1.0% 2.0% 3.0% 4.0% 5.0% 6.0%

CN Steel Bars/GrillsID Infrared Motion Detectors

GD Policy/ProcedureGD Patrol/Tour Reporting

ID Magnetic/Contact SwitchesBR Policy/ProcedureLK Policy/ProcedureFR Marshal/Brigade

ID UPS DedicatedBR Jersey Walls

EC Biometric AccessPR Personnel Termination

VC RemovalVC Vehicle Barriers

ID Microwave Motion DetectorsSC Security Manual

SC Security PolicyCN Steel Mesh Walls

OV CCTV Cameras

This Graph Illustrates how Implementing the Top 20 Controls will Contribute to a Cumulative

Reduction in Loss Potential

Single vs. Cumulative Loss Reductions

Page 36: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

The Bottom Line

• Security Risk Management Requirements will Continue to Increase and need to be standardized.

• Measuring and Managing Security by Return on Investment gives you the ‘best bang for the buck’

• Conducting Risk Assessments are the best way to meet security requirements, quantify areas of weakness, justify security controls, and manage and validate the security budget.

Page 37: Risk Assessment - Where Security Meets Compliance Caroline R. Hamilton, CEO RiskWatch, Inc

Caroline Hamilton410-224-4773, x105

[email protected]