communicating about information security - cdm media · benefits of using a capability maturity...

17
CATERPILLAR: NON CONFIDENTIAL Communicating about Information Security

Upload: others

Post on 13-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Communicating about

Information Security

Page 2: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Mike ZachmanDeputy CISO, Caterpillar Inc.

Currently leading Information Security transformations at two high-

risk business units to improve their capability to protect, detect and

respond to information security risks.

Previously performed the same function at the enterprise level.

Certifications include:

– Certified Internal Auditor (CIA)

– Certified Information Security Manager (CISM)

– Certified in the Governance of Enterprise IT (CGEIT)

Page 3: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Objectives

Discuss the use of a Capability Maturity Model to

• Measure and communicate progress

• Ensure strategic alignment

• Calibrate with program management

Page 4: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

An Example Capability Maturity Model

Page 5: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Security Program Management (SPM) frameworkErnst & Young’s model

Business drivers

Metrics and reporting

Data infrastructure

Events Alerts Logs

Go

vern

ance

an

d o

rgan

izat

ion

Strategy

Policy and standards framework

Architecture Operations Awareness

Services

Software security

Host security

Network security

Data protectionIncident

management

Business continuity management

Technology protection ResiliencyFunctional operation

Asset managementThird party

managementIdentity and access

management

Security monitoringThreat and

vulnerability management

Privacy Inte

lligence

Page 6: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Maturity Rating Scale

Maturity level descriptions

1

Initial/Ad hoc

►Basic undocumented, changing capability is in place with some technology and tools; limited local processes, and limited organizational support.

2

Repeatable

►A partial capability is in place with a combination of some technology and tools; local processes covering some regions/business units or processes are repeatable, but may not be good practice or maintained; and limited organizational arrangement to support good practice.

3

Defined

►A defined capability is in place with significant technology and tools for some key resources and people; processes defined for some regions and/ or business units; and organizational guidance is in place for some key regions and/or business units.

4

Managed

►A mature capability is in place with advanced technology and tools for some key resources and people, consistent processes exist for some regions and/or business units, and some governance is in place (accountability/responsibility/metrics) for some key regions and/or business units.

5

Optimized

►An advanced capability is in place which is leading-edge technology and tools for all key resources and people, consistent process across regions, business units, and effective governance is in place (accountability / responsibility/continual monitoring for improvement).

The maturity rating scale is based on an industry standard Capability Maturity Model, that helps assess current maturity of the program and capabilities to determine the desired future state and identify where improvements are required.

Page 7: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Communicating with a Capability Maturity Model

Page 8: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Some Basic Questions Regarding Information

Security….

How are we doing?

What are our biggest concerns?

How do we compare with our industry?

Are we doing enough?

Page 9: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

IT Security Compliance – Page 1 of 10 Sample Data

Page 10: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Capability Maturity Model Security maturity benchmark results – Year 1

Sample Data

Page 11: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Capability Maturity Model Security maturity benchmark results – Year 1

Sample Data

A different conversation……

Page 12: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Some More Questions Regarding Information

Security….

Are we improving?

Are we spending in the right areas?

Page 13: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Capability Maturity Model Security maturity benchmark results – Year 2

Sample Data

Major Accomplishments:

Documented Information Security strategy aligned with enterprise objectives

CISO organization established with dotted line to Board Audit Committee

Demonstrated improved awareness during self-phishing exercises

Established a formal information security metrics program and achieved targets across several key performance indicators

Implemented mobile device management

Enterprise policies and standards documented and approved by Executive Office

`

Page 14: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Some More Questions Regarding Information

Security….

What is our target?

How does our target compare to the industry?

Are we investing in alignment with our strategy?

Are we investing enough?

Page 15: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Capability Maturity Model Security maturity benchmark results – Years 3+

Sample Data

Page 16: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Benefits of Using a Capability Maturity Model

Easy to understand and communicate information security posture

Provides a holistic view of information security and the ability to establish a baseline for benchmarking

Identifies the strengths and weaknesses of an information security program and thereby, identify areas for improvement and provides justification for where the program needs to mature to prioritize investments

Does not replace the necessary mountains of operational metrics

Page 17: Communicating about Information Security - CDM Media · Benefits of Using a Capability Maturity Model Easy to understand and communicate information security posture Provides a holistic

CATERPILLAR: NON CONFIDENTIAL

Questions?