don’t get left in the dust - rsa conference · don’t get left in the dust: how to evolve from...

33
#RSAC SESSION ID: James Christiansen Bradley J. Schaufenbuel, CISSP Don’t Get Left in the Dust: How to Evolve from CISO to CIRO CXO-W04 Director of Information Security Midland States Bank [email protected] VP Information Risk Management Accuvant [email protected] JC-JC

Upload: dangdan

Post on 12-Aug-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

SESSION ID:

James Christiansen Bradley J. Schaufenbuel, CISSP

Don’t Get Left in the Dust: How to Evolve from CISO to CIRO

CXO-W04

Director of Information Security Midland States Bank [email protected]

VP – Information Risk Management Accuvant [email protected]

JC-JC

Page 2: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Agenda

The Evolution of the Role

Drivers of CIRO Emergence

What Makes the CIRO Different

Making the Transition

How to Apply

Summary

JC-JC

CIRO

2

Page 3: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Introduction

The security landscape is

changing.

There is a disconnect between the

objectives of the traditional CISO

and the businesses they serve.

It is time to evolve with the

organizations we serve.

JC-JC 3

Page 4: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

The Six Forces

Require a Resilient

Security Strategy

Business

Strategy

Global Social

and Political

Forces

Government

and Industry

Regulations

Adversaries and

Threats

Organizational

Culture

IT

Organization,

Systems and

Infrastructure

JC-JC 4

Page 5: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Progression of this Field…

1990-1998

IT Security

1999-2004

Info Sec

2005-2014

IT Risk Management

2015-???

Information Risk

Management?

JC-JC 5

Page 6: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

The Security Journey

A business aligned strategy includes

understanding the business and compliance

objectives, threats, and risks

AD HOC

INFRASTRUCTURE

BASED COMPLIANCE

BASED

THREAT BASED

BUSINESS ALIGNED RISK

BASED

Shortcut =

Failure to

Pass

INTEL DRIVEN

JC-JC 6

Page 7: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Guidance from the National Association of Corporate Directors (NACD)

Executive Management / Board – NACD

Guidance includes specific questions about program maturity, breach

notification, situational awareness, strategy and incident response

PRINCIPLE 1:

Cybersecurity is

an enterprise-

wide risk

management

issue, not just an

IT issue

PRINCIPLE 2:

Understand

Legal

implications

of cyber

PRINCIPLE 3:

Have regular

updates and

access to cyber

security experts

PRINCIPLE 4:

Establish an enterprise-

wide cyber-risk

management

framework with

adequate staffing and

budget

PRINCIPLE 5:

Discussion of

which risks to

avoid, accept,

mitigate, or

transfer through

cyber insurance

JC-BS 7

Page 8: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Drivers of the Emergence of the CIRO – 1/2

Determine Assets and Actors

Increase in outsourcing (greater emphasis on third party oversight)

Changing threat landscape (need for risk based remediation)

Greater expectations of boards and executive teams

BS-BS 8

Page 9: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Drivers of the Emergence of the CIRO – 2/2

Misalignment of security

spending with business risk

Lack of support for taking

calculated risks

Divergence amongst existing

information governance functions

BS-BS 9

Page 10: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Where CISOs

Fall Short – 1/2

Focus on information protection at the

expense of other corporate goals.

Information risk is a business problem

with a shared budget responsibility

Focus on technology solutions in lieu

of other controls (continual search for

the next silver bullet)

BS-BS 10

Page 11: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Emphasize risk elimination

instead of risk optimization (‘no’

instead of ‘yes – if we …’)

Even “risk enlightened” leaders

are fixated on technology risks

(focus on ‘IT’ risk instead of

‘information’ risk)

Where CISOs

Fall Short – 2/2

BS-BS 11

Page 12: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

The Ideal CIRO

Traditional security knowledge (CISSP, CISM, etc.)

Business savvy (MBA)

Thinks like a lawyer and a hacker

Leader (comfortable in front of the board)

Understands risk management principles

Can implement project management fundamentals

BS-JC 12

Page 13: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

The Successful Chief Information Risk Officer

CIRO Information Driven Decision Making

Strategic and Operational Metrics / Dashboard

Information Risk Assessment and Management

Integration with Enterprise Risk Management

Information Security is a Business Imperative Enable Business to Securely Deliver Product and Services

Positive Interaction With Partners, Third-parties and Regulators

Shared Budget Responsibility Corporate and Business Unit - Balanced Risk and Cost

Prioritization With Other Strategic Business Projects

JC-JC 13

Page 14: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

What Makes the CIRO Different?

Organizational profile – Executive

team member with board access

Organizational alignment – Strategy

dovetails with organization’s

Depth and breadth of skills

Business risk based approach

Leadership

JC-JC 14

Page 15: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Not Just Context,

but Also Content Not just protection, but also:

Timely destruction:

What is the risk of

keeping information

too long or not long

enough?

Optimization of use:

Are we extracting value

from information?

Collection practices:

Do we even need to

obtain the information?

JC-JC 15

Page 16: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

What Functions Fall Under CIRO?

May include parts of:

Traditional Information Security

Legal and Regulatory Compliance

Privacy

Third Party Oversight

Business Resilience

Physical Security

JC-JC 16

Page 17: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Reporting Structures, Old and New

JC-BS 17

Page 18: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Advantages of New

Organizational Structure

Aligns information risk with business priorities

Visibility into organizational or product changes

Supports shared responsibility for information risk

Ensures that all types of information risk are addressed

Able to address board, executive management and customers

BS-BS 18

Page 19: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Do We Need Another C-Level Position?

Value of information (and associated risk)

rising.

Executive composition should parallel

board’s fiduciary duties.

Consolidation of existing C-level positions

(CPO, CISO / CSO, etc.)

BS-BS 19

Page 20: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Skills Required to Make the CIRO Transition

Thorough understanding of risk management concepts Factor Analysis of Information Risk (FAIR)1

1Source: Risk Management Insight (riskmanagementinsight.com)

Executive level communication skills Presentation Skills – Toastmasters

Written Skills – College & Editors / Colleagues

Thorough understanding of your organization’s business,

objectives and growth plans Regular meetings with business executives

BS-BS 20

Page 21: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

The Information Risk Transformation

Transition yourself from law

enforcement / military

mindset to that of a

business risk manager

Add risk management

skill set to staff (through

training or hiring)

Don’t forget about

information in non-

electronic format

BS-BS 21

Page 22: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Understanding Regulations:

Translate legal regulations to internal activities to meet spirit (legislative intent) and letter of the law. Establish a good working relationship with your attorneys. Participate in standard setting and regulatory rulemaking processes (i.e., help shape the rules).

Threat Landscape: Implement threat analytics maturity model

Understand the corporate culture: Risk aversion, rate of change, cultural differences, countries of operation

How?

BS-JC 22

Page 23: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Evolution of the CISO to the CIRO

Securing the

Organization

CISO Secure the internal

organization

Manage the risk of

third parties

Manage regulatory

risks

Communicate

current status and

risks to board Business Acumen

Regulatory Compliance

Management

Third-Party Risk

Management

Information

Security

CIRO

JC-JC 23

Page 24: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Keep it short and concise – Typically they will want pre-materials

Never guess at an answer – They read people very well!

Information Risk Dashboard

Include areas of risk inside and outside the organization

Trends – What areas of risk are increasing

and decreasing

New risk highlights

Overall goal – Demonstrate the effectiveness

of your information risk management program

over time.

Executive Management / Board – Tips

Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014

JC-BS 24

Page 25: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Using Existing Enterprise Risk Management (ERM) Program (or Create One)

Leverage the existing enterprise risk management

(ERM) program (if one exists).

Information risk is a subset of enterprise risk.

If there isn’t an enterprise risk management

program, sponsor one (position yourself to be

CRO).

BS-BS 25

Page 26: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Leveraging Information Risk

to Drive Value

Concrete Examples:

Factoring in an information risk discount on an

acquisition valuation / purchase price

Leveraging fraud and security data to improve

customer experience

BS-JC 26

Page 27: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Revenue Contribution

Enable Business Efficiency

Product Delivery

Brand Name Confidence

Earnings Contribution

Reduced Operating Expenses Related to Security Failure

Long Term Reduction of Security Program Costs

Circumvent Costs of Regulatory Non-compliance

27

Contributing to the Organization’s Success

JC-JC

Page 28: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Managing Information Risk

28

Ease of Doing Business

Effective Compliance

Information

Technology Governance People

Information Security Regulatory Compliance Third Party Risk

Information Risk Management

JC-JC

Enhanced Security

Global Execution

Process Improvement

Third Parties Regulations

Page 29: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

The Reward

Earned respect from organizational peers

Inclusion in your organization’s strategic

decision making processes and forums

Perception shifts from marginal cost

center to value adding unit

JC-BS 29

Page 30: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Summary

We have established:

The current CISO role is not meeting organizational needs

CISO must adapt or go the way of the Dodo bird

A focus on managing information risk offers a superior

alignment to the organization’s objectives

There are steps you can take to position yourself for this

transition

BS-BS 30

Page 31: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Apply It

TODAY

Immediate actions:

Assess you and your

program’s readiness

to make the CIRO

transition

Establish YOUR plan

to gain and implement

necessary skills

90 DAYS

Take steps to realign

skill sets, focus, and

organizational structure

to an information risk

based approach

+90 DAYS

BS-BS 31

Page 32: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Resources

The Evolution of the CISO

(accuvant.com/resources/risk-and-the-ciso-

role#sthash.TUMIWWV7.dpuf)

NACD – Cyber-Risk Oversight Handbook

(nacdonline.org/cyber)

Introduction to Factor Analysis of Information

Risk (FAIR) (riskmanagementinsight.com)

Six Forces of Security Strategy

(accuvant.com/resources/accuvants-six-

forces-of-security-strategy)

32 BS-BS

Page 33: Don’t Get Left in the Dust - RSA Conference · Don’t Get Left in the Dust: How to Evolve from CISO to CIRO ... Source: NACD, Cyber-Risk Oversight, Directors Handbook 2014 JC-BS

#RSAC

Questions?

[email protected] [email protected]

33