1 / 43

presented by: peter s. browne principal manager peter browne associates, llc

Projected B2B eCommerce Growth. Gartner 7.3 Trillion. Ovum 1.4 Trillion. Forrester 6.3 Trillion. Goldman 3.2 Trillion. emarketer 2.8 Trillion. 2004 Predictions. Internet Users Worldwide. Source: IDC. Risk Management In Perspective - Drivers. New TechnologiesWeb presenceOnline transactionsDelivery of professional services via the InternetNew RisksCyber-extortionNetwork security breachesLitigationLoss of

paul2
Download Presentation

presented by: peter s. browne principal manager peter browne associates, llc

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    2. Projected B2B eCommerce Growth

    3. Internet Users Worldwide

    4. Risk Management In Perspective - Drivers New Technologies Web presence Online transactions Delivery of professional services via the Internet New Risks Cyber-extortion Network security breaches Litigation Loss of “intangible” information Dependence on third party service providers

    5. The Problem 85% of Companies report at least one Computer Security Breaches last year 90% report Vandalism attacks 78% report Denial of Service attacks 64% Acknowledged financial losses due to these attacks Average loss: $2,000,000 Melissa = $80 million total Denial of Service (Mafia Boy) = $1.2 billion Love Bug - $10 billion Statistical data provided by CSI/FBI 2001 report

    6. The Computer Attack Risks Loss or damage to Data Legal Liability to Others Loss or damage to Reputation Loss of Market capitalization and resulting Shareholder lawsuits

    7. Foundations Managing risk includes the following components: Accept Mitigate Transfer a portion of the risk to an insurance underwriter

    8. Electronic Commerce: A Paradigm Shift Traditional Commerce Centralized systems in glass house Economy of scale Managed risk Security says NO Electronic Commerce Distributed systems everywhere Economy of dispersion Distributed risk Security is an enabler

    9. Business Drivers for Security The effect of the Internet on banking and financial services Movement from information “silos” to information integration Holistic view of risk management Increasing global regulatory oversight Effect of GLBA Increasingly proactive regulatory agencies and audits More pervasive and complex technologies

    10. The Four Foundations of Protection People Board and management commitment, dedicated technical personnel, crisis management team all in place and active! Process Enterprise ISO7799 ready, on-going management, employee education and regular training, patch management. Technology Monitoring/log review, DMZ zones, firewall, anti-virus software, intrusion detection systems, remote access two factor authentication, audit trails.

    11. 11 The Overriding Objective

    12. People Success Factors Set up the right organization

    13. Organizational Placement of IT Security Report separately from IT (Audit, Security, Legal, Finance) Report directly to CIO/Head of Technology Report into CTO/Operations Part time function Split function

    14. Roles and Responsibilities Set policy/standards/guidance Act as internal consultant Perform system/security operations Provide oversight over outsourced/third party technology providers Conduct/manage assessments and audits

    15. Ownership What to centralize: Policy, standards, guidance Test and validation of security Cross-enterprise coordination System-wide administration What to decentralize: Accountability Risk acceptance User access administration

    16. People Success Factors Set up the right organization Get good people and train them adequately

    17. Security Must Add Value Facilitate, don’t obfuscate Be a perpetual student Provide solutions to business needs Communicate, communicate, communicate Be an agent of change Focus on operational excellence Treat risk as part of the business equation Clearly articulate what is expected

    18. What Is the Scope? Make security enterprise-wide… and coordinated with all business units Focus early in the product/software life cycle Enlist allies: Business units Legal Operations Risk management Earn your budget!

    19. Preach Security Awareness Educated management Understand risk To the enterprise To the given business To the individual Application of security standards In the software development life cycle In the management of platforms

    20. People Success Factors Set up the right organization Get the good people and train them adequately Get management commitment

    21. Articulate Risk in Business Terms Value of the asset Probability of a loss Likely cost over time

    22. Control Analogy: ATM versus Internet Known and limited number of customer entry points Two-factor authentication required (card plus PIN) Camera recording all activity Limited amount of cash available for withdrawal Full audit trail of all activity Physical limits to bulk fraud Customer cannot stop an initiated transaction Settlement and problem resolution processes in place Customer has receipt to verify transaction

    23. Management Involvement Top-level steering committee Task force Advisory board Reporting key performance indicators Reporting incidents Compliance checking

    24. Process Success Factors Put policy and standards in place

    25. Security Life Cycle Steps

    26. Top-level Policy Broad statement of intent Sets the expectations for compliance Must acknowledge individual accountability Culture-dependent Must cover appropriate use Must be enforced

    27. Standards Describe what to do, not how to do it Explain the application of policy Cover all elements of information security Use existing models (I4 & ISF) Provide the cornerstone for compliance

    28. Guidelines Tell how to meet standards Are platform- or technology-specific Provide examples and configuration recommendations Must be kept up to date

    29. Process Success Factors Put policy and standards in place Build a robust program

    30. Desired State of Security Desired state of security: The level of security controls needs to correspond to the value/sensitivity of the underlying information asset: “risk-based” Security must: Be incorporated into the development process Be part of the overall architecture Be part of the project management and implementation process Be part of system administrators’ and network planners’ job function Keep current with technologies because they evolve rapidly. What worked yesterday may not be valuable today (digital certificates, application proxy firewalls, biometrics, IDS)

    31. Process Success Factors Put policy and standards in place Build a robust program Track metrics for accountability

    32. Platform Compliance

    33. Security Awareness

    34. Operational Statistics

    35. Technology Success Factors Protect the perimeter

    36. Perimeter Control Firewall technology in place to protect Concept of a DMZ Intrusion Detection Network based Host based Standardized system configuration

    38. Technology Success Factors Protect the perimeter Provide consistent security services

    39. Consistent Security Services Remote access authentication and authorization Remote dial in access Internet access Business to business links System management Lockdown of access File protection Security patches

    40. Technology Success Factors Protect the perimeter Provide consistent security services Capture audit data

    41. Audit Trails What to capture All access to systems All intrusion attempts Financial transactions Access to sensitive data Uses Digital forensics Monitoring of security Improving performance

    42. Information Security as the Foundation for Electronic Commerce The people are the critical components, but they must be supported by management and trained The process starts with the policy, and concludes with implementation The technology must be put in place to manage and enforce security Management commitment is not difficult… if Metrics: If you can’t measure it, you can’t control it Information security bridges the business and the technology

    43. The Future In the future, there’ll be just two kinds of banks —the ones on the Internet

More Related