SlideShare a Scribd company logo
1 of 17
1 22 May 2009 Solving Problems That Don’t Exist! building better security practices Rafal M. Los Solutions Specialist, HP ASC
Session Overview In today's enterprise, Web Application Security has come front and center for security managers as well as the business.  The reason many well-funded, well-backed programs fail is because they miss the fundamental rule of problem solving – understand the problem.  The secret to success is simple – understand your business context and build a program around that. How can you develop an actionable, business-risk driven program for your enterprise?  Understanding your role within the business is key, followed by successful identification of a cornerstone upon which to base the program.  Evaluating data value, application visibility and business exposure one step at-a-time, and assigning real, measurable risk are the necessary steps to making sure your program is well-grounded in business value. Participants will be given a strong foundation to succeed, so they don't end up solving problems the business doesn't have.
Fundamentals Security is all about mitigating risk Risk is a high-complexity problem IT alonecan not eliminate risk Security must work through the business
Knowing Your Role Role is fundamental to problem solving Where you report into your organization makes a big difference Identify your function and capacity Is security tactical or strategic? Is security a business stake-holder?
Identifying a Cornerstone Build your program on a key principle You must answer this question: “Why does the business care about security?” External compliance or regulations Internal governance requirements Competitive differentiator/advantage Incident prevention
Security Program Charter Publish a charter document Apply these 5 key knowledge points Focus on the cornerstone Use content & context for business metrics Publish the risk profile components Emphasize transparency Focus on building business value This is your road map to success
Business Value Metrics Definition: metrics which can meaningfully quantify the business value proposition of risk mitigation Keys to good metrics: Must be business-input driven Uniformity of perspective Must never allow for “maybe”
Context & Content Assign concrete values to $Rn  and $V Content –  Monetary value of data asset ($V) Context – Assign asset value relative to environment Value Ratio: Data Value Asset ($Vn) = $Rn total assets ($Vt)
Context & Content Site Visibility Site Visibility (Vis): Metric derived from an identification of the public awareness of the site Context –  3 Categories  ,[object Object]
example: company storefront
Moderate – Indexed, searchable, sparsely linked
Low – Non-indexed, private, non-linkedContent –  How desired is the data in the site?
Context & Content Business Exposure (Exp): Public business risk profile derived from the dynamics of the business unit High | Moderate | Low Context –  What line of business is the company/unit in? How does the line of business contribute to the amount of risk the company undertakes in daily operations? Consider your business’s risk management group your best ally Business Exposure
Context & Content Acme Credit Company Acme Credit Company processes credit card transactions, and thus stores and processes hundreds of millions of credit cards weekly.  Web site An is a portal for merchant processing of credit and debit payments, temporarily storing as many as one million credit cards for processing per day; this is the Acme Co’s primary business. $Rn = .8 (most of the company’s total assets are here) $V = $10,000,000 (business value of 1 million records) Vis = Moderate (indexed, searchable, but non-publicized site) Exp = High (credit card processors are a big target) Case Study
Building Risk Profiles Allows for mathematically derived priorities based on business-driven input Goals: Transparency: formula for deriving priority metric is published Objectivity: real numbers remove bias Each site must have a risk profile Prioritization Matrix
Building Risk Profiles Prioritization Matrix Assigning Values to the Matrix $V = Direct dollar-value of asset $R = Computed ratio Vis values Exp values
Building Risk Profiles How does priority get computed? Priority = Log10 ($V x $R x Vis x Exp) Heavily weighted to data value Rightfully so!  Data value is important $R works to segregate sites within a business Vis and Exp work to distinguish between multiple businesses The Formula

More Related Content

More from Rafal Los

Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...
Rafal Los
 

More from Rafal Los (20)

The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfThe 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
 
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityIrrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
 
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
 
Lies, Fables and Security Metrics
Lies, Fables and Security MetricsLies, Fables and Security Metrics
Lies, Fables and Security Metrics
 
Losing battles, winning wars
Losing battles, winning warsLosing battles, winning wars
Losing battles, winning wars
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
 
Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterprise
 
Making Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessMaking Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in Business
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with Automation
 
Ultimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelUltimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI Model
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
 
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Solving Non Existant Problems v1.2

  • 1. 1 22 May 2009 Solving Problems That Don’t Exist! building better security practices Rafal M. Los Solutions Specialist, HP ASC
  • 2. Session Overview In today's enterprise, Web Application Security has come front and center for security managers as well as the business. The reason many well-funded, well-backed programs fail is because they miss the fundamental rule of problem solving – understand the problem. The secret to success is simple – understand your business context and build a program around that. How can you develop an actionable, business-risk driven program for your enterprise? Understanding your role within the business is key, followed by successful identification of a cornerstone upon which to base the program. Evaluating data value, application visibility and business exposure one step at-a-time, and assigning real, measurable risk are the necessary steps to making sure your program is well-grounded in business value. Participants will be given a strong foundation to succeed, so they don't end up solving problems the business doesn't have.
  • 3. Fundamentals Security is all about mitigating risk Risk is a high-complexity problem IT alonecan not eliminate risk Security must work through the business
  • 4. Knowing Your Role Role is fundamental to problem solving Where you report into your organization makes a big difference Identify your function and capacity Is security tactical or strategic? Is security a business stake-holder?
  • 5. Identifying a Cornerstone Build your program on a key principle You must answer this question: “Why does the business care about security?” External compliance or regulations Internal governance requirements Competitive differentiator/advantage Incident prevention
  • 6. Security Program Charter Publish a charter document Apply these 5 key knowledge points Focus on the cornerstone Use content & context for business metrics Publish the risk profile components Emphasize transparency Focus on building business value This is your road map to success
  • 7. Business Value Metrics Definition: metrics which can meaningfully quantify the business value proposition of risk mitigation Keys to good metrics: Must be business-input driven Uniformity of perspective Must never allow for “maybe”
  • 8. Context & Content Assign concrete values to $Rn and $V Content – Monetary value of data asset ($V) Context – Assign asset value relative to environment Value Ratio: Data Value Asset ($Vn) = $Rn total assets ($Vt)
  • 9.
  • 11. Moderate – Indexed, searchable, sparsely linked
  • 12. Low – Non-indexed, private, non-linkedContent – How desired is the data in the site?
  • 13. Context & Content Business Exposure (Exp): Public business risk profile derived from the dynamics of the business unit High | Moderate | Low Context – What line of business is the company/unit in? How does the line of business contribute to the amount of risk the company undertakes in daily operations? Consider your business’s risk management group your best ally Business Exposure
  • 14. Context & Content Acme Credit Company Acme Credit Company processes credit card transactions, and thus stores and processes hundreds of millions of credit cards weekly. Web site An is a portal for merchant processing of credit and debit payments, temporarily storing as many as one million credit cards for processing per day; this is the Acme Co’s primary business. $Rn = .8 (most of the company’s total assets are here) $V = $10,000,000 (business value of 1 million records) Vis = Moderate (indexed, searchable, but non-publicized site) Exp = High (credit card processors are a big target) Case Study
  • 15. Building Risk Profiles Allows for mathematically derived priorities based on business-driven input Goals: Transparency: formula for deriving priority metric is published Objectivity: real numbers remove bias Each site must have a risk profile Prioritization Matrix
  • 16. Building Risk Profiles Prioritization Matrix Assigning Values to the Matrix $V = Direct dollar-value of asset $R = Computed ratio Vis values Exp values
  • 17. Building Risk Profiles How does priority get computed? Priority = Log10 ($V x $R x Vis x Exp) Heavily weighted to data value Rightfully so! Data value is important $R works to segregate sites within a business Vis and Exp work to distinguish between multiple businesses The Formula
  • 18. Building Risk Profiles The formula is not a Silver Bullet Prioritization addresses business value (of a site) objectively Addressing business value increases the chance of your program’s success Your Goal: risk reduction and business value The Formula
  • 19. Executing Demonstrate business understanding Continue a two-way conversation Be ready to change strategies with the business
  • 20. Questions? Click on the questions tab on your screen, type in your question (and name if you wish) and hit submit.