Time
3 hours 54 minutes
Difficulty
Advanced
CEU/CPE
4

Video Description

Instructor Kelly Handerhan will list important questions that must be asked if the CISO is to develop an effective security strategy for the organization. - Does the CISO routinely meet with or brief business management? - When was the last time top management got involved in security-related decisions? - How often does top management get involved in progressing security solutions? - Would people recognize a security incident if they saw one, and what would be their reaction? - Does management know who is responsible for security? - Does anyone know how many computers the company owns and would management now if some went missing? - Are damage assessment and disaster recovery plans in place? - Has management identified all information that would violate policy, legal, or regulatory requirements, or cause embarrassment/ competitive disadvantage if leaked? Course participants will learn the numerous pitfalls inherent in developing a security strategy that can compromise your organization's data. - Overconfidence- in inherent security, your own ability, or the abilities of your team - Optimism- you believe that "it won't happen to you," and if something does happen, that you can recover - Anchoring- As a CISO, you're too reliant on past experience or quantitative data - The status quo- Believing it will always be the way it has been - Mental accounting- being more willing to spend money in one place than another, no direct line to profit - The herding instinct- For senior managers the only thing worse than making a huge mistake is being the only one in the industry who makes it False consensus- CISOs may overestimate the extent that others share their views, or only seek out sources that support their views

Video Transcription

00:04
now as I move into my role as a scissors. Oh, and I'm looking to gain information about the organization. I want to find out what's currently in place, where we are, versus where we wanna get.
00:18
And you know, the idea there is looking at the current state versus the desired state, and that's exactly what it sounds like. It's Where are we versus Where do we want to be?
00:28
So when I come into an organization, I've got some questions I have to ask now I'm not going to stop and read every single one of these. But I do think that there are a couple that need to be discussed. All right, So first question, we're looking at an organization.
00:43
Does the previous or has the previous says, Oh, how routinely did they meet with
00:48
business management? How frequently did they interact with them? Is that something that's been a part of normal operations, or would this be something new?
00:57
Um, how involved his top management, senior management in security related decisions Do they just, you know, is there ah, consideration? Do they a part in the decision making process?
01:11
Uh, what criteria do they use to approve or decline security mechanisms that have been recommended. What's their role? How involved are they?
01:21
Does management understand the different roles of security within an organization? Now, again, I'm gonna ask these much more delicately than saying, Hey, do you have any idea what goes on in your company? But ultimately these air, the things that I want to discover How would employees know if there was a security incident?
01:40
Do they have a good understanding of what constitutes a security incident as well as what to do? Should they see one?
01:47
Um, how is inventory managed? Right? Because, you know, many organizations are very careless with their inventory and, you know, we've got thousands and thousands of dollars wrapped up in her company laptops and desktops and other elements. Rounder switches. How are they protected currently?
02:05
Um, do we have disaster recovery plans
02:07
in place? What are they? How are they documented? Who's trained? Are the teams well defined or the roles and responsibilities establish? Where do we stand in disaster coverage planning? I, um do we understand what liabilities has management identified all the information?
02:28
Um,
02:29
that would violate company policy, legal requirements, standards, whatever do we understand where are valuable information is or what it is. And how is that currently protected?
02:44
When's the latest attack the organization has has gone through? Did we have a virus? Some sort of mount? Where infection was it? And more active Attack from an intruder.
02:54
Um, how often do these attacks happen?
02:59
Um, how many people are online in our network on any given day? How many different entities have access to our network?
03:08
Are we monitoring our Do we have a monitoring system in place for employees versus one for contractors? How do we segment out these non, uh, consistent users from the rest of our organization?
03:23
Do we have them segmented to their own network, their own V land? How if we divided up that
03:30
I give trust versus untrusted, we'll talk about that later, but it's exactly what it sounds like. We have a reasonable degree of trust in our internal employees. We don't trust them exclusively, but we have had,
03:44
you know, we work with them. We have policies in place for them that got through screening before employment. There's a reasonable degree of trust in our employees,
03:53
very little trust for outside entities like customers, contractors and so on. So how do we segment out There's different layers of trust,
04:02
And how do we approach security? Isn't something that we think you know has to be decided upon. Before we initially design an element made, we do software development in house. How early on in the process do we talk about security or do we developed the program and go, Oh,
04:21
we better secure it.
04:24
Let's release the patch later to go back and fix the vulnerabilities. And again, that's what is our mindset in our approach to security. When we talk about developing strategy, we've got no these pieces of information,
04:38
all right, so when I talk about questions to ask, those are good ones.
04:43
Now, In addition to that, we've also got to think about what are the pitfalls that come along with developing strategy. What are the pitfalls that keep us? We're getting honest. Ah, an actual answers to the questions that we have.
04:56
Why is senior management reluctant to change? Well, we've got a lot of different pitfalls that come in the way of us moving forward effectively. One is overconfidence.
05:08
You know what? We haven't had a compromise. Therefore we were safe. It's that old idea. If it ain't broke, don't fix it. Well,
05:15
you know, many of these mechanisms in configurations have been broken, and it's just a matter of time before it's compromised in our environment. So that over confidence or, you know, that could come from
05:28
Hey, we just bought a $30,000 firewall. We better be covered. You know, overconfidence in single mechanisms, overconfidence in technology, over confidence and skill of our team, our own personal skills. Overconfidence is a killer in the world of security. You know,
05:46
the longer I've been insecurity,
05:48
the more threats and vulnerabilities I realize there are. And the more
05:54
the more I realized that you can never rest
05:57
optimism. You know, it's that idea of all this will happen to me. You know, um, we're small organization. Who's gonna target us? We're good
06:09
optimization. You know, we hope for the best, but we prepare for the worst.
06:15
Another idea anchoring. You know, we hear one value or we have one experience, and we stick to that. It sticks in our mind. So, um, you know, if we look at
06:28
ah, five years ago and we find out that during the course of a year, we only had a single malware malware attack. Well, that sticks in our mind, right? We don't have a tax that frequently. The last time I talked about it, we only had a single attack.
06:43
Yeah, that was five years ago. The threat environment has changed directly. But if we cling to that old information, we confined ourselves locked in and making poor decisions. One of the worst ones in the thing that's hardest to fight, I think, sometimes is the status quote. This is how it is.
07:01
What?
07:02
Because it's always been this way,
07:04
right? We're reluctant to change. Sometimes you hear that described his inertia. An object at rest tends to stay at rest, right? We just tend to be very comfortable and very relaxed where we are. So as security managers,
07:20
as information security officers, we've got to really fight that idea off.
07:27
We're doing this because we always have. Just because we've always done it doesn't make it the best decision, especially because of emerging threats, mental accounting. Sometimes people have odd justifications for how they spend their money, you know, and ultimately
07:46
because of the fact that security does not profit
07:49
an organization. You will never make a profit off of security. Now you'll prevent losing money, Absolutely. But because we don't have that direct line to profitability, sometimes it's difficult for a manager to put out an investment into security because I don't see that immediate return.
08:09
All right, the herding instinct. You know, sometimes we look at what other officers are peers, other other industries they're doing. And we tend to do something because everybody else is doing it. You know, that's kind of a one size fits all solution.
08:28
Um, as trends emerge, you know, organizations today are moving to the cloud very, very quickly, and there are a lot of good reasons, a lot of good benefits to the cloud. But
08:39
the cloud isn't sort of this panacea that fixes every problem that's out there. I gotta get to the cloud. Why? Because everybody's going to the cloud. I do it. Why? Because he's in the cloud, right? We've gotta have that mentality that says we're looking for solution that meets our organization's needs
08:58
high and then a false concensus. I'm sure everybody thinks this way. You know that idea of because I have a belief everyone else naturally would have that same belief. We find that that's frequently not true. And we need Thio.
09:16
Make sure that we surround ourselves
09:20
with people that will give us honest opinions and that we conduct risk assessments in a way that has integrity and in a way that facilitates honest opinions and honest information. You know, if I only surround myself with people that think just like me,
09:37
I'm gonna be open and they're gonna leave themselves open to the same vulnerabilities that I would.
09:43
So we gotta watch for these pitfalls And we have to make good, objective decisions as an information security officer, because again, what were ultimately looking to do is give the greatest value to business.

Up Next

Chief Information Security Officer (CISO)

In this CISO certification training, you will learn what other CISO's are focusing their time and attention on. Among the key topics, you will learn how to implement the proven best practices that make for successful cyber security leadership.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor