acquiring risk: information security due diligence risk: information security due diligence ......

26
CRISC CGEIT CISM CISA 2013 Fall Conference – “Sail to Success” Acquiring Risk: Information Security Due Diligence Andrew McDonnell, VP–Security Solutions, AsTech Consulting, Inc. Professional Techniques – T24

Upload: dinhtu

Post on 27-May-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

CRISC

CGEIT

CISM

CISA2013 Fall Conference – “Sail to Success”

Acquiring Risk: Information Security Due Diligence

Andrew McDonnell, VP–Security Solutions, AsTech Consulting, Inc.Professional Techniques – T24

11/10/2015 2

CRISC

CGEIT

CISM

CISA2013 Fall Conference – “Sail to Success”

“AN AMERICA ONLINE FILM”:MERGERS AND ACQUISITIONS

2

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

How Does This Work?

1. Identification of interest

2. Assessment of worth

a. Obligations

b. Liabilities

c. Litigation

d. Infringement

e. Contracts

f. …

3

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

How Does This Work?

1. I like you

2. Are you good for me?

4

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

How Does This Work? Sometimes Badly

5

11/10/2015 6

CRISC

CGEIT

CISM

CISA2013 Fall Conference – “Sail to Success”

CAVEAT EMPTOR:HOW WE GOT INTO THIS BUSINESS

6

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Story Time

1. Customer Identifies Target

2. Standard Due Diligence

3. Purchase

4. Security Review

5. Regret

7

11/10/2015 8

CRISC

CGEIT

CISM

CISA2013 Fall Conference – “Sail to Success”

WAS $970M THE RIGHT PRICE?

8

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Heard of this one?

2007 – Justin.tv launched

2011 – Gaming spun off as Twitch.tv

2013 – 43M monthly viewers, profitable

2014 – Acquired by Amazon for $970M

2015 – User credentials, payment info(?) hacked

9

11/10/2015 10

CRISC

CGEIT

CISM

CISA2013 Fall Conference – “Sail to Success”

HEADLINE INSURANCE:APPROACHES TO MEASURE RISK

10

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Return On Security Investment

• Software Assessment

– Quickly evaluate security liabilities

– Quantifiable liability impact

• Infrastructure Assessment

– Data exposure

– Risk assessment maturity

• Salable Context For Traditional Assessments

11

11/10/2015 12

CRISC

CGEIT

CISM

CISA2013 Fall Conference – “Sail to Success”

EVERYONE IS IN THE SOFTWARE BUSINESS

12

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Quantifying Software Liabilities

• Find vulnerabilities and flaws

• Evaluate code complexity

• Determine costs

• Contextualize within risk tolerance

13

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Identify Security Flaws

• Static analysis

• Code review

Web Applications

• Dynamic analysis

• Penetration testing

14

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Establish Code Complexity

• Development maturity

• Application model

• User roles

• Transaction depth

• Interface type(s)

• Sensitive data handling

• Dependent architecture

15

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Estimate Costs

• Difficulty to fix

– Flaw types

– Code complexity

• Developer familiarity

• Volume of flaws

• Market delays

16

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Adjust Risk Thresholds

• Cost-benefit curves

• Target identification

• Price adjustment

17

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Contextual Static Analysis

• Automated assessment

• Results validation

• Code disposition

• Risk ranking

• Liability projection

18

11/10/2015 19

CRISC

CGEIT

CISM

CISA2013 Fall Conference – “Sail to Success”

SETEC ASTRONOMY:WHAT DATA LOSS WILL COST

19

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

IT Infrastructure Liability

• Establish data flows

• Map infrastructure zones

• “Data balance sheet”

• Apply to value model

20

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Data Flows

• Data classification

• Least privilege

• Retention necessity

• Unintentional accumulation

21

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Zone Defense

• Asset classification

• Role segmentation

– Ingress

– Egress

– Reuse

– Recovery

• Encryption / storage protection

22

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Profit and Loss

• Parameterize data value

• Relate to breach cost

• Assess breach likelihood

• Contextualize breach in assets and liabilities

23

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Example

• SaaS platform

• 500k subscribers

• Average subscription $60/year

• Breach cost averages $150/record

• Lax data protection => 2.5 lost years

• Assign weight and apply to liabilities

24

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Return of the Return On Security Investment

• Software Assessment

• Infrastructure Assessment

• Salable Context For Traditional Assessments

• Value For Buyers and Sellers

25

2015 Fall Conference – “CyberSizeIT”November 9 – 11, 2015

Thank You

Andrew McDonnell

[email protected]

510.270.5551

astechconsulting.com

26