Copyright ©2011Savid
Security As A Service
The Future of Security Services
Michael A. Davis
Chief Executive Officer
Savid Technologies, Inc.
http://www.savidtech.com
Agenda
• Trends that you must get in front of
• What is SecaaS?
• Why do we need this methodology?
• How do I use it?
• War Stories
• Ask Questions
Who am I?
• Michael A. Davis
– CEO of Savid Technologies
• IT Security Consulting
• Risk Assessments/Auditing
• Security Remediation
– Speaker at Major Security Conferences
• Defcon, CanSecWest, Toorcon, Hack In The Box
– Open Source Software Developer
• Snort
• Nmap
• Dsniff
Author
InformationWeek Contributor
Where we got our data
» March 2012 And November 2011 Survey
» Over 1,100 Security Professionals
» Follow-up Interviews With Fortune 1000 CSO/CISOs
» Wide Variety Of Industries
– Financial
– Healthcare
– Business Services
What is everyone concerned
with?
Source: Savid/Information Week Data Survey, 2011
They are paying attention
Complexity is everywhere
Application
integration
OS
Database
Collaboration
Business
intelligence/
Analytical
applications
Application
development
tools
Hardware
platform
Applications
Services
Computer Network Storage
FS Applications
Security
IDS
Content Filtering
Management
AV/Spyware Anti-Spam
Identity Management
Regulatory Compliance
Firewalls
Vulnerability Assessment
Monitoring
Network & Systems
Management
Management Vendors
Dynamic Provisioning
Storage
Source: CA, 2009
Complex IT Projects Fail - A lot
Out Of 200 Multi-nationals:
• 67% Failed To Terminate Unsuccessful Projects
• 61% Reported Major Conflicts
• 34% Of Projects Were Not Aligned With Strategy
• 32% Performed Redundant Work
1 In 6 Projects Had A Cost Overrun Of 200%!
Source: 2011 Harvard Business Review – Berlin Univ Technical survey
The Problem
• Too many areas to audit
• Security can’t keep up either
• Velocity of change is high
• Audit or Security isn’t involved in the critical
projects
How do we handle a high velocity of change while
providing a high level of assurance that controls
are being implemented?
The Future of IT Audit
© PWC IA Audit 2012 Report
We All Do Them
Source: 2011 InformationWeek Analytics Strategic Security Survey
0%
10%
20%
30%
40%
50%
60%
70%
80%
Yes No Don't Know
% that perform Risk Assessments
2012
2011
The Reality
Source: 2011 InformationWeek Analytics Strategic Security Survey
Very
30%
Somewhat
67%
Not At All
3%
Risk Assessment
Effectiveness
That Cloud Thingy
What This Means To Security
Amazon EC2 - IaaS
The lower down the stack the Cloud provider
stops, the more security you are tactically
responsible for assessing and implementing
yourself.
Salesforce - SaaS
Google AppEngine - PaaS
RFP/Contract
It In
RFP/Contract
It In
Build It InBuild It In
Future of Audit and Security
Adequacy = Compliance
Effectiveness = Consultancy
Audit As a Service
• Be Relevant Not Redundant
• Partner with other risk functions in company
• Focus on start-up/future activities
• Be flexible, don’t limit to the annual plan
• Our recommendation is to stop trying to make
everyone a security expert and instead
• Focus on educating people so they know when to
ask for expertise
To be successful IT Audit’s fundamental VALUE
proposition MUST SHIFT
Security Services?
The Services Menu
• Risk Assessments
– NOT CONTROL ASSESSMENTS
• Guidance without risk levels
– Areas of concern, “pre-audit”
• Cloud Vendor Selection Analysis
• Education
• Advisory Services
• Metric/KRI Development
Why This Works
• Providing real value – Audit is asked to be involved
• Communication increases helping develop your team
talent
• Customers understand what services are available
• Audit understands which services are being requested
and which are not as popular. This allows for growth
planning.
• Customers understand how service consumption
affects their budgets.
• Increased accountability
• Closer to continuous monitoring/auditing!
How To Implement
• Approach each as an customer engagement
– Why are we performing this engagement?
– What value can we provide back?
– Can we provide value to another group?
• Surveys/NetPromoter
– “On a scale of one to 10, how likely is it that you
would recommend us to a colleague?”
– Promoters = 9 to 10.
Passive = 7 to 8, satisfied but enthusiastic about
service
Detractors = 0 to 6, unhappy with the service and will
damage teams reputation through word of month.
How To Implement
• Customize your deliverables!
– Not everything needs to be a finding/risk ranking
– What is valuable to the project?
• What other value can we derive from our
process?
– Interviews
– Data Collection
• Augment Security As a Service too!
Getting buy-in
• Metrics and Transparency are essential
• We want to provide consistency
• Reduce one-off high likelihood risks.
• Work with PMO, if you have one.
• Track adoption rates
• Provide incentives to adopt services
Security Services Menu
• Ensure Controls map to technologies being
deployed
• Traditionally you see items such as:
• Content security, Antivirus/Anti-malware,
Spam filtering
• Email encryption, DLP for outbound email,
Web mail, Anti-phishing
A Better Security Menu
• Focus on Services! Not Technologies!
• Internal and / or external penetration test,
Application penetration test
• Host and guest assessments, Firewall / IPS
(security components of the infrastructure)
• Virtual infrastructure assessment
• THEN provide technology options
IT Security As A Service
A Case Study
The Formula Of Successful Risk
Management
PBL = λ1 x p1 + λ2 x p2 + λ3 x p3
Hazard vs. Speculative Risk
Linking to Business Goals
Copyright Carnegie Mellon SETI MOSAIC Whitepaper
Outcome Management
Copyright Carnegie Mellon SETI MOSAIC Whitepaper
Conclusion
Contact Information
Michael A. Davis
mdavis@savidtech.com
708-532-2843
Twitter: @mdavisceo

More Related Content

PDF
Security as a Service with Microsoft Presented by Razor Technology
PDF
Security As A Service
PDF
Secaa s cat_10_network_security_implementation_guidance
PDF
Cloud Security Governance
PPTX
Identity's Role in a Zero Trust Strategy
PPTX
Secure remote access to AWS your users will love
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PPTX
Zscaler ThreatLabz dissects the latest SSL security attacks
Security as a Service with Microsoft Presented by Razor Technology
Security As A Service
Secaa s cat_10_network_security_implementation_guidance
Cloud Security Governance
Identity's Role in a Zero Trust Strategy
Secure remote access to AWS your users will love
Rethinking Cybersecurity for the Digital Transformation Era
Zscaler ThreatLabz dissects the latest SSL security attacks

What's hot (19)

PPT
Securing Sensitive Data in Your Hybrid Cloud
PDF
SOC-as-a-Service - comSpark 2019
PPTX
Maximize your cloud app control with Microsoft MCAS and Zscaler
PDF
CSA Introduction 2013 David Ross
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
PDF
Msft cloud architecture_security_commonattacks
PDF
The Year the Internet Fell Apart
PPTX
Service Organizational Control (SOC 2) Compliance - Kloudlearn
PDF
Cybersecurity frameworks globally and saudi arabia
PPTX
Intel SaaS Security Playbook
PPTX
Security as a Service Model for Cloud Environment
PDF
63 Requirements for CASB
PDF
How Zero Trust Makes the Mission Simple & Secure
PPSX
The security of SAAS and private cloud
PPTX
Mobile App Security: Enterprise Checklist
PPTX
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
PPTX
Faster, simpler, more secure remote access to apps in aws
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PPT
Ransomware webinar may 2016 final version external
Securing Sensitive Data in Your Hybrid Cloud
SOC-as-a-Service - comSpark 2019
Maximize your cloud app control with Microsoft MCAS and Zscaler
CSA Introduction 2013 David Ross
3 Modern Security - Secure identities to reach zero trust with AAD
Msft cloud architecture_security_commonattacks
The Year the Internet Fell Apart
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Cybersecurity frameworks globally and saudi arabia
Intel SaaS Security Playbook
Security as a Service Model for Cloud Environment
63 Requirements for CASB
How Zero Trust Makes the Mission Simple & Secure
The security of SAAS and private cloud
Mobile App Security: Enterprise Checklist
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Faster, simpler, more secure remote access to apps in aws
Adopting A Zero-Trust Model. Google Did It, Can You?
Ransomware webinar may 2016 final version external
Ad

Viewers also liked (11)

PDF
Security As A Service
PPTX
Elite Force Security Service Brief
PDF
Cyber Security as a Service
PDF
Hosted Security as a Service - Solution Architecture Design
PPTX
Security As A Service In Cloud(SECaaS)
PPT
Security As A Service
PDF
Security Service Management
PPTX
Security As A Service
PDF
How to avoid your website from keep getting hacked
PDF
Security as a Service in a Financial Institution: Reality or Chimera?
PPTX
Security as a Service = JSOC
Security As A Service
Elite Force Security Service Brief
Cyber Security as a Service
Hosted Security as a Service - Solution Architecture Design
Security As A Service In Cloud(SECaaS)
Security As A Service
Security Service Management
Security As A Service
How to avoid your website from keep getting hacked
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service = JSOC
Ad

Similar to IT Security As A Service (20)

PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PDF
Does title make a difference?
PDF
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
PDF
Security Hurts Business - Don't Let It
PPTX
Top Cybersecurity Challenges Facing Your Business
PDF
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
PDF
Fall2015SecurityShow
PPTX
Information Security and your Business
PDF
The Future of Software Security Assurance
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PDF
Rogers eBook Security
PPTX
Enterprise under attack dealing with security threats and compliance
PDF
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
PPSX
Meraj Ahmad - Information security in a borderless world
PPTX
IBM Relay 2015: Securing the Future
 
PPTX
11 19-2015 - iasaca membership conference - the state of security
PDF
Building an effective Information Security Roadmap
PPTX
Top 12 Threats to Enterprise
PDF
G05.2013 gartner top security trends
PPT
Dr K Subramanian
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
Does title make a difference?
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Security Hurts Business - Don't Let It
Top Cybersecurity Challenges Facing Your Business
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Fall2015SecurityShow
Information Security and your Business
The Future of Software Security Assurance
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rogers eBook Security
Enterprise under attack dealing with security threats and compliance
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
Meraj Ahmad - Information security in a borderless world
IBM Relay 2015: Securing the Future
 
11 19-2015 - iasaca membership conference - the state of security
Building an effective Information Security Roadmap
Top 12 Threats to Enterprise
G05.2013 gartner top security trends
Dr K Subramanian

More from Michael Davis (7)

PDF
Can You Steal From Me Now? Mobile and BYOD Security Risks
PDF
Make Mobilization Work - Properly Implementing Mobile Security
PDF
Cost Justifying IT Security
PPTX
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
PDF
Applicaiton Security - Building The Audit Program
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PDF
Michael Davis Bio
Can You Steal From Me Now? Mobile and BYOD Security Risks
Make Mobilization Work - Properly Implementing Mobile Security
Cost Justifying IT Security
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Applicaiton Security - Building The Audit Program
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis Bio

Recently uploaded (20)

PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Auditboard EB SOX Playbook 2023 edition.
DOCX
search engine optimization ppt fir known well about this
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PPTX
Internet of Everything -Basic concepts details
PDF
giants, standing on the shoulders of - by Daniel Stenberg
Convolutional neural network based encoder-decoder for efficient real-time ob...
Improvisation in detection of pomegranate leaf disease using transfer learni...
Auditboard EB SOX Playbook 2023 edition.
search engine optimization ppt fir known well about this
Training Program for knowledge in solar cell and solar industry
sustainability-14-14877-v2.pddhzftheheeeee
sbt 2.0: go big (Scala Days 2025 edition)
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Flame analysis and combustion estimation using large language and vision assi...
Advancing precision in air quality forecasting through machine learning integ...
Consumable AI The What, Why & How for Small Teams.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Module 1 Introduction to Web Programming .pptx
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Internet of Everything -Basic concepts details
giants, standing on the shoulders of - by Daniel Stenberg

IT Security As A Service

  • 1. Copyright ©2011Savid Security As A Service The Future of Security Services Michael A. Davis Chief Executive Officer Savid Technologies, Inc. http://www.savidtech.com
  • 2. Agenda • Trends that you must get in front of • What is SecaaS? • Why do we need this methodology? • How do I use it? • War Stories • Ask Questions
  • 3. Who am I? • Michael A. Davis – CEO of Savid Technologies • IT Security Consulting • Risk Assessments/Auditing • Security Remediation – Speaker at Major Security Conferences • Defcon, CanSecWest, Toorcon, Hack In The Box – Open Source Software Developer • Snort • Nmap • Dsniff
  • 6. Where we got our data » March 2012 And November 2011 Survey » Over 1,100 Security Professionals » Follow-up Interviews With Fortune 1000 CSO/CISOs » Wide Variety Of Industries – Financial – Healthcare – Business Services
  • 7. What is everyone concerned with? Source: Savid/Information Week Data Survey, 2011
  • 8. They are paying attention
  • 9. Complexity is everywhere Application integration OS Database Collaboration Business intelligence/ Analytical applications Application development tools Hardware platform Applications Services Computer Network Storage FS Applications Security IDS Content Filtering Management AV/Spyware Anti-Spam Identity Management Regulatory Compliance Firewalls Vulnerability Assessment Monitoring Network & Systems Management Management Vendors Dynamic Provisioning Storage Source: CA, 2009
  • 10. Complex IT Projects Fail - A lot Out Of 200 Multi-nationals: • 67% Failed To Terminate Unsuccessful Projects • 61% Reported Major Conflicts • 34% Of Projects Were Not Aligned With Strategy • 32% Performed Redundant Work 1 In 6 Projects Had A Cost Overrun Of 200%! Source: 2011 Harvard Business Review – Berlin Univ Technical survey
  • 11. The Problem • Too many areas to audit • Security can’t keep up either • Velocity of change is high • Audit or Security isn’t involved in the critical projects How do we handle a high velocity of change while providing a high level of assurance that controls are being implemented?
  • 12. The Future of IT Audit © PWC IA Audit 2012 Report
  • 13. We All Do Them Source: 2011 InformationWeek Analytics Strategic Security Survey 0% 10% 20% 30% 40% 50% 60% 70% 80% Yes No Don't Know % that perform Risk Assessments 2012 2011
  • 14. The Reality Source: 2011 InformationWeek Analytics Strategic Security Survey Very 30% Somewhat 67% Not At All 3% Risk Assessment Effectiveness
  • 16. What This Means To Security Amazon EC2 - IaaS The lower down the stack the Cloud provider stops, the more security you are tactically responsible for assessing and implementing yourself. Salesforce - SaaS Google AppEngine - PaaS RFP/Contract It In RFP/Contract It In Build It InBuild It In
  • 17. Future of Audit and Security Adequacy = Compliance Effectiveness = Consultancy
  • 18. Audit As a Service • Be Relevant Not Redundant • Partner with other risk functions in company • Focus on start-up/future activities • Be flexible, don’t limit to the annual plan • Our recommendation is to stop trying to make everyone a security expert and instead • Focus on educating people so they know when to ask for expertise To be successful IT Audit’s fundamental VALUE proposition MUST SHIFT
  • 20. The Services Menu • Risk Assessments – NOT CONTROL ASSESSMENTS • Guidance without risk levels – Areas of concern, “pre-audit” • Cloud Vendor Selection Analysis • Education • Advisory Services • Metric/KRI Development
  • 21. Why This Works • Providing real value – Audit is asked to be involved • Communication increases helping develop your team talent • Customers understand what services are available • Audit understands which services are being requested and which are not as popular. This allows for growth planning. • Customers understand how service consumption affects their budgets. • Increased accountability • Closer to continuous monitoring/auditing!
  • 22. How To Implement • Approach each as an customer engagement – Why are we performing this engagement? – What value can we provide back? – Can we provide value to another group? • Surveys/NetPromoter – “On a scale of one to 10, how likely is it that you would recommend us to a colleague?” – Promoters = 9 to 10. Passive = 7 to 8, satisfied but enthusiastic about service Detractors = 0 to 6, unhappy with the service and will damage teams reputation through word of month.
  • 23. How To Implement • Customize your deliverables! – Not everything needs to be a finding/risk ranking – What is valuable to the project? • What other value can we derive from our process? – Interviews – Data Collection • Augment Security As a Service too!
  • 24. Getting buy-in • Metrics and Transparency are essential • We want to provide consistency • Reduce one-off high likelihood risks. • Work with PMO, if you have one. • Track adoption rates • Provide incentives to adopt services
  • 25. Security Services Menu • Ensure Controls map to technologies being deployed • Traditionally you see items such as: • Content security, Antivirus/Anti-malware, Spam filtering • Email encryption, DLP for outbound email, Web mail, Anti-phishing
  • 26. A Better Security Menu • Focus on Services! Not Technologies! • Internal and / or external penetration test, Application penetration test • Host and guest assessments, Firewall / IPS (security components of the infrastructure) • Virtual infrastructure assessment • THEN provide technology options
  • 29. The Formula Of Successful Risk Management PBL = λ1 x p1 + λ2 x p2 + λ3 x p3
  • 31. Linking to Business Goals Copyright Carnegie Mellon SETI MOSAIC Whitepaper
  • 32. Outcome Management Copyright Carnegie Mellon SETI MOSAIC Whitepaper
  • 33. Conclusion Contact Information Michael A. Davis [email protected] 708-532-2843 Twitter: @mdavisceo