Information Security - Hewlett-Packard
Information Security - Hewlett-Packard
Information Security - Hewlett-Packard
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
from HP Information Security
Issue 4 2011
Inform meets Stephen Bonner,
Barclays Risk Management guru.
He's also the most Influential Person
in Information Security, we find out
what makes him tick.
Banking on
Security
7 Trends
for 2011
The top seven
trends that are
set to transform
information security in 2011 –
and beyond.
Lessons from
the CISO Club
A report from the
findings of the
influential CISO Club on
social networking, consumerisation
and more.
An Economic
Outlook
A look at the
economic conditions
ahead and how they
will affect the decisions that CISOs
must make.
Check Point SmartEvent Software Blade
Turns Security Information
into ACTION
The SmartEvent Software Blade from Check Point is the fi rst and only unifi ed
event analysis and management solution that delivers real-time, actionable threat
management information.
More
Visibility
Faster
Remediation
Better
Integration
More
Simplicity
©2003-2010 Check Point Software Technologies Ltd. All rights reserved.
Check Point, the Check Point logo and SmartEvent are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affi liates.
www.hp.com/info/security
In this edition
4 News
Latest announcements,
products and updates from
leading security vendors.
Foreword
Bob Dylan once sang “The Times They Are A-Changing”,
an acerbic and prophetic take on the social and cultural
upheavals about to engulf the 1960s, a decade that can
be described as truly transformational.
6 The Security Year
In Review
A look back at some of the
highs and lows of the year in
security, plus what happened
elsewhere in the world.
8 7 Trends for 2011
The top seven trends that are
set to transform information
security in 2011 – and beyond.
11 Interview: Stephen
Bonner, Barclays
Inform gets an audience with
the man voted the Most
Influential Man Person in
Information Security.
14 An Economic
Outlook
A look at the economic
conditions ahead and how
they will affect the decisions
that CISOs must make.
19 The CISO Club
A report from the findings
of the influential CISO
Club on social networking,
consumerisation and more.
22 Q&A: Larry
Ponemon
The founder of the Ponemon
Institute shares his views on
security effectiveness, ROI
and the lessons he’s learned.
Fifty years on I believe we are on the
cusp of a transformation in our industry.
We have already seen huge changes
in technology and the social impact of
those. Information security has gradually
risen up the food chain to become a
board level concern. Threats to business
continuity have reached unprecedented
levels of sophistication – the presence of
politically and even militarily motivated
attacks is very real. At the same time,
financial attacks are now the domain of
ruthless international criminal gangs.
Change and transformation are the twin
themes that run through this issue of
Inform. If the security community is to
manage this change, industry leaders need
to provide best-in-class service levels.
Which is why I am delighted to introduce
HP Information Security to you. We’ve
fused the capability of the information
security specialist, Vistorm, with the
scale, dedicated R&D and innovation of
HP to create a dynamic new entity called
HP Information Security.
As CEO I am committed to our goal of
transforming security. We have the
finest security expertise and partners;
now backed up with the resources of the
world’s largest technology company. To
put that in perspective here’s just one
statistic: HP serves more than one billion
customers in more than 170 countries on
six continents. That’s some clout.
So what’s hot in this issue We look at
some of the key trends that CISOs and
their teams will need to be on top of in
2011 and beyond (page 8). Our interview
(page 11) features Stephen Bonner,
Managing Director, Barclays Information
Risk Management. It’s a great read and
shows why he was recently voted the
'Most Influential Man in Information
Security' by SC Magazine.
There’s a report on how the economic
conditions will impact security strategies
in 2011 with expert comment from
financial guru Justin Urquhart Stewart
(page 14)
You can tap into the findings of our
exclusive CISO Club (page 19) which
brings together some of the best minds in
information security. Of course we will be
running more CISO Clubs in the year ahead.
Next year will also see the return of
our highly successful and influential
Information Security Leaders events,
set to focus on the theme of security
transformation and change. I look
forward to welcoming you there.
The times they are a-changing for sure;
for us and our customers. But I am
excited by the challenges ahead and the
solutions that HP Information Security
will develop.
Dan Turner
CEO, HP Information Security
Issue 4 | 2011
Published by HP Information Security
Web: www.hp.com/info/security
For enquiries about Inform, please contact
sarah-ashley.stephens@hp.com
Produced by °Crisp Design
www.crisp-design.co.uk
Cover photography: Teri Pengilley
The third party views expressed in this magazine are
those of the contributors, for which HP Information
Security accepts no responsibility. Readers should
take appropriate professional advice before acting
on any issue raised. Reproduction in whole or in
part without permission is strictly prohibited.
© 2010, Hewlett-Packard Development Company, L.P.
All Rights Reserved.
When you have finished
with this magazine
please recycle it.
www.hp.com/info/security
News
Check Point
Check Point wins best IPS and UTM
solutions in Information Security
Readers' Choice awards
Check Point scored a double success in the 2010
Information Security awards, winning the Readers' Choice
Award gold medal winner for Best Intrusion Prevention
solution and Best Unified Threat Management solutions.
The awards are selected by the readers and editors of
Information Security and SearchSecurity.com.
Check Point was also recognized for its leadership in
Network Access Control (NAC) and Secure Remote
Access, with Check Point Endpoint Security and
Connectra winning silver and bronze in their respective
categories.
"These awards clearly validate our products' strength,
performance and Check Point's pure focus on security.
Every vote is clear testament to our continued
commitment to security innovation," said Juliette Sultan,
head of global marketing at Check Point.
For further information visit: www.checkpoint.com
McAfee
McAfee moves to speed delivery of
security solutions into virtualised
environments
McAfee has announced its Management for Optimised
Virtual Environments (MOVE) platform, which it says
will speed the delivery of security and management
solutions into virtualised environments.
The anti-virus capable solution is claimed to be the
first to be delivered within a virtualised infrastructure
avoiding the problems of running a traditional anti-virus
in virtual machines.
“If you have anti-virus running on ten virtual machines
and they all attempt to scan at once you get AV
storming. It kills your CPU.” said Brian Foster, product
manager at McAfee
The new platform consists of a set of APIs that sit on top
of a hypervisor, or virtual machine monitor to optimise
security functions while minimising performance
overheads. This enables the system to offload the
scanning requirement to a guest virtual machine
operating on the same platform, meaning that the scan
only needs to run once.
For further information visit: www.mcafee.com
RSA RSA unveils new solution to deliver end-to-end data security
RSA, the security division of EMC, has announced its
new Data Protection Manager, a product designed to
give customers data protection capabilities built in to
the application.
According to RSA the product combines tokenisation and
application encryption, two popular application-based
controls, with advanced token and key management to
deliver end-to-end data security.
The company believes that by protecting data at the
source, within the application that's creating or using
it, the new product will help ensure seamless data
protection throughout the information lifecycle.
"The majority of on-line data breaches happen within the
server or application, so mitigating this risk is critical for
overall data protection," said Jon Oltsik, principal analyst,
Enterprise Strategy Group at RSA.
"Application-based data security provides a high-level
of protection because data is protected at the point
of capture and then remains protected throughout its
lifecycle. Application-based encryption and tokenisation
can be quite effective for this type of data security."
he said.
For further information visit: www.rsa.com
4 2011 | Inform - Issue 4
News
Check Point
Check Point extends its secure blade technology
to mobile workforce
Check Point has released its new Mobile Access Software, said to deliver
fast and secure access to corporate applications from mobile devices.
The new blade integrates advanced SSL VPN capabilities and encryption
technology to protect against security threats as users remotely connect
to the corporate network. Users can download the Check Point Mobile
application for secure, one-touch access directly from mobile devices
running on Apple, Android, Symbian and Windows PC platforms.
"With more users connecting remotely than ever before, mobile computing
presents an ongoing security challenge for organizations that want to
protect company data and resources, while providing employees with
access to the network anytime, anywhere," said Dorit Dor, vice president
of products at Check Point Software Technologies. "Our approach is to
simplify mobile security for businesses and their employees. Users can go
to the Apple app store and download the free application, enter their login
and password, and instantly gain secure access to their corporate data."
With certificate-based authentication and smart user-device pairing,
Check Point says that businesses can ensure each individual has access to
their authorized applications, just as they would from their desktop.
For further information visit: www.checkpoint.com
Websense
Websense Security Labs report proves growing
sophistication of cyber criminals
The 2010 Websense Threat Report shows that cybercriminals are
increasingly sophisticated, deploying targeted attacks. The report
suggests that blended attacks are exploiting security gaps left open by
legacy technologies like firewalls and AV tools.
"The continued rise of organized cyber criminal gangs and the emergence
of targeted advanced malware threats are the most concerning trend
we've seen." said Dan Hubbard, chief technology officer at Websense.
"Security needs to move ahead of the attackers and focus on contextual
classification. Simple binary access controls and castle and moat security
will not solve the complex attacks we see today."
According to the report, in 2010 cyber criminals adapted their strategies
to address social websites and sites with user-generated content. Many
attacks use new tricks and methods of delivery.
Trends predicted for 2011 include blended threats and data loss over the
dynamic Web and the potential for targeted cyber terrorism attacks.
For further information visit: www.websense.com/2010threatreport
Trend Micro
Trend Micro wins
Messaging Solution
of the Year at the
Computing Security
Awards 2010
Trend Micro has won its fourth
industry award in the UK in under
a year, at the Computing Security
Awards 2010. The Computing
Security Awards 2010 reward
achievement in technology
and Trend Micro’s Interscan
Messaging Security Virtual
Appliance won the Messaging
Solution of the Year category.
“To be honoured with an
award is to celebrate the
hard work and effort that
goes into developing and
supporting a product.
The victory is even more
significant when it is
our customers whose
satisfaction with Interscan
Messaging Security Virtual
Appliance has compelled
them to vote for it over
competitor solutions.”
said Tony Larks, Marketing
Director, EMEA at Trend Micro.
Interscan Messaging Security
Virtual Appliance has been
developed to stop new and
evolving threats before they can
enter a network, by utilising Trend
Micro’s cloud-based web and
email reputation technologies.
It also blocks unwanted mail
and blended threats with multilayered
anti-spam and awardwinning
malware protection.
For further information visit:
www.trendmicro.co.uk
Inform - Issue 4 | 2011 5
www.hp.com/info/security
As we look forward to
the New Year we take a
look back at some of the
headlines from another
eventful year in security.
2010
The year kicked off with the news
the Gmail accounts of human rights
activists had been hacked in China
– thought by some to be the work
of the Chinese government. The
incident demonstrated that even
the biggest Internet companies
were vulnerable to hacks. Google
beefed up its security accordingly.
On a happier note the security
industry’s annual White Hat Ball not
only attracted more attendees than
ever before, it also raised £100,000
for the organisation’s chosen charity,
NSPCC Child Line. Well done.
February saw around 7,000 members
of the Association of Teachers
and Lecturers (ATL) affected by a
data breach following the loss of a
laptop and USB stick stolen from
the roadside while an ATL member
packed a car. Unfortunately as is
too typical, neither laptop nor USB
stick were encrypted. Oops.
Moving into April and the biggest news
in IT was the launch of Apple’s iPad. Not
since the iPhone's appearance in 2007
had one piece of technology garnered
so much fevered press coverage. Apple
claimed it sold more than 300,000 iPads
on launch day. Stories of jailbroken iPads
swiftly followed but to date Apple’s
tablet has proved resilient to malware.
In May, MessageLabs (now
Symantec Hosted Services)
reported that nine out of ten
spam emails contained a
URL link in the message and,
perhaps more worrying, five
per cent of all domains found
in spam URLs belonged to
genuine websites, including
those of the major social
networking sites. Further
evidence that proved that the
web was now the dominant
threat vector.
Twitter meanwhile went from strength
to strength with everyone in the known
world seemingly updating the world
on the minutiae of their lives. But the
site itself was starting to creak under
all the success and June saw a number
of outages and service disruptions,
mostly due to the World Cup. Worse
was to come in September when a
number of celebrities' Twitter sites were
hijacked. These were mostly pranks
but sadly it won’t be the last time
that Twitter users will be targeted.
The unusually named Hell Pizza chain
in New Zealand suffered one of the
year’s worse data breaches with the
passwords, emails, home addresses
and phone numbers of around 230,000
customers stolen from its database.
Some Kiwi celebrities were affected
by the breach in July but, according
to the New Zealand Herald at
least one maintained a sense of
humour over the incident.
It's been another eventful year
January: Gordon Brown faces
another attempted coup to oust him.
This time the instigators are Geoff
Hoon and Patricia Hewitt. It fails
February: A special EU Summit
takes place to try an solve the
worsening economic crisis in Greece
March: North Korea sinks South
Korean ship The Cheonan, leading
to rising tensions in the region
April: Apple
launches the iPad
to an expectant
world. Cynics are
confounded by
3 million sales in
the first 80 days
May: The
UK General Election ends in a hung
parliament. A coalition government
led by David Cameron is formed
June: The new
Chancellor George
delivers his first budget
speech. It’s the first
sign of the austerity
measures ahead
July: Andrés Iniesta
scores the only goal in
the World Cup final to
deliver the trophy to
Spain for the first time
6 2011 | Inform - Issue 4
2010 in review
in review
"My Twitter has been hacked, my
Facebook has been hacked and I'm
pretty sure half of New Zealand has
my phone number already. I have
nothing bad to say about Hell." said
local comedian Dai Henwood.
August brought the biggest and
most surprising industry news of the
year as Intel acquired McAfee for a
whopping $7.7bn. Some analysts were
mystified at the purchase but others
saw it as a “smart strategic move”
and one that could potentially embed
security controls at the heart of a
new generation of Intel processors.
The acquisition followed the trend
for the big IT corporations to acquire
and integrate security expertise.
The other big talking point at the
end of the summer was the growing
impact of the Stuxnet worm which,
was spreading further into the
wild. The controversy over Stuxnet
wasn’t just its sophistication and
highly targeted nature but who
actually created it in the first place
and why. One theory was it was
deliberately used to damage Iran’s
nuclear programme but to date this
has not been proven. Whatever its
origins, its creators were remiss in
not designing in a self-destruct. It
ended up damaging power supplies
in India and remains loose.
Then there was Firesheep. This
small extension to Firefox was
created and distributed by a
developer with the sole intention
of exposing a security flaw in the
browser. According to Firesheep’s
creator Eric Butler, it could enable
HTTP session hijacking – where
an attacker steals a user's cookie,
allowing them to do anything the
user can do on a particular website.
The little extension generated a huge
controversy and was downloaded
by security geeks the world over.
In November we had an
example of careless use of
the company email.
According to report in the
Daily Telegraph a banker at
UBS allegedly cost the Swiss
Bank millions in potential fees
after he sent an email to 100
people containing details of
General Motors upcoming
flotation, designed to help the
troubled car company raise
cash. The rogue email
resulted in UBS being
summarily dropped as the
underwriter on the deal.
Not good.
As Inform went to press, December
had not yet happened, but you
can be sure it brought its fair share
of scams, data embarrassments
and threats. Happy New Year
on the world stage...
August: The Food
Standards Agency
investigates allegations
that milk from the
offspring
of cloned cows is being
sold illegally in the UK
and elsewhere in Europe
September: BP finally seals the
leaking deepwater oil well that has
devastated the Gulf of Mexico
October: Wayne Rooney stuns
Manchester United saying he is
leaving, then changes his mind after
securing £160,000 a week deal
November: Prince William and
Kate Middleton cheer up the country by
announcing their engagement
December: After months
of planning, Vistorm officially
becomes HP Information Security,
ready to meet the security
challenges of 2011 and beyond •
Inform - Issue 4 | 2011 7
www.hp.com/info/security
7 Trends
The year ahead will bring new challenges to the information
security community. We take a look at seven key trends
and technologies that 2011 will bring into sharp focus.
1
Information
Assurance
Organisations will find themselves
operating in an increasingly
interconnected and regulated
environments than ever before.
While the business benefits of closer
integration with partners, suppliers
and customers are indisputable,
there is an increased risk to data
and information sitting in the cloud
or beyond controlled enterprise
environments. New regulatory
powers will also bring compliance
and governance pressures to
bear on the CISO work load.
This means that organisations will
need to ensure that they have
enhanced information assurance
policies to satisfy regulators,
partners and most importantly,
customers. Those organisations
who fail to effectively manage risk
are potentially exposed to events
which can seriously damage financial
performance and reputation.
2
Security
Information
& Event Management
More organisations will be
investing in rapidly emerging
Security Information and Event
Management (SIEM) technologies.
These are seen by analysts as a
cost-effective and efficient way
of managing constantly evolving
threat landscapes and risks to the
enterprise from employee error.
The new breed of sophisticated
SIEM tools will be able to provide
an effective security posture
awareness, faster incident response,
in addition to meeting stringent
compliance reporting requirements.
The leading SIEM systems deploy and
use advanced software-based tools.
SIEM integrates security and
compliance with operational activities
and the best will enable enterprises
to achieve more comprehensive
security and compliance control
monitoring and reporting as well as
lower security operations costs.
3
Managed
Security
Services
As security becomes more
complicated to manage and stresses
increase, those businesses with
fewer resources will increasingly
turn towards Managed Security
Services (MSS) to partly or totally
outsource their security function.
The threats and compliance
pressures are no less for smaller
businesses but by turning to
dedicated MMS suppliers they
will access dedicated and fulltime
specialist expertise.
With the assurance of service
performance provided by Service
Level Agreements (SLAs),
companies can expect real-time
results by engaging MSS at a
lower cost of ownership than
managing security in-house.
At a time of continuing economic
uncertainty and budget cuts, the
MSS market is likely to become
highly competitive; customers will
demand the best and choose those
MSS providers that have top-line
resources and expertise drawn
from years of security experience.
8 2011 | Inform – Issue 4
7 Trends for 2011
for 2011
4
Security
Risk
Management
Risk management will become more
than a buzzword and establish itself
as an embedded component of the
security professional's armoury
as business change accelerates,
employment patterns oscillate
due to economic pressures and
enterprise technology shifts. The
ability to assess and manage the risk
to information and data assets does
demand an advanced set of skills and
experiences – mostly from outside
the traditional IT security sphere.
Larger enterprises are likely to
invest in risk management skills
and resources to keep on top while
smaller companies will look to
specialist consultancies to quantify
risk and define appropriate controls
– especially in relation to governance
and compliance requirements.
5
Infrastructure
Situational
Awareness
Related in part to risk management,
Situational Awareness is a set of
soft skills likely to emerge in 2011.
In a nutshell it involves being aware
of what is happening throughout the
business environment and the impact
any incident or activity may have.
Situational awareness enables
organisations to build a complete
picture of infrastructure activity
and help to reduce threat
profiles. A full understanding of
the operational picture and the
associated management functions,
particularly assists organisations
in achieving compliance with
applicable laws and regulations.
6
Governance,
Risk & Compliance
systems
In a way, Governance Risk and
Compliance systems are an amalgam of
many of the previous trends listed on
these pages. Driven by the complexity
of national and international laws
in relation to data assurance and
privacy, organisations will look to
combine both the technologies
and skills needed to manage
governance, risk and compliance.
This will be driven by the supplier and
vendor community looking to offer
end-to-end and bespoke solutions to
the enterprise. Enterprises for their
part will look to those suppliers who
can integrate disparate standards into
single view matrices combining ISO
27001, PCI, SOX and FSA standards as
well as stringent legal requirements.
7
Greater
Expectations
Not a technology or an emerging skill of
course. Instead, greater expectations
are precisely what the security
professional will have of their service
providers and technology suppliers.
So complex is the threat landscape,
so disruptive the changes in IT
(consumerisation, virtualisation,
stepped outsourcing etc) that to
keep up, the security professional will
deal only with those organisations
and suppliers that can meet
those complexities. Those that
cannot may not survive.
Those expectations will increasingly
include the complete control and
management of risk, clear reporting
procedures and communications,
forensic analysis and genuine 24/7
support. Security professionals will
demand full visibility of timescales,
risks, cost and performance.
In short, they will want worldclass
information security.
Inform – Issue 4 | 2011 9
INFORMATION
SECURITY
Is your information
security designed for the
relentless challenges that
are thrown at it How will
it meet the demands of
hyper-competitive business
and massive technological
change Or the almost
daily new security threats
More of the same is no longer an option.
It is time for a total transformation
of information security. And it is why
Information Security Leaders 2011
is devoted to enabling CISOs, CIOs,
IT and Security Managers to achieve
substantial change. There will be
insights from industry leaders, proven
strategies for successful transformation,
and purposeful innovation drawn from
the global information security market.
It is a recipe that has helped many
businesses keep ahead of the curve
on information security – and established
Information Security Leaders as the
pre-eminent information security
conference for the past three years.
MANCHESTER
8TH FEBRUARY
EDINBURGH
10TH FEBRUARY
BRISTOL
15TH FEBRUARY
LONDON
17TH FEBRUARY
To secure your place,
simply register at
www.informationsecurityleaders.co.uk
EVENT SPONSORS
MEDIA PARTNER
IN PARTNERSHIP WITH
Paul Fisher interviews Managing Director of Information Risk Management (IRM) at Barclays
Paul Fisher went to meet the man voted the
Most Influential Person in
Information
Security
The Managing Director of Information
Risk Management (IRM) at Barclays,
Stephen Bonner looks sharp. Suited and
booted – a man at the top of his game.
He’s looking trim too, thanks to a punishing training
schedule he is putting himself through in preparation for
the 2011 London Marathon. He is running to raise money
for NSPCC Childline, on behalf of the information security
industry’s own charitable organisation White Hat.
It’s surprising he finds the time but when you listen to
Bonner you quickly realise that he has the ability to
make complex multi-tasking – like the small matter
of managing risk for one of the world’s most powerful
banks, seem easy.
He also understands instinctively about where
technology ends and where risk management and
creative thinking takes over.
“I’m an advocate of balanced investment across a range
of controls. Some security teams have people who
come from a particular network security background.
Whenever they see a risk they decide to deploy another
piece of network technology rather than thinking about
maybe better ways to do it.”
Photography: Teri Pengilley
Inform – Issue 4 | 2011 11
www.hp.com/info/security
“You see a disproportionate
investment in network
technologies, rather
than application security
technologies, even though
industry-wide lots of the
losses are at the application
layer. And there is the quite
insane decision by the
industry not to put money into
good user awareness.” he says.
User awareness is something that
Bonner is passionate about and his
advocacy has seen Barclays innovate
security awareness campaigns that
have gone on to win industry awards.
In no small part because Bonner
realised that a successful campaign
needs creative input – from experts
outside of his department.
“It’s actually more expensive to
produce bad content. You see
security teams who do awareness
badly by having a go themselves.
We wouldn’t get someone who had
spent years studying psychology
and writing media to come and
configure one of our firewalls”
he says.
Bonner believes that value is high
and the cost of good awareness
material is “remarkably low”
compared to the cost of some
very technical solutions that
people deploy. Some might argue
however that an organisation
with the resources of Barclays
can and will source and pay for
the best external suppliers.
“If you produce low quality content
people just walk past it. But I don’t
think it’s the budget that’s been
different here. I think there’s a very
strong support for dealing with this
issue and a willingness to try new
things. We’re just not interested in
doing things the same as everybody
else. We’re interested in actually
solving the problem” he says.
He points out that the IRM group’s
“Think Privacy” programme is
now available via a consortium
for free download on the
Information Commissioner’s Office
website for any organisation
to use so Barclays investment
is now able to help others.
For 2011 Bonner’s department has
come up with something of a first
in information security awareness
– a specially commissioned book.
Consequences is a collection
of anecdotes, short stories and
poems from some pretty stellar
names, Ricky Gervais among them,
all on the theme of minimising
risk. The little blue tome will
be distributed internally to
selected Barclays employees.
“We were able to work
through a literary agent who
had a series of big names.
It became very clear that
getting people to engage with
the risk messages is hard.
I’m passionate about it but
generally most people are
busy doing their job, they’ve
got their goals, they just want
to get that done.” he says.
“The challenge is get people to pay
attention to something. And the
names on the cover of the book help.
I don’t think anyone knows all of them
but everyone knows one or two.
But immediately the cover catches
people’s attention. And when they
hear that we’ve got some of these
names then it's a bit ‘my goodness!’”
he says.
12 2011 | Inform – Issue 4
Paul Fisher interviews Managing Director of Information Risk Management (IRM) at Barclays
And thanks to advances in just-intime
printing, Bonner explains that
it hasn’t cost that much either. Next
year there will be podcast versions
and an e-book of Consequences.
“We’ve got the rights and we are
intending to make it available to some
of our suppliers as we did with some
of the film and other training stuff.”
he says.
Bonner is also known to be an
advocate of enlightened, forward
thinking recruitment policies when it
comes to bolstering the IRM team. It’s
a broad church – which chimes with
Bonner’s own personality.
“Teams that have a variety
of viewpoints make better
decisions. If everybody is from
the same background, with
the same experiences – they
will agree and their level of
confidence in that decision will
be disproportionately high.
They won’t listen to anyone
who disagrees with them.
“If you get a group of people who
have a variety of experiences, both
in terms of academic training, in
terms of where they’ve grown up in
the world, industries they’ve worked
in, they bring different viewpoints.”
he says.
“We do select with some bias for
bright, driven, vocal people. But
beyond that it’s the proper reason for
diversity in that it’s to give us better
results. We have a team that works
well and people seem to judge us
as doing the right thing and doing it
well.” he says.
Bonner can be outspoken. He is
certainly not one to follow the herd
as anyone who has enjoyed any of
his numerous public appearances
will testify. He didn’t get where he is
today by signing up to “flavour of the
month” or fad technology.
“I’ve seen this earlier in my career.
Back in the day it was PKI, or IDS, or
it was DLP. There have been these
things that last year no one was
running a project on, this year pretty
much everyone is running a project
on it. In three years time how many
people will be running a project on it”
He likens it to five-year olds
playing football. No-one’s marking
anything – they all run after the
ball. In the end, as he explains,
it must come back to thinking
logically, looking at the facts and
concentrating on risk management.
Typically, he wants to learn from
outside his immediate industry.
“As we get more data we get better
about making decisions. It’s like
evidence based medicine and doubleblind
studies. You inoculate half of
the population and give the other half
a placebo and monitor the success
rate. There’s a lot of complicated
work to get good data but once you
get it you can tell if something works
or not.” he says.
“I may be naive or I may be
lucky but I’d like to see an
industry that can reduce the
amount of fear. People will
sell less magic beans, maybe
fewer boxes get shifted but
actually in the long term there
is a gain for the business to
add real value.” he says.
That day may still be some way off.
In the meantime Bonner is likely to
still get a kick from the things that
get him out of bed in the morning.
Like the challenge of solving
hard problems.
“Both the terrifying thing and brilliant
thing about information risk is when
you finally get it all working right
the other side change tactics and
completely invalidate everything
you’ve built. So it’s constant change
and much more challenging.” he says.
“Finding the best people,
getting them to work together
as a group, and seeing other
people’s success is brilliant. I
love that. Seeing people come
up through the ranks of my team
and then go on to be heads of
other places just feels right.
There’s a real sense of you’re
leaving people better than
when you found them and that
feels good. I think they’re the
kind of fun bits but I think really
what drives me is a sense, as a
shareholder, as a customer, an
employee of Barclays there’s a
total duty of care” he says.
It should come as no surprise that
Bonner is a keen social networker. He
ends our conversation be referring to
a meme currently doing the rounds
on Twitter. “It asks what would you
say to your 16 year old self What
message would you send back in time
to change your life I would say don’t
listen to what people in the future
say that you should do!”
“Once I was the sort of ferret, now
I’m a dinosaur. I would encourage
anyone in this industry to do things in
a different way, work out what really
works and do that. Don’t just do what
people tell you to do”. That’s Stephen
Bonner then. Influential in more ways
than one. •
Inform – Issue 4 | 2011 13
www.hp.com/info/security
Sec rity
in an
Few people expect a return to the economic good times in 2011 or even further
beyond. The world economy took a major hit in 2008 and as financial expert Justin
Urquhart Stewart says it’s going to take more than a few years to get back on track.
This means that just like the rest
of us 2011 is likely to be another
uncertain year for the security
professional. But unlike the rest of us,
the security professional faces some
unique challenges in the workplace
and beyond.
Many CISOs will have already
experienced the pain of the last
two years and being expected to do
more with less against a background
of ever growing numbers and
sophistication of cyber threats –
witness the release and impact of
Stuxnet in mid-2010.
However that experience may well
have been a useful learning exercise
for the future as they seek to map
the concept of total security against
changing economic patterns. They
do at least know what they are up
against and may have a much better
idea of how to write security policies
and strategies from the starting point
that maximum value must be gained
from any new investment in staff or
technology. At the same time they
must continue to push security to the
heart of any business. The key term
for 2011 and beyond then is
“Security Effectiveness”.
This is an area that the Ponemon
Institute has been researching and in
a study and report recently released
in partnership with HP Information
Security and Check Point (see details
at foot of article) it details how
CISOs and others can measure their
security effectiveness.
One of the key findings
from the report was that
security professionals did
not believe that their budget
was “sufficient to curtail
or minimise data breach
incidents”. The situation is
unlikely to change soon, given
the continuing uncertainty in
the wider economy and the
pressure from boards to make
savings. This is of course
especially true in a public
sector about to be hit by the
most stringent cuts in
a generation.
It appears that many security
professionals are still finding it
hard to make a business case for
their departments and strategies.
Worse, many are not even given the
opportunity to make a business case
for security.
Given the economic background it
is therefore imperative that CISOs
ensure they get that opportunity and
that know how to talk the language
of business and make the case for
effective security investment.
A pitfall to avoid is agreement on
return on investment (ROI). An agreed
ROI is extremely hard to measure in
security. The old conundrum for any
security professional is that the only
real “return” is that breaches, data
losses and attacks are either stopped
or minimised sufficiently.
In a downturn, a CFO may be tempted
to reduce the security budget or
demand numerous proofs that money
invested has been worthwhile. The
CFO sense is often that the same
results may be achieved with less
investment.
Therefore the CISO needs to be
able to argue a bullet-proof case
for continued and enhanced
investment. Security bosses need
to be absolutely sure of their own
effectiveness and, further, the
efficiency of their own departments.
That way CISOs can ensure that they
know absolutely what they need
when the budgets are written.
To help, as part of its research
Ponemon has released the Security
Effectiveness Framework Tool. This is
a questionnaire tool which analyses
the organisation across six major
areas: culture, security environment,
technologies, control activities,
governance and budget.
Such an empirical measure is likely
to be highly valuable in a continuing
14 2011 | Inform – Issue 4
The Economic Climate
uncertain
economy
climate of cost savings and efficiencies
throughout different sectors. Those
working in the public sector may look
to this tool with a certain degree of
enthusiasm and interest.
However, there are likely to be on
shifts in overall IT strategies across
all sectors. Chief Information Officers
(CIOs) will be looking to adopt
further mobile working, embrace
consumerisation and Bring Your Own
Computer (BYOC) policies as well as
accelerate cloud and virtualisation
deployments. The effective thing for
any CISO to do is make sure they are
there at the start of these shifts.
Global changes mean that
organisations will be working across
borders and with new partners, most
likely in the Far East. This too will
impact on security strategies and
effectiveness.
There are undoubtedly economic
challenges ahead but if they bring
greater discipline and a more
scientific approach to security from
the CISO community it will benefit
them and the businesses they serve
to enhance and protect.
The Security Effectiveness Framework
Study can be downloaded from:
http://www.hp.com/info/security
TOP 5
Drivers to a good Security
Effectiveness Rating
1 Appointment of a CISO or organisational leader for
information security.
2 Training and awareness programs on data protection
and security for end-users.
3 An organisational culture that respects privacy
and data protection
4 Executive-level support for security
5 Strong endpoint controls.
Source: Security Effectiveness Framework Study, Ponemon Institute
Inform – Issue 4 | 2011 15
www.hp.com/info/security
The economic outlook for 2011 and
beyond: Justin Urquhart Stewart
Justin Urquhart Stewart is a co-founder of Seven Investment Management, a
business which manages around £3 billion on behalf of professional financial wealth
managers and intermediaries. He writes regularly for national magazines and
newspapers, and is a frequent commentator on television and radio, both in the UK
and abroad. Inform got an exclusive insight into his predictions for the economic
conditions ahead and the shift in economic power across the globe.
First the good news. He is
reasonably confident that the
UK won’t fall back into recession,
thus avoiding the much talked
about ‘double-dip’ that has been
consuming commentators for the
past few months.
However, this doesn’t mean that it is
full-steam ahead. “The economy is
still pretty insipid and and is likely to
remain so. We haven’t actually had
any cuts yet, we are still going to
have some serious difficulties ahead
when they come.” he says.
He is cautious that a second
recession will only be avoided as
long as the banks return to sensible
lending again and that the spending
cuts are genuinely spread over four
years. That way we may sustain a
reasonable level of growth and a
return to confidence.
“However we do face a number of
serious headwinds in terms of the
level exports not being particularly
strong, lending still weak and
consumer confidence remaining
weak too. The continuing lack of
confidence in the housing sector is
a worry.” he says.
“We will probably still get growth
but it will be very weak for some
time to come. We won’t see any
shrinkage unless the government
was stupid enough to carry out the
cuts wholesale. Some 39 per cent
of the working population is related
to state employment. State and
private employment are intrinsically
linked – both cubs sucking off the
same she-wolf.” he says.
Those expecting a quick return
to the good times are going to be
disappointed. We are likely to be in
the doldrums for some time yet.
As Urquhart Stewart explains, the
Western economies spent 15 years
building the boom. It will take time
to restructure the debt – not just
government debt but also the
billions tied up in personal debt.
“The UK economy needs to become
less consumer dependent and move
towards a manufacturing base. We
are a nation of small businesses.
This year will see 400,000 new
businesses being set up – not all will
survive. Even fewer will survive if
we don’t have a functioning banking
sector.” he says.
Urquhart Stewart sees continuing
difficulties in the retail and housing
sectors and for any one involved with
the public sector. However those
trading with the Far East are likely
to be in a stronger position as the
oriental consumer continues to grow
in importance and buying power.
“We will see a two speed global
economy. Western nations with the
exception of Germany will remain
slow while the the Eastern nations
with the exception of Japan will be
fast. The Eastern nations, SE Asia
and the emerging economies will
grow. But they may feel the pain of a
backlash from the United States with
increasingly protectionist noises
coming from there. We need to need
to avoid protectionism because
that way leads to a 1930s style
depression.” he says.
Urquhart Stewart believes that it
is unlikely that protectionism will
rear its ugly head. More likely the
US will continue with a policy of
quantitative easing which in effect
is a devaluation of the dollar, which
could lead to some problems as it
reduces the value of US bonds –
mostly bought by the Chinese.
There is one thing of which Urquhart
Stewart is absolutely convinced and
that is the irreversible shift in global
economic power that started even
before the global slowdown. This will
affect all our businesses and trading
strategies.
“Politically and economically the
power has shifted to the East. The
world will look very different in 20
years time.” he says.
16 2011 | Inform – Issue 4
THINK AGAIN.
Enterprises around the world are relying on virtualisation to increase datacenter efficiency and, unknowingly,
leaving themselves more vulnerable. That’s because conventional security isn’t able to protect virtual machines
or see the traffic between them — leaving data and networks exposed. Which is why, according to Gartner, Inc., in
2009 sixty percent of virtual machines were less secure than their physical counterparts. But with Trend Micro
Enterprise Security, powered by the Trend Micro Smart Protection Network infrastructure, you can mitigate
the risk and maximize the benefits of virtualissation. It’s a different kind of security that protects your physical
and virtualised environments and helps set the foundation for your company to move confidently into the cloud.
Learn how to protect your virtualised datacenter.
Download the Trend Micro eBook at www.trendmicro.co.uk/server-security
Calling all Websense Web Filter Customers
We have an incredible offer for you.
Get a Free Subscription Upgrade to Websense® Web Security*
That’s right, Websense would like to offer you a free subscription upgrade to Websense
Web Security to protect your employees from spyware, bot nets, keyloggers and more.
All you have to do is renew your subscription using the Websense V5000 appliance,
and your license upgrade is on us.
When you upgrade, you get:
• Malware security categories that protect your organisation from malicious code,
spyware, phishing sites, and more, with real-time security updates.
• Performance at a value with the Websense V5000 appliance platform to support
Websense Web security.
• Investment protection with free hardware warranty and the ability to run Websense
Web Security Gateway on your V5000 appliance for security in the social Web.
For more information about Websense Web Security, go to
www.websense.com/websecurity
* Terms and Conditions:
Free upgrade offer is available only to current Websense Web Filter customers, and applies only to upgrade to Websense Web Security for a subscription renewal period of
equal to or greater than the duration of the existing subscription agreement. The free subscription upgrade requires the purchase of a minimum of one (1) Websense V5000
appliance, as well as Premium Support for the duration of the subscription agreement. Offer cannot be combined with any other offers or promotions with the exception of the
“3 years for the price of 2” promotion. Offer may not be available in all states or regions. Some additional terms and conditions may apply subject to federal guidelines. Offer
does not have any cash value and promotion may be cancelled at any time by Websense. Shipping charges, tax and support costs are the responsibility of the buyer.
Lessons from the CISO Club
Lessons
from the
HP Information Security’s CISO Club events bring together some of the UK’s most
influential CISOs, who manage risk and security at FTSE 100 companies. Each event
allows them to brainstorm the future of business security and how it impacts on
future procurement
At the most recent meeting they discussed corporate social media, consumerisation
of IT and the identity management. We present some of the findings.
The attendees of the CISO Club were
keen to discuss three top line trends
that they felt were now seriously
impacting their enterprises. Three
big issues, each one developing its
own set of challenges and search
for solutions.
The first of these was the seemingly
unstoppable spread of social media
into the workplace and beyond. Social
media is here to stay and it is being
used by employees for personal use
and by companies themselves keen
to exploit the marketing and PR
opportunities that applications such
as Facebook and Twitter offer.
What CISOs need to grasp is that
while today Facebook and Twitter
dominate, tomorrow it may well be
another tool with as yet unknown
functionality as well, of course,
as opportunities. That is the key
point. Forward thinking CISOs will
understand that social media and
other web 2.0 applications must be
integrated securely so that their
power can then deliver the business
the benefits that they hold.
Social media can be managed,
even encouraged and exploited as
a positive force for the business.
We are only just scratching the
surface of the power of social media.
Already, applications can include
intra-enterprise communication and
sharing all the way to interactive
customer facing tools.
It’s not just about technology and
applications. It’s also about people.
CISOs must accept the reality of
social media and the integration of
“generation Y” into the enterprise. They
must be prepared also for the next
wave of social media tools.
As a start, CISOs can take the lead in
encouraging people to communicate
via social media as long as clear rules
are incorporated into social media
policies. These policies are likely to be
fluid but most crucially employees must
be aware of the social implications of
social networking. Beginning with that
message is a great start to enlightened
and secure use of social media.
Inform - Issue 4 | 2011 19
www.hp.com/info/security
Bring Your Own Desktop
We are entering a new era in IT with
innovation and demand being driven
by the consumer rather than the
enterprise. Companies like Apple that
were once considered peripheral to
the business market are now integral
thanks to the widespread adoption
of devices such as the iPhone and
iPad and those devices which have
imitated Apple’s products. Employees
at every level are now attracted
to buying and using mobiles and
laptops of their own choosing in the
workplace – often in addition to the
company issued device.
This can have its advantages
however for the enterprise but as
usual, challenges for the CISO. Some
companies have started to adopt the
concept of Bring Your Own Desktop
(BYOD) as a way to deal with the
ongoing consumerisation of IT.
The advantages are clear: reduced
purchasing and support costs –
employees effectively provide their
own support, happier employees. The
dangers are increased exposure to
data leakage threats and the blurring
of personal and business activities on
a number of other devices: personal
smart phone, home PC, iPad, other
people’s devices. Quite often the
same “consumer” device is used for
work and pleasure.
This is the real challenge for the CISO
and by extension, the CIO. They must
not let themselves be blinded by
simple cost savings. Consumerisation
needs careful management – off
shoring procurement and support
costs to the employee is fine as long
as the enterprise retains control
of secure working on consumer
devices. This will undoubtedly
entail technical solutions such as
sand boxing and data encryption.
Consumerisation is the biggest
practical management issue that
CISOs will face in the next decade.
Identity management challenges
The third main topic of discussion
centred on identity management
which the group decided was still
central to effective enterprise
security. If you can verify that a
person is who they say they are
you can grant access. True enough,
but CISO leaders are starting to
think beyond identity management
and into identity protection in
order to evolve advanced identity
management policies.
This is a new challenge to CISOs and
brings with it some ethical and HR
related issues. Just as the enterprise
needs to monitor access does it also
have a duty to protect employee
identity from online predators
In an increasingly blurred home/
work environment, employees are
opening and closing online identities
throughout multiple environments.
The challenge then is for CISOs is to
determine where enterprise duty of
care begins and where it ends.
8
Strategic
lessons from
1 Develop social media policies that reflect
the values and purpose of your enterprise
2 Listen to and learn from your enterprise
social community
3 Don’t try and control the method
of communication
4 Educate employees on the social
implications of social networking
5 Start developing your strategy for IT
consumerisation today – it will come to your
enterprise sooner than you think
6 Careful that cost savings of BYOD are not
outweighed by data loss costs
7 Determine where your responsibility for
employee identity lies
8 This the third age of computing, the CISO
role is about to change fundamentally
20 2011 | Inform - Issue 4
Put your
offi ce
yourpocket.
in
Check Point
Abra
• Instantly turns any PC into
your own corporate desktop
• Provides virtual workspace
that keeps mobile data secure
• Delivers ideal solutions for
mobile workers, contractors
and disaster recovery
Secure
virtualization
Secured connection
solutions
Portable, plug-and-play
solutions
www.hp.com/info/security
Larry
Ponemon
In your long career
researching security, what
event or technology has
had the greatest impact
This is a complex question because
enabling technologies can have
a positive and negative impact. In
terms of making the world a safer
place, I choose encryption, access
governance and SIEM technologies.
In terms of creating insecurity for
people and companies, I see portable
data-bearing devices such as USB
memory sticks, smart phones and
laptop computers as the main culprits.
Do you think that the
business world now
“gets” the importance
of information security
to its survival
I think that business leaders have come
a long way over the past decade in
terms of their general understanding
and appreciation of information
security within their enterprise. Recent
Ponemon Institute research shows that
CEOs do believe information security
and data protection initiatives are
important to maintaining a company’s
reputation and brand. However, many
C-level executives are still out-of-touch
with the realities of information security
in terms of economic impact and the
resources necessary to accomplish
its mission. They often are unaware of
how vulnerable their organisations are
to attacks against their networks.
Are we entering a new age of
security enlightenment or a
dark age of cyber warfare
This is difficult to determine. On the
one hand, most security technologies
are becoming more effective, efficient
and easier to deploy. On the other hand,
the bad guys (a.k.a. cyber criminals) are
harder to stop because of sophisticated
attack vectors and greater stealth.
While I tend to be optimistic about the
future, I do foresee the possibility of
catastrophic cyber attacks against
local, national and global critical
infrastructure in the next few years.
Have we “lost” the
battle against malware
and does it matter
There is no doubt that the malware
problem is getting worse. Our
research shows that, on average,
about five percent of all enterprise IT
endpoints are infected with malware.
To make matters worse, a sizeable
percentage of these infections
infiltrate corporate networks and
enterprise systems. Until recently,
malware was just an annoyance (not
super critical to a company’s security
posture). However, this has changed
with the advent of data-stealing
malware and relational botnets.
You helped develop the
Security Effectiveness
Framework, how
important is effectiveness
to business security
Security effectiveness is very
important to business continuity
and success. Clearly, security
inefficiencies result in downtime, noncompliance
with regulations, opens
the door to cyber attack, causes data
leakage and a whole bunch of other
serious organisational maladies.
You’re not an advocate
of ROI in security
– why is that
I believe return on investment is a poor
metric for judging enabling security
technologies. The ROI model assumes
that a given investment maintains
a predictable or constant stream
of value over time. Unlike general IT,
the IT security ecosystem changes
very quickly in response to changing
threats, vulnerabilities and attacks.
A constantly changing attack profile
means the organization’s security
arsenal will not maintain a predictable
or constant level of value over time.
22 2011 | Inform - Issue 4
Quick Fire: Larry Ponemon Q&A
Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a
leading research think tank dedicated to advancing privacy and data protection
practices. He consults with leading multinational organizations on global privacy
management programs and has extensive knowledge of regulatory frameworks
for managing privacy and data security. He also contributes to Computerworld,
CSO Magazine and other leading publications.
You’re an ex-Navy man
– are there any lessons
you learned in the Navy
that you have applied to
your academic work
proudest achievement was getting a
personal “thank you” note from the
President of the United States. •
Discipline, patience, duty and humor.
Beyond sea sickness, the Navy was
a very positive experience for me
especially with respect to developing
core research skills such as intelligence
gathering, analysis and reporting.
When not researching
security, what do you do
to relax
I enjoy life with my family, including
three lovely dogs. As an instrument
rated pilot, I enjoy flying my small
airplane (Mooney Acclaim) throughout
the United States and Canada.
I’m also an avid guitar collector
and player. I enjoy my electric
guitars most of all – including a
1972 custom Fender telecaster.
What has been your
proudest achievement
My proudest achievement was
seeing my two sons graduate from
university. The second proudest
achievement was successfully
defending my Ph.D. dissertation. My
third proudest achievement was
passing my pilot exam. A fourth
Inform – Issue 4 | 2011 23
WHO WILL YOU TRUST TO
SECURE THE
PRIVATE CLOUD
EMC 2 , EMC, RSA, the EMC logo, the RSA logo, and where information lives are registered trademarks or trademarks of
EMC Corporation in the United States and other countries. © Copyright 2010 EMC Corporation. All rights reserved.