Escolar Documentos
Profissional Documentos
Cultura Documentos
Risk Oversight
Guidance for CEOs
and Boards
By:
Christopher Petersen
Sameer Bhalotra
Sameer Bhalotra
Former White House Senior Director for Cybersecurity
LogRhythm
Introduction
At the height of the critically important holiday
shopping season in 2013, one of North Americas
largest merchants suffered a major data breach.
Cyber thieves surreptitiously compromised pointof-sale (POS) systems and stole the payment
card data of 40 million customers, along with
non-payment personal data of another 70 million
customers.1 In terms of the amount of sensitive
information stolen, this was among the largest
known data breaches in history.
The fallout from this event was swift and sobering.
The companys shares initially plunged 11%
following the announcement of the breach. Sales
fell 3.8% as the number of transactions dropped
5.5% during the crucial holiday season.2 Q1 2014
earnings dropped 16%.3 By the second quarter
of 2014, the company reported net pre-tax data
breach expenses of $129 million, or 13 cents per
shareand that was just the beginning.4 Even
now, expenses continue to mount as the company
prepares for class action and other lawsuits while
paying for credit monitoring for tens of millions of
customers.
Brian Krebs, "The Target breach, by the numbers," May 14, 2014
Paul Ziobro, "Target Earnings Slide 46% After Data Breach," The Wall Street Journal, updated February 26, 2014
3
James Covert, "Target data crisis haunts Q1 earnings, with 16% drop," New York Post, May 21, 2014
4
Press release, "Target Reports Second Quarter 2014 Earnings," August 20, 2014
5
Paul Ziobro, "ISS urges overhaul of Target board after data breach," The Wall Street Journal, May 28, 2014
6
A letter to the U.S. Senate from William Hughes, Senior Vice President, Government Affairs, Retail Industry Leaders Association,
February 3, 2014
1
LogRhythm
Neil MacDonald, Gartner, Inc., Prevention is Futile in 2020: Protect Information Via Pervasive Monitoring and Collective Intelligence,
30 May 2013
8
Michael Riley, Ben Elgin, Dune Lawrence, and Carol Matlack, Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target
Blew It, Bloomberg Businessweek, March 13, 2014
7
LogRhythm
10
LogRhythm
Responding to Threats
Effective IT security depends on skilled people,
well defined policies and processes, and a range
of integrated technologies. As both the volumes
of cyber threats and the sophistication of attack
methods continue to grow, security technology
is critical in augmenting the human expertise
necessary to successfully detect and respond to
potentially damaging threats.
Cyber threats are evidenced in underlying forensic
data. Forensic data consists of the log and machine
data being constantly generated by every server,
device, application, database, and security system
deployed across the IT environment. Additional
forensic visibility is achieved via the deployment
TIME TO RESPOND
FORENSIC
DATA
DISCOVER
QUALIFY
INVESTIGATE
MITIGATE
RECOVER
User
Analytics
Generated
Forensic Sensor
Data
Machine
Analytics
Assess threat
and determine
if it may pose
risk and
whether a full
investigation
is required.
Fully analyze
the threat and
associated risk,
determine if
an incident has
or is occurring.
Implement
countermeasures
and controls that
mitigate risk
presented by
the threat.
Fully eradicate,
clean up,
report, review,
and adapt.
Event Data
LogRhythm
LogRhythm
Conclusion
Corporate CEOs and Board members have a
fiduciary responsibility to know and understand
their organizations IT security and business
risk posture; i.e., where the company sits on the
Security Intelligence Maturity Model. They must
weigh the organizations appetite for risk with the
current capabilities to mitigate it, and then make a
plan to close the gap if one exists. The LogRhythm
Security Intelligence Maturity Model is a valuable
guide for building the necessary successive layers
of threat detection and response capabilities.
LogRhythm
About LogRhythm
LogRhythm, the leader in security intelligence and
analytics, empowers organizations around the
globe to rapidly detect, respond to and neutralize
damaging cyber threats. The companys patented
and award-winning platform uniquely unifies
next-generation SIEM, log management, network
and endpoint forensics, and advanced security
analytics. In addition to protecting customers from
the risks associated with cyber threats, LogRhythm
provides unparalleled compliance automation and
assurance, and enhanced IT intelligence.
LogRhythm is consistently recognized as a market
leader. The company has been positioned as a
Leader in Gartners SIEM Magic Quadrant report
for three consecutive years, named a Champion
in Info-Tech Research Groups 2014-15 SIEM
Vendor Landscape report and ranked Best-in-Class
(No. 1) in DCIGs 2014-15 SIEM Appliance Buyers
Guide. In addition, LogRhythm has received Frost
& Sullivans SIEM Global Market Penetration
Leadership Award and been named a Top
Workplace by the Denver Post.
To download or forward the complement to
this paper, Surfacing Critical Cyber Threats
Through Security Intelligence: A Reference
Model for IT Security Practitioners, go to:
www.logrhythm.com/SIMM-CISO.
Appendix A
LEVEL
0
DESCRIPTION
LEVEL LEVEL
1
2
LEVEL LEVEL
3
4
2015
YEARS
MONTHS
DAYS
HOURS
MINUTES
MONTHS
WEEKS
DAYS
HOURS
MINUTES
LOG MANAGEMENT
SERVER FORENSICS
ENDPOINT FORENSICS
NETWORK FORENSICS
MACHINE ANALYTICS
VULNERABILITY
INTELLIGENCE
THREAT INTELLIGENCE
MONITORING AND
RESPONSE PROCESSES
SECURITY OPERATIONS
CENTER
Continued on page 10
8 LogRhythm
RISK CHARACTERISTIC
COMPLIANCE RISK
DESCRIPTION
The organization is able to comfortably and efficiently meet all
LEVEL
0
LEVEL LEVEL
1
2
LEVEL LEVEL
3
4
THREAT INTELLIGENCE
MONITORING AND
RESPONSE PROCESSES
Appendix A
SECURITY OPERATIONS
CENTER
RISK CHARACTERISTIC
DESCRIPTION
COMPLIANCE RISK
ADVANCED PERSISTENT
THREAT (APT) RISK
NATION STATE
THREAT RISK
LogRhythm
LEVEL
0
LEVEL LEVEL
1
2
LEVEL LEVEL
3
4
LR_SIMM_CEO_01.15
2015 LogRhythm, Inc. All trademarks, service marks and trade names
referenced in this material are the property of their respective owners.