Making the Business Case for Information Security Sanford Sheizen, Ph.D., CISSP

advertisement
Making the Business Case for Information Security
Sanford Sheizen, Ph.D., CISSP
Version of article printed in Beyond Computing (Nov./Dec., 1994), an IBM
publication. Beyond Computing, 1994.
What do the World Trade Center bombing, a computer embezzlement equal to $250
million dollars from Volkswagen Corporation, lawyers demanding E-mail messages
for litigating employment issues or trade secret cases, and the Federal Sentencing
Guidelines corporate probation provision all have in common? They are clear warning
signs that the New Security Rules for the Information Age, the rules of the road for
the information superhighway, require a change in the way business is done.
Information protection has become a priority business requirement. Your senior
executives now have a major obligation to ensure that information is adequately
protected. Critical information is at risk, criminals have gone high tech, and, when
these problems almost inevitably become publicly known, senior level managers are
being held directly accountable for security problems.
Yet, few non-technical senior executives realize that they have that obligation or
sufficiently respond to meeting their legal and fiduciary requirements. These senior
managers may agree that security is important and then do what executives often do
very well. Move on to the more immediate tangible crisis. Hand the problem over to
others by assigning someone the security responsibility. Write a warning memo to
employees. Ask whether the insurance coverage is sufficient. Inquire what the
competitors are doing. Wait until the perfectly secure computer becomes available.
Pray.
Dr. Sanford Sherizen is considered as a leading consultant and seminar leader in
information security. He is president of Data Security Systems in Natick,
Massachusetts.
None of those management actions will suffice when it comes to protecting vital
information from computer crime and abuse. In fact, in the current liability
environment, these actions can be viewed as indicating that senior management is
neglecting basic due diligence requirements. There are serious prices to be paid for
such neglect.
This lack of adequate management attention to information protection places IT
professionals, who are often charged with the responsibility to protect information, in
a difficult situation. They juggle inadequate information security resources,
insufficient management commitment to security, and increasing productivity
pressures that limit security options. IT professionals have to prevent abuse when
access decisions may be made by other managers and limit intrusions while their
organization makes business decisions that extend the network to potentially
vulnerable connections, such as customers or the Internet.
In order to be able to develop appropriate security protections, IT must be able to
convince senior management that information security is now required as proper due
diligence for organizations. How to make your management aware of the importance
of information security? To summarize, IT professionals need to be able to convince
their management that crimes against information are now so serious that
businesses may fail and executives may be banned from their industries for
inadequate attention to crime control. IT must become marketeers and translate
information protection into management terms.
Business and other management language is necessary in order to prove the need
for securing information. Persuasive arguments must be used to point out that
inadequate information protection has led to major financial losses, legal difficulties,
negative public relations, lost jobs, and shrinking market shares.
This job of convincing management is very difficult in the current economic
environment. Rather than continuing to struggle with the increasingly difficult and
potentially liability prone status quo, IT professionals should take the offensive. What
follows are suggestions and aids in making the business case for information
protection.
BACKGROUND FOR THE BUSINESS CASE FOR NEW INFORMATION RISKS
Information protection is now more complex than ever. That complexity is due to
problems outside out as well as within businesses. A starting point in making the
business case for information protection is to outline why information risks have
increased, requiring new management attention to protection vital information
resources.
Information protection is complex since the computer criminal has changed from the
old days of just a few years ago. Hackers who break into computer and phone
systems and those who develop and spread viruses are a big problem today. Yet, in
the future, we may look back at this period and consider how relatively benign these
intruders were. For in the Post-Hacker Era, there are new computer criminals,
including competitors who want product designs, angry employees who feel
downsizing calls for revenge, inside traders seeking strategic plans, governments
seeking to protect state-supported companies by spying on foreign companies, and
journalists investigating scandals. More types of new computer criminals are
expected.
The complexity of information protection is also the direct result of technological
developments. Yesterday s technological advance is today s computer crime
problem. Just as voicemail became a common business tool, which soon led to
criminals penetrating corporate voicemail systems for international telephone frauds
and as drops for their drug deals, so today s advances in wireless communications
and pen- based commands will soon be followed by their own forms of crime. The
crime-free shelf life of a technology, the time before people figure out how to attack,
manipulate, destroy or misuse technology, has been shrinking dramatically. The
information protection shelf life , where a security approach is sufficient, has also
shrunk. Information protection float time is gone and the stakes have increased.
Information protection is also complex due to organizational ignorance of the ease by
which information can be exposed. Ironically, organizations have contributed to their
information being threatened by making key business decisions without sufficiently
considering security implications. Outsourcing and strategic partnering can be viewed
from an information security perspective as the distribution of the most sensitive
information to sources outside of the direct control of the organization. Relatively few
organizations which have taken these (often economically necessary) steps insist
that the recipient of the information meet the information security requirements of
the parent organization. Yes, there are legal clauses regarding errors and omissions
but not a preventive security clause which states that organizations receiving this
information must show how they will meet the following security provisions and that
they will be subject to unannounced security reviews and audits.
And then there is the management problem. This can be considered as the most
important contributor to the complexities, since information protection has moved
from a technical responsibility to a managerial responsibility without this shift being
recognized. Senior executives have become the chief corporate information cops
without understanding what this means, wanting this responsibility or knowing what
to do next.
EVOLVING MANAGEMENT RESPONSIBILITIES FOR INFORMATION PROTECTION
The direct message that must be given to senior executives by IT (as well as by
auditors, members of the Board of Directors, and corporate counsel) is that they no
longer have choices as to whether or not to have information security. As
information is a strategic resource, so information protection is a strategic
requirement. The end of voluntary information protection choices is here. Reluctance
by management in supporting information security with sufficient resources and high
level backing increasingly are legally inappropriate. Non-existent or insufficient
protection of vital business information is the road to personal and organizational
destruction.
Some of this management responsibility has resulted from CEO s who become the
public symbols of their companies. Frank Purdue and Lee Iacocca are two leading
examples. They were held responsible for the good as well as the bad of their
companies. Blame fell directly on the boss and that included blame for situations that
were out of their control or their ability to prepare for. Thus, the CEO s of Exxon and
the makers of Tylenol became the chief spokespersons when crises hit their
companies. And so will your CEO likely be grilled by the press and stockholders as to
why sensitive information was stolen, customer lists were copied, operations ceased
due to the virus, or business was lost when the fire destroyed files that were not
backed up. Those are natural media stories that will get big play and cause public
relations nightmares. Think about the Exxon Valdez with its oil spill and then think of
your company's potential Exxon Valdez information spill.
Information crime control as a management problem is also developing in legal
terms. There are new due diligence standards that have evolved, often causing
chagrin among executives who find out that they are legally exposed for actions
which were previously considered as allowable. In several recent cases, CEO s and
other high ranking executive have been stripped of their professional futures. In May
of 1993, for example, an SEC settlement banned Frederick H. Joseph, the ex-CEO of
Drexel Burnham Lambert, from ever running a securities firm again for what the SEC
said was his failure to respond to red flags that should have alerted him to the illegal
activities of Michael Milken. The Wall Street Journal (May 5, 1993) suggests that by
the settlement, the SEC appears to be spelling out a new policy that top executives
have a duty not only to stop illegal activities once they discover them but to
thoroughly investigate hints of wrongdoing by subordinates.
One of the most direct statements of upper management s new crime control
responsibilities is found with the Federal Sentencing Guidelines. The guidelines are a
set of decisions by which judges set punishment levels for individuals as well as
organizations which have violated federal laws. The guidelines developed for
organizations give senior management responsibilities to prevent, detect, and report
crimes. Failure to accept those responsibilities can result in fines of over $200 million
and, under certain circumstances, corporate probation, where the courts will take
over operations of an organization in order to ensure that it is in compliance with
laws and regulations.
Since so many workplace activities are now computer-related and since information
is the key resource for many organizations, the computerization of many traditional
crimes means that information security can be considered as a requirement. The
need for management to prevent, detect, and report crimes has become an
information security mandate. [See the Sidebar story for more details on the Federal
Sentencing Guidelines.]
SELLING MANAGEMENT ON INFORMATION PROTECTION
For IT as well as information security managers, selling information protection can be
even more important and even more difficult than the complexitiesof the technical
safeguards. Selling information protection is fraught with political considerations,
involves people skills, and the rules are less clear than technical decisions.
What is necessary is to articulate the management problems of underprotected
information in management language and management terms. Information
protection is not an easy sell and is not easy to understand. Here are some ways to
help management understand the problem and to get them to provide sufficient
attention and resources.
Understand Management Views on Risks. Start with the view of the audience. What
ideas, stereotypes, worries, or misconceptions do they have about risks in general
and information risks more specifically? Common thoughts that senior managers
have include:







I've got more important risks
It can't happen here
It's not my problem
I'll deal with it when and if it becomes a problem
We are spending huge amounts of dollars for technology and more is not
available for less important support activities
The techies have taken care of the problem
If a problem occurs, we are covered by insurance or we will pass the cost on
to others
Your task is to let them know that these thoughts are dangerous to them as well as
to the organization. These are security myths which need to be discussed since they
interfere with the development of sufficient resources and program activities.
Discuss Cost Benefit and ROI Strategies. Do not deny but use the fact that
information protection costs a lot, does not directly contribute to profit, and does not
provide a clear return on investment. To deny or try to avoid these issues is to
present a negative business case. For example, no one knows what is the best costbenefit ratio that leads to X number of dollars producing Y amount of information
being protected. Information investments require a value-added perspective and
information protection must be evaluated on the same basis. While cost-benefit
decisions are important, make the case that the nature of information and the types
of threats that occur require an insurance-type view by management. It can also be
useful to create a clipping file of computer crime losses which can be distributed to
managers on a periodic basis to remind them of the large costs and consequences of
not adequately securing information.
Link Information Protection and Total Quality Management. Information protection
contributes to an organization s quality. Information confidentiality, integrity, and
availability- the key objectives of security efforts- provide an organization with clean
information. Managers need to hear how information security is an important but
often overlooked ingredient in any organization s quality effort. Employees need to
hear how their following of information protection policies and procedures is part of
the larger effort to maximize products and services to customers. Quality leaders in
organizations need to appreciate that there are hidden resources in the security
effort which can help their efforts. (An upcoming article by this author in Beyond
Computing will explore this issue in more detail.)
Define Management Tradeoff and Choice Considerations. Work with management to
determine the best strategies for information protection. Non-technical managers
may not realize that there are many decisions that they must make in order for IT
and information security to develop an effective information security program. These
decisions involves tradeoffs, such as whether the information security program will
stress prevention before vs. detection after a crime occurs. Prevention is costly and it
is difficult to know how much is enough. Detection may not recover losses, negative
publicity may occur, and preventive measures may then have to be put in place.
Similarly, management decisions need to be made about the degree to which
information security will be a centralized vs. a decentralized activity. Downsizing
means that corporate staffs are disappearing and decision-making is moving
downward in organizations, raising critical decisions on how best to manage
information protection.
Balance Production and Protection. Security can interrupt workflows and counter the
efficiency and effectiveness that computers allow. An organization which emphasizes
production over production may suffer losses while an organization that emphasizes
protection over production may fail. An appropriate balance needs to be reached and
that occurs through intensive discussions between IT, general management, and end
users. Decisions will need to be made on how to reward employees for achieving
both production and protection. Considerations will also have to be made on how to
audit and secure information during those critical times and for those critical
activities when production needs become paramount, such as during the end of the
year rush.
STRATEGIES FOR MANAGING INFORMATION PROTECTION
If you have been able to make a successful business case for information protection,
the final point that needs to be made to your senior executives is that they don t
have to become information security managers in order to manage information
security. What they need to do is make sure that an information protection program
succeeds.
Let them know that information protection is an on-going concern and not a oneshot effort. They need to show leadership by writing a short memo to all employees
indicating that information is increasingly at risk and that all employees must support
corporate information security policies and procedures. They need to show advocacy
by instituting a security impact statement requirement so that, prior to major
technical enhancements or key business decisions, appropriate questions will be
raised about security complications. And they need to show to all employees that
everyone now owns the security responsibility--Whether They Want It Or Not Whether They Understand It Or Not Whether They
Have Time For It Or Not When it comes to s-e-c-u-r-i-t-y, U -R -IT is the key
management message.
SIDEBAR: SUMMARY OF THE FEDERAL SENTENCING GUIDELINES
The Federal Sentencing Guidelines are a set of rules for Federal judges on
appropriate punishments for individuals and for organizations found violating criminal
laws. According to the guidelines, organizations have a responsibility to maintain
internal mechanisms for preventing, detecting, and reporting criminal conduct. Ethics
statements and policy announcements alone are no longer considered as sufficient.
Specific actions and effective programs will be the measure of how an organization
will be evaluated. Faulty judgment calls by management and/or an environment that
allows such judgments to be made by agents of the organization have the potential
to become considered as crimes. In essence, the guidelines spell out new due
diligence requirements for senior management.
The guidelines offer a carrot as well as a stick for organizations. The carrot is a
suggested model program for crime prevention, detection, and reporting. An
organization that develops a program based on the model can minimize legal
liabilities even if a crime occurs later. The existence of the program elements serves
as an indication of good faith efforts toward crime control. The carrot? Hefty fines,
negative publicity, and, under certain circumstances,
corporate probation.
Due to the computerization of work processes, financial or business crime are
increasingly computer-based crimes. In that sense, many of the crimes that the
guidelines evaluate are, in essence, computer crimes, even if they have not been so
defined specifically by the law. Further, the U.S. Department of Justice has requested
that the U.S. Sentencing Commission specifically address computer crimes by
considering an amendment regarding computer-related offenses. The Commission is
considering this request and a draft amendment has been made available for public
comment. Computer crime will increasingly become an active consideration under
the guidelines, whether indirectly as now stated or more directly with new sections.
Avoid serious liabilities by reviewing whether your organization meets the guidelines
by:




Reviewing if your senior executives are meeting the new due diligence
requirements stemming from the guidelines as well as other legal and
regulatory changes
Developing a liability prevention plan for your organization to maximize good
faith efforts for crime control as defined in the guidelines
Evaluating your information security and other forms of employee crime
deterrence to conform with Guideline recommendations
Maximizing an effective information security awareness program and other
crime control communications to employees as specified in the guidelines.
The guidelines are one of a number of government initiatives which seek to control
business crime. The legal trend is clearly toward more direct management
responsibility. Be forewarned.
©Sanford Sherizen
Download