Information Security and IT Risk Management in the Real World:

advertisement
Information Security and IT Risk Management in
the Real World:
Results From Field Studies
Scott Dynes
Center for Digital Strategies
Tuck School of Business at Dartmouth College
What We Study
Risks firms face as a result of using the information
infrastructure to manager their extended enterprise
- How firms make InfoSec investment decisions
- Emergent risk from business networks
- Privacy
Field Study
Our Field Studies: Methods
Investigate a ‘host’ firm and a few suppliers of different
sizes.
At each firm conduct interviews to determine:
- How InfoSec investment decisions are made.
- How reliant the firm is on the information infrastructure
for its ability to produce product.
Understand the means by which the host and suppliers
communicate to gauge the internal IT risk due to
integration.
Supplier
Supplier
S
u
Host
Supplier
Field Study
Field Study Sector Coverage
Field Study
Key Results From Field Studies
Four Main Paradigms To Managing/Investing in
Information Security:
• The “Sore Thumb” Paradigm
• The “IT Risk” Paradigm
• The “Business Risk” Paradigm
• The “Systemic Risk” Paradigm
Field Study
Key Results From Field Studies
Four Main Paradigms To Managing/Investing in
Information Security:
• The “Sore Thumb” Paradigm
Low/No Economic Role
• The “IT Risk” Paradigm
• The “Business Risk” Paradigm
• The “Systemic Risk” Paradigm
High Economic Role
Field Study
Key Results From Field Studies
Firms Are Mainly Taking A Local View of
Information Security
• Risk in supply chain glitches, leading to business sector brittleness
• Hypothesis: Firms managing risk in the extended enterprise will
directly lead to greater sector resiliency
Field Study
Key Results From Field Studies
Local vs. Sector Views of Information Security
Field Study
Key Results From Field Studies
Firms Are Mainly Taking A Local View of
Information Risk
Field Study
Key Results From Field Studies
Firms Are Mainly Taking A Local View of
Information Risk
Field Study
Key Results From Field Studies
Firms Are Mainly Taking A Local View of
Information Risk
Field Study
Key Results From Field Studies
Notable Incentives/Drivers For InfoSec Investment:
• Customer requests - firms are very responsive
• Government regulation - have to do it, but firms feel largely ineffective
• Brand protection
• Insurance - in unexpected ways
Field Study
Conclusion
• Latent Market Forces Exist
• Proper Government Role: Create Markets Through Increasing
Transparency
• Key Challenge: Enabling Investment Against Intangible, NeverHappened-Before Risks
Field Study
Production resilience to cyber disruptions
Manufacturing sector: In general, production not
sensitive to internet outages; supply chain sensitive to
internet outages.
• Once beyond first tier of suppliers, reliance on information
infrastructure to manage supply chain is low
• Electrical BU supply chain has ‘learned behavior’
- High-volume supply relations have extensive forecasting
- Everyone would do the expected thing
- Pain comes in distribution
• Auto BU- centralized control strategy leads to lack of learned
behavior
Field Study
Production resilience to cyber disruptions
120%
Start of recovery
100%
Productivity
Productivity
100%
80%
60%
40%
20%
0%
0%
1
-1
3
2
0
1
2
3
4
5
6
7
8
9
10
11
12
Day
Time
10-day oil refiner SCADA event
120%
Productivity
100%
80%
60%
40%
20%
0%
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Day
10-day electrical supplier internet event
10-day auto supplier internet event
Input-Output Model
Leontief Model
Production
x
xo = Axi + c
A :=Technical Coefficient Matrix
calculated from U.S. Bureau of
Economic Analysis data
Consumption
c
Inoperability I-O Model (IIM)
Terrorist Attack
c*
qo
*
=A
qi +
*
c
A* := Interdependency Matrix
Inoperability
q
Ripple Effects
Sector A
Input-Output Model
Sector A
Sector B
Sector n
Sector A
Sector B
Disruptive
Event
Sector A
Sector B
Sector n
Sector n
Sector A
Sector B
Sector n
Economic Costs of Cyber-events
Total Loss (in $mm)
10-Day Cyberevent for Electrical Sector
6.00
5.00
Manufacturer represents 5% of national capacity
4.00
Indirect
3.00
Direct
2.00
1.00
Integrated loss of 10-day event: $22.6 Million
0.00
1
2
3
4
5
6
7
8
9
10 11 12 13 14
Day
10-Day Cyberevent for Auto Sector
Total Loss ($mm)
25.00
Manufacturer represents 5% of national capacity
20.00
15.00
Indirect Loss
10.00
Direct Loss
Integrated loss of 10-day event: $65 Million
5.00
0.00
1
2
3
4
5
6
7
8
9
10 11
Day
Total Loss (in $mm)
10-Day Cyberevent for Oil & Gas Sector
50.00
Refiner represents 10% of national capacity
40.00
30.00
Indirect Loss
20.00
Direct Loss
Integrated loss of 10-day event: $405 Million
10.00
0.00
1
2
3
4
5
6
7
Day
8
9
10 11 12
Economic Costs of Cyber-events
10 days of U.S. GDP:
~ 330,000 MM
16,000
14,000
12,000
10,000
U.S.Dollars (MM)
8,000
6,000
4,000
Oil Refiner
2,000
0
Auto Supplier
Integrated loss
from 10-day event integrated loss of
entire sec tor for 10
days
Take-Aways
• The first demonstration of an empirically-based approach to
estimating national economic consequences of cyber events
• The economic costs of the cyber events investigated may not be
that great from a sector and national perspective.
• For the sectors presented (Manufacturing, Oil Refining), supply
chains are largely resilient to cyber disruptions.
•Economic consequences due to cyber events depend on how, not
whether firms use technology.
Incentives
What is an incentive?
Example: UK/US ATM regulations
Example: Attendee badges at RSA Security conference
Example: The “Commons”
Example: Stop Signs
Incentives - Information Security
Home Users
- What are they motivated to do?
- Privacy - not necessarily important
- Use of machine - is important
- Result: no real incentive to protect machine until something bad happens
- Bad things:
- Assimilation by Bot network; Spam generator
- Spyware/virii: machine becomes ever more unstable
Incentives - Information Security
Business Users
- What are they motivated to do?
Make Money! (rational market assumption)
Economic Costs - Information Security
Economic Costs of Cyber Events:
InfoSec Adoption by Firms
In a rational market, firms will maximize profit.
After Gordon and Loeb 2002
InfoSec Adoption by Firms
This ‘Optimal Spending’ approach requires:
-Titration of cyber losses and cyber spending
- Some idea of what effect cyber spending has on cyber losses
- A good idea of the threat environment in which the firm lives
What are the incentives felt by directors of information security?
InfoSec Adoption by Firms
Drivers of Adoption of InfoSec
InfoSec Adoption by Firms
Drivers of Adoption of InfoSec - Inputs
Baseline level of InfoSec based on:
- Experience
- Input from trusted colleagues
- External Consultants
- Trade mags/ other press
Beyond baseline level, firms respond mainly to:
- Customer requests/questionnaires
- Government regulation
InfoSec Adoption by Firms
Drivers of Adoption of InfoSec - Prioritization
How were InfoSec recommendations prioritized, and
received by decision-makers?
At InfoSec manager’s level, InfoSec “wants” prioritized by:
- Cost
- Exposure
- Internal pain
InfoSec Adoption by Firms
Drivers of Adoption of InfoSec - Outcomes
Making the leap from InfoSec manager to business
managers, we found:
- InfoSec not an important issue
- InfoSec efforts largely reactive and tactical
- ROI measures mainly qualitative; investments seemingly
made to eliminate all InfoSec incidents (not explicitly to
minimize total costs)
- Most impressive firm didn’t even have the conversation.
InfoSec Adoption by Firms
Drivers of Adoption of InfoSec - Outcomes
Managing Risk - always implicit, was never explicit
Info on threats - same as inputs
Info on probabilities came from:
- History
- Industry pubs
- Gartner/Meta/etc.
- Gut
- “Al”
- Tech Republic
Info on costs of attacks came from:
-Gut
InfoSec Adoption by Firms
Drivers of Adoption of InfoSec
All firms thought of InfoSec as an expense
Most thought of InfoSec as a qualifier, even though none
had any InfoSec requirements of their business partners
Few gave examples of InfoSec as a competitive advantage
InfoSec Adoption by Firms
Summary: 4 Paradigms for InfoSec Risk Management:
-The ‘Sore Thumb’ Approach
-The ‘IT Risk’ Approach
-The ‘Business Risk’ Approach
- The ‘Systemic Risk’ Approach
In most business sectors, InfoSec is not a technical
challenge, but a social/organizational challenge
Incentives - Information Security
Government/National Level
- What are they motivated to do?
Incentives - Information Security
Government/National Level
Incentives - Information Security
Government/National Level
Incentives - Information Security
Government/National Level
Freeman Drivers:
- Market Forces
- Government Regulation
- Litigation
- Government Spending
Incentives - Information Security
Intellectual Property loss - the real worry?
Start of recovery
Productivity
100%
0%
0
1
Time
2
3
Incentives - Information Security
Government/National Level
120%
Productivity
100%
80%
60%
40%
20%
0%
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Day
Effects on Production of a 10-day Internet
Outage at an Electrical Goods Manufacturer
Incentives - Information Security
Government/National Level
Total Loss (in $mm)
10-Day Cyberevent for Electrical Sector
6.00
5.00
4.00
Indirect
3.00
Direct
2.00
1.00
0.00
1
2
3
4
5
6
7
8
9
10 11 12 13 14
Day
Total Economic Effects on Production of a
10-day Internet Outage at an Electrical
Goods Manufacturer - $22.6 Million
Managing Cyber Risk
Globally Known
Viruses
Web Site Defacement
Locally
Known
Globally Unknown
Other OS bugs
Phishing
OS bugs
Best practices
Applied Research
???
(Phishing)
Locally
Unknown
Education
Basic Research
Managing Cyber Risk
Reactive IS
Globally Known
Viruses
Web Site Defacement
Locally
Known
Other OS bugs
Phishing
OS bugs
Implement
Locally
Unknown
Globally Unknown
Wait for patch
???
---
Unprepared when
something happens
Managing Cyber Risk
Proactive IS
Globally Known
Viruses
Web Site Defacement
Locally
Known
Other OS bugs
Phishing
OS bugs
Implement
Locally
Unknown
Globally Unknown
Listen, work to
mitigate outcomes
???
---
Watch, try to ID bad
outcomes
Managing Cyber Risk: Mind The Gap:
• Manufacturer: Manager of InfoSec wants to patch critical
vulnerability. Business manager would rather risk infection of
machines and close the quarter.
• Oil refinery: Manager of InfoSec wants better SCADA security;
VP refining: “How is more SCADA security going to help me
make better oil?”
• Hospital: IS thinks virus event was mainly an IS event and had
minor impact on clinical units; clinical unit manager : “It was a
living hell”
• Most every InfoSec manager: information security is not a
priority with business managers.
Download