You are on page 1of 25

EXECUTIVE SERIES

Reporting to the Board

A Toolkit for
CISOs
Table of Contents
03 Introduction

05 Embrace the Opportunity

06 Lay the Right Foundation to Improve Receptivity

09 Align Your Message with the Business

11 Prepare Your Presentation with the Right


Agenda and Dashboard

14 Conclusion

17 Appendix: Sample Board Reporting Dashboards

2 ©2018 SecureWorks, Inc. All rights reserved.


Introduction
Cybersecurity, once relegated to the back In this toolkit, you’ll find steps for building a
office of the business, is now a front and foundational relationship with your board,
center priority for boards of directors. As techniques for implementing a successful
businesses become more digitally empowered, reporting process, and tips for creating a board
cyber threats find more ways to breach defenses, presentation agenda that will help you establish
increasing the risk to business operations and your role as a trusted and credible leader. The
bottom line. From loss of revenue and intellectual appendix contains sample dashboards and other
property to legal liability and reputational reporting tools.
damage, plus the cost to resolve, boards of
Informed by client input as well as our
directors bear the responsibility for appropriate
observations across 4,400 client organizations
oversight of the risks associated with a breach.
in more than 55 countries, this guide comprises
To execute their due diligence, they rely on their
leading practices of Chief Information Security
organization’s cybersecurity leader to help them
Officers (CISOs) from all types of industries
understand two things: What are the risks to the
who have established strong C-suite and board
business, and how well is the company
reporting relationships. Secureworks® believes
managing those risks?
these practices will better position CISOs to not
just survive a crisis, but lead through a breach,
should one occur.

You’ll know you’ve met your cybersecurity reporting


goals when your board can say the following:

• We understand risk in the context of our unique • We have confidence that our security investment is
business and its objectives. appropriate to both known and anticipated risk.

• We have confidence that risk is being managed • We have a high degree of confidence that we are
crisis-ready.
effectively and that there is a process in place to
continually test those assumptions.

3 ©2018 SecureWorks, Inc. All rights reserved.


Seven Objectives for Your
Board Reporting Relationship

1  rovide practical knowledge of the


P
threat environment.
5 Establish benchmarks based on the
results of testing and assessments.

2 Identify your company’s top risks.


6  evelop a dashboard to monitor
D
cybersecurity risk over time and
against relevant benchmarks.

3 Demonstrate that your security


strategy is aligned with your
company’s risks, tolerance, and goals.
7  stablish and agree on a roadmap to
E
demonstrate progress.

4 Adopt a company-wide cybersecurity


risk management framework.

Why Boards Care About Cybersecurity


Boards have a responsibility to protect shareholder value. And now the assets on which corporate value
depends are largely digital and intangible, putting them at risk from cyber threats.

In 1975, 17% of S&P 500 firms’ market value was tied to intangible assets.

In 2015, that number was 87%.

Source: Intangible Asset Market Value Study (2017), Ocean Tomo, LLC

4 ©2018 SecureWorks, Inc. All rights reserved.


Embrace the Opportunity
As the Chief Information Security Officer (CISO) role continues to evolve from security
expert to business leader, more security leaders are answering the call to provide their board
of directors with a better understanding of how, and how well, the organization is managing the
business risks inherent in a cybersecurity breach.

This is not a simple task. Even CISOs with a To avoid making conversations with your board feel
well-established board reporting relationship must adapt more like an inquisition than a briefing, be proactive in
their tactics as board members grapple with new and your approach and pre-align your primary talking points
unfamiliar risk issues, such as global data protection with the board’s priorities. Board members are conditioned
regulations or digital transformation. to test assumptions. Careful preparation to ensure you
understand the board’s expectations before you walk
It’s difficult for board members, too. The linkages between into the room is key.
cybersecurity risk and business risk aren’t always intuitive
to business leaders who don’t have an IT or security As challenging as it can be to establish the right reporting
background. Your boardroom audience has very little insight framework with your board, there are rewards. When
into the complexity of your operations or the persistence you present to the board and executive team, you have
of your cyber adversaries. It’s up to you to share enough an opportunity to educate, align priorities, and ask for
information to ensure they are confident the risks are leadership support in the areas where you need it most,
well-managed, without overloading them with details. such as holding other functional areas accountable or
Legal, risk, and security advisors encourage board gaining a seat at the table in strategy initiatives.
members to focus on the big picture issues, such as
those shown in Figure 1.

01 02 03 04
Governance & Responsibility & Awareness & Goal Setting &
Leadership Accountability Communication Board Reporting

05 06 07 08
Cyber Risk Legal & Security Tools & Incident Preparation
Management Compliance Operations & Management

Figure 1: Eight Areas of Board Oversight for Cybersecurity Risk (Source: Board Cyber Risk Oversight Framework, Secureworks)

5 ©2018 SecureWorks, Inc. All rights reserved.


Lay the Right Foundation
to Improve Receptivity
Board meeting agendas are tightly packed, and directors can be quick to deprioritize what they
are hearing if they don’t relate to the content. To significantly improve receptivity, be proactive
about two things: 1. foster one-on-one interaction with board members outside of the formal
meeting context; and 2. lay an educational foundation about the cyber threat environment,
including the threat actors and their motives.

Do Your Research Some CISOs have found it useful to find a sponsor among
the executive team, often the CFO or General Counsel, who
Understanding perspectives and motivations in the
is willing to share information about the company’s strategic
boardroom is a good way to establish trust and gain
goals and facilitate an introduction to board members.
confidence. Research the backgrounds of your board
members to determine what they bring to the table. Are they If possible, engage with the chair of the board committee
former CEOs or CFOs? Have they led corporate mergers or with primary responsibility for cybersecurity risk, whether
digital transformations previously? Each one brings a unique that be the Audit or Risk committee, or a special committee
leadership perspective to the table that may predispose dedicated to IT, information security, or data protection.
them to interpret your reports and proposals differently than Discuss the top potential business impacts and risks that
you expect. What’s more, directors often serve on more can win consensus with the broader board as the focus for
than one board, particularly in public companies, and may your agenda. Ask them what they want to hear more about.
bring expectations about cybersecurity shaped by their Remember: from their perspective, cybersecurity is a means
experience with those other businesses. A little homework to a business outcome.
will tell you if one of your board members has been through
the trial of a public breach.

Make It Personal
An Opportunity to
No matter how much research you do, meeting
Improve Receptivity
directors for the first time in a formal presentation is not
ideal. It’s helpful to have a few well-placed advocates According to the Marsh-Microsoft Global
for cybersecurity before wading in. Forming individual Cyber Risk Perception Survey, February 2018:
relationships with select members of the board and
53% of Chief Information Security Officers
executive leadership team ahead of time is even better. Start
said they provide reports to board members
by identifying those with the strongest interest in the subject
on cyber investment initiatives. Yet only 18% of
matter. Discuss the organization’s strategic initiatives and
directors said they receive such information.
gain an understanding of what keeps them up a night.

6 ©2018 SecureWorks, Inc. All rights reserved.


Take Every Opportunity The more you educate your board about Reporting Tip

to Educate cybersecurity risks, the better positioned FUD is Not


you will be to dispel myths such as, ‘‘we Your Friend
Many CISOs tout the value of coming can’t be breached” or “cybercriminals
to the boardroom prepared to discuss don’t want anything we have.” Instead, Ensure that the tenor of
breaches making headline news. When a board members will begin to understand your security discussions
major news story breaks, board members that security is a process of continuous is balanced between
will likely reach out and ask for assurances. improvement, not a one-and-done program pessimism and positivity.
Instead of succumbing to a cycle of that simply needs ongoing maintenance.
The threat environment is
reactionary fire-drills, use that opportunity
justifiably scary. Rather than
to educate proactively. One leading
Establish a Common sowing fear, uncertainty,
practice is to offer up a simple, informative
“anatomy of a breach” story.
Language (Hint: The and doubt (FUD), use your
seat at the table to build
Language of Business) confidence in your strategy
Most board members like to improve to protect critical assets
As part of their risk oversight responsibility
their knowledge of cybersecurity risk by and accelerate revenue
to stakeholders, corporate directors must
learning how a breach happened, including opportunities in the face
quickly identify risk and progress trends.
the result of forensic investigations, threat of threats.
Establishing a common language with your
actor motivations, and a layman’s overview
board—defined as using the same specific
of the techniques, tools, and procedures
terms and definitions for cybersecurity
used. Effective storytelling will enable you to
metrics every time you meet—makes the
successfully demonstrate how the breached
board’s job much easier, and will help you
company became vulnerable to the threat
win the board’s confidence and trust.
and what your organization does differently
— or could do differently — to avoid Dialect is also important. The language of
becoming a victim. business is numbers, including revenue and
margins. The language of cybersecurity
Your anatomy of a breach story should
operations—e.g., signatures, cryptography,
be simple. Describe the event in terms
and exploits—has no place in board
of business vulnerabilities and business
reporting. You may have success pulling
impact, including reputational damage and
a few select operational terms into your
loss of revenue, market share, or business
board dashboard, but only if they are
continuity. Then discuss the potential
well-defined and reinforced quarter after
impact of a similar breach on your own
quarter as part of your common language
organization and how you may or may not
with the board.
be managing that same risk.
In the boardroom, time is limited, so
You have limited time eliminate acronyms from your vocabulary.
to convey ideas in the Acronyms, without definition, will erode
the board’s receptivity to your ideas. And
boardroom. Acronyms pausing to define a term like IPS will rob
and complex cyber speak you of time that might be more wisely
will erode the board’s spent on making a case for your budget or

receptivity to your ideas. establishing your credibility.

7 ©2018 SecureWorks, Inc. All rights reserved.


Join Peer Exchanges to
Share Best Practices
Secureworks clients consistently cite three types of Consider joining a peer networking group to discuss
knowledge essential to doing their job: board challenges and learn what has and hasn’t worked
for other security leaders. And ask your vendors for
• Insights gained through their own experiences and support in developing better metrics and risk assessment
security tools conversations.

• Insights their vendors bring from working across Once you’ve laid foundational relationships with directors
thousands of clients and established common language, you can build
confidence and trust with practical reporting.
• Insights gained from other security leaders who share
their lessons learned and best practices

The Dos and Don’ts of Board Reporting

What Not to Report Consider This Instead

Acronyms Full names and descriptions

Business terms and a common language


Technical and security jargon
for every meeting

Tactical plans that tell how Strategic plans that demonstrate why security
security works is a means to a business outcome

A problem with no solution A realistic roadmap for improvement

Metrics without measurement Replicable metrics that track trends

Financial, operational, reputational, and regulatory


Data without business relevance
concerns that align with board oversight responsibilities

Confidence-building stories about


Too much data
proactive plans

8 ©2018 SecureWorks, Inc. All rights reserved.


Align Your Message with the Business
Too often, CISOs find that their first board presentation devolves into a contentious
discussion about a single metric that the board doesn’t understand. You may be tempted to
pad your report with extra data in an attempt to highlight the risk, but that won’t address the
root cause of the disconnect. To increase board receptivity and build confidence that the risk
is being managed effectively, offer enough context to make the data relevant to likely business
risks and strategic goals.

Avoid the Tactical Components Breaches have an obvious link to business impact, causing
of Your Program many board members to focus only on crisis readiness
and response plans. When tackling the difficult task of
Useful board reports address business risk, not demonstrating how the rest of your program is connected
cybersecurity risk. Your message should be practical and not to business outcomes, it may be helpful to highlight
overly-dependent on all the details of your day-to-day battle cybersecurity’s role in organizational resilience. For example:
against the adversaries. Boards expect that the organization’s
security program has put the appropriate IT support, controls, • What IT systems will have the most impact on business
and processes in place to prevent what it can, detect what it availability if they experience an outage due to
can’t prevent, and respond quickly to mitigate risk. They don’t cybersecurity breach or remediation? By addressing the
need to know how cybersecurity works, nor do they need risk of losing business availability, you have an opportunity to
to learn your whole security dashboard. What they do need discuss where to prioritize resources and enforce security
to know to exercise their fiduciary duties with confidence policies.
is that the risk is being managed. That means they care
deeply about the impact a breach could have on innovation, • Of all the products we deploy, which would have the
productivity, revenue, reputation, and shareholder value. most impact on revenue or reputation if it put consumer
safety at risk and had to be pulled? Help boards imagine

Use a Revenue and how threat actors could use the company’s unique
vulnerabilities to harm customers, partners, or consumers,
Margin Lens and then describe what protections are necessary to
For cybersecurity, proving a return on investment (ROI) mitigate those risks.
can be a mythical goal. While some security initiatives
will improve efficiencies and squeeze more value out of • Where is the workflow of mission-critical intellectual
existing investments, it is difficult to measure a return on risk property that could weaken our competitive position
prevention. This underscores the importance of delivering if it were stolen or made public? Is that system behind a
your cybersecurity risk report in terms of business outcomes firewall or in the cloud? Who has access to the information
that impact current or future revenue and margin. and on what devices? Discussing the flow and storage of
digital assets will lead to a conversation about administrative

Lead with Anticipated access controls and authentication initiatives.

Business Impact
Clearly articulating the alignment between cybersecurity
practices and business outcomes will help manage budget
expectations and avoid misaligned priorities.

9 ©2018 SecureWorks, Inc. All rights reserved.


These questions will help directors think about the Explain the Limitations of Industry
consequences of not taking security actions, and also lead
to a discussion about how to prioritize and apply limited Boards naturally want to benchmark cyber risk
resources in a way that has the greatest impact on risk and investment against industry baselines and standards.
mitigation. To ensure early alignment with the company’s Industry context—including threat trends for the type of
strategic initiatives, you’ll also want to emphasize positive data you handle—is an essential component of your risk
business outcomes. Link security dollars spent to outcomes assessment. It also informs regulator expectations of
such as risk reduction, productivity achievements, and new your company’s level of cybersecurity rigor. Your
strategic undertakings. challenge is, however, to expand the lens through
which your board assesses risk to include the uniqueness
of your company’s threat landscape, including poorly-
Put a Different Twist on Risk enforced policies and processes, insufficient resources for
Tolerance and Investment patching, poorly-architected IT infrastructure, and lack of
CISOs seem to universally agree on one thing: the third party oversight.
biggest driver behind a company’s level of tolerance for
cybersecurity risk is whether or not they’ve been breached
before. Low-tolerance strategies can cost more. To help
board members understand the options and trade-offs:
Reporting Tip
• Start with a snapshot of the current state of risk, Boards should understand that if you’re breached
end to end because your environment presents the path of least
resistance for an adversary, it will be of little consolation
• Review the desired outcomes that you had the same controls and investment level as your
• Present several investment options at varying levels (use industry peer group.
a threat effectiveness lens to highlight how hard it would
be for a threat to succeed and the price point to stop it)

• Articulate the tradeoffs at each level (what you will gain


and what will need to be deprioritized)
Room for Improvement
In addition to assembling the data, consider interviewing
85% of board members believe that IT and
C-suite leaders in advance and including their perspectives
security executives need to improve the
on what risks they’re willing to accept. While it requires
way they report to the board. 54% of board
some rigor, this exercise may help you land on an agreed
members say the information reported is
tolerance more quickly.
too technical.

Osterman Research: How Boards of Directors Really Feel


About Cybersecurity Reports, 2016

10 ©2018 SecureWorks, Inc. All rights reserved.


Prepare Your Presentation with the
Right Agenda and Dashboard
Security is a fairly new discipline in the boardroom, creating Universal cybersecurity risk management frameworks, such
an undefined playing field for CISOs. Cyentia Institute’s as the NIST Framework for Improving Critical Infrastructure
Cyber Balance Sheet Report 2017 finds that board members Cybersecurity, are essential for guiding that conversation.
prefer for CISOs to express risk in one of two ways:
Practical board reporting also demonstrates that the
• Tell a story: describe the problems and how you are security program is consistently delivering on projections
solving them (or not) and promises. Your agenda, and any dashboards you
present, should include adequate evidence to give the
• Give a sign: prove you are reducing exposure via various board confidence that you know the current level of risk,
Key Performance Indicators and Key Results Indicators what vulnerabilities are a priority, and what progress is being
made to address them.

Questions Boards Are Asking (or Should Be)


• Is cybersecurity being managed appropriately and • Do we have a tested incident response
effectively across our organization? plan for the whole business?

• Have we tested those assumptions with • How are we staying current on the
independent third parties? threat landscape?

• Have we established an appropriate cyber risk • Do we have adequate organizational


escalation framework that includes our risk appetite talent to govern, own, and execute the
and KPI/KRI reporting thresholds? cybersecurity agenda?

• Do we have adequate data governance policies and • How does our program align with
controls to protect critical assets? industry standards, those of our peers,
and regulatory requirements?
• How do we manage risk from our third parties
and suppliers, including Cloud and critical • Is our organization cyber-focused and culturally
business suppliers? cyber-conscious?

• Are we able to rapidly contain damages and • Are we focused on, and investing in, the
mobilize response resources when a cyber right things from a people, process, and
incident occurs? technology perspective?

11 ©2018 SecureWorks, Inc. All rights reserved.


Tips For Agenda Planning:
Three Board Meeting Scenarios
Chances are that your next board presentation will fall into one of the following three
categories. Here are some tips shared by Secureworks clients for leading a productive
conversation in each scenario:

Reporting Tip

01
Board Members
Suffer from Slide
Fatigue

Slideware is rarely your


First-time Appearance, friend in the boardroom.
Onboarding New Board Members Keep your live presentation
materials to no more than
If you’ve done your foundational ground work, then you have a good idea of what’s
five slides (sometimes
important to your audience. Address their needs first, then swiftly move to your
1-3 will do), and focus
concerns about the top risks and threats and how they relate to business operations
on the quality of your
and objectives.
narrative. Always have
Plan for interruptions and discussion Consider including a quantifiable information
A two-way dialog will help you identify third-party risk assessment available as backup, or
what’s most useful to the board. Third-party assessments establish an in the board book, but
un-biased baseline of risks and exposures. don’t rely on the slides do
Link your program to the organization’s They can lend credibility to your security the talking for you.
top business risks roadmap and may help reinforce your
concerns about strategic initiatives that are
• What data and IP are mission critical?
increasing security risk.
• Where is that data and how is Reporting Tip
Establish cornerstone issues
it accessed?
Use an introductory meeting or annual A Picture is Worth
• What are the top threats that may update to suggest a couple of issues a Thousand Words
go after them? that relate to the long-term value of the
• What are the top cybersecurity enterprise and should stay on the board’s Sharing a high-level view
risks to the business and how likely is radar. Over time, the board will become of the organization’s IT
each one? your advocate for change on these issues infrastructure configuration
by setting a tone-at-the-top expectation and where the crown jewels
• Which risks are most important for the whole company. are located can be an
to avoid?
effective risk management
• Can any risks be mitigating or discussion tool.
transferred through insurance?

• What is the plan for the remaining risk?

12 ©2018 SecureWorks, Inc. All rights reserved.


02
Reporting Tip
Quarterly Reporting with Dashboard Review Dashboard
Components
To help board members fulfill their risk oversight responsibility, establish a reliable and
consistent set of metrics that acts as a gauge against your baseline. The numbers you
to Consider
report should be replicable and communicate trends over time.
• Emerging threat trends
• Less is more on your dashboard. • Demonstrate your readiness for
• Incident or breach trends
The business relevance and quality “the big incident” by highlighting
of your metrics are more important established protocols. • Time to respond
than volume. Rather than presenting
• Show that steady progress is being made • Time to detect
the number of unpatched systems, for
against the roadmap.
example, provide a month-over-month • Vulnerability management
update on patch latency, specifically for • Use insights from the metrics to
mission-critical systems. highlight how security is supporting the • Compliance and control
organization’s key strategic initiatives. • Data loss prevention,
• Help the board revisit known risks to
ensure that controls are in place and • Finally, plant the seeds for future integrity, and availability
assess their effectiveness. investment in response to changes in the
• Third party vendor risk
threat landscape.
• Explain the timeline to resolve specific
• Employee awareness
exposures and describe the mitigating
controls you’ve put in place. • Status of key initiatives
• Assessment results

03
Dashboards
Are a Supporting
Prop, Not the
Presentation
Annual Report
A useful board report tells
This is your chance to roll up the year’s prior presentations to demonstrate the strategic a story about how well risk
value of the investments made to date—and present future concerns that may warrant is being managed at the
budget adjustments. Aligning progress with the agreed-upon roadmap will help make the business level. Within that
case for renewed support from the board. report, your dashboard plays
a supporting role, while the
• Always start with your “ask.” What do • For public companies, this may also
narrative you use to explain
you want from the board or what do you be a time to prepare annual business
the risk is essential.
want them to agree to? risk disclosures. Be prepared to review
incident and breach impact metrics.
• Provide a narrative about progress Within the dashboard,
against desired outcomes: business • Illustrate how improved security has key metrics should be
execution, security controls, and risk reduced business risks or helped achieve replicable—appearing
position. Keep it high level. goals such as digital transformation. consistently in each report
over time—to help board
• Leverage a rollup of your quarterly • Paint a picture for what’s next given
members assess risk
metrics to provide risk and vulnerability emerging known threats.
trends, as well as the current state of
trends over time.
• Clarify your action plan and reiterate
risk exposure.
your asks for resources or support.

13 ©2018 SecureWorks, Inc. All rights reserved.


Conclusion
As CISOs take a business leadership position, it is important to
do so with thought and purpose. Building relationships with your
executive team and members of the board is critical to earning
the support that will help you lead confidently through a breach
should one occur.

Consistency in board reporting will pay off as you establish


metrics and narratives the board comes to rely on for assessing
the organization’s response to cybersecurity risk. To maintain
that confidence, stay focused on business outcomes. A lapse
into tactics that describe “how the security program works”
will distract attention from the more valuable “why security is
important” story, pulling the discussion off track and threatening
to erode the board’s perception of your leadership role.

Finally, continue to test the effectiveness of your security program


and help the board benchmark better management of the
risk over time. Together, these factors will support a reporting
framework that helps you answer your board’s most burning
question: “How secure are we?”

14 ©2018 SecureWorks, Inc. All rights reserved.


Join the
Conversation
Do you have board reporting strategies or useful templates
to share with your CISO peers? Secureworks will continue
to update this Toolkit appendix with redacted templates for
reporting visuals, dashboards, and assessment results.
Our goal is to foster an ongoing exchange of leading
practices among security leaders from companies of all sizes
and industries. We look forward to hearing from you at
thoughtleadership@secureworks.com.

15 ©2018 SecureWorks, Inc. All rights reserved.


About
Secureworks
Secureworks® (NASDAQ: SCWX) is a leading global cybersecurity company that
protects organizations in the digitally connected world. We combine visibility from
thousands of clients, aggregate and analyze data from any source, anywhere, to
prevent security breaches, detect malicious activity in real time, respond rapidly,
and predict emerging threats. We offer our clients a cyber-defense that is
Collectively Smarter. Exponentially Safer.™

Corporate Headquarters Europe & Middle East


1 Concourse Pkwy NE #500 FRANCE
Atlanta, GA 30328 8 avenue du Stade de France
1.877.838.7947 93218 Saint Denis Cedex
secureworks.com +33 1 80 60 20 00
secureworks.fr

GERMANY
Asia Pacific
Main Airport Center,
AUSTRALIA Unterschweinstiege 10
Building 3, 14 Aquatic Drive 60549 Frankfurt am Main
Frenchs Forest, Sydney NSW 069/9792-0
Australia 2086 secureworks.de
1800 737 817
secureworks.com.au NETHERLANDS
Transformatorweg 38-72, 1014
JAPAN AK Amsterdam,
Solid Square East Tower 20F +31 20 674 5500
580 Horikawa-cho, Saiwai-ku
Kawasaki, 212-8589 UNITED KINGDOM
81-(44)556-4300 UK House, 180 Oxford St
secureworks.jp London W1D 1NN
+44(0)203 907 6280
secureworks.co.uk

1 Tanfield
Canonmills
Edinburgh EH3 5DA
United Kingdom
+44(0)131 260 3040
secureworks.co.uk

UNITED ARAB EMIRATES


Building 15, Dubai Internet City
Dubai, UAE PO Box 500111
00971 4 420 7000
EXECUTIVE SERIES

Appendix

Sample Board
Reporting
Dashboards

17 ©2018 SecureWorks, Inc. All rights reserved.


Office of the CISO ------ April 2017 ------ IS Managed Devices

Compliance Operations Endpoints..............................................................14,974


Desktops.............................................................9,194
Total Thin Clients........................................................1,888
Hardware Laptops............................................................. 3,588
Assets*** Unknown Windows (AD)................................224
Virtual Desktops...................................................80
PCI HIPPA Projects Budget Audit SLA Strategy Servers....................................................................1,080
Network......................................................................656

Threat Landscape

External Internal Network Server Client Confidentiality Integrity Availability


Infrastructure Infrastructure Infrastructure

Client Security Stack

Win 2000
0 Left
80% 73% 98% 81% 84% 91% 83%

Anti-Virus Desktop Laptop Application Patch Software AETD Firewall


Encryption Encryption Whitelisting Management Vulnerability Advanced Endpoint Default XP Systems
Software Monitoring Threat Detection Rules 39 Left

Server Security Stack

Server 2000
93% 0% 59% 91% 66% 2 Left

Anti-Virus Application Software Patch AETD SIEM Firewall


Secureworks purchased; Server 2003
Whitelisting Vulnerability Management Advanced Endpoint implementation started
Default
Monitoring Software Threat Detection October 2016. Rules 59 Left

Network Security Stack

3% 84%

OS Patching Authentication SIEM IPS Firewall Router/Switch Wi-Fi Security PKI/Certificate


% of Network Devices with % of Network Devices in Secureworks purchased; Secureworks purchased; Security Configuration 2012 Expired Cert on Infrastructure
non-Vulnerable OS (LiveOnly) ACS - Central Auth implementation started implementation started Prod Network (Validation
October 2016. October 2016. Disabled)

Gauge Legend
Good (85%-100%) Warning (65%-84%) Bad (0%-64%) Unknown
***Calculations below this point are based on the entire network not just the AD/Domain. Items such as PSO Networks/Non-IS Managed Systems/Medical Systems that are plugged into the Production Network are included.

Security Projects Vulnerabilities Within SLA


Internal: Critical Vulnerabilities: 12% Actual; Target 85%
Secureworks - Managed Security Service Provider
Internal: Non-Critical Vulnerabilities: 32% Actual; Target 85%
External: Critical Vulnerabilities: 0% Actual; Target 85%
External: Non-Critical Vulnerabilities: 37% Actual; Target 85%

External Vulnerabilities Internal Vulnerabilities


Marketing Vulnerabilities - 15 14,531 Systems with CVSS of 10
Research Vulnerabilities - 1 14,421 Systems that have Vulnerabilities that have
TLS/SSL Related - 70% Adobe - 34%
Discovered since last report - 35 publicly available exploits
IIS - 17% Java - 23%
167 Information Disclosure - 4% Microsoft - 29%
Misc. - 9% 7,404,464 7,244,830 Misc. - 14%
146 6,588,793 6,804,076 6,817,588

111 113 5,085,915


99 102 99 100 102 4,723,940 4,900,115 5,867,915
4,130,714
79 82 5,238,762 5,437,305 4,929,117
166 70 66 76 75 4,576,551
66 5,137,565
145 3,416,982
2,761,477

98 102 99 111 113 100 100


3,341,360
2,998,737
82 76 73 2,743,755
78 69
65 66
2,165,702 1,807,525 1,888,471 1,382,580 2,138,638
2,012,242 1,666,510 1,668,933 1,386,959 1,869,178

Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr

Vulnerability Legend

Critical CVSS 7-10 Non-Critical CVSS 0-6.9 Total/Trend *Critical / Non-Critical Findings based on Standard ISS / 01 Time to Remediate 30 Days Critical /
90 Days Non-Critical
Dashboard
Threat Landscape LOWERED TO GUARDED Wednesday, June 29, 2017 09:00:00
CTU researchers continue to analyze the NotPetya malware. Clients should block
MeDoc accounting software updates, verify backup and restore processes, and HISTORY
Guarded Cybersecurity Index segment networks for different business functions.

RECON INCIDENTS ATTACKS Threat Intel

Security Stack

Physical
NETWORK WORKSTATIONS SERVER CLOUD SaaS CLOUD IaaS Security

Compliance Operations

SSAE16

SSAE16
ISO (SOC2/
FFIEC 27001 GDPR HIPPA NERC/CIP PCI Audit BCP Projects RISK Strategy
Type 2)

Classification: Confidential - Limited External Distribution

Vulnerabilities

Criticality Within SLA> Outside SLA Outside SLA Trend

Critical 79 21%

High 93 7%

Medium 98 2%

Low 98 2%

Total 93 7%

External Vulnerabilities Internal Vulnerabilities

900 ???
800
700
600
500
400
300
200
100
0
Feb Mar Apr May Jun July Feb Mar Apr May Jun July

Non-Critical Critical ???? Non-Critical Critical ????

External Vuln Details Internal Vuln Details


Vuln Count Criticality Vuln Count Criticality

SSL Certificate Expired 18 critical Microsoft CVE-2017-84?3: Windows Explorer 2571 critical
Remote Code Execution Vulnerability
SSL Certificate Supports Weak Encryption 3 critical
Microsoft CVE-2017-????: 2571 critical
World Readable and Writable 1 critical Win32k Elevation of Privilege Vulnerability
Directory on Anonymous FTS
Microsoft CVE-2017-????: 2571 critical
Birthday attacks against TLS ciphers with 97 non-critical WordPad Remote Code Execution Vulnerability
64bit block size vulnerability (Sweet32)
CIFS Account Lockout Policy 4433 non-critical
SSL Certificate - Signature Verification Failed 60 non-critical Allows Password Brute Forcing
Vulnerability
Microsoft CVE-2017-0170: Windows Performance 2639 non-critical
CMP Timestamp Request 69 non-critical Monitor Information Disclosure Vulnerability

Microsoft CVE-2017-????: Microsoft Browser Security ???? 2639 non-critical


Threat Landscape Detail
LOWERED TO GUARDED Wednesday, June 29, 2017 09:00:00
CTU researchers continue to analyze the NotPetya malware. Clients should block
MeDoc accounting software updates, verify backup and restore processes, and HISTORY
Guarded Cyber Security Index
segment networks for different business functions.

• CTU researchers identified 15 possible breaches. Most of these unconfirmed breaches affected government organizations or containing government identification
• Most threat actor activity and interest focused on financial organizations, specifically targeting credentials. CTU researchers also identified a significant increase in activity
affecting hotels, business services and technology
• North America and the combination of Europe and Russia (Europe + Russia) were the most targeted geographical locations although CTU researchers observed an
increase in advertised data from China, Australia and South America. UK financial e-crime also continued to rise.

Reconnaissance Reconnaissance is measured via standard deviance over weeks for seen events on our network as reconnaissance
MOST RECENT CHANGE

Timestamp Value Comments


2017 07-09 ??:24:46 49.218.60 49218 is outside of the standard deviation. There is still a good bit of apache struts scanning occurring

Number of Reconnaissance events by month


Top Events Count
70000
60000 Apache Struts wildcard ?? OGNL remote code execution attempt 34167
50000 Netcore UDP Backdoor Exploration Attempt inbound 8487
40000
Bash CGI environment variable injection attempt 1663
30000
20000 SQL Injection Attack SQL Tautology Detected 369
10000
TEST TEST TEST 99
0
Jan Feb Mar Apr May Jun July

Threat Landscape Detail - Incidents


???????
Incidents
MOST RECENT CHANGE

Timestamp Value Comments


2017 07-09 11:24:46 ?? ??

CAT 0 ?? Network Defense Testing CAT 5 Non-Compliance Activity


CAT 1 Root Level Intrusion CAT 6 Reconnaissance
CAT 2 User Level Intrusion CAT 7 Malicious Logic
CAT 3 Unsuccessful Activity / Attempt CAT 8 Investigating
CAT 4 Denial of Service CAT 9 ??

Incidents Opened (6/1-6/30) CAT 5 Incidents By Business Unit (6/1-6/30)


200
8
175
7
150
6
125
5
100
4
75
3
50
2
25
1
0
CAT 1 CAT 2 CAT 3 CAT 4 CAT 5 CAT 6 0

Team 1 Team 8
Team 2 Team 9
Team 3 Team 10
Team 4 Team 11 Team 1 Team 5
Team 5 Team 12 Team 2 Team 6
Team 6 Team 13 Team 3 Team 7
Team 7 Team 4 Team 8

??

Unsafe malware research 12

Cross Client Data Publication 5

?? 10

Other 7

TEST 99
Threat Landscape Detail - Attacks
Attacks Unsuccessful events are actual threats against Secureworks that were not turned into compromises. This is measured via standard deviation over
weeks for unsuccessful events against our networks
MOST RECENT CHANGE

Timestamp Value Comments

These events 2017-07-10 11:45:45 17.00 17 unsuccessful attack incidents created from 6/1-6/30. This is within standard deviation.
generally are http
attacks, but include
phishing, brute This graph represents the number of unsuccessful attempts to compromise secureworks divided by week for the last 4 months.
force attacks and
other events as CAT 3 Incident Trending
well.
30

25

20

15

10
5

0
Jan 2017 Feb 2017 Mar 2017 April 2017 May 2017 June 2017 July 2017

Team 1 Team 5 Team 8


Team 2 Team 6 Team 9
Team 3 Team 7 Team 10
Team 4

Threat Landscape - Threat Intel.


Threat Intelligence The threat intelligence score is taken from the portal. The scores are translated into stop lights from the Cyber Security Index maintained by our
Counter Threat Unit
MOST RECENT CHANGE

Timestamp Value Comments


2017-07-10 11:45:43 100.00 LOWERED TO GUARDED Wednesday, June 29, 2017 09:00:00
CTU researchers continue to analyze the NotPetya malware. Clients should block MeDoc accounting software updates,
verify backup and restore processes, and segment networks for different business functions.

The Secureworks® Counter Threat UnitTM (CTU) research team welcomes you to the Open Sources Intelligence Update for July 10, 2017. This update
provides a brief daily highlight of CTUTM activities, major issues, and trends affecting Secureworks clients.

CTU Research

Nothing to report

Vulnerabilities and Threats

LeakerLocker Ransomware Found in Two Apps on the Google Play Store


???

Unmasking Android Malware: A Deep Dive into a New ?? Variant


http://blog.fortiner.com/2017/07/09/unmasking-android-malware:-a-deep-dive-into-a-new-??-variant-part-??
http://blog.fortiner.com/2017/07/09/unmasking-android-malware:-a-deep-dive-into-a-new-??-variant-part-??
http://blog.fortiner.com/2017/07/09/unmasking-android-malware:-a-deep-dive-into-a-new-??-variant-part-??

OSX ?? Malware Linked to Operations ?? Hijacks User Network Traffic


???

Petya’s ?? Boot Record Infection


http://blog.fortiner.com/2017/07/08/petya-s-??-boot-record-infection
Security Stack Detail - Network (abbreviated)
OVERALL STATUS - DEGRADED OPERATION

The Firewall metric is determined by the deployment of firewalls on all production networks. It is determined by taking the total number of
production networks that have no firewall or allow for ?? and dividing by the total number of networks.
Firewall MOST RECENT CHANGE

Timestamp Value Comments


2017-07-?? 500.?? At this time, all production networks have firewalls enabled.

More information >> More History >>>

App Firewall is determined by coverage of application firewalls that host internet facing services. This traditionally only applies to web
traffic today. Application firewalls in blocking get one point. Applications in read only get 5. Applications with 0 application firewall get 0.
The score is an average.
MOST RECENT CHANGE
App Firewall
Timestamp Value Comments
2017-07-?? ?? We currently have a Web Application Firewall blocking ?? of IDP secureworks.com and
secureworks.com. Redcloak, the mobile portal, T ICE have a ?? that is non blocking, but being
monitored. Cloud Guardian, ??, ??, and CTU ?? ?? source code is stored have no ??. Currently,
we’re working on deploying the ?? ?

More information >> More History >>>

Security Stack Detail - Workstations (abbreviated)


OVERALL STATUS - OPERATIONAL

Encryption is determined by the percentage of workstations with no errors running full disk encryption. This ?? which use AES-256 local-
ly. Checkpoint and BitLocker (Windows 10)
Full Disk MOST RECENT CHANGE
Encryption
Timestamp Value Comments
2017-07-12 12:42:32 87.00 87% of devices are utilizing Full Disk Encryption (??)

More information >>

Network Access Control is determined by the percentage of workstations with a valid certificate and AnyConnect that can
connect to the corporate network.
Network MOST RECENT CHANGE
Access
Control Timestamp Value Comments
2017-07-12 12:49:01 100.00 100% of devices are part of the domain and configured as part of GPO with network control
access. This is ensured by the ability to join our network.

More information >>


Security Stack Detail - Servers (abbreviated)
OVERALL STATUS - DEGRADED OPERATION

Forensics is calculated by a percentage of workstations that have EnCase installed. EnCase is the tool we use to perform data forensic investigations.
MOST RECENT CHANGE
Forensics
Timestamp Value Comments
2017-07-10 15:10:15 0.00 Working with IT on deployment, CSO is building an encase install package that ProdOps can test deploy-
ment on sample machines.

More information >>

File Integrity Monitoring is a host intrusion detection system that watches for unauthorized file changes indicating a potential compromise.
File Integrity MOST RECENT CHANGE
Monitoring
Timestamp Value Comments
2017-07-10 15:10:36 75.00 ?? software deployed and configured, monitoring process/procedures currently in development. We’re
having regular meetings where we ?? and respond to events.

More information >>

Advanced AETD is calculated by the percentage of workstations running Red Cloak.


Endpoint MOST RECENT CHANGE
Threat
Detection Timestamp Value Comments
2017-07-10 19:08:51 75.00 The Linux agent for Red Cloak is built, but in beta. We’re working on installing the Windows agent now.
Plan to have it fully deployed by 8/15

More information >>

Security Stack Detail - Cloud SaaS (abbreviated)


OVERALL STATUS - DEGRADED OPERATION

Adaptive Planning is a budgeting and planning tool. Calculation is a metric determined by the vetting done by Security Architecture and Vendor Risk Manage-
ment as well as the number of exceptions to standards.
MOST RECENT CHANGE
Planning
Timestamp Value Comments
2017-05-02 20:24:28 0.00 This legacy service from Dell has not been reviewed by CSO and therefore gets a default total score of ??

More information >>

Box is a hosted application that is used to store files and documents in a secure manner for collaboration. Calculation is a metric
determined by the vetting done by Security Architecture and Vendor Risk Management as well as the number of exceptions to standards.
Box com MOST RECENT CHANGE

Timestamp Value Comments


2017-05-02 20:30:32 90.00 Architecture and Vendor Management Review with flying colors. It also has one exceptions currently

More information >>

Concur is a Dell hosted application used by SCWX for travel and expense related activities. Calculation is a metric determined by the vetting done
by Security Architecture and Vendor Risk Management as well as the number of exceptions to standards.
Concur
MOST RECENT CHANGE

Timestamp Value Comments


2017-05-04 17:03:42 70.00 This legacy service from Dell has ?? been reviewed by CSO, some controls in place.
Security Stack Detail - Cloud IaaS (abbreviated)
OVERALL STATUS - DEGRADED OPERATION

Backup is calculated as a percentage of machines that are backed up in some form


MOST RECENT CHANGE
Forensics
Timestamp Value Comments
2017-05-18 19:54:15 100.00 CloudOps reports that all needed backups are successful

More information >>

Vulnerability Management is calculated by the number of devices without known vulnerabilities.


Vulnerability
Management MOST RECENT CHANGE

Timestamp Value Comments


2017-05-18 19:22:03 95.00 95 of the hosts have vulnerability management in AWS

More information >>

Whitelisting is determined by the percentage of security groups per device that allow all connectivity inbound or outbound.
Whitelisting
MOST RECENT CHANGE

Timestamp Value Comments


2017-05-18 19:24:15 95.00 95 of the hosts have a complete lockdown of outbound traffic in AWS. The remaining 5% need to
be investigated as they could potentially have access.

More information >>

Security Stack Detail - Physical Security (abbreviated)


OVERALL STATUS - OPERATIONAL

All doors in SCWX controlled spaces that have the specific purpose of controlling access and reporting anomalies to our monitoring system.
This excludes Dell Controlled and Monitored points of entry. There are 195 SCWX doors globally. To be considered fully operational, the door must:
Only open when prompted by associated badge reader
Close without assistance from person accessing it.
Doors Alarm ?? when forced open, or held open beyond its alloted time.

MOST RECENT CHANGE

Timestamp Value Comments


2017-05-02 ??:04:28 100.00 All doors are currently operational.

More information >>

All cameras in SCWX controlled spaces that have the specific purpose recording activity in the vicinity of key areas. SCWX cameras are UNMOUNTED and
therefore only usable for investigative purposes after an incident has occurred. This excludes Dell Controlled and Monitored cameras. While we do have the
ability to petition Dell for a summary of activity from a given camera and time window, we do not currently possess the agreements to receive raw footage
for investigative purposes. There are 148 SCWX cameras. To be considered fully operational, the camera must:
Cameras Possess a recording resolution of 1280x720
Perimeter, SOC, IT Storage, and Data Center Cameras will record full time motion video.
All other cameras will be prompted by motion sensor.

MOST RECENT CHANGE

Timestamp Value Comments


2017-07-12 16:15:11 96.00 More legacy low resolution cameras have been replaced with high resolution cameras.

More information >>


Operations (abbreviated)
OVERALL STATUS - OPERATIONAL

Audit Audit - Remediation status for security impacting audit findings.


MOST RECENT CHANGE

Timestamp Value Comments


2017-07-28 14:02:23 90.00 1. Control standard ??? is ??? in a manner to allow the data custodian subjectivity to determine require-
ments around encryptions ??? - Recommend closure. Submitted to Internal Audit for Review. Due
8-1-2017.
2. The current ??? policies, procedures and standards do not sufficiently address or include the vendor
management compliance items. - ???
3. The Vendor Risk Management Program does not identify ???

BCP BCP - Readiness of Business Continuity Plan testing and ??? analysis.

MOST RECENT CHANGE

Timestamp Value Comments


2017-07-28 08:40:28 100.00 ???
???
???
Legal ??? Compliance - Approved
IT Operations BCP - Approved
Finance BCP - Approved
???
???
Sales BCP - Approved
CTO BCP - Approved
HR BCP - Approved
Security BCP - Approved
???
Service Directory BCP - Approved
Marketing BCP - Approved
CTU BCP - Approved

You might also like