SAN FRANCISCO โ Before CISOs start spending money on analytics and data loss prevention solutions theyโd better know whatโs under their thumbs.
That was the message from former Bank of America CISO Patrick Gorman at a panel Tuesday atย the annual RSA Conference here.

Conducting a complete inventory โ also known as asset management โ is a vital first step for any infosec leader who doesnโt want to get buried, he said.
In an interview after the session Gorman โ now head of strategy and product development at startup CyberGRX โ expanded on the comments.
โWhen I think about assets in the enterprise itโs mobile devices, endpoints, servers, networks, where your data is located, Itโs where your people are at, itโs understanding business processes โ and Iโve yet to see any organization that has a good end-to-end view of this, so if something happens what business process is affected? Whereโs the data?
โA lot of time asset management just gets picked up in terms of things like physical devices โ which still has to be done โ but thereโs a whole stack that goes along with that that I donโt think is looked at holistically.
โI start with this principle: How do you defend something if you donโt know what youโre defending? If youโre in charge of defending the borders of a country if you donโt even know the geography I donโt know how you defend against that.โ
He recalled the old war philosophy of the Chinese strategist Sun Tzu: Know yourself, know your enemy.
Asset management is underfunded and ignored because itโs not particularly sexy,โ he said. โThe sexy things are APT tools and advanced analytics and modeling simulation โ which I think are all importantโbut thereโs basic blocking and tackling thatโs forgotten in all this, and thatโs around asset management.โ
How can an organization change this?
โYou take a look at the SANS top 20 controls. Number one and number two are know you applications, know your data and your systems. They donโt start with vulnerability management or DLP or advanced analytics. What you really have to do is recognize the criticality of this. Without those things you canโt do all this advanced monitoring, you canโt do vulnerability management well, you canโt deploy your controls because you donโt know what assets to put controls on.
โThe way you do this is you (the CIO) say โThis is a top control I want to see the metrics on this and Iโm going to hold you accountable for making sure we understand our assets.โ
โAnd thatโs a combination of the CISO holding the IT department accountable and reporting up to the CEO where the board on the risk perspective saying โthere are assets, and hereโs the vulnerability of our assets.โ
โSo I think itโs more of a mentality and holding people accountable for it. Itโs really not that difficult, and most of the standards out there say you have to do asset management: the NIST framework has that, ISO has that, itโs just it gets lost in the noise.โ