SUBSCRIBE

RSA 2016: Cyber security starts with asset management: Speaker

SAN FRANCISCO โ€” Before CISOs start spending money on analytics and data loss prevention solutions theyโ€™d better know whatโ€™s under their thumbs.

That was the message from former Bank of America CISO Patrick Gorman at a panel Tuesday atย the annual RSA Conference here.

Patrick Gorman at RSA
Patrick Gorman at RSA

Conducting a complete inventory โ€” also known as asset management โ€” is a vital first step for any infosec leader who doesnโ€™t want to get buried, he said.

In an interview after the session Gorman โ€” now head of strategy and product development at startup CyberGRX โ€” expanded on the comments.

โ€œWhen I think about assets in the enterprise itโ€™s mobile devices, endpoints, servers, networks, where your data is located, Itโ€™s where your people are at, itโ€™s understanding business processes โ€” and Iโ€™ve yet to see any organization that has a good end-to-end view of this, so if something happens what business process is affected? Whereโ€™s the data?

โ€œA lot of time asset management just gets picked up in terms of things like physical devices โ€“ which still has to be done โ€“ but thereโ€™s a whole stack that goes along with that that I donโ€™t think is looked at holistically.

โ€œI start with this principle: How do you defend something if you donโ€™t know what youโ€™re defending? If youโ€™re in charge of defending the borders of a country if you donโ€™t even know the geography I donโ€™t know how you defend against that.โ€

He recalled the old war philosophy of the Chinese strategist Sun Tzu: Know yourself, know your enemy.

Asset management is underfunded and ignored because itโ€™s not particularly sexy,โ€ he said. โ€œThe sexy things are APT tools and advanced analytics and modeling simulation โ€“ which I think are all importantโ€”but thereโ€™s basic blocking and tackling thatโ€™s forgotten in all this, and thatโ€™s around asset management.โ€

How can an organization change this?

โ€œYou take a look at the SANS top 20 controls. Number one and number two are know you applications, know your data and your systems. They donโ€™t start with vulnerability management or DLP or advanced analytics. What you really have to do is recognize the criticality of this. Without those things you canโ€™t do all this advanced monitoring, you canโ€™t do vulnerability management well, you canโ€™t deploy your controls because you donโ€™t know what assets to put controls on.

โ€œThe way you do this is you (the CIO) say โ€˜This is a top control I want to see the metrics on this and Iโ€™m going to hold you accountable for making sure we understand our assets.โ€™

โ€œAnd thatโ€™s a combination of the CISO holding the IT department accountable and reporting up to the CEO where the board on the risk perspective saying โ€˜there are assets, and hereโ€™s the vulnerability of our assets.โ€™

โ€œSo I think itโ€™s more of a mentality and holding people accountable for it. Itโ€™s really not that difficult, and most of the standards out there say you have to do asset management: the NIST framework has that, ISO has that, itโ€™s just it gets lost in the noise.โ€

Tech Jobs

Categories