Click here to close now.


SDN Journal Authors: Stefan Dietrich, Elizabeth White, Peter Silva, Pat Romanski, Don MacVittie

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Log Management, Cloud Security, SDN Journal

@CloudExpo: Article

Adopting a Comprehensive Risk Management Program

In the Boardroom with...Mr. Rob Wigley, Director, Cybersecurity Consulting Services, HP Enterprise Services, U.S. Public Sector

Rob Wigley is Director, Cybersecurity Consulting Services at HP Enterprise Services, U.S. Public Sector. He has more than 30 years of information technology experience supporting manufacturing, high tech, healthcare, and public sector market segments. For the last 10 years, he has focused on developing and delivering cybersecurity consulting solutions for public sector clients. Thank you for joining us today, Rob. Can you please tell us a little about your background and your role within HP.

Rob Wigley: I have more than 30 years of information technology experience supporting manufacturing, high tech, healthcare, and public sector market segments. For the last 10 years, as regulatory requirements for information security have increased in association with mounting threats facing government and businesses today, I have focused on developing and delivering cybersecurity consulting solutions for public sector clients. This market has unique IT security requirements and is facing a significant increase of cyber threats. HP Cybersecurity Consulting Services are soundly structured to help our clients manage risks to their environment. Cybersecurity is front-page news on a daily basis. Attacks and threats may emanate from anywhere, at any time - from well-organized state-sponsored and foreign-operated governments, to lone wolf hackers, and even from natural disasters such as Hurricanes Katrina and Sandy. We seem to be in an environment where it is not "IF" your organization will be exposed to a breach or experience downtime due to a security threat, but "WHEN." What are the minimum "best-practices" that your Cybersecurity Consulting Team recommend for implementation in this very challenging environment?

Rob Wigley: Without question, adversaries have become smarter, better organized, and more persistent as they seek to cause disruptions and access intellectual property and other sensitive information. The number of cyber threats is proliferating faster than many organizations can defend. Many companies and global governments have been subjected to some very sophisticated and targeted attacks, which have had a significant impact on their mission. This includes some recent extremely high-profile breaches conducted by insiders.

In order to address these threats, first and foremost an organization needs to have an effective risk management program supported by senior management, with a strong governance structure, and integrated across all business processes. As businesses look for new growth opportunities and consequently adopt new technologies, the tradeoff becomes uncertainty and risk that could affect their mission and goals. A continuous process of risk management activities should be applied to identify new risks, reassess previously identified risks, and monitor and track the effectiveness of risk mitigation plans.

An often overlooked component of risk management is the benefit of integrating the processes early within the business and technology lifecycle. Doing so helps to identify potential threats and vulnerabilities so they can be addressed from the start in order to prevent security breaches. It's much less costly in terms of financial impact to fix vulnerabilities detected up front in the design and development phases, rather than fix them in production environments or after a security incident. This lifecycle-based risk management approach can also reduce costs, as full risk assessments would not be required as frequently.

Another important aspect of a comprehensive risk management program is that it allows business leaders to make informed decisions when balancing the cost of managing risk. As IT budgets continue to come under scrutiny, a thorough documented risk analysis is necessary to justify the expenditures of implementing risk-based controls. That's why it's critical to describe risk in terms of "risk to the business." The bottom line is that an effective risk management program is one that permeates throughout an organization's culture, including people, processes, technology, and governance. If possible, may we have a brief overview of the comprehensive risk management services you are able to provide to both public and private sector entities?

Rob Wigley: HP has a set of core services under our Governance Risk and Compliance Consulting Services specifically designed to improve a client's overall risk posture in a cost-effective manner. These include compliance and risk assessment services that evaluate the infrastructure and applications with your agency, or corporate security policies and industry best practice. We perform vulnerability scanning, penetration testing, code review, and comprehensive application threat assessments.

We also perform assessments on the strategic aspects of an information security program. We evaluate the effectiveness of security governance, security strategy, incident management, and an organization's risk management process. This consists of a current state and maturity assessment, a gap analysis, and the development of a strategic roadmap with the end goal of aligning your security program with business requirements and measurably reducing business risk. We also offer Security Discovery Workshops, which are one-day interactive workshops facilitated by senior HP consultants involving both business and IT stakeholders. The objective is to examine your cybersecurity strategy and identify your biggest challenges, looking at how you're currently addressing those challenges, and showing how you can use our maturity model to implement a prioritized roadmap to improve your overall cybersecurity posture. In your opinion, does a misperception exist within the IT world between the terms "risk management" and "risk assessments"?

Rob Wigley: This is a very good question and one that I find myself explaining quite frequently. A risk assessment is just one step in a risk management framework - the overall process of risk identification and analysis by determining potential threats and vulnerabilities associated with an IT system. Conversely, risk management includes selecting and implementing security controls to reduce risk to an acceptable level, categorizing systems to determine their criticality, and reviewing regulations, and policies and standards affecting the security of the information.

Another very important process with risk management is monitoring security controls. Because of the increased threat landscape and sophistication of attackers, periodic risk assessments are no longer sufficient for many organizations. Continuously monitoring for threats and vulnerabilities has become critical to support risk management decisions.

There are some well-established risk management frameworks and standards that explain in detail the processes with all aspects of risk management and risk assessments. This includes publications from the International Organization for Standardization (ISO) and the National Institutes of Standards and Technology (NIST). With everything moving into the Cloud, can we take a moment and drill down specifically into Cloud Security? What resources does HP offer its clients to help design and deploy a secure cloud strategy?

Rob Wigley: Many surveys indicate that one of the top concerns organizations have in moving to the cloud is the security of their information. While security concerns are not unique to cloud computing, cloud is just one of many disruptive technology trends that organizations are facing. HP offers a secure comprehensive portfolio for cloud computing from private and virtual private cloud, to public cloud and hybrid environments serving customers in both the private and public sector market segments.

To help clients address their concerns on cloud security, we establish a risk-based approach. First, we assess our client's risk tolerance profile, compliance requirements, operational requirements, organizational capabilities, and resources. We typically do this within HP Cloud and HP Security Discovery Workshops with the client. We then look to transform the client's environment.

To assist in that transformation process, HP Security Architects will help clients in developing a secure reference architecture. This provides a common set of the essential architectural design artifacts that can be tailored to fit the needs of a particular cloud delivery model. It also provides a checklist against which architects and engineers will be able to ensure that they have covered all the necessary security requirements in their design solution. Next, HP consultants implement secure application design and deployment practices and secure data management in the cloud. As I mentioned previously, security needs to be built into the infrastructure and applications early in the design cycle to reduce attack surfaces. Can you highlight any Cybersecurity process/methodologies HP follows?

Rob Wigley: For our U.S. Public Sector clients, HP routinely uses the NIST Special Publications (800 Series). There's an extensive list of documents developed collaboratively by the government, academic organizations, and the private sector that's available to the public. This ranges from very specific technical requirements and guidance on IT systems to strategic guidance at the organizational and business process level.

HP has developed an Enterprise Security Framework that encompasses end-to-end security. Our end-to-end approach incorporates the capabilities of HP ArcSight, Fortify and TippingPoint, along with our suite of Risk Management Consulting Services and Managed Security Services.

To support our clients with this framework, HP has developed a risk-based methodology: "Assess, Transform, Optimize, Manage" (or ATOM) that helps enable organizations reduce risk in a cost-effective manner. We Assess our client's risk tolerance profile, compliance requirements, operational requirements, organizational capabilities and resources. We then work to Transform our client's environment, structuring and prioritizing their security issues, and then undertaking remediation projects with them. Next, we Optimize and broaden our client's level of security awareness. We help them continually monitor their environment and proactively recommend operational and process improvements that can deliver an optimized security and risk posture. We also Manage the associated transformation programs required to deliver security in the most effective way for the enterprise. In this phase, we can also reduce cost by leveraging our worldwide security operations centers. Any final thoughts you'd like to share?

Rob Wigley: Cyber threats are real and growing, and most organizations are overwhelmed with the increasing risk to their business. When organizations adopt a comprehensive risk management program, they experience significant benefits in compliance achievement, reduced risk and better decision-making. Risk management is most effective when it's engrained within an organization's culture. The role of senior leaders must be to establish and emphasize the need for a strong risk management program. The failure to do so will pose a significant risk to organizational objectives.

This interview originally appeared in Republished with permission.

More Stories By Liz McMillan

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@CloudExpo Stories
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, presented how organizations can use eFolder Cloudfinder to automate backups of cloud application data. He also demonstrated how easy it is to search and restore cloud application data using Cloudfinder.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty ...
Internet of @ThingsExpo, taking place June 7-9, 2016 at Javits Center, New York City and Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 18th International @CloudExpo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo New York Call for Papers is now open.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operations, business intelligence, and security and compliance. Asaf Yigal is co-founder and VP of Product at log analytics software company In the past, he was co-founder of social-trading platform Currensee, which...
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, explored the IoT cloud-based platform technologies driving t...
There are over 120 breakout sessions in all, with Keynotes, General Sessions, and Power Panels adding to three days of incredibly rich presentations and content. Join @ThingsExpo conference chair Roger Strukhoff (@IoT2040), June 7-9, 2016 in New York City, for three days of intense 'Internet of Things' discussion and focus, including Big Data's indespensable role in IoT, Smart Grids and Industrial Internet of Things, Wearables and Consumer IoT, as well as (new) IoT's use in Vertical Markets.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is required which seamlessly integrates robust data analytics with massive scale. These storage systems will act as “smart systems” provide in-place analytics that speed discovery and enable businesses to quickly derive meaningf...
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, rich desktop and tuned mobile experiences can now be created with a single codebase – without compromising functionality, performance or usability. In his session at DevOps Su...
In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects).
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, exploreed the current state of IoT connectivity and review key trends and t...