Welcome!

SDN Journal Authors: Elizabeth White, Rishi Bhargava, Pat Romanski, ManageEngine IT Matters, Steven Lamb

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Log Management, Cloud Security, SDN Journal

@CloudExpo: Article

Adopting a Comprehensive Risk Management Program

In the Boardroom with...Mr. Rob Wigley, Director, Cybersecurity Consulting Services, HP Enterprise Services, U.S. Public Sector

Rob Wigley is Director, Cybersecurity Consulting Services at HP Enterprise Services, U.S. Public Sector. He has more than 30 years of information technology experience supporting manufacturing, high tech, healthcare, and public sector market segments. For the last 10 years, he has focused on developing and delivering cybersecurity consulting solutions for public sector clients.

SecuritySolutionsWatch.com: Thank you for joining us today, Rob. Can you please tell us a little about your background and your role within HP.

Rob Wigley: I have more than 30 years of information technology experience supporting manufacturing, high tech, healthcare, and public sector market segments. For the last 10 years, as regulatory requirements for information security have increased in association with mounting threats facing government and businesses today, I have focused on developing and delivering cybersecurity consulting solutions for public sector clients. This market has unique IT security requirements and is facing a significant increase of cyber threats. HP Cybersecurity Consulting Services are soundly structured to help our clients manage risks to their environment.

SecuritySolutionsWatch.com: Cybersecurity is front-page news on a daily basis. Attacks and threats may emanate from anywhere, at any time - from well-organized state-sponsored and foreign-operated governments, to lone wolf hackers, and even from natural disasters such as Hurricanes Katrina and Sandy. We seem to be in an environment where it is not "IF" your organization will be exposed to a breach or experience downtime due to a security threat, but "WHEN." What are the minimum "best-practices" that your Cybersecurity Consulting Team recommend for implementation in this very challenging environment?

Rob Wigley: Without question, adversaries have become smarter, better organized, and more persistent as they seek to cause disruptions and access intellectual property and other sensitive information. The number of cyber threats is proliferating faster than many organizations can defend. Many companies and global governments have been subjected to some very sophisticated and targeted attacks, which have had a significant impact on their mission. This includes some recent extremely high-profile breaches conducted by insiders.

In order to address these threats, first and foremost an organization needs to have an effective risk management program supported by senior management, with a strong governance structure, and integrated across all business processes. As businesses look for new growth opportunities and consequently adopt new technologies, the tradeoff becomes uncertainty and risk that could affect their mission and goals. A continuous process of risk management activities should be applied to identify new risks, reassess previously identified risks, and monitor and track the effectiveness of risk mitigation plans.

An often overlooked component of risk management is the benefit of integrating the processes early within the business and technology lifecycle. Doing so helps to identify potential threats and vulnerabilities so they can be addressed from the start in order to prevent security breaches. It's much less costly in terms of financial impact to fix vulnerabilities detected up front in the design and development phases, rather than fix them in production environments or after a security incident. This lifecycle-based risk management approach can also reduce costs, as full risk assessments would not be required as frequently.

Another important aspect of a comprehensive risk management program is that it allows business leaders to make informed decisions when balancing the cost of managing risk. As IT budgets continue to come under scrutiny, a thorough documented risk analysis is necessary to justify the expenditures of implementing risk-based controls. That's why it's critical to describe risk in terms of "risk to the business." The bottom line is that an effective risk management program is one that permeates throughout an organization's culture, including people, processes, technology, and governance.

SecuritySolutionsWatch.com: If possible, may we have a brief overview of the comprehensive risk management services you are able to provide to both public and private sector entities?

Rob Wigley: HP has a set of core services under our Governance Risk and Compliance Consulting Services specifically designed to improve a client's overall risk posture in a cost-effective manner. These include compliance and risk assessment services that evaluate the infrastructure and applications with your agency, or corporate security policies and industry best practice. We perform vulnerability scanning, penetration testing, code review, and comprehensive application threat assessments.

We also perform assessments on the strategic aspects of an information security program. We evaluate the effectiveness of security governance, security strategy, incident management, and an organization's risk management process. This consists of a current state and maturity assessment, a gap analysis, and the development of a strategic roadmap with the end goal of aligning your security program with business requirements and measurably reducing business risk. We also offer Security Discovery Workshops, which are one-day interactive workshops facilitated by senior HP consultants involving both business and IT stakeholders. The objective is to examine your cybersecurity strategy and identify your biggest challenges, looking at how you're currently addressing those challenges, and showing how you can use our maturity model to implement a prioritized roadmap to improve your overall cybersecurity posture.

SecuritySolutionsWatch.com: In your opinion, does a misperception exist within the IT world between the terms "risk management" and "risk assessments"?

Rob Wigley: This is a very good question and one that I find myself explaining quite frequently. A risk assessment is just one step in a risk management framework - the overall process of risk identification and analysis by determining potential threats and vulnerabilities associated with an IT system. Conversely, risk management includes selecting and implementing security controls to reduce risk to an acceptable level, categorizing systems to determine their criticality, and reviewing regulations, and policies and standards affecting the security of the information.

Another very important process with risk management is monitoring security controls. Because of the increased threat landscape and sophistication of attackers, periodic risk assessments are no longer sufficient for many organizations. Continuously monitoring for threats and vulnerabilities has become critical to support risk management decisions.

There are some well-established risk management frameworks and standards that explain in detail the processes with all aspects of risk management and risk assessments. This includes publications from the International Organization for Standardization (ISO) and the National Institutes of Standards and Technology (NIST).

SecuritySolutionsWatch.com: With everything moving into the Cloud, can we take a moment and drill down specifically into Cloud Security? What resources does HP offer its clients to help design and deploy a secure cloud strategy?

Rob Wigley: Many surveys indicate that one of the top concerns organizations have in moving to the cloud is the security of their information. While security concerns are not unique to cloud computing, cloud is just one of many disruptive technology trends that organizations are facing. HP offers a secure comprehensive portfolio for cloud computing from private and virtual private cloud, to public cloud and hybrid environments serving customers in both the private and public sector market segments.

To help clients address their concerns on cloud security, we establish a risk-based approach. First, we assess our client's risk tolerance profile, compliance requirements, operational requirements, organizational capabilities, and resources. We typically do this within HP Cloud and HP Security Discovery Workshops with the client. We then look to transform the client's environment.

To assist in that transformation process, HP Security Architects will help clients in developing a secure reference architecture. This provides a common set of the essential architectural design artifacts that can be tailored to fit the needs of a particular cloud delivery model. It also provides a checklist against which architects and engineers will be able to ensure that they have covered all the necessary security requirements in their design solution. Next, HP consultants implement secure application design and deployment practices and secure data management in the cloud. As I mentioned previously, security needs to be built into the infrastructure and applications early in the design cycle to reduce attack surfaces.

SecuritySolutionsWatch.com: Can you highlight any Cybersecurity process/methodologies HP follows?

Rob Wigley: For our U.S. Public Sector clients, HP routinely uses the NIST Special Publications (800 Series). There's an extensive list of documents developed collaboratively by the government, academic organizations, and the private sector that's available to the public. This ranges from very specific technical requirements and guidance on IT systems to strategic guidance at the organizational and business process level.

HP has developed an Enterprise Security Framework that encompasses end-to-end security. Our end-to-end approach incorporates the capabilities of HP ArcSight, Fortify and TippingPoint, along with our suite of Risk Management Consulting Services and Managed Security Services.

To support our clients with this framework, HP has developed a risk-based methodology: "Assess, Transform, Optimize, Manage" (or ATOM) that helps enable organizations reduce risk in a cost-effective manner. We Assess our client's risk tolerance profile, compliance requirements, operational requirements, organizational capabilities and resources. We then work to Transform our client's environment, structuring and prioritizing their security issues, and then undertaking remediation projects with them. Next, we Optimize and broaden our client's level of security awareness. We help them continually monitor their environment and proactively recommend operational and process improvements that can deliver an optimized security and risk posture. We also Manage the associated transformation programs required to deliver security in the most effective way for the enterprise. In this phase, we can also reduce cost by leveraging our worldwide security operations centers.

SecuritySolutionsWatch.com: Any final thoughts you'd like to share?

Rob Wigley: Cyber threats are real and growing, and most organizations are overwhelmed with the increasing risk to their business. When organizations adopt a comprehensive risk management program, they experience significant benefits in compliance achievement, reduced risk and better decision-making. Risk management is most effective when it's engrained within an organization's culture. The role of senior leaders must be to establish and emphasize the need for a strong risk management program. The failure to do so will pose a significant risk to organizational objectives.

This interview originally appeared in SecuritySolutionsWatch.com. Republished with permission.

More Stories By Liz McMillan

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
DevOps at Cloud Expo – being held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device.
Large scale deployments present unique planning challenges, system commissioning hurdles between IT and OT and demand careful system hand-off orchestration. In his session at @ThingsExpo, Jeff Smith, Senior Director and a founding member of Incenergy, will discuss some of the key tactics to ensure delivery success based on his experience of the last two years deploying Industrial IoT systems across four continents.
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
In his session at @DevOpsSummit at 19th Cloud Expo, Yoseph Reuveni, Director of Software Engineering at Jet.com, will discuss Jet.com's journey into containerizing Microsoft-based technologies like C# and F# into Docker. He will talk about lessons learned and challenges faced, the Mono framework tryout and how they deployed everything into Azure cloud. Yoseph Reuveni is a technology leader with unique experience developing and running high throughput (over 1M tps) distributed systems with extre...
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
"When you think about the data center today, there's constant evolution, The evolution of the data center and the needs of the consumer of technology change, and they change constantly," stated Matt Kalmenson, VP of Sales, Service and Cloud Providers at Veeam Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.