benefits of a truly wholistic approach to security in government

61
Benefits of a truly wholistic approach to Security in Government Jolyon Keegan, Government Portfolio Lead Vern Amey, Senior Security Risk Consultant Des Sengunlu, Senior Physical Protections Consultant

Upload: jenny-waller

Post on 02-Dec-2014

107 views

Category:

Government & Nonprofit


2 download

DESCRIPTION

Security-in-depth is a key and noble concept. It is often implemented very well within the individual disciplines of information, personnel and physical security. Good practitioners also implement it well across the disciplines to achieve holistic, cost effective and efficient protections of an organisation’s people, information and assets. Achieving effective and efficient security-in-depth is dependent not just on controls within and across the disciplines, but also on the interaction of policy development, risk assessment, planning, incident management, assurance and review. QinetiQ Australia assists its clients to take a wholistic approach to the implementation of security; one which sees security as an entire system with component parts. The approach doesn’t stop at security in depth through controls alone, but sees how those controls and the policies that initiate them are properly informed by environment, risk assessment, incident analysis and assurance review. QinetiQ’s consultants possess backgrounds as Agency Security Advisers, policy writers, risk assessors, system auditors and systems engineers. This knowledge and expertise is harnessed to provide the best possible support and advice to government agencies seeking to be compliant with the Protective Security Policy Framework within a resource-constrained environment.

TRANSCRIPT

Page 1: Benefits of a Truly Wholistic Approach to Security in Government

Benefits of a truly wholistic approach to Security in Government

Jolyon Keegan, Government Portfolio Lead Vern Amey, Senior Security Risk Consultant

Des Sengunlu, Senior Physical Protections Consultant

Page 2: Benefits of a Truly Wholistic Approach to Security in Government

Outline

2

Page 3: Benefits of a Truly Wholistic Approach to Security in Government

Outline

3

Introductions Evolution to PSPF

Observations Wholistic

system Security

risk A cyclical approach Benefits

Key takeaways Discussion

Page 4: Benefits of a Truly Wholistic Approach to Security in Government

Our Three Key Presenters

4

Page 5: Benefits of a Truly Wholistic Approach to Security in Government

Our Three Key Presenters

5

Jolyon Keegan Government

Portfolio Lead

Page 6: Benefits of a Truly Wholistic Approach to Security in Government

Our Three Key Presenters

6

Jolyon Keegan Government

Portfolio Lead

Vern Amey Senior Security Risk Consultant

Page 7: Benefits of a Truly Wholistic Approach to Security in Government

Our Three Key Presenters

7

Jolyon Keegan Government

Portfolio Lead

Vern Amey Senior Security Risk Consultant

Des Sengunlu Senior Physical

Protections Consultant

Page 8: Benefits of a Truly Wholistic Approach to Security in Government

Our Background

8

Page 9: Benefits of a Truly Wholistic Approach to Security in Government

Evolution of PSPF Risk-based Approach

Pre 9/11

9

Page 10: Benefits of a Truly Wholistic Approach to Security in Government

Evolution of PSPF Risk-based Approach

Focus on risks associated

with foreign espionage

Pre 9/11

10

Page 11: Benefits of a Truly Wholistic Approach to Security in Government

Pre 9/11

Evolution of PSPF Risk-based Approach

Focus on risks associated

with foreign espionage

Protection of Australian Government

information (aimed more at the higher

classification levels – primarily hard copy)

11

Page 12: Benefits of a Truly Wholistic Approach to Security in Government

Evolution of PSPF Risk-based Approach

Focus on risks associated

with foreign espionage

Protection of Australian Government

information (aimed more at the higher

classification levels – primarily hard copy)

Government Agency security less

focussed on physical and personnel

measures

Pre 9/11

12

Page 13: Benefits of a Truly Wholistic Approach to Security in Government

Evolution of PSPF Risk-based Approach

Focus on risks associated

with foreign espionage

Protection of Australian Government

information (aimed more at the higher

classification levels – primarily hard copy)

Government Agency security less

focussed on physical and personnel

measures

General Government

security policy

Pre 9/11

13

Page 14: Benefits of a Truly Wholistic Approach to Security in Government

2001 – 2010

14

Evolution of PSPF Risk-based Approach

Page 15: Benefits of a Truly Wholistic Approach to Security in Government

Security risk focus broadened to include risks associated with protection against a high-impact event

2001 – 2010

15

Evolution of PSPF Risk-based Approach

Page 16: Benefits of a Truly Wholistic Approach to Security in Government

Security risk focus broadened to include risks associated with protection against a high-impact event

Australian Government security

policy became the Protective Security

Manual

2001 – 2010

16

Evolution of PSPF Risk-based Approach

Page 17: Benefits of a Truly Wholistic Approach to Security in Government

Security risk focus broadened to include risks associated with protection against a high-impact event

Australian Government security

policy became the Protective Security

Manual

So were born the protective security

elements of Physical, Personnel and

Information security

2001 – 2010

17

Evolution of PSPF Risk-based Approach

Page 18: Benefits of a Truly Wholistic Approach to Security in Government

Security risk focus broadened to include risks associated with protection against a high-impact event

Australian Government security

policy became the Protective Security

Manual

So were born the protective security

elements of Physical, Personnel and

Information security

Security risk mitigation

strategies became multi-faceted

2001 – 2010

18

Evolution of PSPF Risk-based Approach

Page 19: Benefits of a Truly Wholistic Approach to Security in Government

2011

19

Evolution of PSPF Risk-based Approach

Page 20: Benefits of a Truly Wholistic Approach to Security in Government

The threat and risk landscape

changes

2011

20

Evolution of PSPF Risk-based Approach

Page 21: Benefits of a Truly Wholistic Approach to Security in Government

The threat and risk landscape

changes

Risk associated with cyber

intrusion become a major focus

2011

21

Evolution of PSPF Risk-based Approach

Page 22: Benefits of a Truly Wholistic Approach to Security in Government

The threat and risk landscape

changes

Risk associated with cyber

intrusion become a major focus

Security risk again heavily focussed on Information

Security

2011

22

Evolution of PSPF Risk-based Approach

Page 23: Benefits of a Truly Wholistic Approach to Security in Government

The threat and risk landscape

changes

Risk associated with cyber

intrusion become a major focus

Security risk again heavily focussed on Information

Security

The Australian Government completes

delivery of a revised security policy in the form of the Protective Security

Policy Framework

2011

23

Evolution of PSPF Risk-based Approach

Page 24: Benefits of a Truly Wholistic Approach to Security in Government

The threat and risk landscape

changes

Risk associated with cyber

intrusion become a major focus

Security risk again heavily focussed on Information

Security

The Australian Government completes

delivery of a revised security policy in the form of the Protective Security

Policy Framework

2011

24

Agencies are to take a risk-based

approach to protective security

Evolution of PSPF Risk-based Approach

Page 25: Benefits of a Truly Wholistic Approach to Security in Government

25

Our Key Observations

Page 26: Benefits of a Truly Wholistic Approach to Security in Government

26

Our Key Observations

Cookie-cutter risk assessments

1.

Page 27: Benefits of a Truly Wholistic Approach to Security in Government

27

Our Key Observations

Shelved risk assessments

2.

Cookie-cutter risk assessments

1.

Page 28: Benefits of a Truly Wholistic Approach to Security in Government

28

Our Key Observations

Document present = tick

3.

Shelved risk assessments

2.

Cookie-cutter risk assessments

1.

Page 29: Benefits of a Truly Wholistic Approach to Security in Government

29

Our Key Observations

Lack of security input to budgets

4.

Document present = tick

3.

Shelved risk assessments

2.

Cookie-cutter risk assessments

1.

Page 30: Benefits of a Truly Wholistic Approach to Security in Government

30

Our Key Observations

Policy development in blissful isolation

5.

Page 31: Benefits of a Truly Wholistic Approach to Security in Government

31

Our Key Observations

Security-in-depth overkill or controls

mismatch

6.

Policy development in blissful isolation

5.

Page 32: Benefits of a Truly Wholistic Approach to Security in Government

32

Our Key Observations

Security as an opportunity/enabler, rather than an impost

7.

Security-in-depth overkill or controls

mismatch

6.

Policy development in blissful isolation

5.

Page 33: Benefits of a Truly Wholistic Approach to Security in Government

33

Our Key Observations

A factor in all of these = risk

8.

Security as an opportunity/enabler, rather than an impost

7.

Security-in-depth overkill or controls

mismatch

6.

Policy development in blissful isolation

5.

Page 34: Benefits of a Truly Wholistic Approach to Security in Government

Security is a Wholistic System

34

Page 35: Benefits of a Truly Wholistic Approach to Security in Government

Security is a Wholistic System

35

Policies Physical Controls

Budgets

Incidents & Investigations Personnel

Controls

Information Controls Audit,

Assurance & Review

Plans

Page 36: Benefits of a Truly Wholistic Approach to Security in Government

Risk as the system driver

36

Page 37: Benefits of a Truly Wholistic Approach to Security in Government

Risk as the system driver

37

Establish the ‘Agency-specific’ threat context

Page 38: Benefits of a Truly Wholistic Approach to Security in Government

Risk as the system driver

38

Establish the ‘Agency-specific’ threat context

Determine risk tolerance

Page 39: Benefits of a Truly Wholistic Approach to Security in Government

Risk as the system driver

39

Establish the ‘Agency-specific’ threat context

Determine risk tolerance

Identify criticality of assets

Page 40: Benefits of a Truly Wholistic Approach to Security in Government

Risk as the system driver

40

Establish the ‘Agency-specific’ threat context

Determine risk tolerance

Identify criticality of assets

Assess what the agency is doing right and what is missing from a protective security perspective

Page 41: Benefits of a Truly Wholistic Approach to Security in Government

Risk as the system driver

41

Establish the ‘Agency-specific’ threat context

Determine risk tolerance

Identify criticality of assets

Assess what the agency is doing right and what is missing from a protective security perspective

Identify relationships between security risk, WH&S, emergency management, business continuity and enterprise risk processes

Page 42: Benefits of a Truly Wholistic Approach to Security in Government

Risk as the system driver

42

Establish the ‘Agency-specific’ threat context

Determine risk tolerance

Identify criticality of assets

Assess what the agency is doing right and what is missing from a protective security perspective

Identify relationships between security risk, WH&S, emergency management, business continuity and enterprise risk processes

Define the pathway to developing wholistic security risk treatment strategies

Page 43: Benefits of a Truly Wholistic Approach to Security in Government

Risk as the system driver

43

Establish the ‘Agency-specific’ threat context

Determine risk tolerance

Identify criticality of assets

Assess what the agency is doing right and what is missing from a protective security perspective

Identify relationships between security risk, WH&S, emergency management, business continuity and enterprise risk processes

Define the pathway to developing wholistic security risk treatment strategies

Agree that security risk management is good business sense

Page 44: Benefits of a Truly Wholistic Approach to Security in Government

Risk as the system driver

44

Establish the ‘Agency-specific’ threat context

Determine risk tolerance

Identify criticality of assets

Assess what the agency is doing right and what is missing from a protective security perspective

Identify relationships between security risk, WH&S, emergency management, business continuity and enterprise risk processes

Define the pathway to developing wholistic security risk treatment strategies

Agree that security risk management is good business sense

When it’s all said and done, don’t walk away

Page 45: Benefits of a Truly Wholistic Approach to Security in Government

Cyclical approach

45

Page 46: Benefits of a Truly Wholistic Approach to Security in Government

Cyclical approach

Security risk assessment/security

risk review

46

Page 47: Benefits of a Truly Wholistic Approach to Security in Government

Cyclical approach

Security risk assessment/security

risk review

Initial planning/planning

updates

Higher planning/higher

planning updates

47

Page 48: Benefits of a Truly Wholistic Approach to Security in Government

Cyclical approach

Security risk assessment/security

risk review

Initial planning/planning

updates

Policy development/ policy review

Higher planning/higher

planning updates

48

Higher policy/higher

policy updates

Page 49: Benefits of a Truly Wholistic Approach to Security in Government

Cyclical approach

Security risk assessment/security

risk review

Initial planning/planning

updates

Policy development/ policy review

Implementation planning

Higher planning/higher

planning updates

49

Higher policy/higher

policy updates

Page 50: Benefits of a Truly Wholistic Approach to Security in Government

Cyclical approach

Security risk assessment/security

risk review

Initial planning/planning

updates

Policy development/ policy review

Implementation planning

Implementation

Higher planning/higher

planning updates

Higher policy/higher

policy updates

50

Page 51: Benefits of a Truly Wholistic Approach to Security in Government

Cyclical approach

Security risk assessment/security

risk review

Initial planning/planning

updates

Policy development/ policy review

Implementation planning

Implementation

Operations

Higher planning/higher

planning updates

Higher policy/higher

policy updates

51

Page 52: Benefits of a Truly Wholistic Approach to Security in Government

Cyclical approach

Security risk assessment/security

risk review

Initial planning/planning

updates

Policy development/ policy review

Implementation planning

Implementation

Operations

Higher planning/higher

planning updates

Higher policy/higher

policy updates

Investigations

Targeted reviews and audits

Incident data analysis

Projects/validation exercises 52

Page 53: Benefits of a Truly Wholistic Approach to Security in Government

Cyclical approach

Security risk assessment/security

risk review

Initial planning/planning

updates

Policy development/ policy review

Implementation planning

Implementation

Operations

Higher planning/higher

planning updates

Ongoing security risk monitoring

Ongoing security risk monitoring

Higher policy/higher

policy updates

Investigations

Targeted reviews and audits

Incident data analysis

Projects/validation exercises

Ongoing security risk monitoring

53

Page 54: Benefits of a Truly Wholistic Approach to Security in Government

Cyclical approach

Security risk assessment/security

risk review

Initial planning/planning

updates

Policy development/ policy review

Implementation planning

Implementation

Operations

PSPF annual assurance

Higher planning/higher

planning updates

Ongoing security risk monitoring

Ongoing security risk monitoring

Higher policy/higher

policy updates

Investigations

Targeted reviews and audits

Incident data analysis

Projects/validation exercises

Ongoing security risk monitoring

54

Page 55: Benefits of a Truly Wholistic Approach to Security in Government

Benefits

55

Helps protective security in an organisation:

align with the risk-based approach intent of the PSPF

Page 56: Benefits of a Truly Wholistic Approach to Security in Government

Benefits

56

Helps protective security in an organisation:

align with the risk-based approach intent of the PSPF

to be responsive to changing environment

Page 57: Benefits of a Truly Wholistic Approach to Security in Government

Benefits

57

Helps protective security in an organisation:

align with the risk-based approach intent of the PSPF

to be responsive to changing environment

to remain relevant to executive management (risk owners)

Page 58: Benefits of a Truly Wholistic Approach to Security in Government

Key Takeaways and Discussion

58

The component parts must interact – communication essential

Page 59: Benefits of a Truly Wholistic Approach to Security in Government

Key Takeaways and Discussion

59

The component parts must interact – communication essential

Risk context is crucial – tailoring important

Page 60: Benefits of a Truly Wholistic Approach to Security in Government

Key Takeaways and Discussion

60

The component parts must interact – communication essential

Risk context is crucial – tailoring important

Take a cyclical, wholistic approach driven by risk

Page 61: Benefits of a Truly Wholistic Approach to Security in Government