Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=gIsLP_Dtv7M



Category:
Guide
Duration: 36:24
15,182 views
246


Presenter: Jason Christopher, CTO, Axio Global, Inc.

We’ve heard it all before: “Our team handles 500,000 cyber-attacks a day.” “Cyber threats are increasing.” “We track cybersecurity as a critical risk for our organization.” But what does any of that really mean? Creating measurements and metrics around cybersecurity is difficult, but so is building a sustainable metrics program, regardless of the subject matter. Early tasks, including measuring what is important and resource management, can be undermined by external pressures to tell a certain narrative or prove certain results. How can our industry create unbiased, yet compelling, metrics? What is the right-sized team or amount of resources for a metrics program? Is such a program sustainable? This presentation will cover not only the basics of cybersecurity metrics, but also lay the foundation for how s security team can create a new metrics program that goes beyond red/yellow/green or compliance. By moving to objective and repeatable metrics, utility security leaders will be able to not only justify programmatic improvements, but also track trends across environments and future projects. With research from the U.S. Department of Energy, the Electric Power Research Institute, and the National Institute of Standards and Technology, practitioners can build a defensible security metrics program across strategic, tactical, and operational levels of the utility.

SANS Summit schedule: http://www.sans.org/u/DuS

The annual ICS Security Summit brings together practitioners and leading experts to share ideas, methods, and techniques for defending control system environments. In-depth presentations and interactive panel discussions deliver real-world approaches that work and make a difference for the individuals fighting this fight every day.




Other Videos By SANS Institute


2019-08-14Gaining Endpoint Log Visibility in ICS Environments - SANS ICS Security Summit 2019
2019-08-14What you need to know about SEC530: Defensible Security Architecture and Engineering
2019-08-13What you need to know about SEC503: Intrusion Detection In-Depth
2019-08-12What you need to know about SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
2019-08-06Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
2019-07-31Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
2019-07-30Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit
2019-07-24Scanners, Tunnels, and Sims, Oh My! - SANS ICS Security Summit 2019
2019-07-23Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
2019-07-22Threat Hunting via Sysmon - SANS Blue Team Summit
2019-07-17Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019
2019-07-15To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
2019-07-12OSINT: Not Just Offensive - SANS Blue Team Summit
2019-07-01Defeating Attackers with Preventative Security
2019-06-13Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking
2019-06-13Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
2019-06-13Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
2019-06-13Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
2019-06-13Key Take-Aways from SEC401: Security Essentials Bootcamp Style
2019-06-13Key Take-Aways from SEC503: Intrusion Detection In-Depth
2019-06-10What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
SANS Summits
ICS Security Summit
SCADA
Axio Global
cybersecurity metrics