Practice is Key
Just like painting, basketball, or playing guitar, security requires continuous practice.
Planning for the future is a core skill in security.
Managing Uncertainty
We naturally plan ahead to avoid problems (e.g., packing for a trip).
Businesses do the same by analyzing risks to prepare for potential threats.
Security Teams & Risk Management
Security focuses on risk: anything that affects Confidentiality, Integrity, and Availability (CIA triad).
Each company has a unique security plan based on its risks.
Three Elements of Security Risk Analysis
Assets (What needs protection?)
Anything valuable: buildings, data, equipment, people.
Example: A home has assets like walls, doors, and personal belongings.
Prioritization is key—front doors have locks because they’re more likely entry points than walls.
Threats (What could cause harm?)
Events or circumstances that can negatively impact assets.
Example: A burglar, strong winds, or accidental damage can all be threats to a home.
Recognizing threats helps prioritize security measures.
Vulnerabilities (What weaknesses exist?)
Flaws in assets that threats can exploit.
Example: A weak door lock makes it easier for a burglar to break in.
Security teams analyze vulnerabilities to strengthen defenses.
Security Planning in Action
Security teams assess assets, threats, and vulnerabilities to plan effectively.
Understanding these basics is the first step toward strong security.
Fundamental Truth of Security
"You can only protect what you account for."
Asset management is key to tracking assets and assessing risks.
Security plans revolve around keeping track of valuable assets.
Asset Inventory (Like a Shepherd Counting Sheep)
A record of all assets that need protection.
Helps allocate resources effectively.
Alerts organizations if an asset is missing.
Asset Classification (Prioritizing Importance)
Similar to ranking personal items (e.g., wallet vs. shoes).
Helps organizations determine protection levels.
Basic classification levels:
Public – Can be shared freely.
Internal-Only – For employees, not the public.
Confidential – Limited to specific project teams.
Restricted – Highly sensitive, need-to-know basis.
Example: A company might classify emails about a new product as confidential, while office doors might have restricted access.
Ongoing Asset Management
Classification determines whether an asset can be disclosed, altered, or destroyed.
Continuous process that identifies security gaps and potential risks.
Keeping track of assets is essential for strong security planning.
Data as a Valuable Asset
In today’s world, information is one of the most valuable assets.
Most information exists as digital data—processed, stored, or transferred by computers.
Billions of devices are constantly exchanging data over the internet.
Three States of Data & Their Security Considerations
Data in Use – Actively being accessed or modified.
Example: Checking emails on a laptop at a park.
Data in Transit – Moving from one place to another.
Example: Sending an email reply.
Data at Rest – Stored and not actively accessed.
Example: Closing a laptop and walking to a café.
Information Security (InfoSec) & Its Importance
InfoSec protects data in all states from unauthorized access.
Weak security can lead to identity theft, financial loss, and reputational damage.
A breach can affect organizations, partners, and customers.
Evolving Digital World & New Risks
Cloud storage challenges the traditional idea of data at rest.
Example: A phone on a table may still be syncing data with the cloud.
Security analysts must stay aware of new vulnerabilities as technology advances.
Connecting Data Security to Asset Management
Protecting data depends on where it is and what it’s doing.
Security teams analyze risk based on data states to develop strong asset management plans.
Security is About People, Processes, & Technology
It's not just an IT responsibility—security is a culture shared across the organization.
Everyone, from employees to vendors to customers, plays a role in protecting assets.
The Role of Security Plans
Purpose: To prepare for risks before they happen.
People-focused security plans are the most effective.
Risks impact Confidentiality, Integrity, and Availability (CIA triad).
Risks are categorized based on factors like:
Damage, disclosure, or loss of information
Physical malfunctions, cyberattacks, and human error
Common Security Risk Example
A new teacher's contract may include policies about not using personal email for sensitive information.
Helps spread security awareness across the organization.
The Three Elements of Security Plans
Policies – The foundation (strategic rules that reduce risk).
Answers: What are we protecting and why?
Example: Acceptable Use Policy (AUP) defines how employees access company systems securely.
Standards – The tactical guide (how to implement policies).
Creates a point of reference for security practices.
Example: Many companies follow NIST password standards (e.g., minimum 8-character passwords).
Procedures – Step-by-step instructions for security tasks.
Ensures accountability, consistency, and efficiency.
Example: Instructions on choosing secure passwords or resetting a locked account securely.
Customization & Importance of Security Plans
Policies, standards, and procedures vary by organization but follow the same structure.
Understanding these elements is key to making security a true team effort.
Compliance: Ensuring Security Plans Are Followed
Having a security plan is not enough—compliance ensures it’s being followed.
Compliance means adhering to internal standards & external regulations.
Critical for trust, reputation, safety, and data integrity.
Non-compliance can lead to fines, penalties, lawsuits, and reputational damage, especially in regulated industries (healthcare, finance, energy).
Regulations & the Role of NIST Cybersecurity Framework (CSF)
Regulations are government-imposed rules to protect people and data.
NIST Cybersecurity Framework (CSF) provides security guidelines & best practices.
CSF is voluntary but widely used to manage cybersecurity risks.
CSF consists of three main components:
Core – Defines five key security functions.
Tiers – Measures security performance across functions.
Profiles – Captures the security state over time.
CSF Core: The Five Key Security Functions
Identify – Understand assets & risks (linked to asset management & risk assessment).
Protect – Implement security measures (upcoming discussion).
Detect – Identify security incidents.
Respond – Take action against security events.
Recover – Restore operations after an incident.
CSF Tiers: Measuring Security Effectiveness
Level 1 (Passive) – Bare minimum security.
Level 4 (Adaptive) – High-level, continuously improving security.
Tiers help organizations refine security plans based on effectiveness.
CSF Profiles: Tracking Security Over Time
Think of profiles like photos of a tree—comparing them over time shows growth & changes.
Helps organizations assess how security improves or weakens.
Beyond Fines & Attacks: The Human Side of Security
Good security practices show care for people and their information.
Next focus: The "Protect" function of security plans.