Security Needs to be Everyone's Responsibility
CIOREVIEW >> Storage >>

Security Needs to be Everyone's Responsibility

John Petrie, CISSP, CISM, CBM, CISO , Harland Clarke Holdings Corp
John Petrie, CISSP, CISM, CBM, CISO , Harland Clarke Holdings Corp

John Petrie, CISSP, CISM, CBM, CISO , Harland Clarke Holdings Corp


Petrie developed a metrics program that was mapped to corporate goals for the organization. Clarke American, one of the two companies that joined to form Harland Clarke in May 2007, won a prestigious Malcolm Baldridge National Quality Award in 2001; it was the sole recipient in the manufacturing category. Petrie took advantage of this strong culture of quality to develop a centralized and repeatable metrics program. His approach to designing and implementing a security metrics program takes the following steps:

Step 1: Get to know your business and understand the culture. Successful CISOs know how to reach out across teams to understand security’s impact. Petrie founded his security practice on an organization that was already committed to quality. Understanding this foundation was crucial in developing a security program — and later, a metrics program — that had relevancy. He used a lot of the existing measurement process and tools to gather security-related information.

Step 2: Identify business goals. At Harland Clarke, senior executives define key business strategic imperatives. Imperatives are refined annually based on results from the prior year and the company’s overall vision, factoring in marketplace dynamics. The statements define the focus that each business unit needs to align with to plan their actions and define success for their respective areas. Petrie was able to map security initiatives to these business success imperatives.

Step 3: Determine how security can impact corporate goals. Understanding what makes the company successful leads to understanding how security mightaffect that success.Petrie crafted security statements based on three core principles: 1) Security is everyone’s responsibility; 2) trust but verify; and 3) protect the confidentiality, assure the integrity, and ensure the availability of the data entrusted to the company

Step 4: Develop your program on established standards.Leaning on the International Organization for Standardization (ISO) standard 17799 and applying his core principles, Petrie developed a program that was based on a comprehensive yet globally recognized standard.Other standards and frameworks may be more appropriate for other organizations, but it is essential to look to a proven framework to build out your program. Standards can remove some of the guesswork

Step 5: Measure the business success of security imperatives. With security imperatives and business goals aligned, Petrie developed targeted and repeatable metrics to measure security’s position and impact over time

Harland Clarke’s metrics secure executive visibility
Harland Clarke’s security metrics program consists of 33 measurements that are monitored on a periodic basis. Some are measured weekly, others monthly, and yet others quarterly. Each of these is mapped exclusively to the information security organization’s key strategic imperatives. Five of the metrics are selected by executives and are monitored by the executive team on an ongoing basis.The increased visibility among senior leadership — and the demonstrated results — led to a 100 percent increase in the security budget in the second year of the ISO program. This success was possible because Petrie was able to demonstrate the merit of the program by translating security’s value to key business stakeholders.

Security Secrets To Success

To achieve the results outlined above, follow Petrie’s recommendations: Get to know your business. Petrie stresses the importance of understanding what it is that makes your business successful. Start with sales to learn how they generate their numbers and revenues. Use marketing techniques and do a strengths, weaknesses, opportunities, and threats (SWOT) analysis to find out how they got successful. Figure out what the key business metrics are and how security could contribute to one or more of them.

Evaluate and re-evaluate your metrics. Metrics should be evaluated when policies change, if new tools are introduced, or if any major change occurs in your environment. It’s important to have a team review the metrics rather than the CISO making the decision on his own. But think of the metrics program as an ongoing effort. You are never done.

Avoid probabilities. Most of Petrie’s metrics are based on actual historical data. Assumptions change over time, and probabilities and estimations can erode credibility and transparency if they are not based on reality. Probabilities should not be used if you don’t have data to back up your assumptions.

Read Also

How CannonDesign leverages technology to remain versatile during COVID-19

How CannonDesign leverages technology to remain versatile during...

Ernesto Pacheco, ASAI, DVAB, Firm Visualization Leader, CannonDesign
The Changing Role of IT within Banking Sector

The Changing Role of IT within Banking Sector

Alessandro Campanini, Group Chief Information Officer,Mediobanca


Oliver Pulcher, Director of Corporate Development, Strategy, International Affairs and UAS at DFS Deutsche Flugsicherung
Systematic Detection Of Drones At Airports

Systematic Detection Of Drones At Airports

Angela Kies, Head Of Unmanned Aircraft Systems And Drone Detection Project Lead, DFS Deutsche Flugsicherung
Use Of Drone Technology To Improve Productivity In The Oil And Gas Sector

Use Of Drone Technology To Improve Productivity In The Oil And Gas...

Mark Hutcherson, Director, Low-Carbon Projects and Technology at ConocoPhillips
Parallel Developments In Civil And Military Drone Technologychallenges And Opportunities

Parallel Developments In Civil And Military Drone...

Andrew Munday, Director of Advanced Engineering and Technology, Atkins