Analytics

6/28/2018
10:58 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ISACA and SecurityScorecard Define Questions to Implement Continuous Assurance for Data

New York, NY, and Schaumburg, Ill., USA (26 June 2018) – Today, ISACA and SecurityScorecard announce a joint research paper, “Continuous Assurance Using Data Threat Modeling,” to provide enterprises guidance in adopting an attacker’s point of view to help account for data. With a step-by-step guide to apply application threat modeling principles to data, enterprises can now establish a baseline for monitoring ongoing data risk over time.

Enterprises are challenged to move the process of accounting for data in a structured, systematic way higher on the list of priorities. One option to accomplish this challenge is by applying application threat modeling principles to data (data threat modeling). Application threat modeling provides value by allowing application security specialists to systematically evaluate an application from an attacker’s point of view. By doing this, an analyst can methodically analyze an application to identify and map threats that the application is likely to encounter in post-deployment conditions.

“To support a continuous view of anything, there are two things needed: something to measure and a way to perform that measurement frequently or in an ongoing way,” said Fouad Khalil, Head of Compliance, SecurityScorecard. “By implementing this continuous assurance process, an enterprise can be notified as changes happen that impact its understanding of the threats to their applications and, ultimately, their data.”

The ISACA and SecurityScorecard paper provides 11 key questions to ask to implement continuous assurance related to threat understanding, including these five:

  1. What are the specific indicators the enterprise will use to measure changes to the threat environment?
  2. How will the enterprise account for entities in the supply chain?
  3. What instruments are in place to evaluate control performance at third parties?
  4. Who is responsible for maintaining and monitoring the view that is put together?
  5. What is the amount the enterprise is willing to invest in this?

“Organizations often struggle with data protection that feels out of control—and this guidance helps bring clarity to the chaos,” said Karen Heslop, Director of Content Strategy at ISACA.

“Continuous Assurance Using Data Threat Modeling” is available as a complimentary download and can be found at www.isaca.org/continuous-assurance-using-data-threat-modeling. For additional ISACA resources, please visit www.isaca.org/Knowledge-Center.


About ISACA

Nearing its 50th year, ISACA (isaca.org) is a global association helping individuals and enterprises achieve the positive potential of technology. Today’s world is powered by technology, and ISACA equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organizations. ISACA leverages the expertise of its 450,000 engaged professionals in information and cybersecurity, governance, assurance, risk and innovation, as well as its enterprise performance subsidiary, CMMI Institute, to help advance innovation through technology. ISACA has a presence in more than 188 countries, including 217 chapters worldwide and offices in both the United States and China.

Twitter: https://twitter.com/ISACANews
LinkedIn: https://www.linkedin.com/company/isaca 
Facebook: www.facebook.com/ISACAHQ 
Instagram: https://www.instagram.com/isacanews


About SecurityScorecard

Headquartered in the heart of New York City, SecurityScorecard's vision is to create a new language for measuring and communicating security risk. The company was founded in late 2013 by Dr. Aleksandr Yampolskiy and Sam Kassoumeh, two former cybersecurity practitioners who had served, respectively, as Chief Information Security Officer and Head of Security and Compliance. With cloud solutions becoming an increasingly integral part of the security technology stack Yampolskiy and Kassoumeh recognized the need to address third- and fourth-party risk as well as better understand the security capabilities of their business partners. Since its founding, the company has grown dramatically and now counts hundreds of leading brands as customers. SecurityScorecard is backed by leading venture capital investors including Sequoia Capital, GV, NGP Capital, Evolution Equity Partners, Boldstart Ventures, AXA Venture Partners among others. For more information, visit securityscorecard.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Lessons from My Strange Journey into InfoSec
Lysa Myers, Security Researcher, ESET,  7/12/2018
What's Cooking With Caleb Sima
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-9574
PUBLISHED: 2018-07-19
nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
CVE-2017-2673
PUBLISHED: 2018-07-19
An authorization-check flaw was discovered in federation configurations of the OpenStack Identity service (keystone). An authenticated federated user could request permissions to a project and unintentionally be granted all related roles including administrative roles.
CVE-2017-7481
PUBLISHED: 2018-07-19
Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templati...
CVE-2018-12911
PUBLISHED: 2018-07-19
WebKitGTK+ 2.20.3 has an off-by-one error, with a resultant out-of-bounds write, in the get_simple_globs functions in ThirdParty/xdgmime/src/xdgmimecache.c and ThirdParty/xdgmime/src/xdgmimeglob.c.
CVE-2018-14404
PUBLISHED: 2018-07-19
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulne...