Comparative Security

Comparative Security

Sustainable levels of performance can never be achieved without keeping security at the forefront of an organization's digitalization strategy. Too often, security is treated like an after-thought - an activity at the end of the product development cycle or something to “fix” once a vulnerability is identified.

Created by:

Comparative Agility

Comparative Agility

A data-driven strategy to security

Comparative Security provides forward-leaning organizations with the information and intelligence necessary to embed security thinking as a natural part of an organization's operational strategy.

By treating security as an integral part of product development, companies can limit their security exposure, make better tradeoffs and more effectively maneuver the constant security challenges inherent in today's fast-moving business landscape.

About Comparative Security

Understand how you stack up against other companies or peers in your industry so you can more effectively target your security investments where it makes the most sense. By deploying a data-driven strategy to security, you'll be able to:

Continuous Improvement

1. Gather Data

Take survey, conduct open space sessions, gather objective measures and perform 1:1 interviews.

2. Analyze Results

Baseline data against world, specific industry or other comparative data set. Identify unique strengths and improvement opportunities. Understand the narrative.

3. Implement Changes

Define inprovement strategy based on key findings from your analysis. Communicate what you intend to do, execute on improvement strategy and evaluate progress.

4. Learn Together

At regular intervals, validate the impact of the improvement efforts. Communicate progress and be open about challenges. Build a culture of continuous improvement and learning across the enterprise.

Step

Integrate a continuous improvement approach to your security strategy: leverage Comparative Security to inform a strategic security roadmap at all levels of the organization.

Step

Get a perspective of your current security risk profile and understand strengths and weaknesses of your approach compared to peers.

Step

Quickly target areas of your security strategy where you need to act; recognize where you can build on existing strengths.

Step

Give team members a voice and involve people at all levels of the organization as part of your security strategy.

Sample Questions

Governance

Our organization has an evangelist - an active advocate - who keeps stakeholders aware of the issues around information security and their importance to the business.

Intelligence

We maintain a list of open source used in apps, and have a process to keep it current with security patches.

SSDL Touchpoints

Security requirements are used to review feature designs.

Deployment

We use external penetration testers to find problems.

Outcomes

The team is producing higher quality products than before.

Governance

We have gates in our SDLC that call for security-related artifacts.

Intelligence

We analyze and document application-specific threat models and/or top attack lists.

SSDL Touchpoints

We perform basic threat modelling (perhaps with a standard questionnaire) on each new application or feature.

Deployment

Findings from penetration testing are entered into the produce development process (e.g. backlog, defect tracking).

Top Features

  • Embed security as an integral part of your organization's product development approach.

  • Benchmark your company's security efforts against peers in your industry.

  • Understand where you need to invest additional time and resources; amplify existing strengths.

  • Assess efforts at the team, program and organizational levels.