Information Technology Risk Management
|
|
|
- Cornelia Nichols
- 10 years ago
- Views:
Transcription
1 Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT How does a leader create an affordable, sustainable, resilient and dynamic risk management program with the ability to reliably detect threats and morph rapidly to defeat them? Find What Matters... Control What Counts
2 Why Risk Management? The Batle Against Cyber Threats Technology s reach is expanding the cyber security batlefield. Emerging technologies will continue to blur the network perimeter, while sophisticated cyber-criminal methods will entice users and threaten the enterprise. Cyber criminals continue to find ways around current measures to protect information. In one of the most publicized data compromises of the year 47,000 Social Security numbers, corporate s, internal proprietary data and unreleased movies were taken from Sony Pictures, as reported by media outlets such as Wired. In this incident, hackers gained access by equipping a malware program with a stolen valid digital certificate. This allowed the attackers to bypass various types of security controls. As technology continues to evolve, organizations will continue to face increases and changes in security risks: Cloud Computing - Adopting cloud architecture allows organizations to tap into never before seen levels of efficiency, but at the same time, opens them to risks and vulnerabilities as information travels to and from protected networks via public pipes, creating more opportunities for data contamination or theft. Bring Your Own Device (BYOD) BYOD, especially mobile devices, is becoming more popular, but trying to manage multiple platforms brings greater risks. Social Networking - Social networking sites (e.g., Twitter, Facebook, Snapchat) continue to grow in popularity, exposing large amounts of personal information. With this exposure, along with increased online financial transactions, our vulnerability to identity theft is increasing. No surprise then, that it has become the fastest growing crime in the United States. The Federal Trade Commission (FTC) estimates more than 109 million Americans have their identities stolen each year. Safeguarding and protecting personal identifiable information (PII) in both commercial and Federal Government systems is more critical than ever before. Industry and the Federal Government have put standards and guidance into place as a preventive measure to protect PII; however, criminals continue to find ways around these measures. Personal Information (PII) Data Storage and Integrated Architectures Yes, the ability to hack computer systems is often the principle culprit in cyber-crime. There are many reasons to protect PII beyond just the threat of identity theft, as our entire information environment becomes more integrated. In fact, this integration increases the potential for information misuse at many levels, driving greater risk and more complex risk scenarios to be dealt with. Since you can t safeguard yourself from every possible risk, the best way to protect your organization is through an operational Information Technology Risk Management (ITRM) program. 2
3 What is Risk Management? Find what maters - Control what counts Who will be able to accept the responsibility for risk? It needs to be someone with budget authority so controls requiring resources can be applied when needed. An effective Risk Management Process, as shown in Figure 1, is the identification, assessment, response, and monitoring of risk to your organization s information infrastructure, and therefore its mission. The goal is to reduce the potential impact from a threat exploiting an organization s vulnerabilities. No organization has the resources to monitor and control everything all the time - therefore you need to manage risks carefully and prioritize and develop measured responses by finding what maters and controlling what counts. Risk Management Strategy A successful ITRM program starts with a well thought out risk management strategy strongly supported by leadership. Proper planning will help you develop a viable ITRM program with the ability to identify threats and adapt promptly to defuse them. A risk management strategy will document how your organization intends to identify, assess, respond to, and monitor risks. Some of the high-level considerations when documenting a risk management strategy include: Who will be accountable for risks and do they have budgetary control that will allow them to apply the necessary resources to mitigate risks? Who will be responsible for managing the day-to-day ITRM program? How will accountability be maintained for personnel with risk management responsibilities? Does my organization already have an overall risk management program? If so, where will my ITRM program overlap and what resources should be shared across the programs? What training is available for personnel with risk management responsibilities? What existing tools can I use to assist with the risk management process? Figure 1: Find/Control Risk Management Process Now - Find What Matters Step 1: Identify The first component of a risk management program is to identify the elements necessary to frame the program. 3
4 Identify the scope - The identification of the scope is one of the most critical components of this step. The scope determines what IT components and organizations will be considered as part of your ITRM program. ITRM program scope affects the range of information available to make risk-based decisions and is determined by the senior management that is requesting the risk management strategy. Business Impact Analysis In order to understand the scope of what you are protecting and why you re protecting it, you must start with understanding your organization s mission and what business functions/ processes support the mission. To do this you should execute a business impact analysis (BIA), which will help to determine: Which IT components support which business functions/ processes Personnel supporting your organization s business functions/ processes External organizations dependent on the continuation of your organization s mission The Maximum Allowable Outage time for IT components A priority for the resumption of components Business function/ process criticality How you choose to respond to risks affecting business functions/ processes and ultimately the overall mission of your organization Identify Assumptions, Constraints, and Risk Tolerance - As part of the risk framing step in the overall risk management process, organizations identify the specific assumptions, constraints, and risk tolerance used to make investment and operational decisions in regards to risks. Understanding these risk profiles will increase the chances of a successful and well thought-out risk management strategy: Risk Assumptions A common frame of reference for addressing risks throughout your organization. Risk Constraints - Limitations or restrictions on your organization s ability to respond to risk (e.g., lack of funds, technology limitations, bureaucracy) Risk Tolerance - The level of risk your organization is willing to accept. Risk Profiles As mentioned earlier, risk profiles (elements of which are shown in Figure 2) help to capture the risk assumptions, constraints and tolerances. They promote a common terminology and frame of reference for comparing and addressing risks across your organization s business areas. 4
5 Figure 2: Elements of a Risk Profile Input Output Metrics Driver (e.g. specific NIST SP control Potential threat source Potential vulnerabilities Assets/ resources affected Consequences/ impact Existing/ planned countermeasures Risk constraints Likelihood Impact Risk scope Risk response Recommended Controls Frequency of assessment for related security controls Measure Target Frequency Responsible parties Data sources Report format Identify tools - As a part of this step, identify what tools you have at your disposal to assist in risk management: Vulnerability scanning/ asset management tool to identify vulnerabilities and discover network components Risk management applications/ software Identify Expectations and Training Needs - For those personnel responsible for managing risk, clearly define the responsibilities and expectations, and develop a training plan. Training organizations (e.g., SANS, INFOSEC Institute), social networks (e.g., LinkedIn groups, GovLoop), and professional organizations and certifications (e.g., ISACA, ISC2) can provide the training you need to help staff stay informed, and ahead of emerging threats. Now Control What Counts Step 2: Assess In step 2, you need to identify a risk model that will be used to assess your risk. Regardless of the risk model used, similar components are identified. Threat-sources - Determine what threat sources can exploit the vulnerabilities of your organization. Some useful sources in determining threat-sources to your organization can include: Historical data (past incidents and frequency of incidents or threats listed on previous assessments) Brainstorming amongst various business units Threats that may have occurred at similar organizations US Computer Emergency Readiness Team (CERT) Federal Emergency Management Agency (FEMA) (e.g., environmental threats) Your insurance agency 5
6 Vulnerabilities - Vulnerabilities can be determined through several techniques (or a combination of techniques): Vulnerability scanning tools Penetration Testing Assessments (interview, examine, test) Matching threats to vulnerabilities Once you have determined what your threat-sources and vulnerabilities are, your model needs to define the strength of their relationship. Matching threat sources to vulnerabilities is not always a one-to-one scenario. You may have multiple threats that can exploit a single vulnerability or one threat that can exploit multiple vulnerabilities. A documented approach to determine the likelihood and impact of a threat-vulnerability match occurring should be established so the overall risk determination is consistent. This can be done through a qualitative approach, quantitative approach, or semi-qualitative/ combination. Qualitative Approach A qualitative approach offers flexibility in how you respond to risks. In Figure 3, we show a qualitative scale for Event Likelihood and Impact, and show the degree of potential severity of an incident based upon the intersection of the two scales, e.g. the intersection of a moderate event likelihood with a high impact results in a moderate incident severity. Each organization needs to look at the intersection points and make its own judgments on the weighting it wants to assign. Figure 3: A Qualitative Approach to Risk Assessment 6
7 Semi-Quantitative Approach NIST Special Publication , Revision 1, Guide for Conducting Risk Assessments was revised to offer a semi-quantitative approach. It can be used for both risk profiling and to determine the frequency with which security controls should be assessed. According to NIST Special Publication , Semi-quantitative assessments typically employ a set of methods, principles or rules for assessing risk using bins, scales, or representative numbers. Figure 4 below is an example of a semiquantitative risk assessment, and Figure 5 is an example of a security controls assessment schedule. Figure 4: Semi-Quantitative Risk Assessment Qualitative Values Semi-Quantitative Description Values Very High The vulnerability is exposed and exploitable, and its exploitation could result in severe impacts. Relevant security control or other remediation is not implemented and not planned; or no security measure can be identified to remediate the vulnerability. High The vulnerability is of high concern, based on the exposure of the vulnerability and ease of exploitation and/or on the severity of impacts that could result from its exploitation. Relevant security control or other remediation is planned but not implemented; compensating controls are in place and at least minimally effective. Moderate The vulnerability is of moderate concern, based on the exposure of the vulnerability and ease of exploitation and/or on the severity of impacts that could result from its exploitation. Relevant security control or other remediation is partially implemented and somewhat effective. Low The vulnerability is of minor concern, but effectiveness of remediation could be improved. Relevant security control or other remediation is fully implemented and somewhat effective. Very Low The vulnerability is not of concern. Relevant security control or other remediation is fully implemented, assessed, and effective. 7
8 Risk scoring and risk profiles can be used to determine security controls assessment frequency. Figure 5: Security Controls Assessment Qualitative Values Example Risk Score Range Frequency of Security Control Assessment Example 1 Frequency of Security Control Assessment Example 1 Very High Bi-weekly Monthly High Monthly Quarterly Moderate Quarterly Annually Low Annual Every two years Very Low Annual Every three years Continue to Control What Counts Step 3: Respond Risk response can include risk acceptance, risk avoidance, risk mitigation, and/or risk sharing/transfer. Each of these is explained in Figure 6. How you respond to risk will depend on identified assumptions, constraints, and your organization s tolerance toward each risk. Figure 6: Risk Response Approaches Risk Response Explanation Cost Risk Acceptance Risk Avoidance Risk Mitigation Risk Sharing/ Transfer The risks within your organizational risk tolerance Taking actions to completely eliminate the technology or activity that is the foundation for the risk The appropriate response for that portion of risk that cannot be accepted, avoided, shared, or transferred Shifting risk liability and responsibility to other organizations (e.g., using insurance to transfer risk from your organization to an insurance company) Low in costs initially, but if risk is realized, may be costly Can be costly (and risk avoidance measures are not always guaranteed) Cost may vary depending on the risk and the solution used to mitigate or reduce the risk Cost-effective when risk transferred to a competent, properly prepared owner 8
9 Continue to Control What Counts Step 4: Monitor Continuous Monitoring (CM) NIST defines Continuous Monitoring as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. Continuous monitoring practices are not new; however, the latest revision to NIST SP (Rev.1), Guide to Applying the Risk Management Framework to Federal Information Systems, pushes federal agencies to move toward near real-time risk management. This involves moving from documentation-based security to a greater reliance on automation of security. As part of your risk management strategy, you should have a documented continuous monitoring capability that: Determines what to monitor based on a risk assessment Establishes a frequency of monitoring based on types of risks Establishes automated tools for near real-time monitoring Develops metrics to determine effectiveness and uses results to fine-tune continuous monitoring and risk management strategy. The Continuous Asset Evaluation, Situational Awareness, and Risk Scoring (CAESARS) framework and SANS Top 20 Critical Security Controls are just two approaches that can be used to assist with a continuous monitoring capability. There are others, so you will need to choose the method that best fits your organization. Implementation time, cost, and complexity are a few factors to consider when making this choice. In addition, a hybrid of several methods may be used, or seeking a commercial tool that has already automated this process can be another choice. For this discussion, we will further explore CAESARS and SANS Top 20. Continuous Monitoring and CAESARS Framework Multiple external systems will interface with your continuous monitoring capability and the domains on which you choose to focus. The Department of Homeland Security, Federal Network Security Branch identifies 11 domains within their CAESARS Reference Architecture Report. These domains include the following: Vulnerability Management Configuration Management Patch Management Network Management Event Management License Management Incident Management Information Management Malware Detection Software Assurance Asset Management 9
10 The CAESARS Reference Architecture Report resulted from collaboration between the Departments of State, Justice, and Treasury and allows for the assessment of an organization s security posture on a near real-time basis, moves risk management from a point-in-time process to a continuous risk management process, and focuses on controls that can be automated. Although CAESARS is not a full risk management capability, its framework can serve as a major component of your ITRM program. As depicted in Figure 7, CEASARS contains four subsystems: Figure 7: CEASARS Sensor Subsystem - The sensor subsystem should provide the ability, on an enterprise-wide basis, to monitor and identify weaknesses in security configuration settings in computing and networking assets throughout their system life cycles. It includes all platforms upon which CAESARS is expected to report, including end-user devices, database servers, network servers and security appliances. Database/Repository Subsystem - The CAESARS Database/ Repository Subsystem should house all data collected by the Sensor Subsystem and transferred to CAESARS. It also includes any tools required to perform data pull operations from the Sensor Subsystem platform. Analysis/Risk Scoring Subsystem Consists of analytic risk analysis/ scoring tools (centralized and decentralized). Presentation and Reporting Subsystem Presentation tools/ dashboards. Continuous Monitoring and SANS Top 20 Critical Security Controls The SANS Top 20 Critical Controls are based on security controls that are effective in blocking currently known high-priority attacks as well as 10
11 those attack types expected in the near future. The Controls represent a prioritized baseline of information security measures and are designed to support organizations with different levels of information security capabilities. The SANS approach is offense must inform defense and that s what the implementation of the 20 security controls is designed to achieve. SANS s Top 20 Critical Security Controls include the following: Critical Control 1: Inventory of Authorized and Unauthorized Devices Critical Control 2: Inventory of Authorized and Unauthorized Software Critical Control 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Critical Control 4: Continuous Vulnerability Assessment and Remediation Critical Control 5: Malware Defenses Critical Control 6: Application Software Security Critical Control 7: Wireless Device Control Critical Control 8: Data Recovery Capability Critical Control 9: Security Skills Assessment and Appropriate Training to Fill Gaps Critical Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Critical Control 11: Limitation and Control of Network Ports, Protocols, and Services Critical Control 12: Controlled Use of Administrative Privileges Critical Control 13: Boundary Defense Critical Control 14: Maintenance, Monitoring, and Analysis of Audit Logs Critical Control 15: Controlled Access Based on the Need to Know Critical Control 16: Account Monitoring and Control Critical Control 17: Data Protection Critical Control 18: Incident Response and Management Critical Control 19: Secure Network Engineering Critical Control 20: Penetration Tests and Red Team Exercises Each control is broken in to four areas for implementation purposes: Quick wins - fundamental aspects that rapidly improve the security stance generally without major procedural, architectural, or technical changes to the environment 11
12 Improved visibility and atribution Improving the process, architecture, and technical capabilities so your organization can monitor Hardened configuration and improved information security hygiene Improve security posture by reducing the number and impact of potential security vulnerabilities Advanced - Further improves security beyond the other three subcontrols In addition, SANS s website provides user-vetted tools to implement each control (free and fee-based). Summary Risk must be pro-actively managed to identify and respond to new vulnerabilities and minimize cost associated with a breach of security. A risk management strategy will help you develop a sustainable and dynamic ITRM program. Continuous monitoring will help you control what matters, provide a near real-time awareness of your security posture, and Influence management decisions and buy-in. About Carson Associates Your Bridge to Better IT Carson Associates has 22 years of experience developing IT security solutions for federal agencies and commercial organizations. We understand the security environment within the Federal Government, and we are experts at turning data into actionable information. We also understand the role of change management and collaborative teamwork as success factors in continuous monitoring implementations. With this background you can count on us to be a part of your IT security team as your trusted advisor, recommending new approaches and technologies to successfully respond to changing guidance, future cyber threats, and enterprise-wide security challenges. To learn more about how Carson Associates can help your organization comply with the evolving changes in federal security guidance, send a message to: [email protected] or call and ask for Diane Reilly at
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole
The Future Is SECURITY THAT MAKES A DIFFERENCE Overview of the 20 Critical Controls Dr. Eric Cole Introduction Security is an evolution! Understanding the benefit and know how to implement the 20 critical
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY
IG MATURITY MODEL FOR FY 2015 FISMA 1 Ad-hoc 1.1 program is not formalized and activities are performed in a reactive manner resulting in an adhoc program that does not meet 2 requirements for a defined
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
SCAC Annual Conference. Cybersecurity Demystified
SCAC Annual Conference Cybersecurity Demystified Me Thomas Scott SC Deputy Chief Information Security Officer PMP, CISSP, CISA, GSLC, FEMA COOP Practitioner [email protected] 803-896-6395 What is Cyber
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Jumpstarting Your Security Awareness Program
Jumpstarting Your Security Awareness Program Michael Holcomb Director, Information Security HO20110473 1 Jumpstarting Your Security Awareness Program Classification: Confidential Owner: Michael Holcomb
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Assessing the Effectiveness of a Cybersecurity Program
Assessing the Effectiveness of a Cybersecurity Program Lynn D. Shiang Delta Risk LLC, A Chertoff Group Company Objectives Understand control frameworks, assessment structures and scoping of detailed reviews
Building a More Secure and Prosperous Texas through Expanded Cybersecurity
Building a More Secure and Prosperous Texas through Expanded Cybersecurity Bob Butler Chairman, Texas Cybersecurity, Education and Economic Development Council April 2013 About the Texas Cybersecurity
PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 1 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V2 Company Name: The Boeing Company December 10, 2012 1 Interim Techlogy Performance Report 1
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
White Paper: Consensus Audit Guidelines and Symantec RAS
Addressing the Consensus Audit Guidelines (CAG) with the Symantec Risk Automation Suite (RAS) White Paper: Consensus Audit Guidelines and Symantec RAS Addressing the Consensus Audit Guidelines (CAG) with
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
Check Point and Security Best Practices. December 2013 Presented by David Rawle
Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002
ForeScout CounterACT and Compliance An independent assessment on how network access control maps to leading compliance mandates and helps automate GRC operations June 2012 Overview Information security
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
CDM Hardware Asset Management (HWAM) Capability
CDM Hardware Asset Management (HWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Eliminating Cybersecurity Blind Spots
Eliminating Cybersecurity Blind Spots Challenges for Business April 15, 2015 Table of Contents Introduction... 3 Risk Management... 3 The Risk Blind Spot... 4 Continuous Asset Visibility... 5 Passive Network
SITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
PUTTING NIST GUIDELINES FOR INFORMATION SECURITY CONTINUOUS MONITORING INTO PRACTICE
PUTTING NIST GUIDELINES FOR INFORMATION SECURITY CONTINUOUS MONITORING INTO PRACTICE Since Congress instituted the Federal Information Security Management Act (FISMA) of 2002 to address the rapid proliferation
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. Session Objectives. Introduction Tom Walsh
Effectively Completing and Documenting a Risk Analysis Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS Session Objectives Identify the difference between risk analysis and risk assessment
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Managing the Unpredictable Human Element of Cybersecurity
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN
Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software
eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life
Executive s Guide to Windows Server 2003 End of Life Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows
Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management
Prevent cyber attacks. SEE what you are missing. See Your Network MAPS. Prevent cyber attacks. [RedSeal] is meeting our expectations and is playing an integral role as it feeds right into our overall risk
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
Data Privacy and Gramm- Leach-Bliley Act Section 501(b)
Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement
Cyber Security Management
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT
GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology A comprehensive approach
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Continuous Diagnostics & Mitigation:
WHITE PAPER Continuous Diagnostics & Mitigation: CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL Table of Contents What is CDM Requirements, Mandates & Policy that drive for adoption of Continuous Monitoring....
Principles of Information Security, Fourth Edition. Chapter 12 Information Security Maintenance
Principles of Information Security, Fourth Edition Chapter 12 Information Security Maintenance Learning Objectives Upon completion of this material, you should be able to: Discuss the need for ongoing
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Taking Information Security Risk Management Beyond Smoke & Mirrors
Taking Information Security Risk Management Beyond Smoke & Mirrors Evan Wheeler Omgeo Session ID: GRC-107 Insert presenter logo here on slide master. See hidden slide 4 for directions Session Classification:
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
SOLUTION BRIEF. Next Generation APT Defense for Healthcare
SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their
PCI DSS AND THE TOP 20 CRITICAL SECURITY CONTROLS COMPARING SECURITY FRAMEWORKS SERIES
CONFIDENCE: SECURED WHITE PAPER PCI DSS AND THE TOP 20 CRITICAL SECURITY CONTROLS COMPARING SECURITY FRAMEWORKS SERIES ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE BENCHMARKS, STANDARDS, FRAMEWORKS
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,
Automate Risk Management Framework
Automate Risk Management Framework Providing Dynamic Continuous Monitoring, Operationalizing Cybersecurity and Accountability for People, Process and Technology Computer Network Assurance Corporation (CNA)
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
Department of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
