Improving Cyber Security and Mission Assurance via Cyber Preparedness (Cyber Prep) Levels
|
|
|
- Ashley Dortha George
- 10 years ago
- Views:
Transcription
1 Improving Cyber Security and Mission Assurance via Cyber Preparedness (Cyber Prep) Levels Deb Bodeau Richard Graubart Jennifer Fabius Greene Executive Summary The MITRE-developed cyber preparedness (Cyber Prep) framework provides an approach for addressing the cyber threats that an organization or mission faces; determining the level of preparedness necessary to ensure mission success; facilitating strategic planning for cyber security by setting preparedness objectives; and assisting in the prioritization of cyber security investment planning and management decisions. The nature of cyber threats in general and advanced cyber threats in particular requires a longer-term commitment from senior leadership, including vision, strategy, and investment prioritization as well as the organizational agility to respond to ever-changing tactics and techniques. This paper provides recommendations on how to characterize an organization s cyber threat environment and identifies a number of defensive tools and techniques that will provide a solid start for improving security and resiliency against advanced cyber threats. With broad adoption, the five Cyber Prep levels are expected to provide a simple and common method for assessing the degree of cyber preparedness associated with an organization and/or its components. Background Much has been written and discussed during the last several years about advanced cyber threats and their impact, both potential and actual, on the nation s information infrastructure. Cyber threats vary in sophistication and intent and the consequences to the targeted system/network can vary widely as well. The one consistent theme is that the cyber defenses commonly used today are simply not effective against most forms of advanced cyber attack. The question is: Can we characterize such advanced threats and devise ways to overcome or minimize them? This paper describes a framework for thinking about cyber threats and determining the appropriate level of preparedness for a particular organization or mission. It recommends representative defensive tools and techniques that form a good starting point for improving security against modern cyber threats and strategies for operating through attacks. To be useful at the organizational level, a cyber preparedness framework should provide some insight into the organization s current posture with respect to threats as well as ideas about the defenses that can be used to counter such threats. In addition, a framework should aid in identifying the organizational cyber threat environment as well as a strategy for improving the enterprise s approach to addressing cyber threats. A framework needs to be useful for multiple types of enterprises and environments because most organizations missions and adversaries will have at least some unique aspects. 1
2 The growing number and variety of cyber threats can be categorized in many different ways. MITRE defined the five Cyber Prep levels to correspond to fairly distinct break points in adversary capabilities, intent, and technical sophistication, as well as in the operational complexity involved in an attack. Each Cyber Prep level builds on the defenses and activities an organization has taken to prepare itself against lower-level adversaries. 1 For example, an organization that encounters Level 3 threats would also need to prepare for Level 1 and Level 2 threats, since a Level 3 adversary will use lower-level attack techniques if those techniques achieve the adversary s desired results. One of the most difficult questions to answer relating to security is about the benefits from investing in specific security safeguards. If an organization implements these safeguards, how much better protected will it be? Solid quantitative answers are difficult to come by, particularly for a single defensive technique. The best approach is to look at the ensemble of defensive techniques that have been implemented and see the difference they make together. For example, to assess its preparedness for attacks at its perimeter, an organization can measure intrusions that successfully penetrate the firewall, where detectable, threats detected within the firewall, and threats eliminated within the firewall. An organization s or a mission s preparedness can also be actively tested and measured through the use of red teams. Red teams can be highly effective at providing concrete information regarding the effectiveness of an organization s security safeguards. Different organizations or missions attract different types of adversaries, with different goals, and thus need different levels of preparedness. A major financial institution may be targeted by organized crime with the goal of transferring money. A defense think tank may be targeted by nation states with the goal of covertly acquiring sensitive information. A defense-parts supplier may be targeted by an adversary whose goal is to corrupt the produced parts. Each of these organizations will in turn require a different level of preparedness and different defenses tailored to the nature of the attacks they face. Cyber Prep Framework Approach The Cyber Prep levels are characterized by three factors: The nature or caliber and intent of the threat with which an organization is prepared to address. The technical and operational capabilities the organization uses to assure its missions and provide security to counter the threat it faces. Types of controls or capabilities can be defined, and for each type of control or capability, multiple levels can be defined. The process capabilities i.e., the risk assessment and governance policies and processes the organization uses to determine its cyber threat level and (as appropriate) to characterize the specific threats it faces; to determine and deploy technical and 1 Cyber Prep levels are intended to be strategic in nature and may take multiple years to achieve. Thus, Cyber Prep, complements, but does not replace, more tactical cyber threat levels or security measures that may change corresponding to the daily security assessments of cyber threats. 2
3 operational capabilities in a manner calibrated to counter its threats; and to manage, assess, and adapt those capabilities to address the changing threat environment. This paper focuses on the first two areas. The characterization of adversaries and their motivations in Tables 1, 2, and 3 are for descriptive purposes to demonstrate the evolution of cyber threats and associated preparedness approach. Based on the way attackers generally tend to operate, a more competent and determined group may first use techniques that are also available to less capable, less motivated attackers. If those attacks were blocked then the adversary would escalate to a higher-level attack. Insight into this escalation can be helpful for future planning of safeguards and can also help increase the cost of attack for different adversaries. Ideally an organization facing cyber threats at a certain level should look to have a commensurate level of preparedness organizations facing a Level 4 threat should generally employ a Level 4 degree of cyber preparedness. The five levels of cyber threat and preparedness are labeled consistent with the nature and severity of the adversary and attacks, as well as with the strategy for preparedness to counter such threats. However, each successive level of preparedness adds more expense, more complexity and generally more overhead to an organization s information systems and management processes. The level of resources required by an organization to reach a higher level will be quite significant. Achieving a higher level of preparedness requires addressing architectural, cultural, process, management and technical areas. Therefore, an organization s determination of its target level of cyber preparedness must be made carefully in conjunction with proper planning and funding. Table 1: Cyber Threat and Preparedness Levels Level Cyber Threat Level Cyber Preparedness Level 1 Cyber Vandalism Perimeter Defense 2 Cyber Theft/Crime Critical Information Protection 3 Cyber Incursion/Surveillance Responsive Awareness 4 Cyber Sabotage/Espionage Architectural Resilience 5 Cyber Conflict/Warfare Pervasive Agility A description of each level and its associated characteristics (adversaries, techniques, defensive schemes, etc.) is provided in the following tables. Without senior leadership understanding the range of issues and a serious commitment to improvement, an organization s progress from one level to the next will be erratic and incomplete. Representative existing and future capabilities to address these threats are also described; they are listed as existing, emerging or future due to their availability and production maturity. 3
4 4
5 Preparedness Level Table 2: Characteristics Associated with Cyber Preparedness Levels Organizational Perspective Organizational Objective Organizational Strategy Level 1 Foundational Defense Believes the cyber threat is largely external and can keep adversaries from penetrating perimeter defenses; the situation is largely manageable via due diligence. Prepares for known external attacks and minor internal incidents. Establishes and defends the information system perimeter. Protects against introduction of known malicious code/malware and discourages unauthorized internal access. Uses commercial security products, and professionally manages perimeter and desktops Level 2 Critical Information Protection Recognizes the importance of identifying and safeguarding critical information, whether internal, external or transiting the organization s perimeter. Prevents unauthorized access to critical or sensitive information. Identifies and protects critical data regardless of location, using encryption, enhanced identification & authentication and access control methods. Level 3 Responsive Awareness Understands that adversaries are penetrating the organization s information infrastructure; can no longer assume that perimeter based protection will keep internal systems secure. Recognizes the need for a high degree of awareness to identify and respond to attempted incursions. Deters adversaries from gaining a foothold in the organization s information infrastructure. Deploys capabilities to detect and respond to targeted penetration attempts within the organization s information infrastructure. Complement with procedures to better understand methods of adversary. Level 4 Architectural Resilience Recognizes that it is not possible to keep the persistent adversary from, over time, establishing footholds within the organization s information infrastructure, including some which will remain undetected. Understands the importance of maintaining an operational capability in the face of adversaries who can launch successful cyber attacks from their persistent footholds. Constrains exfiltrations of critical data, continues critical operations, minimizes damage despite successful attacks from adversaries who have established a foothold. Designs and operates systems with the concepts of resilience and protection through multiple distinct enclaves, so that the organization can limit exfiltration of critical information, contain adversaries, and operate through (even in degraded mode), and recover from a successful attack. Level 5 Pervasive Agility Assumes that the adversary is taking continuous, overt actions against the organization from its persistent foothold within the information infrastructure, including a compromised supply chain, that will result in loss of some key systems and services; assume data has been purposely been modified to mislead and confuse. Recognizes need for agility and flexibility to ensure mission operations. Maintains operations on a continuing basis and adapts to current and future coordinated, successful attacks, regardless of their origins. Employs a highly agile, adaptive, and flexible structure that permeates all aspects of the organization (including planning, supply chains, collaboration, architecture, governance, and resources), allowing the organization to continually and dynamically reshape all aspects of its operations in face of changing, successful attacks. 5
6 Table 3: Characteristics Associated with Cyber Threats Level Typical Actors Typical Intent of Threat Actor Hackers, Taggers, and Script Kiddies; small disaffected groups of the above. Individuals or small, loosely affiliated groups; political or ideological activists; terrorists; domestic insiders; industrial espionage; spammers. Nation-state government entity; patriotic hacker group; sophisticated terrorist group; professional organized criminal enterprise (e.g., RBN). Professional intelligence organization or military service operative. Nation-state military possibly supported by their intelligence service; very sophisticated and capable insurgent or terrorist group. Disruption and/or embarrassment of the victimized organization or type of organization (e.g., a specific Department or Federal government as a whole). Obtain critical information and/or usurp or disrupt the organization s business or mission functions for profit or ideological cause. Increase knowledge of general infrastructure; plant seeds for future attacks. Obtain or modify specific information and/or disrupt cyber resources, specifically resources associated with missions or even information types. Obtain specific, high value information, undermine or impede critical aspects of a mission, program, or enterprise, or place itself in a position to do so in the future. Severely undermine or destroy an organization s use of its mission, information and/or infrastructure. In identifying the nature of the cyber threat an organization or mission faces, the interplay of an adversary s capabilities, intentions and targeting activities must be considered. Table 4 provides some representative examples of how the combination of threat factors come together to form actionable threats per level. Table 5 offers more concrete examples of the tactics, techniques, and procedures (TTPs) employed by adversaries at each level. Table 6 provides a small sample of the types of safeguards and strategies that could address advanced cyber threats. Table 6 has three columns, Existing Solutions, Emerging Solutions, and Future Solutions. These three columns reflect the fact that as the sophistication of the adversary increases, so will the maturity of the proposed safeguards or strategies. At the higher threat levels, a greater percentage of the safeguards fall into the Emerging and Future Solutions area. The entries in both Table 5 and Table 6 are representative; a complete set of TTPS or safeguards would be much more numerous, and could be classified. Because the specific TTPs of adversaries evolve rapidly, the assignment of a specific TTP or safeguard to a particular level is intended to serve only as a snapshot in time. As the threat level increases, the limitations of today s widely available solutions become more apparent. We need only look at some of the TTPs exercised by the more advanced threats today to understand what may very well be readily available to less sophisticated adversaries in the not too distant future. Investment in future architectural, operational, and technical solutions is essential for ending the cycle of reaction and delayed response. In the meantime, organizations need to be creative with the application of emerging solutions to address today s threats. 6
7 Level Table 4: Cyber Threat Capability Examples Threat Scenarios The adversary uses simple attack tools (e.g., freeware vulnerability scanners) to launch well known attack methods (e.g., brute force password guessing) from outside the organization s cyber perimeter. The attack may cause minor disruption (e.g., cyber vandalism). Attacks may not be targeted at specific organizations but rather at any organization that the attacker can penetrate; alternatively, personally motivated attacks may be focused on a specific organization (e.g., a retailer that has alienated the attacker). The adversary has access to and experience with tailorable attack tools (e.g., to custom-craft malware). The adversary is positioned opportunistically to target critical information external to or transiting the organization s cyber perimeter. The adversary attempts to steal or acquire information (e..g., SSNs) or resources (often for financial enrichment). Sample attack methods include stealing laptops left in vehicles in the organization s parking lot, intercepting transiting the perimeter, and spam phishing s. The adversary is in position for limited infiltration across the organization s cyber perimeter resulting in a tentative foothold within the organization. Sample attack methods include some combination of internally (from foothold) and externally based cyber attacks, both employing nontargeted zero-day attacks. The adversary attempts to obtain and exfiltrate large quantities of highvalue information from within the organization s infrastructure (e.g., proprietary plans, personal information about celebrities), in a covert manner, possibly supported by more overt mechanisms such as cyber extortion. Attacks are focused on specific high value organizations (e.g., IRS, Federal Reserve) thought to possess sensitive information with national security or financial implications. The adversary has been able to breach the organization s cyber and/or physical perimeters and establish a persistent foothold within the organization. Sample attack methods include some combination of internally and externally based attacks, both employing targeted zero-day attacks, supply chain intercepts, and covert physical access (e.g., using a co-opted or unwitting insider). The adversary attempts to obtain and exfiltrate large quantities of specific, high value or mission-critical information, insert malicious components to support future attacks, feed false information to the organization to undermine its operations or to corrupt its information products. Attacks are focused on specific high value organizations (e.g., IRS, Federal Reserve) or on specific employees of the organization (e.g., by targeting their home computer) thought to possess highly sensitive information with major national security or financial implications. Attacks may also focus on intercepting key supplies to the organization while in transit from the supplier to the organization, and replacing them with corrupted or defective components. The adversary has been able to breach some combination of the organization s cyber, physical, personnel and supply perimeters, and establish persistent footholds within the enterprise. Sample attack methods include some combination of internally and externally based advanced cyber attacks (e.g., tailored zero-day attacks), corruption of the organization s supply chain, covert physical access (e.g., using an implanted insider), and physical attacks. The adversary attempts to prevent or disrupt high value organizations from carrying out key aspects of their mission (e.g., destroy or disrupt components governing portions of the electrical power grid causing wide scale blackouts, disabling IRS s ability to process tax returns) or take control of systems. Attacks are focused on specific organizations or on specific individuals thought to possess highly sensitive information with major national security or economic implications. In addition, the attacks may be more narrowly focused, targeting supporting components (e.g., key suppliers of the critical infrastructure component), or may be more broadly focused targeting a set of related organizations (e.g., multiple critical infrastructure providers). 7
8 Table 5: Sample Tactics, Techniques and Procedures (TTPs) Adversaries Might Use Cyber Prep Sample TTPs Level 1 Discovering and accessing sensitive data/information stored on publicly accessible information systems; Inserting known malware into organizational information systems (ISs), e.g., virus via ; Performing brute force login attempts; Defacing files on publicly accessible information systems; Performing network reconnaissance; Social engineering by outsiders to convince insiders to take harmful actions Compromising critical organizational ISs via physical access by insiders; Conducting phishing attacks; Employing open source discovery of organizational information useful for later cyber attacks; Hijacking information system sessions of data traffic between the organization and authorized external entities; Opportunistically stealing or scavenging computer or data storage assets; Sniffing external information systems and networks (e.g., hotel kiosk) to obtain organizational information; Take advantage of split tunneling by authorized users to gain access to organization s ISs Compromising, and reintroducing to the internal environment, organizational ISs used externally; Inserting malicious code into organizational information systems to facilitate exfiltration of data/information; Installing general-purpose sniffers on organization-controlled (internal) networks; Mapping and scanning organization-controlled (internal) networks from within (inside) the organization; Performing reconnaissance and surveillance of information systems, facilities, and operations; Successful compromise of widely used software; Tailgating authorized employees to gain access to organizational facilities; Use of non-targeted zero-day attacks. Inserting counterfeited hardware into supply chain; Insider-based session hijacking; Installing persistent and targeted sniffers on organizational information systems and networks; Implanting subverted individuals into the organization; Social engineering by (malicious) insiders to convince other (trusted) insiders to take harmful actions; Targeting and compromising home computers of critical employees; Targeting zero-day attacks on organizational information systems; Using malware targeted at organizational ISs known to be used by the organization; Using postal service or other delivery services to covertly insert wireless sniffers inside facilities. Causing destruction of critical information system components and functions; Compromising design, manufacture, and/or distribution of IS components the organization is known to use; Coordinating attacks on the organization using external, internal, and supply chain attack vectors; Creating false-front organizations to inject malicious IS components into organization s supply chain; Injecting false but believable data into organizational ISs; Inserting specialized, non-detectable, malware into organizational ISs based on system configurations; Jamming wireless communications; Implanting subverted individuals into privileged positions within the organization. 8
9 Table 6: Sample Safeguards per Cyber Prep Level Level Existing Solutions 2 Emerging Solutions 3 Future Solutions Perimeter firewalls and intrusion detection. Strong identification and authentication (I&A) for remote privileged access. Anti-virus and anti-spyware on servers and client systems. Audit-log monitoring of externalfacing and perimeter systems (non-real-time). Strong I&A for all remote access. Encrypted external transmissions (e.g., SSL, VPNs) between internal systems and trusted external systems. Segregated Demilitarized Zone (DMZ) at the edge of the enterprise network. Scanning of portable systems (laptops, thumb drives, etc.) prior to re-connection to internal network. Strong physical security for critical systems to deter malicious insiders. Periodic open source searches and defensive adjustments for information. Strong I&A for all privileged access (remote and local). Deploy sensors at critical points to detect exfiltration. Monitor and analyze network traffic for abnormal conditions and unusual patterns. Honeypots. Not required Use virtualization on desktops to better segregate production environment from risky user behavior Improve design/architecture for additional security software. Deploy insider monitoring. Rootkit detection. Correlate/analyze physical and cyber access. Monitor control channels through perimeter for illicit data transfer. Honeyclients. Not required or none identified Not required or none identified Not required or none identified 2 Solutions are commercially available and in widespread use. 3 Solutions require application of existing technology in a new manner or early adoption of emerging technology. 4 Solutions require further Research & Development. 9
10 Table 6: Sample Safeguards per Cyber Prep Level (concluded) Level Existing Solutions Emerging Solutions Future Solutions 4 5 Use strong I&A for all access to critical information systems. Partition internal information infrastructure into subnetworks, using rapidly reconfigurable boundary control solutions. Minimize time between placing an order and requested delivery date to stress any supply chain intercept attempt. Penetration testing of physical security on the organization s facilities. Strong I&A for all access. Use multiple trusted suppliers for key components. Trusted cutouts to support shipping acquiring critical components through trusted intermediaries that purchase them on the organization s behalf. Analyze systems to see which critical components should be (re-)implemented to avoid risk of serious COTS failure/ malware. Use trusted foundries. Use a heterogeneous code base for key infrastructure components. Acquire spare parts during initial system procurement. Use trusted shipping with physical protection and continuous accountability. Integration of cyber and physical penetration testing. Virtualization to reconstitute services. Periodically conduct reconstitution of critical functions to reduce persistence of ad to gain and maintain a foothold. Employ out of band control to maintain or reconstitute operation of critical services. Make frequent small changes to software configurations to thwart offensive TTPs. Contingency reserve critical capabilities or operating modes that are maintained offline and used when production capabilities are no longer available or trusted, or simply to confuse the adversary. Near-real-time forensics and response to cyber attacks; investigate root-cause analysis of attack. Use trusted components for critical organizational functions. Summary The application of the Cyber Prep methodology requires focusing on the anticipated threats and TTPs. Different organizations, even at the same Cyber Prep level, are likely to have differences in their threat environments as well as in their risk management strategies and enterprise architectures, which will determine which TTPs are relevant to them and which safeguards best suit them. As a consequence, it is very likely that different organizations (even at the same Cyber Prep level) will employ different mixtures of safeguards. Achieving a given Cyber Prep level is based on the degree to which an organization has taken action to address as many as possible of the TTPs it has identified as relevant. Reaching a particular Cyber Prep level is accomplished by selecting those safeguards which partially or fully counter the identified TTPs 5. Within the Cyber Prep framework, there is no additional benefit from expanding the potential set of safeguards to the maximum associated with a particular level. Nor is there additional benefit from selecting safeguards that do not address the organization s threat environment. Successful application of Cyber Prep requires prioritization and an explicit understanding of the tradeoffs being made. Ultimately it should be used to improve risk management of cyber assets and the environments in which they reside and the cost effectiveness of safeguard investments. 5 At MITRE we are applying Cyber Prep in just this manner, first selecting a target Cyber Prep level, then identifying which of the TTPs we need to address, and then deploying appropriate safeguards to counter those TTPs. 10
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge
Targeted Intrusion Remediation: Lessons From The Front Lines Jim Aldridge All information is derived from MANDIANT observations in non-classified environments. Information has beensanitized where necessary
Getting real about cyber threats: where are you headed?
Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a
PENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
Cyber Security Governance
M T R 1 0 0 3 0 8 M I T R E T E C H N I C A L R E P O RT Cyber Security Governance A Component of MITRE's Cyber Prep Methodology Sponsor: Dept. No.: G020 Contract No.: Project No.: 01CCG005-AD The views,
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Advanced Persistent Threats
Advanced Persistent Threats Craig Harwood Channel Manager SADC and Indian Ocean Islands 1 Agenda Introduction Today s Threat landscape What is an Advance persistent Threat How are these crimes perpetrated
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Protecting Organizations from Cyber Attack
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience
Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience Cloud Standards Customer Council Public Sector Cloud Summit March 24, 2014 Dr. Ron Ross Computer Security Division Information
Enterprise Cybersecurity: Building an Effective Defense
Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Course Descriptions November 2014
Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments
DATA SHEET Technical Testing Application, Network and Red Team Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia
Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Marshall D. Abrams, The MITRE Corporation Joe Weiss, Applied Control Solutions, LLC Annual Computer Security
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
The Next Generation Security Operations Center
The Next Generation Security Operations Center Vassil Barsakov Regional Manager, CEE & CIS RSA, the Security Division of EMC 1 Threats are Evolving Rapidly Criminals Petty criminals Unsophisticated Organized
Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security
Next-Generation Penetration Testing Benjamin Mossé, MD, Mossé Security About Me Managing Director of Mossé Security Creator of an Mossé Cyber Security Institute - in Melbourne +30,000 machines compromised
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Persistence Mechanisms as Indicators of Compromise
Persistence Persistence Mechanisms as Indicators of Compromise An automated technology for identifying cyber attacks designed to survive indefinitely the reboot process on PCs White Paper Date: October
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
Post-Access Cyber Defense
Post-Access Cyber Defense Dr. Vipin Swarup Chief Scientist, Cyber Security The MITRE Corporation November 2015 Approved for Public Release; Distribution Unlimited. 15-3647. 2 Cyber Security Technical Center
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
Technical Testing. Network Testing DATA SHEET
DATA SHEET Technical Testing Network Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance your security posture, reduce
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Security and Privacy
Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Incident Response. Proactive Incident Management. Sean Curran Director
Incident Response Proactive Incident Management Sean Curran Director Agenda Incident Response Overview 3 Drivers for Incident Response 5 Incident Response Approach 11 Proactive Incident Response 17 2 2013
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
Exam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Digital Evidence and Threat Intelligence
Digital Evidence and Threat Intelligence 09 November 2015 Mark Clancy CEO www.soltra.com @soltraedge External Threats Growing 117,339 incoming attacks every day The total number of security incidents detected
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
Security Risk Management For Health IT Systems and Networks
Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Setting the stage. NATIONAL INSTITUTE OF STANDARDS AND
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
