Cybersecurity in Modern Critical Infrastructure Environments
|
|
|
- Marvin Lucas
- 10 years ago
- Views:
Transcription
1 WHITE PAPER Cybersecurity in Modern Critical Infrastructure Environments SECURE-ICS Be in Control Securing Industrial Automation & Control Systems This document is part of CGI s SECURE-ICS family of cyber security methods, tools, materials, services, etc. to secure industrial automation and control system environments and critical infrastructures.
2 TABLE OF CONTENTS INTRODUCTION... 3 CYBERSECURITY TRENDS, CHALLENGES & OPPORTUNITIES... 3 BUSINESS DRIVERS & CHALLENGES... 4 INCREASING SOPHISTICATION OF CYBERCRIME... 5 CLOUD COMPUTING... 6 RISE OF MOBILE DEVICES & APPLICATIONS... 7 CRITICAL INFRASTRUCTURE... 7 LEAKAGE OF SENSITIVE DATA / INTELLECTUAL PROPERTY... 7 INCREASING REGULATORY ENVIRONMENT... 7 TACKLING CYBERSECURITY IN THE ENTERPRISE... 7 ESTABLISHING A CYBERSECURITY MANAGEMENT FRAMEWORK... 9 SUMMARY & RECOMMENDATIONS ABOUT CGI REFERENCES Page 2
3 INTRODUCTION In today s business environment, disruptive technologies such as cloud computing, social computing and nextgeneration mobile computing, as well as the interconnections between corporate networks and process control networks, are fundamentally changing how organizations use information technology for sharing information and conducting commerce online. This wave of technology innovation, often driven by information technology trends that are being rapidly adopted across the enterprise, has created unparalleled levels of access and connectivity across people, information, systems and assets worldwide and has transformed today s networkdelivered society. In the cybersecurity arena, the increasing sophistication, frequency and scale of cybercrime as a result of this open and network-oriented society, coupled with an explosion in the use of edge devices and cloud applications as well as increasing regulatory requirements, has created an urgent need for organizations to rapidly advance their security countermeasures and re-think traditional approaches. On a more global level, due to the compelling and pressing nature of the issues involved, many countries have elevated cybersecurity to a top-tier priority within their national security strategies. To keep pace and stay ahead of escalating risk levels while at the same time efficiently managing costs, business leaders need to rethink their cybersecurity postures in the context of a broader risk management strategy and adopt a new strategic framework that addresses these numerous disruptive trends across the IT landscape. By having a logical framework for understanding cybersecurity and the major domains it represents, enterprises can implement their cyber strategies and develop specific plans tailored for each domain and exposure area in a holistic manner. Key focus areas should include the following: Governance Risk and compliance Users (identity assurance, regardless of location or device type) Data (sensitive data protection, no matter where it resides) Applications (application security modernization) Infrastructure (securing the borderless enterprise, including cloud computing) Production (industrial control systems/critical infrastructures) Assets (cyber supply chain) The challenge is far broader than simply addressing one issue such as securing data, securing mobile devices or securing cloud computing environments. By ensuring a cybersecurity strategy addresses all of these interrelated issues, business leaders can be confident of a defense-in-depth approach. For businesses and governments alike, getting the cybersecurity posture right across all key areas is vital for future growth, innovation and competitive advantage. It s also vital for truly exploiting the business and economic opportunities provided by technologies such as cloud, mobile, and social computing, as well as smart computing, industrial automation and IT appliances. A cybersecurity-related misstep in any of these rapidly emerging areas can lead to lost productivity and serious damage to brand reputation. There is no single answer for success. However, by working across public and private sector partnerships and by advancing security measures particularly with regard to mission-critical systems, processes and applications that are connected in cyberspace businesses will be able to work towards a future environment that is open, secure and prosperous. CYBERSECURITY TRENDS, CHALLENGES & OPPORTUNITIES While traditional information security has always included practice areas related to the security of information and systems, the cyber world that we live in today has become increasingly connected and increasingly mission critical due to our network-delivered society. The traditional enterprise boundaries that formed the basis for securing the perimeter from the outside world have, by necessity, become increasingly porous to support this new, routinely wireless and ubiquitous always-on connectivity. Page 3
4 The major challenge for organizations today is determining how to embrace disruptive technologies and trends such as everything connected, cloud, mobile, and social computing, while at the same time managing the inherent risks that conducting business in cyberspace creates. Before studying the business drivers and challenges related to cybersecurity, it s important to understand the general definition and scope of the term and how it relates within the broader context of security. A useful definition comes from the UK s cybersecurity strategy: Cyber Security embraces the protection of both private and public sector interest in cyber space and their dependency on digital networks and also the protection of exploitation of opportunities commercial or public policy that cyberspace offers. While there are many definitions, the key point to note is that the scope of cybersecurity extends not only to the security of IT systems across the enterprise, but also to the broader digital networks upon which they rely, including cyberspace itself and critical infrastructures. On a national level, many governments have deemed cybersecurity a tier one priority within their national security strategies, recognizing the likelihood and impact of potential attacks. Some figures clearly illustrate the magnitude of the problem. In less than 15 years, the number of global web users has exploded by more than a hundredfold, from 16 million in 1995 to more than 1.7 billion today. By 2015, there will be more interconnected devices on the planet than humans. As this fourth utility (after electricity, water and the telephone system) as it is sometimes called has grown, cybercrime has grown significantly as well. In fact, the cost of cybercrime has been estimated at more than $1 trillion per year globally. One of the key implications of this definition of cybersecurity is that we now have a society dependent on network-delivered services. Protecting this new dependency is what we call cybersecurity. It spans both the logical world of IT, i.e., bits and bytes and computers, as well as the real world of utilities, productions and services in cyberspace. Everything we do is network-delivered, even crime. One of the imperatives for any cybersecurity strategy is therefore to take a more holistic approach to how we defend and protect our organizations, and even our society, and to help recover when things go wrong. BUSINESS DRIVERS & CHALLENGES Today, some of the major cybersecurity business drivers impacting the enterprise include the following: Increasing sophistication, frequency and scale of cybercrime Malicious and inadvertent leakage of sensitive data Loss of intellectual property Increasing regulatory environment Interconnections between corporate and process control networks Vulnerabilities introduced by the rise of cloud computing, mobile devices and Web 2.0 applications within the enterprise (see next figure) Each of these business drivers creates unique challenges for CIOs and CISOs (chief information security officers) within both the public and private sectors (see next figure). While these are not the only drivers, they are of a magnitude that requires serious attention to compete in the cybersecurity arms race by managing risk and protecting assets. We ll now examine some of these drivers and challenges individually and their impact on businesses. Page 4
5 INCREASING SOPHISTICATION OF CYBERCRIME The increasing sophistication, frequency and scale of cybercrime is requiring public and private sectors to scale up their levels of protection across their operations and become more predictive to avoid becoming the next headline. One such illustration of this increasing sophistication was the Stuxnet worm, which was discovered in June 2010, and infected computer systems around the world. This worm was thought to have more than 4,000 functions, comparable to some commercial software. While Stuxnet may or may not have been government-sponsored, it s an example of the complexity of some of these worms. Symantec has monitored more than 40,000 Stuxnet infected IP addresses in 155 countries. In terms of frequency, cyber attacks have become common occurrences with companies. A recent Cisco study shows that 4.5 billion s and 80 million web requests are blocked every day and that 50,000 network intrusions are detected every day. A Ponemon study found that the average cost to the enterprise for a data breach was $3.4 million when factoring in detection and escalation, notification, response and lost business. This study excluded catastrophic data breach incidents to avoid skewing overall findings. All of this points to the challenge of business leaders in raising protection levels against cybercrime while reducing or maintaining costs. Page 5
6 CLOUD COMPUTING As organizations move towards cloud computing for the inherent agility and economic benefits this IT delivery model offers, they are increasingly moving towards hybrid enterprise environments that consist of a mix of cloud, non-cloud, internal and external IT service delivery models. This is due to the fact that not all application workloads, whether they are business-as-usual, mission-critical or highly innovative, are suited to cloud deployments and may need to remain within a more traditional model for reasons as varied as architecture, regulatory compliance and the location of stored data. This hybrid enterprise environment is more than just a hybrid cloud model consisting of two or more cloudbased entities. It is a composition of cloud, non-cloud, internal and external IT service delivery models that remain unique entities, but are bound together by an integrated management environment and common technology, processes and policies. The cybersecurity challenge for cloud computing is therefore not only to protect data within public clouds and hosted private clouds, but to ensure governance, risk and compliance is addressed across this fully integrated environment where applications and data may be highly virtualized across the end-to-end infrastructure. Page 6
7 RISE OF MOBILE DEVICES & APPLICATIONS The consumerization of IT, as noted by recent IDC research, exposes a broader array of end user or consumer devices in use within the enterprise, many of which are personally owned. There is also an ever increasing use of social computing technologies and platforms for internal and external collaboration. Research has revealed that information workers are using an average of four consumer devices and multiple third-party applications, such as social networking sites, in the course of their day. In addition, the number of connections via mobile devices is expected to reach nearly 9.7 billion by 2017, according to The Mobile Economy 2013, an A.T. Kearney report. The challenge for security practitioners is how to secure this increasingly porous and seemingly borderless enterprise, and manage the risks of lost or stolen devices, inadequate authentication of mobile workers, and unauthorized disclosure of confidential and sensitive data via social networks. CRITICAL INFRASTRUCTURE Organizations within critical infrastructure sectors provide the essentials of modern life and defend our national security. Their services impact national economic security, as well as national public health and safety. Many sector components influence or impact any combination of these critical national concerns. Cybersecurity is an integral part of overall critical infrastructure sector security, and governments are addressing the risks as a sector-wide challenge to minimize the potential impact on both public safety and the economy. Because these sectors touch so many aspects of how we live our lives and how business is conducted around the world, technology, connectivity and information exchange are three of the greatest challenges and essential aspects of company operations and processes within these sectors. However, the same technologies that make business operations and critical infrastructure processes more efficient can introduce new risks. As the world faces increased threats, critical infrastructure sectors need to increase their capability to manage cybersecurity risks and protect against the threat of unauthorized access to information for the purpose of causing a physical attack or disruption in the supply chain. LEAKAGE OF SENSITIVE DATA / INTELLECTUAL PROPERTY The leakage of sensitive data is another area that has been highly publicized. One of the most recent examples is the WikiLeaks saga related to the exposure of stolen classified U.S. diplomatic documents during which WikiLeaks shared these classified documents with newspapers such as The New York Times, Le Monde, Der Spiegel, and The Guardian. This highlights the increasingly complex issue of protecting intellectual capital and maintaining privacy. The U.S. alone has 50 states with a multitude of data breach laws and differing data protection practices. Sensitive data protection has to be addressed along with privacy while organizations move to the cloud, add more mobile devices and adopt social computing paradigms. Business leaders need to address how to secure and protect sensitive data no matter where it resides including realtime detection and prevention of unauthorized disclosures and how to strike the right balance between need to know and need to share. INCREASING REGULATORY ENVIRONMENT Organizations are also grappling with the expected impact of new security legislation and mandates applicable to the protection of critical infrastructures and key resources across all sectors. International committees have been wrestling with protecting the Internet without regulating it. There has been a significant amount of international discussion about what constitutes cyber war and what treaties need to be enacted. The dynamic has swung the pendulum from historically reactive monitoring to proactive, continuous monitoring for situational awareness. Another requirement is the migration to trust-based systems with built-in, end-to-end, security. TACKLING CYBERSECURITY IN THE ENTERPRISE Because cybersecurity and overall security, which includes physical or real world security, are so intricately linked, we believe it is important to have integrated strategies within the enterprise for both. An organization s strategy for prevention, detection and reaction should take a more holistic approach and be built on the Page 7
8 concept of a common operating picture and situational awareness across all fronts both cyber and noncyber. This supports a defense-in-depth approach where each layer of security, whether physical or logical, helps to ensure the overall security posture of the organization from society to sensor in critical infrastructure/process control networks where production environments are interconnected with corporate networks. The cybersecurity framework you choose or may already have in place will likely depend upon your specific industry and the countries in which you conduct business. While these frameworks can range from simple to complex, the main goal is to categorize the cybersecurity areas that should be secured and integrated as part of your overall approach. This, of course, should be in addition to following standards and compliance-based approaches and requirements such as the ISO series and ISA99/IEC62344, which provide best Page 8
9 practice recommendations on information security management. In fact, ISO/IEC 27032:2012 is a new standard that specifically addresses Information Technology/Security Techniques - Guidelines for Cyber Security. The previous figure illustrates the relationship between cybersecurity and other security domains to address in modern enterprises/organizations. ESTABLISHING A CYBERSECURITY MANAGEMENT FRAMEWORK In the context of this overall security strategy, it is important to understand the gaps and overlaps between cybersecurity and the other security domains. By having a logical cybersecurity management framework for understanding cybersecurity and the major domains it represents, enterprises can implement their cyber strategies and develop specific plans tailored for each domain. The challenge is far broader than simply addressing one issue such as securing mobile devices or securing cloud computing environments. By ensuring the cybersecurity strategy and logical framework addresses all of these interrelated issues, business leaders can be confident of a comprehensive approach. Additionally, a logical cybersecurity management framework and reference architecture for addressing cybersecurity can help an organization migrate from tactical, point solutions to a more coordinated set of tools and techniques, or systems approach, by seeing the big picture. The mission of a critical infrastructure cybersecurity management framework is cybersecurity risk management and reduction to provide open, secure information and industrial and control systems that protect employees and communities and facilitate business operations. Companies achieve the greatest number of benefits when a holistic system management approach is implemented. This guidance does not necessitate new stand-alone programs, but rather describes opportunities for reliance on and adaptation to other management frameworks. The fundamental objective is to use familiar management frameworks to enhance cybersecurity. Through an integrated approach, indirect benefits also can be anticipated. The enterprise, as well as the critical infrastructure domains, have unique industrial and control and information system characteristics. These characteristics combined with the value chain create a potential physical security impact. In general, a cybersecurity management framework should cover the following: Introduction: Introduces the overall topic of cybersecurity for the critical infrastructure sector. Statement of management practice: Identifies the scope and objectives of the key framework elements. Applicability of cybersecurity in the critical infrastructure sector: Describes cybersecurity objectives for the critical infrastructure sector, focusing on applicability to traditional IT assets, manufacturing and control systems, and critical infrastructure sector value chain components. General baseline practices: Outline common options for critical infrastructure sector companies to consider for benchmarking and enhancing cybersecurity practices. Additional or alternative practices may be required based on a company s individual circumstances. How critical infrastructure companies are approaching cybersecurity: Builds upon general baseline practices and describes some of the innovative approaches critical infrastructure sector companies are using to further enhance cybersecurity. Resources used: Lists sources for additional information as well as referenced documents. The figure below represents CGI s cybersecurity management framework for critical infrastructures based on international standards and industry best practices. This cybersecurity management framework is completely in line with the new USA NIST Cybersecurity Framework 2014 and even covers more elements than addressed in the NIST Cybersecurity Framework. Page 9
10 The following is a brief summary of 21 specific elements a cybersecurity management framework should address: 1. Importance of cybersecurity in operations: Describes the importance of having an awareness and understanding of the impact of cybersecurity on IT operations and risks. This extends to manufacturing and control systems, value chain operations, joint ventures, third parties, outsourcing partners, as well as business-related IT activities. 2. Scope of cybersecurity management framework: Notes that management must determine the scope of the framework. The scope can include all aspects of business information systems, manufacturing and control systems, and integration points with business partners, customers and suppliers. A management framework can be established to initiate and control the implementation and ongoing operations of cybersecurity within the company. 3. Security policies: Addresses the need for senior leadership commitment to continuous improvement through published policies. Providing policies to employees and reviewing them regularly is recommended. 4. Cybersecurity reference architecture: Addresses the principles, concepts and structures necessary for secure sites/plants. The main principle is defense-in-depth. Page 10
11 5. Risk identification, classification and assessment: Discusses the importance of identifying, prioritizing and analyzing potential security threats, vulnerabilities and consequences using accepted methodologies. 6. Risk management and implementation: Addresses the need to develop security measures that are commensurate with risks. The security measures may take into account inherently safer approaches to process design and engineering, as well as administrative, manual and procedural controls, and prevention and mitigation measures. The importance of risk mitigation is to convert all risk management plans into actions and have a program plan in place to monitor effectiveness. 7. Statement of applicability (SoA): Addresses the need to document the results of all security controls, as well as the elements of each security control. Documented results aid in the decisionmaking process, facilitate the communication of decisions, provide a basis for training and education, improve response time to incidents and threats, and provide a basis for subsequent self-assessment or auditing of the security control compliance. 8. Business continuity plan: Addresses the need for a course of action in responding to disasters, security failures and loss of services. Contingency plans should be developed, implemented and tested to help ensure that business processes are restored in a timely fashion. 9. Organizational security: Addresses the need to establish an organization, structure or network with responsibility for overall security, recognizing there are physical as well as cyber components involved. Organizational security requires accountability to be established to provide direction and oversight for a company s cybersecurity strategy. Cybersecurity in the broadest sense covers not only data but also systems (hardware and software) that generate or store this information and includes elements of physical security as well. Manufacturing and control systems specialists, value chain partners, third-party contractors, joint venture partners, outsourcing partners and physical security specialists can be considered by the organization as part of the overall security structure, and hence included in the scope of responsibility. 10. Personnel security: Describes security responsibilities at the recruitment phase and the inclusion of these responsibilities in all contracts and individual monitoring during employment. Recruits can be screened as part of the process, especially for sensitive jobs. Companies may consider having all employees and third-party users of information processing facilities sign a confidentiality or nondisclosure agreement. 11. Physical and environmental security: Addresses the protection of tangible or physical assets (e.g., locations, buildings, computers, networks, manufacturing processes equipment, etc.) from damage, loss, unauthorized access or misuse. Critical information or assets can be safeguarded by placing them in secure areas, protected by security perimeters and entry controls (security zones and conduits). These physical security controls work in conjunction with cybersecurity measures to protect information. 12. Information and network/ communication security: Addresses the protection of information and network/communication security assets from damage, loss, unauthorized access or misuse. Critical information or assets can be safeguarded by placing them in secure IT areas, protected by security perimeters and access controls (security zones and conduits). 13. Incident planning and response: Addresses the need to be vigilant in efforts to deter and detect any cybersecurity incident. If an incident occurs, the company needs to promptly respond and involve management and government agencies as appropriate. After investigating the incident, the company may consider incorporating key lessons and, if appropriate, share those lessons with others in the industry, as well as government agencies, and implement corrective actions. 14. Communications, operations and change management: Addresses the development of processes and procedures to ensure the security of computer systems and information processing facilities. Clearly articulating the operational security aspects can enhance these overall management practices and procedures. The need for security is very strong for manufacturing and control systems that are used to operate facilities because security lapses have the potential to result in safety, health or environmental issues. Page 11
12 15. Identity access management: Addresses account administration, authorization and authentication. Account administration involves the development of rules to ensure that users access to systems and data is controlled. There are rules that are enforced administratively, and those that are enforced automatically through the use of technology. Both kinds of rules are generally addressed as part of the overall access control strategy. Authorization addresses the need for businesses to establish and employ a set of authentication practices commensurate with the risk of granting unauthorized users, hosts, applications, services and resources access to critical system resources. Authentication describes the process of positively identifying network users, hosts, applications, services and resources for some sort of computerized transaction using a combination of identification factors or credentials. Authentication is the prerequisite to allowing access to resources in a system. 16. Information and document management: Addresses processes for data classification and the safeguarding of information, as well as document management processes associated with a cybersecurity management system. Document management is generally a part of a company s records retention and document management system. 17. System development and maintenance: Addresses the need for security to be built into the information system and sustained through normal maintenance tasks. 18. Staff training and security awareness: Describes how management commitment is critical to providing a stable computing environment for both information and manufacturing and control systems. Effective cybersecurity training and security awareness programs provide each employee with the information necessary to identify, review and remediate control exposures, and help ensure their own work practices are utilizing effective controls. 19. Compliance and privacy: Addresses scheduling and conducting audits, and compliance with legal, regulatory and contractual security requirements. A company should periodically assess its security programs and processes to ensure their adequacy and proper application. In appropriate circumstances, assessments should also be conducted with suppliers, logistics service providers, joint ventures or customers. In addition, to avoid breaches of criminal or civil law, as well as regulatory and contractual obligations, a compliance audit may be necessary. 20. Cybersecurity framework monitoring and review: Addresses the continuous monitoring and review of the cybersecurity management framework. Internal checking methods such as system audits, compliance audits and incident investigations help determine the effectiveness of the management framework and whether it is operating according to expectations. Finally, through a management review process, the company s senior leaders should asses the performance of the framework and identify any deviations from the goals, targets and objectives established during the planning process. If there are deviations or non-conformance, revisiting the original assumptions and/or taking appropriate corrective actions may be necessary. 21. Maintaining and implementing improvements: Describes the importance of maintaining and implementing improvements to the cybersecurity management framework. Because security practices continually evolve, company security programs and measures must evolve, reflecting new knowledge and technology. Ongoing tracking, measuring and improvements are key to ensuring security. SUMMARY AND RECOMMENDATIONS Cybersecurity is clearly much more than simply another name for IT security. In fact, it has been elevated by many governments, such as those in the U.S., Canada and Europe, to the level of a top-tier priority for economic and national security. These governments also recognize that cyberspace is woven into the fabric of our societies. In the civilian world, it has been named the fourth utility, alongside telecommunications, electricity, and water, and, in the military world, it is a strategic asset to be protected alongside land, sea, air and space. For businesses and governments alike, getting the cybersecurity posture right across all its elements is vital for future growth, innovation and competitive advantage. There is no single answer for success, but by working across public and private sector partnerships and by advancing security measures, particularly with Page 12
13 regard to mission-critical systems, processes and applications that are connected in cyberspace, businesses will be able to work towards a future environment that is open, secure and prosperous. Following are recommendations for improving your cybersecurity posture: Establish a logical cybersecurity management framework for enterprise and critical infrastructures: The challenge is far broader than simply addressing one issue such as securing mobile devices or securing cloud computing environments. An effective cybersecurity management framework addresses all of these interrelated issues, and business leaders can be confident of a comprehensive approach from society to sensor. Revisit plans related to governance, risk and compliance: Conduct a security assessment and revisit business continuity plans at the corporate level and at the process control network level as a defense against cyber attacks and determine alternate security controls and measures for critical business / production operations. Manage user/device identities and entitlements in a comprehensive, integrated approach: Centralized identity and access management applications that integrate user system access with user device management are the key to protecting cyber assets in a mobile environment. Be aware that there are no interdependencies between the corporate and process control levels. Develop a strategy for trusted identities that includes identity enablement and strong authentication across multiple platforms that are interoperable and resilient. Take into account the specific requirements for identity, device and access management in process control networks. Take a coordinated approach to sensitive data/intellectual property protection: Your plan should encompass a broad array of scenarios, including secure document access and delivery, encryption of data at rest and data in motion, data masking, and digital rights management, as well as more recent areas such as cloud computing and the use of social networks where sensitive data can be particularly at risk. Incorporate cybersecurity enhancements as an integral part of application modernization initiatives in critical infrastructure and plant/production designs: As mission-critical business applications are modernized in areas such as web, cloud and mobile enablement, it is important to review and potentially upgrade their security levels as well. Accordingly, cybersecurity in process control networks should specify end-to-end protection aligned with the corporate initiatives, with respect to the specific security and safety requirements in this critical infrastructure. Re-assess the integrity of your cyber supply value chain: Build a trusted relationship with suppliers and contractors at all levels in the supply chain and adopt best practices across systems and processes to protect against counterfeits and ensure the integrity of your end-to-end cyber value chain operations. Outsourcing partners, suppliers and contractors must assure and prove (through audits or third-party reviews) that they are at least on the same cybersecurity level in the supply chain. Take advantage of the built-in capabilities of today s next generation devices to better secure mobile users, devices and applications: In many cases, biometric techniques via voice, signature or even facial recognition can be used to provide strong, two-factor authentication as opposed to having to invest in expensive add-on hardware. Be aware of the different types of wireless communication: In computer networking, wireless communication such as WLAN has been used for many years. For close-range wireless communication, technologies such as RFID, Bluetooth or Zigbee are popular choices. Wireless technology is also entering the industrial automation market, with technologies for Wireless HART, Ethernet or PROFIBUS. ABOUT CGI A global business and IT leader, CGI has vast cybersecurity experience, managing cyber risks and attacks within our own data centers, as well as for the clients we serve. We provide end-to-end security services, including the following: Enterprise security management: Includes the governance, strategies, frameworks, plans and assessments necessary to develop and manage an effective enterprise-wide security program. Security architecting and engineering: Encompasses the architecture, design, development and deployment of cybersecurity solutions and services that secure your information assets and critical infrastructures. Page 13
14 Business continuity: Ensures that contingency plans and enablers are in place to keep your business running when disaster hits. Managed security services: Provide reliable protection from viruses, hacker intrusions, internal misuse/abuse, spam and other unwanted Internet traffic to prevent downtime and other productivity losses. Cloud security: Protects client data in a cloud computing environment. U.S. federal cybersecurity: Solutions and services that help U.S. federal agencies protect themselves from ever-evolving cyber attacks, including advanced analytics, computer network defense and federal identity management solutions. Industrial control systems cybersecurity: SECURE-ICS is CGI s approach and methodology for cybersecurity in industrial control system (ICS) environments. It is based on a risk assessment approach for industrial process automation and control system environments, as well a cybersecurity management framework. The framework is supported by cybersecurity reference guides, baseline standards and policies for plant managers and operators for ensuring proper implementation, monitoring and control. REFERENCES United Kingdom, Cyber Security Strategy, Information Week, Securing the Cyber Supply Chain, UK National Security Strategy, A Strong Britain in an Age of Uncertainty, Information Week, Top 10 Security Stories, 2010, Ponemon Institute, First Annual Cost of Cyber Crime Study, 2010, IDC, A Consumer Revolution in the Enterprise, ISO/IEC 27032:2012, Information Technology - Security Techniques - Guidelines for Cybersecurity, CGI, Cyber Security Management Framework for Critical Infrastructures, CGI, Cyber Security Reference Architecture for Critical Infrastructures, Symantec, Internet Security Threat Report, 2013 Ponemon Institute, Costs of Data Breach Study: Global Analysis, 2013 ATKearney, The Mobile Economy, 2013, Cisco, Annual Security Report, 2014 USA NIST, Cyber Security Framework for Critical Infrastructures, About CGI With 68,000 professionals operating in 400 offices in 40 countries, CGI fosters local accountability for client success while bringing global delivery capabilities to clients front doors. Founded in 1976, CGI applies a disciplined delivery approach that has achieved an industry-leading track record of delivering 95% of projects on-time and on-budget. Our high-quality business consulting, systems integration and managed services help clients leverage current investments while adopting new technology and business strategies that achieve top and bottom line results. As a demonstration of our commitment, our client satisfaction score consistently measures higher than 9 out of 10. Visit for more information. Page 14
Guidance for Addressing Cybersecurity in the Chemical Sector. Version 2.0 December 2004
Guidance for Addressing Cybersecurity in the Chemical Sector December 2004 Legal and Copyright Notice The Chemical Industry Data Exchange (CIDX) is a nonprofit corporation, incorporated in the State of
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?
Managing business risk
Managing business risk What senior managers need to know about business continuity bell.ca/businesscontinuity Information and Communications Technology (ICT) has become more vital than ever to the success
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
CYBER SECURITY Audit, Test & Compliance
www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
CGI Cyber Risk Advisory and Management Services for Insurers
CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
A HELPING HAND TO PROTECT YOUR REPUTATION
OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
State of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI
How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI CGI Cyber Protection & Resilience Solutions Optimized risk management and protection
White Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase
White Paper Architecting the security of the next-generation data center A White Paper by Bloor Research Author : Fran Howarth Publish date : August 2011 teams involved in modernization projects need to
www.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
Reliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
GEARS Cyber-Security Services
Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
INFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
CA Technologies Healthcare security solutions:
CA Technologies Healthcare security solutions: Protecting your organization, patients, and information agility made possible Healthcare industry imperatives Security, Privacy, and Compliance HITECH/HIPAA
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks
Cyber security: everybody s imperative A guide for the C-suite and boards on guarding against cyber risks Secure Enhance risk-prioritized controls to protect against known and emerging threats, and comply
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
Enterprise Risk Management taking on new dimensions
Enterprise Risk Management taking on new dimensions October 2006 The practice of Enterprise Risk Management (ERM) is becoming more critical and complex every day. There is a growing need for organizations
Cyber Security: Confronting the Threat
09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
CYBERSPACE SECURITY CONTINUUM
CYBERSPACE SECURITY CONTINUUM A People, Processes, and Technology Approach to Meeting Cyber Security Challenges in the 21 st Century 1 InterAgency Board 1550 Crystal Drive Suite 601, Arlington VA 22202
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.
Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB 2014-05. Cyber Risk Management Guidance. Purpose
FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB 2014-05 Cyber Risk Management Guidance Purpose This advisory bulletin provides Federal Housing Finance Agency (FHFA) guidance on cyber risk management.
Business resilience: The best defense is a good offense
IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction
Security. Security consulting and Integration: Definition and Deliverables. Introduction
Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data
Cybersecurity on a Global Scale
Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared
Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence
the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group
the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group 54 Banking PersPective Quarter 2, 2014 Responsibility for the oversight of information security and
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities
Industrial Cyber Security Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities WE HEAR ABOUT CYBER INCIDENTS EVERY DAY IN THE NEWS, BUT JUST HOW RELEVANT ARE THESE
CIO, CISO and Practitioner Guidance IT Security Governance
CIO, CISO and Practitioner Guidance IT Security Governance June 2006 (Revision 1, August 2007) 1 CIO, CISO and Practitioner Guidance Whatever your business, security and privacy are key matters that affect
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
2011 Cyber Security and the Advanced Persistent Threat A Holistic View
2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
