PUBLIC SAFETY CYBER SECURITY



Similar documents
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Information Security and Risk Management

The Mile High Denver Chapter of ARMA welcomes you to our virtual meeting!

Defending Against Data Beaches: Internal Controls for Cybersecurity

WRITTEN TESTIMONY OF

CyberArk Privileged Threat Analytics. Solution Brief

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Information Security for the Rest of Us

Unknown threats in Sweden. Study publication August 27, 2014

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

2012 Bit9 Cyber Security Research Report

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

September 20, 2013 Senior IT Examiner Gene Lilienthal

Is your SIEM ready.???

Who s Doing the Hacking?

How To Understand Cyber Security

Cybersecurity Awareness. Part 1

Protecting What Matters Most. Terry Ray Chief Product Strategist Trending Technologies Session 11

Security and Privacy

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES. Strengthening Your Community at the Organizational Level

Evolution Of Cyber Threats & Defense Approaches

Malware. Stopping cyberattacks. Sponsored by

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

CYBER SECURITY INFORMATION SHARING & COLLABORATION

I ve been breached! Now what?

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

After the Attack. The Transformation of EMC Security Operations

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Stay ahead of insiderthreats with predictive,intelligent security

Into the cybersecurity breach

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

90% of health insurers surveyed have had a data breach 3. 72% increase in cyberattacks against healthcare companies occurred between 2013 and

Incident Response. Proactive Incident Management. Sean Curran Director

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Spear Phishing Attacks Why They are Successful and How to Stop Them

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

Advanced Threats: The New World Order

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Defending Against Cyber Attacks with SessionLevel Network Security

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats

Fighting Advanced Threats

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

Middle Class Economics: Cybersecurity Updated August 7, 2015

Cyber Security Management

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Hunting for Indicators of Compromise

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

Ed McMurray, CISA, CISSP, CTGA CoNetrix

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

EY Cyber Security Hacktics Center of Excellence

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

CYBER SECURITY THREAT REPORT Q1

The Role of Security Monitoring & SIEM in Risk Management

SCAC Annual Conference. Cybersecurity Demystified

Solution Path: Threats and Vulnerabilities

67% 61% STATE OF CLOUD SECURITY BULLETIN. Information Security in the Energy Sector. Summer 2013 FROM APR SEP 2012

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES. second edition

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

National Cybersecurity Awareness Campaign

U. S. Attorney Office Northern District of Texas March 2013

Defense Security Service

Cyber-Security. FAS Annual Conference September 12, 2014

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

CYBERSECURITY HOT TOPICS

Perspectives on Cybersecurity in Healthcare June 2015

Advanced Persistent Threats

Perspectives on Cyber Security Strategies & Tactics

Trends in Advanced Threat Protection

A Case for Managed Security

Seven Strategies to Defend ICSs

Don t Fall Victim to Cybercrime:

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015

WELCOME TO THE ITS-NY 22 nd ANNUAL MEETING AND TECHNOLOGY EXHIBITION

Advanced & Persistent Threat Analysis - I

The State of Cyber Security Today. Jeffrey Man

Cybersecurity Health Check At A Glance

Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Presented By: Corporate Security Information Security Treasury Management

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Transcription:

APCO Emerging Technology Forum PUBLIC SAFETY CYBER SECURITY John Facella, P.E., C. Eng. Senior VP, RCC Consultants 3 December 2013

Agenda It Won t Happen to Me Issues in Cybersecurity What to do Right Now Summary Resources

The Threat is Real, Every Day, Every Hour November 20, 2013 Cupid Media Data Breach Affects Millions of Accounts March 13, 2013 APCO reports Denial of Service Attacks on PSAPs

Per Mandiant 243 days = median time before advanced attackers in the network are detected 46% of compromised machines have no malware 100% of compromised machines have antivirus software 100% of breaches involved stolen credentials Source: www.mandiant.com

Per Verizon s 2013 Data Breach Report 66% took months to discover 92% of breaches perpetrated by outsiders 76% exploit weak/stolen credentials; 29% leverage social tactics 96% of espionage cases attributed to China 95% of state espionage used phishing 70% of breaches discovered by 3 rd parties Source: http://www.verizonenterprise.com/dbir/2013/

CyberArk Privileged Passwords in Critical Systems can be a problem Surveyed nearly 1,000 global executive and IT security professionals 80 % consider cyberthreats a greater risk to their country than physical attacks 51% believe that a cyberattacker is currently or has infiltrated their corporate network within the past year Source: http://cyberark.com

How it Works Network Servers Legitimate User Network Firewalls Not Easy to Penetrate Attacker Other Legitimate Users

How it Works Network Servers Legitimate User Other Legitimate Users Network Firewalls Attacker with stolen access credentials of legitimate User

Common Themes Attacker gains legitimate user credentials Circumvents most Defense in Depth protections like firewalls, closed backdoor ports, etc. Only clue will be what they do while masquerading (abnormal behavior for that user) Discovery takes months

Agenda It Won t Happen to Me Issues in Cybersecurity What to do Right Now Summary Resources

These Issues are Not New 1970: Report of the Defense Science Board Task Force on Computer Security, Chairman Willis Ware: "It is important to influence designers of future computers and software so that security controls can be installed before the fact and as an integral part of the system. It is also important to ascertain what can be done with equipment presently installed or owned by the government." http://csrc.nist.gov/publications/history/ware70.pdf (from SANS Newsbites 26 Nov. 2013) 1989: The Cuckoo s Egg by Cliff Stoll

Some Issues Very Difficult to Deal With Fake Computer Chips See IEEE Spectrum October 2013, pgs. 40-45 Chips with hidden security flaws "The majority of application-specific integrated circuits are manufactured outside the United States...People could be putting flaws in these chips that they can activate. Jim Howard, director and chief engineer of information assurance at L-3 Communications (IEEE Spectrum 6 Jan. 2010, Creative Winners in Hardware Trojan Contest )

Why the Cyber threat to the PSBN is Different & Unprecedented Silos removed on >50K public safety communications systems = massive increase in threat actor reward Large number of threat actors: Nation-states Terrorists Corporate Espionage Criminals Hacktivists (e.g., Anonymous) Disgruntled employees Nuisance & thrill seekers Threat Sophistication

Why the Cyber threat to the PSBN is Different & Unprecedented Multiplicity of user agencies = varying policies, resources, regulations Federal, state, local Law enforcement: sheriffs, police, state police, state patrol Fire: career, combination, part-time, volunteer and paid-on-call EMS: fire based, hospital based, volunteer, private ambulance (HIPAA) Utility companies, transportation agencies?? The PSBN will be a complex network of enode B base stations, servers and gateways, passing terrabytes of data Bring Your Own Device (BYOD) Bring Your Own Application (BYOA) Image: Blogs.Norman.com

Emerging Threat Trends It s beyond Denial of Service Attacks, which in fact may mask real attacks harder to detect Digital certificate structure is now suspect Traditional blacklisting based on signatures inadequate Attacks appearing that neuter defense capabilities (e.g., anti-forensics, misattribution of malware) Advanced Persistent Threats (APT) growing

Emerging Threat Trends Horizontal mechanisms that impact multiple assets simultaneously (e.g., the cloud) Cloud based computing has serious security implications, yet many agencies are moving toward it to save $ New Technologies (e.g. new HTML5 web specification includes device geolocation)

Changing Our Approach Move from compliance models, frameworks, and risk management, to actively fixing security flaws Continue prevention ( defense in depth ) but must add prediction, detection, response, intelligence capabilities Benchmark time to detection and time to mitigation Defensive, reactive only solutions inadequate

Security Risk Management National Infrastructure Protection Plan Risk Management Framework Prioritize based on likelihood Source: www.dhs.gov/homeland-infrastructure-threat-and-risk-analysis-center

Agenda It Won t Happen to Me Issues in Cybersecurity What to do Right Now Summary Resources

What to Do NOW Educate Users to the threat of Phishing Attacks Introduce DHS Stop-Think-Connect program Implement and Enforce Policies on: Forced Periodic Password changes Strong Passwords (phrases including special characters, easy to remember) Use of Thumb Drives VPNs Strangers Using Agency Computers User Supplied Devices (BYOD) User Supplied Applications (BYOA) Implement the first 4 SANS Critical Security Controls, and plan to implement the next 4 soon

Agenda It Won t Happen to Me Issues in Cybersecurity What to do Right Now Summary Resources

Summary Security is a continuous journey, and measures/countermeasures are constantly changing You will never be 100% secure Constant vigilance needed Difficult to add on security Bad guys are getting badder Move focus to fixes from compliance reports Traditional Security in Depth no longer enough Single solution/vendor inadequate Public Safety and the FirstNet PSBN system will represent a unique target to defend, and needs careful thought on how to implement security measures, some of which may not exist today There are measures every agency can start taking, RIGHT NOW Stop-Think-Connect The first few SANS Critical Controls

Agenda It Won t Happen to Me Issues in Cybersecurity What to do Right Now Summary Resources

Resources UTC Journal, 1 st Quarter 2013 (devoted to Cybersecurity) Verizon 2013 Data Breach Investigations Report CyberWar, Richard A. Clarke, Harper Collins, 2010 Mandiant report on China s hacking organization, www.mandiant.com SANS Newsbites SANS 20 Critical Security Controls: www.sans.org/critical-security-controls NPTSC BB Security Working Group white paper NFPA 1221, 2013 edition, Chapter 13 Data Security, and proposed Chapter 13 for 2016 edition

Resources Homeland Security Newswire: www.homelandsecuritynewswire.com/topics/cybersecurity www.dhs.gov/stopthinkconnect IACP Cyber Center: http://www.iacpsocialmedia.org/portals/1/documents/fact%20sheets/cyber%2 0center%20fact%20sheet.pdf FBI s Cyber Shield Alliance RCC s NIST cybersecurity white paper: www.rcc.com/resources/archive/04-08- 2013-RCC-NIST-Cybersecurity.pdf

Q & A Follow APCO at facebook.com/apcointernational @apcointl

Thank You! John Facella jfacella@rcc.com