Supplier Vigilance: A Critical Layer of Defense



Similar documents
Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

U. S. Attorney Office Northern District of Texas March 2013

How To Protect Your Data From Being Hacked

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Cybersecurity: Learn Critical Strategies to Protecting Your Enterprise November 6, :00PM EST

September 20, 2013 Senior IT Examiner Gene Lilienthal

Practical Steps To Securing Process Control Networks

Cyber Security Metrics Dashboards & Analytics

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Cybersecurity Enhancement Account. FY 2017 President s Budget

Security and Privacy

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

SIEM is only as good as the data it consumes

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Information Security Addressing Your Advanced Threats

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Advanced Threats: The New World Order

Rich Baich Principal March 22, 2012

IBM Security Strategy

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

How To Handle A Threat From A Corporate Computer System

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Cyber-Security. FAS Annual Conference September 12, 2014

How do we Police Cyber Crime?

Agenda , Palo Alto Networks. Confidential and Proprietary.

Developing Secure Software in the Age of Advanced Persistent Threats

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council

WRITTEN TESTIMONY OF

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Security & privacy in the cloud; an easy road?

Cyber Security for Advanced Manufacturing Next Steps

Capabilities for Cybersecurity Resilience

Managing cyber risks with insurance

NATIONAL CYBER SECURITY AWARENESS MONTH

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Getting real about cyber threats: where are you headed?

Data Center security trends

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Presidential Summit Reveals Cybersecurity Concerns, Trends

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Partnership for Cyber Resilience

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

Data Breach Lessons Learned. June 11, 2015

Cybersecurity: What CFO s Need to Know

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

10 Smart Ideas for. Keeping Data Safe. From Hackers

Into the cybersecurity breach

Microsoft s cybersecurity commitment

A HELPING HAND TO PROTECT YOUR REPUTATION

Breaking the Cyber Attack Lifecycle

Evolving Uses of Technology: Mobility and Cybersecurity

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Cyber security in an organization-transcending way

Anti-exploit tools: The next wave of enterprise security

IBM Smarter Cities Cybersecurity Update

Chairman Johnson, Ranking Member Carper, and Members of the committee:

Speaker Info Tal Be ery

Collaboration for the Detection, Prevention, Mitigation and Response to Cyber Attacks

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Teradata and Protegrity High-Value Protection for High-Value Data

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

Advanced Threat Protection with Dell SecureWorks Security Services

The Cybersecurity Threat Protecting Big Data

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

Unknown threats in Sweden. Study publication August 27, 2014

Middle Class Economics: Cybersecurity Updated August 7, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Cybersecurity Awareness for Executives

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Effective Information Sharing and Analysis Process

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

I ve been breached! Now what?

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

How to Practice Safely in an era of Cybercrime and Privacy Fears

Working with the FBI

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cybersecurity The role of Internal Audit

Department of Homeland Security

Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development

ISOO Notice : Update on Recent Cyber Incidents at OPM

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Software that provides secure access to technology, everywhere.

Cybersecurity Awareness. Part 1

Cyber Security. The changing landscape. Financial Sector. March 4-5, 2014

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Data Breaches and Cyber Risks

Surviving the Ever Changing Threat Landscape

idata Improving Defences Against Targeted Attack

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Transcription:

Supplier Vigilance: A Critical Layer of Defense Lockheed Martin Information Security 1

Supply Chain Cyber Security Lockheed Martin October 23, 2013 Debbie Stuckey Waide Jones, CISSP 2

Synopsis Lockheed Martin security specialists Waide Jones and Debbie Stuckey will review the cyber security threat landscape and how it is affecting business. The speakers will discuss Lockheed Martin s efforts to manage the risk of sharing sensitive information with suppliers. They will review the importance of having an active cyber risk management program to include someone that is awake at the wheel to build and manage the program. 3

Agenda Cyber Threat Landscape Current and Future Legislation Lockheed Martin s Cyber Threat Approach Suggestions for Current Suppliers Resources for Suppliers looking to do business with Lockheed Martin or in the industry in general 4

Cyber Landscape? True or False - the cyber threats that my company faces are similar to the ones faced by Lockheed Martin and the Defense industry. True A&D is a Targeted Industry Companies of All Sizes Impact: Financial, Reputational, Loss of IP, Mission Disruption 5

Threat Major upswing in Cyber attacks Evolution from individual actors performing single attacks.to well funded military wave style attacks on information systems Industrial Espionage Nation Building Prime Contractors were the Initial target. Actors have shifted efforts to suppliers. 6

2014 Evolving Threats & Impacts Increasing potential impact Confidentiality Data theft Availability Denial of Service Integrity Destructive Increasingly Unstable Threats apt broadbased insider hacktivists rogue actors Increasingly Complex Ecosystem LM Core & Perimeter International Supply Chain Cloud & Mobile Media Coverage, Reputation Budget Pressure & Legislative Uncertainty 7

Gen 3 Gen 2 Gen 1 Advanced Persistent Threats Coordinated, trained Robust infrastructure Campaign-scale intrusions Objective: exfiltrate data Email Spoofing Parking lot entry vector Fake sites that look real Extranet server compromise Man-in-the- Mailbox Lateral movement Real websites with malware LM credentials stolen from suppliers Hyperlinks; wolf in sheep s clothing Factory floor; onboard systems Widespread watering holes Extranet server compromise; Denial of service Compromised 2-factor credentials 8

Legislation Executive Order 13636 Improving Critical Infrastructure Cyber Security Develops a technology-neutral voluntary cybersecurity framework, incentivizes the adoption of, Increases cyber threat information sharing Presidential Policy Directive (PPD 21) - Critical Infrastructure Security and Resilience - Advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure. Domestic and International Data Breach Legislation requiring suppliers and service providers to notify of cyber security issues and breaches in privacy 9

Did You Know?? Lockheed Martin s approach to working with suppliers on cyber security includes what elements? A- Working with suppliers to understand their cyber security posture B-Working to ensure our supply chain is aware of the cyber D threats facing our industry and companies C-Working with suppliers to reduce cyber risk to acceptable levels D All of the Above 10

Overall Strategy Objectives Understand Posture Build Awareness Reduce Risk Annual Aircraft Deliveries Known Supplier Security Posture Supplier Security Validation Supplier Threat Awareness Supplier Security Capability Uplift Move Defenses Upstream 11

Approach to Cyber Risk Management Cyber Security Questionnaire added to all full profiles in Exostar 28 cyber security posture questions Policy/Awareness Staffing System Maintenance/Controls Monitoring and Response Remote Access Suppliers responses used to help Lockheed Martin manage risk Provide weakness indicators to suppliers 12

Our Shared Responsibility Suppliers complete the Cyber Security Questionnaire in Exostar profile Ask once, share model Supplier Exostar Administrator has rights No responses to questions indicate a concern in supplier s ability to protect sensitive information Answers are secured and treated as proprietary Instructions on LM Supplier Cyber Security Webpage http://www.lockheedmartin.com/us/suppliers/cyber-security/posture.html 13

Reduce Risk Focus on Critical Information Questionnaire results serve as cyber risk input Validation/Deep Dive with key suppliers Integrated into programs/ business capture standard risk management processes Input for Program/Capture Technical Team 14

Two-way Communication Supplier Memos Supplier Cyber Security Webpage Ready Room Video Frequently Asked Questions (FAQ) Briefings http://www.lockheedmartin.com/us/suppliers/cyber-security.html http://www.lockheedmartin.com/us/suppliers/cyber-security.html 15

What can you do? 16

Educate Employees 1. Department of Homeland Security Dedicated Small Business Site for Cyber Risk Planning 2. United States CERT Distributable Materials for Education and Awareness 3. Stay Safe Online Tips and regularly updated info for businesses 17

Active Cyber Risk Management Institute an active Cyber Security Risk Management Program Someone Awake at the Wheel Threat and Risk appropriate Adversary doesn t care if you are small Care about the data they need Get involved in an information sharing forum InfraGard Information Sharing and Analysis Center (ISAC) Defense Security Information Exchange (DSIE) Lots of great resources available 18

Summary Threat / Target We are a targeted industry and you are a target Lockheed Martin is working with suppliers to enhance their ability to protect sensitive information Review Lockheed Martin Supplier Cyber page http://www.lockheedmartin.com/us/suppliers/cybersecurity.html Review Supplier Cyber FAQ http://myexostar.com/workarea/showcontent.aspx?id=2550 For existing Lockheed Martin Suppliers Complete the Cyber Security Questionnaire in your Exostar profile Someone awake at the wheel Understand and appropriately manage cyber risk as a component of overall business risk 19

20