Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015



Similar documents
IT Insights. Managing Third Party Technology Risk

Service Organization Controls. Managing Risks by Obtaining a Service Auditor s Report

Cybersecurity: Protecting Your Business. March 11, 2015

Vendor Management Best Practices

Managing data security and privacy risk of third-party vendors

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Privilege Gone Wild: The State of Privileged Account Management in 2015

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

SOC Readiness Assessments. SOC Report - Type 1. SOC Report - Type 2. Building Trust and Confidence in Third-Party Relationships

VENDOR MANAGEMENT. General Overview

Cybersecurity and Privacy Hot Topics 2015

2010 Data Breach Investigations Report

Privilege Gone Wild: The State of Privileged Account Management in 2015

SECURITY RISK MANAGEMENT

Service Organization Controls. Managing Risks by Obtaining a Service Auditor s Report

Information for Management of a Service Organization

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Security Risk Management Strategy in a Mobile and Consumerised World

SECURITY AND EXTERNAL SERVICE PROVIDERS

SSAE 16 Everything You Wanted To Know But Are Afraid To Ask. Kurt Hagerman CISA, CISSP, QSA Managing Director, Coalfire December 8, 2011

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

SECURITY CONSIDERATIONS FOR LAW FIRMS

Top Ten Technology Risks Facing Colleges and Universities

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

SAS No. 70, Service Organizations

Preemptive security solutions for healthcare

Cybersecurity and internal audit. August 15, 2014

Third Party Risk Management 12 April 2012

How To Protect Yourself From A Hacker Attack

Information Security and Risk Management

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

SERVICE ORGANIZATION CONTROL REPORTS SM. Formerly SAS 70 Reports

Brief. The BakerHostetler Data Security Incident Response Report 2015

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Risks in the Boardroom

Pursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES

Altius IT Policy Collection Compliance and Standards Matrix

FINRA Publishes its 2015 Report on Cybersecurity Practices

How to ensure control and security when moving to SaaS/cloud applications

What Directors need to know about Cybersecurity?

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Customer-Facing Information Security Policy

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Understanding the Business Risk

Session 9: 20 Questions You Should Answer About Your Cyber Security Readiness Jeff Thomas, Partner, KPMG Ivan Alcoforado, Senior Manager, KPMG

Privacy Rights Clearing House

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Logging In: Auditing Cybersecurity in an Unsecure World

Cloud Security Trust Cisco to Protect Your Data

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

Best Practices for Information Security and IT Governance. A Management Perspective

Understanding SOC Reports for Effective Vendor Management. Jason T. Clinton January 26, 2016

Application Security in the Software Development Lifecycle

10 Smart Ideas for. Keeping Data Safe. From Hackers

How To Be A Successful Compliance Officer

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

RISK MANAGEMENT PROGRAM THAT WORKS FOUR KEYS TO CREATING A VENDOR. HEADQUARTERS 33 Bradford Street Concord, MA PHONE:

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

The Value of Vulnerability Management*

Ed McMurray, CISA, CISSP, CTGA CoNetrix

CGI Cyber Risk Advisory and Management Services for Insurers

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

Navigating the NIST Cybersecurity Framework

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Cybersecurity: What CFO s Need to Know

Network Security & Privacy Landscape

Microsoft s Compliance Framework for Online Services

Big Data, Big Risk, Big Rewards. Hussein Syed

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Cloud Computing An Auditor s Perspective

Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.

The Elephant in the Room: What s the Buzz Around Cloud Computing?

The Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011

Uncheck Yourself. by Karen Scarfone. Build a Security-First Approach to Avoid Checkbox Compliance. Principal Consultant Scarfone Cybersecurity

Transcription:

Risky Business Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

What We ll Cover About Me Background The threat Risks to your organization What your organization can/should be doing The role of cyber counterintelligence About Weaver 2

About Me Brittany George, CISA, QSA Weaver Senior Manager IT Advisory Services Provides security, SOC, IT audit (GRC), security and process improvement consulting services More than 11 years experience in IT auditing, security, and consulting (TXU/Capgemini Energy, KPMG, Weaver) BS in MIS from the University of Oklahoma Boomer Sooner! Board Member, ISACA North Texas 3

Disclaimer The comments and statements in this presentation are the opinions of the speakers and do not necessarily reflect the opinions or positions of Weaver and Tidwell, LLP. This presentation is the property of Weaver and Tidwell, LLP. All rights reserved. No part of this document may be reproduced, transmitted or otherwise distributed in any form without written permission from Weaver and Tidwell, LLP. Weaver and Tidwell, LLP expressly disclaims any liability in connection with the use of this presentation or its contents by any third party. 4

Some organizations will be a target regardless of what they do, but most become a target because of what they do.

If your organization is indeed a target of choice, understand as much as you can about what your opponent is likely to do and how far they are willing to go. -2013 DBIR, pg. 48

Background In 2015, there are two kinds of companies: those that have been breached those that know they ve been breached 7

Background Who are the victims of breaches? 38% larger organizations + 37% financial organizations + 24% retail and restaurants 20% manufacturing, transportation, utilities + 20% professional services firms + 8

The Threat Who are the bad guys? Depends on what information assets or systems you have. Could be: Nation states like China, Russia, Iran, North Korea Hacktivists (Anonymous, Wikileaks) Terrorist organizations Organized crime 9

The Threat What do they want? Depends on what information assets or systems you have. Could be: Defense secrets Disruption of critical infrastructure Trade secrets and intellectual property Confidential information about your organization, your business dealings, or your customers Exploitable consumer financial information 10

The Threat How do breaches occur? 52% some form of hacking 76% exploitation of weak or stolen credentials 40% malware 35% physical attacks + 29% social tactics + 13% privileged misuse or abuse 11

The Threat What are the commonalities? Financial motives Targeted user devices Compromised servers Opportunistic attacks Discovery by external parties Time of discovery is multiple months Low difficulty of initial intrusion 12

Risk to Organizations Key risks to cyber theft: Liability for loss of confidential information, loss of private consumer information, business interruption, or even loss of human life Loss of intellectual property / trade secrets / competitive advantage Damage from loss of confidentiality Reputational damage 13

Polling Question #1 14

Risk Impact Gone are the days we could bury our heads in the sand 16

Risk Impact Gone are the days we could bury our heads in the sand Liability is increasing: Target Yahoo CF Disclosure Guidance: Topic No. 2 Cyber Security 17

Becoming a Target 18

Becoming a Target 19

Becoming a Target 40 Million credit / debit cards 46% Drop in profit 4Q 2013 $200 million lost by banks reissuing cards $100 million planned by Target to upgrade to Chip and Pin cards 1 HVAC Vendor with network access Gained access to the system by using stolen credentials from a third-party vendor. A refrigeration and heating company near Pittsburgh whose data connection to Target was purely for billing, contract submission, and project management. 20

Would your risk management program identify this vendor as high risk? 21

What do we do? 22

Prevention is ideal, detection is a must! 23

What to Do Organizations should: Classify data Implement an ISMS Implement tools to identify security events Perform periodic security assessments based on the specific threats Consider cyber counterintelligence 24

It begins with Risk Identification

Risk Identification

Lifecycle of a Risk Event Risk identification seeks to identify and address risks here instead after they have impacted the company of reacting to risk events here Stage 1 - Root Cause Event Signal Stage 2 - High Risk Environment Stage 3 - Root Cause Event Stage 4 - Risk Realization and Consequence Stage 5 - Management / Mitigation Factors/signals are present that create a high risk environment. Can be identified through monitoring of Key Risk Indicators A high risk environment has resulted from the signals identified in Stage 1. High potential for root cause event. An event occurs that creates potential for significant risks to be realized. A significant risk event occurs, impacting the company. A snowball effect can occur, causing risks to multiply at this stage: Management evaluates outcome and establishes mitigation strategy to avoid future risk. Reputation risk Fraud risk 27

Lifecycle of a Risk Event Stage 1 - Root Cause Event Signal Stage 2 - High Risk Environment Stage 3 - Root Cause Event Stage 4 - Risk Realization and Consequence Stage 5 - Management / Mitigation Tire pressure is low Flat tire Car Accident Increased insurance cost Switch insurance providers Relegated to high risk pool Inability to negotiate terms Wait for accident to clear from record Take defensive driving Check tire pressure regularly 28

Lifecycle of a Risk Event If the risk had been identified here through monitoring of Key Risk Indicators Stage 1 - Root Cause Event Signal Stage 2 - High Risk Environment Stage 3 - Root Cause Event Stage 4 - Risk Realization and Consequence Stage 5 - Management / Mitigation Tire pressure is low Flat tire Car Accident Increased insurance cost Switch insurance providers Relegated to high risk pool Inability to negotiate terms Wait for accident to clear from record Take defensive driving Check tire pressure regularly 29

Lifecycle of a Risk Event If the risk had been identified here through monitoring of Key Risk Indicators the cause event may never have occurred Stage 1 - Root Cause Event Signal Stage 2 - High Risk Environment Stage 3 - Root Cause Event Stage 4 - Risk Realization and Consequence Stage 5 - Management / Mitigation Tire pressure is low Flat tire Car Accident Increased insurance cost Switch insurance providers Relegated to high risk pool Inability to negotiate terms Wait for accident to clear from record Take defensive driving Check tire pressure regularly 30

Lifecycle of a Risk Event If the risk had been identified here through monitoring of Key Risk Indicators the cause event may never have occurred and the risk may never have been realized. Stage 1 - Root Cause Event Signal Stage 2 - High Risk Environment Stage 3 - Root Cause Event Stage 4 - Risk Realization and Consequence Stage 5 - Management / Mitigation Tire pressure is low Flat tire Car Accident Increased insurance cost Switch insurance providers Relegated to high risk pool Inability to negotiate terms Wait for accident to clear from record Take defensive driving Check tire pressure regularly 31

Polling Question #2 32

Third Party Cyber Risk The biggest challenge is getting the data! 34

Third Party Cyber Risk The biggest challenge is getting the data! You may have to create a process to obtain it. 35

Risk Assessment

Risk Definitions Risk Assessment is NOT the same as Risk Management. IDENTIFY & EVALUATE Risk Assessment: The process of identifying and evaluating individual risks for the purpose of determining risk responses. VS. RESPOND & MANAGE Risk Management: The process of identifying, assessing and responding to risk on an ongoing basis. Requires building the processes to manage the risk. 37

Risk Assessment How Build a high-level risk profile for existing third parties and rate it Establish risk factors and evaluate each vendor against relevant risk factors For example, customized to your environment Financial Regulatory Operational Reputation Do further investigations based on risk assessment Establish a more detailed risk assessment based on investigations, not only a rating but a description of the potential risks 38

Evaluating Cyber Risk The process of identifying risk upfront (for example, WHILE you evaluate third parties) Build a program, periodic risk identification considerations Example of risk identification program: Vendor profiling Financial stability Control environment Technology environment Dependency Access to information / intellectual property Critical in supply chain Regional risk Operational characteristics Regulatory / compliance interaction 39

Other Types of Risk 40

Risk Response

Develop Risk Responses When developing responses, management considers four alternative responses: REDUCE ACCEPT AVOID SHARE Implement mitigating controls Take no positive action to mitigate the risk Stop engaging in any activity that creates the risk Share the risk with ta third party, e.g., insurance policies As a part of this process, management: Evaluates costs/benefits of available risk responses Analyzes whether risk responses appropriately reduce risk to tolerable level Selects most appropriate risk response based on risk appetite, risk tolerance, and evaluation of portfolio risk 42

Common Third Party Assurance What is the specific scope of each? SOC 1 What are the areas of overlap? What are the unique areas for each audit type? ISO 27001 SOC 2 & 3 What are some other third party IT audits? PCI DSS 43

Standards and Names Trust Services Principles and Criteria Services Org Control 1 (SOC 1) SSAE16 Service auditor guidance Service Org Control 2 (SOC 2) AT 101 Service Org Control 3 (SOC 3) AT 101 Restricted Use Report (Type I or II report) Generally a Restricted Use Report (Type I or II report) General Use Report (with a public seal) PURPOSE: Reports on controls for F/S audits PURPOSE: Reports on controls related to compliance or operations PURPOSE: Reports on controls related to compliance or operations Note: The SOC 3 report is the SystTrust for Service Organizations. 44

SOC 1 SM Report Restricted Use Services Org Control 1 (SOC 1) SSAE16 Service auditor guidance Restricted Use Report (Type I or II report) PURPOSE: Reports on controls for F/S audits Report on controls at a service organization relevant to a user entity s internal control over financial reporting Contents of report package: Description of service organization s system CPA s opinion on fairness of description, suitability of design, operating effectiveness of controls 45

SOC 2 SM Report Restricted Report Service Org Control 2 (SOC 2) AT 101 Generally a Restricted Use Report (Type I or II report) PURPOSE: Reports on controls related to compliance or operations Report on controls at a service organization relevant to security, availability, processing integrity, confidentiality or privacy Example: A Software-as-a-Service (SaaS) or Cloud Service Organization that offers virtualized computing environments or services for user entities and wishes to assure its customers that the service organization maintains the confidentiality of its customers information in a secure manner and that the information will be available when it is needed. 46

SOC 2 SM Report 5 Trust Services Principles Security The system is protected against unauthorized access (both physical and logical) Availability The system is available for operation and use as committed or agreed Processing integrity System processing is complete, accurate, timely and authorized Confidentiality Information designated as confidential is protected as committed or agreed Privacy Personal information is collected, used, retained, disclosed and disposed of in conformity with the commitments in the entity s privacy notice, and with criteria set forth in Generally Accepted Privacy Principles (GAPP) issued by the AICPA and Canadian Institute of Chartered Accountants 47

SOC 3 SM Report General Use Service Org Control 3 (SOC 3) AT 101 General Use Report (with a public seal) PURPOSE: Reports on controls related to compliance or operations Trust Services Report for Service Organizations Contents of report package: CPA s opinion on whether entity maintained effective controls over its system A seal can be issued on service organization s website 48

What s the difference between Type 1 and Type 2? Both report on the fairness of the presentation of management s description of the service organization s system, and Type 1 Reports on the suitability of the design of the controls to achieve the related control objectives included in the description as of a specified date (i.e. as of June 30, 2013) VS. Type 2 Also reports on the suitability of the design and operating effectiveness of the controls to achieve the related control objectives included in the description throughout a specified period (6 to 12 months) 49

Relying on an Audit Key Considerations Confirm the type of report, its purpose and its scope Evaluate the coverage within the report in relation to the areas of concern based on risk Have the right personnel evaluate the reports Push back and insist on performing your own audit (when necessary) Validate the external audit firm 50

Other Assurance The ultimate risk response is an ongoing program that identifies, assesses and responds to cyber risk Data classification and protection Preventative and detective measures Evaluating and monitoring partner relationships 51

Cyber Risk Considerations Key Focus Areas Intelligence-driven security and risk management Proactive versus Reactive Intelligence collections that enhance audit Are policies and controls effective? Validate internal threat and risk assessments Are our perceived threats real and did we prioritize them correctly? 52

About Weaver

About Weaver 500+ 500 54

IT Advisory Services At a Glance Software Selection IT Risk Assessment IV&V IT Audit Resource Optimization General Controls Application Controls Project Risk Management Service Organization Control Risk Management Information Payment Card Security Industry (PCI) Data Privacy Gramm-Leech Bliley Security & Availability Business Continuity/ Disaster Recovery Sarbanes-Oxley HIPAA FFIEC & FDICIA Compliance 55

Brittany George, CISA, QSA Senior Manager, IT Advisory Services Tel: 972.448.9299 Brittany.George@Weaver.com Discussion