A Cyber Security Integrator s perspective and approach



Similar documents
Defending Against Data Beaches: Internal Controls for Cybersecurity

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Cyber Security solutions

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Italy. EY s Global Information Security Survey 2013

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

IBM Security Strategy

Cyber Security and Critical Information Infrastructure

Advanced Threat Protection with Dell SecureWorks Security Services

Common Cyber Threats. Common cyber threats include:

External Supplier Control Requirements

Cybersecurity Awareness. Part 1

Protecting against cyber threats and security breaches

Protecting Your Organisation from Targeted Cyber Intrusion

Microsoft s cybersecurity commitment

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Defending Against Cyber Attacks with SessionLevel Network Security

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

GEARS Cyber-Security Services

FORBIDDEN - Ethical Hacking Workshop Duration

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Unit 3 Cyber security

Evolution Of Cyber Threats & Defense Approaches

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Cyber security Building confidence in your digital future

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Fighting Advanced Threats

THE HUMAN COMPONENT OF CYBER SECURITY

September 20, 2013 Senior IT Examiner Gene Lilienthal

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

idata Improving Defences Against Targeted Attack

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

A practical guide to IT security

Cybersecurity: What CFO s Need to Know

IT Security Risks & Trends

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Loophole+ with Ethical Hacking and Penetration Testing

Nine Steps to Smart Security for Small Businesses

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

CYBER SECURITY Audit, Test & Compliance

CYBERSPACE SECURITY CONTINUUM

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Reliable, Repeatable, Measurable, Affordable

AUTOMATED PENETRATION TESTING PRODUCTS

Stay ahead of insiderthreats with predictive,intelligent security

CYBER CRIME & SECURITY SURVEY REPORT 2012_

Data Security Incident Response Plan. [Insert Organization Name]

The Information Security Problem

Microsoft Security Intelligence Report volume 7 (January through June 2009)

How-To Guide: Cyber Security. Content Provided by

Information Security Incident Management Guidelines

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Cybersecurity Workshop

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Cybersecurity on a Global Scale

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Top tips for improved network security

The Human Component of Cyber Security

The Cyber Threat Profiler

Report on CAP Cybersecurity November 5, 2015

Advanced Persistent Threats

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

ICS-CERT Incident Response Summary Report

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Cyber security and critical national infrastructure

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Into the cybersecurity breach

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

FERPA: Data & Transport Security Best Practices

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Jort Kollerie SonicWALL

McAfee Security Architectures for the Public Sector

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Beyond the Hype: Advanced Persistent Threats

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Transcription:

A Cyber Security Integrator s perspective and approach Presentation to Saudi Arabian Monetary Agency March 2014

What is a Cyber Integrator? Security system requirements - Finance Building a specific response Benefit from wider system collaboration

What is a Cyber Integrator? Security system requirements - Finance Building a specific response Benefit from wider system collaboration

Threats, vulnerabilities and underlying information technology are changing at a ferocious pace; so must all the countermeasures Hardening Viruses Trojans Botnets Phishing Waterhole Man in the email Intrusion detection Policy Certification Malware analysis Training Anomaly detection And in complex environments, no single product or service specialist can keep up

A Cyber Integrator is typically a systems integrator and manufacturer with a broad perspective of security requirements Defence (National & NATO) Banking & Insurance National Security Agencies Healthcare Governments & institutions Transport & Utilities Law Enforcement Prime Contractors Telecommunications Large Enterprises

A practiced Cyber Integrator seeks to diagnose before prescribing Level of threat X Level of vulnerability = Extent of security measures required Understand factors, methods and history Understand technical vulnerabilities and weaknesses in security governance and user habits Driven by nature and extent of measures required to achieve desired security In some cases, an annual check up Is sufficient. In others, constant monitoring is recommended!

A Cyber Integrator takes a systems engineering approach SOLUTIONS ARE BUILT ON: Customer desired business objectives Customers direct threats and vulnerabilities Customers indirect risks and challenges Engineered solutions and services

Clients suffering data loss, theft and cyber attack with serious to existential consequences Compromising Ability to Perform Intellectual Property Theft Threatening Reputation Loss of Financial Control Affecting Compliance Status Ability to Recover Threat to Human Safety

This is the big picture From the 2013 Data Breach Report With the kind permission of Verizon

Selex ES: What is a Cyber Integrator? Security system requirements - Finance Building a specific response Benefit from wider system collaboration

The Banks and other Financial Institutions in Saudi Arabia are beset by the same global issues Customer Tactics Techniques Procedures Weapons Cash machine Phone Contact with Central bank Online Branch Relentless Spam Socially engineered Botnet Attack Phishing Waterhole Spam Reconnoitre Penetrate Sleep Propagate Control Transmit Virus Trojan Worm Rootkit Logger Dialler VANDALS Break PROTEST Destroy THIEVES Steal SPIES Front office Operations Insider Attack Insider Transform Toolkits Cheat NATIONS Executive IT and Administration Back office Operations Internal Contractors Impair Bought-in Services Trusted Partners

And the evidence suggests that the finance sector attracts the very best talent of the wrong sort Banking Fraud Face to face Online payment Man in the email (China, Nigeria and South Africa) Account takeover Automated clearing Global fraud losses linked to ACH and wire fraud for banking institutions $455 million 2012 2013 projection - $523 million 2016 projection - $795 million Corporate finance Mobile banking and financial transaction threats

And the sector shares common vulnerabilities POORLY INSTALLED https:// FIREWALLS USING DEFAULT PASSWORDS POORLY PROTECTED CUSTOMER DATA AT REST INSUFFICIENT ENCRYPTION https:// OF DATA IN TRANSIT POORLY MAINTAINED ANTI-VIRUS AND IPS/DLP SYSTEMS POORLY MAINTAINED APPLICATIONS AND SYSTEMS LOOSE NEED TO KNOW POLICY LOOSE UNDERSTANDING OF NETWORK ACTIVITY IRRATIONALLY APPLIED ORGANISATION SECURITY POLICY

And from this we start to build up a master set of environment challenges People Level of Damage Tolerance of Damage Tools Processes Systems Drivers Techniques Culture Technology Procedures Organisation Vulnerabilities Threats And then we start to build the appropriate responses

A Cyber Integrator draws on a coherent set of services designed to address threats and resolve vulnerabilities CYBER DOCTRINE Respond CYBER SERVICES Contain Detect Eradicate Prevent Resist Recover Assess Assure Protect Defend Learn Assessment Guidance Remediation Vulnerability Projects Maturity Policy Certification Training System hardening System provision Managed Services Enterprise protective monitoring Managed Services Incident response forensics COMPETITIVE ADVANTAGE. INFORMATION SUPERIORITY.

Taking an Integrators approach, we then develop the Advisory, Skills transfer, Change and enduring Services solution to meet the need. Level of threat X Level of vulnerability = Extent of security measures required Understand factors, methods and history Understand technical vulnerabilities and weaknesses in security governance and user habits Driven by nature and extent of measures required to achieve desired security But two characteristics of the banking and finance sector are a high rate of change and high degree of sophistication in attack methodology So, agility and flexibility in response are fundamentally important.

How does a cyber services integrator achieve agility and flexibility? We remain immersed in your environment: Policy and legislation background Essential industry architecture Key industry governance processes Key financial functions and processes Key systems

How does a cyber services integrator achieve agility and flexibility? We maintain sector specific technical expertise, backed by our own wider technical expertise and context Understand and model predominant attack/exploit methods Develop and maintain a library and understanding of characteristic system vulnerabilities Characterise key domain processes that are subject to attack Anticipate next generation exploits Which enables us to provide a coherent set of appropriate services to the companies operating within the sector

What would the outcome look like? Monitoring and real time analysis of anomalies plus development of intelligence data Detect Deter Hardening of key systems Response to incidents: containment, eradication and recovery Respond Through life security Assure Achievement and maintenance of security compliance Development and maintenance of situation awareness, dynamic risk analysis and feed back for training and process improvement Learn Assess Regular vulnerability assessment Your Cyber Security Capability

Enterprise CIRT An Enterprise CIRT or equivalent managed service provides the right focus Detect Resist Defend Deter Protect Assess Respond - Contain - Eradicate - Recover - Learn Assure Core Systems Users Organisation Copyright Selex ES S.p.A 2014 2013 All rights reserved

Selex ES: What is a Cyber Integrator? Security system requirements - Finance Building a specific response Benefit from wider system collaboration

The key characteristic of response is collaboration Copyright Selex ES ES S.p.A S.p.A 2014 2013 All rights All rights reserved reserved

The key characteristic of response is collaboration EU CYBER STRATEGY RESTS ON COLLABORATION Joint research centre vulnerabilities etc Pan European exercises Sector and National CSIRTs Europol and Interpol: cooperation for Cyber Copyright Selex ES ES S.p.A S.p.A 2014 2013 All rights All rights reserved reserved

The key characteristic of response is collaboration NATO: LISBON DECLARATION To optimise information sharing, collaboration and interoperability Copyright Selex ES ES S.p.A S.p.A 2014 2013 All rights All rights reserved reserved

The key characteristic of response is collaboration US INITIATIVES: Comprehensive National Cyber security Initiative Shared Situational Awareness Connecting Cyber Operations Centres Federal, State, Local and Private Sector Supply chain initiative Education and R&D initiative FUNDING! The concept of sector and national nodes and hubs for reporting, correlating data and sharing intelligence is gaining momentum Copyright Selex ES ES S.p.A S.p.A 2014 2013 All rights All rights reserved reserved

So within the Saudi Banking and Finance Sector, a federated and trustworthy Sector CIRT would encourage collaboration Vulnerabilities Threats Impact Breach and incident data Enterprise CIRT Plans Sector CIRT Secure and trusted information sharing Procedures Lessons learned Technical indicators of compromise Suggested remediation actions Vulnerabilities Threats Impact Breach and incident data Enterprise CIRT Copyright Selex ES S.p.A 2014 2013 All rights reserved

The national effect: shared situational awareness of network vulnerabilities, threats, and events Medical Telecoms Power generation Are you seeing what we are seeing? Oil & Gas Aviation Banking

An integrator can work at scale NATO NCIRC FOC - public domain information 50 Sites 28 Nations 70,000 users Selex-ES leads a British-led Consortium to deliver NCIRC s Full Operating Capability Full Operating Capability 2011 2012 2013 2014 2015

Thank you for listening Presentation to Saudi Arabian Monetary Agency March 2014