Information Security is not an IT problem! Enterprise Risk & Security Management



Similar documents
Visualizing the Business Impact of Technical Cyber Risks

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Leveraging Regulatory Compliance to Improve Cyber Security

A practical guide to IT security

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

2012 Endpoint Security Best Practices Survey

10 best practice suggestions for common smartphone threats

2012 NORTON CYBERCRIME REPORT

Security Controls What Works. Southside Virginia Community College: Security Awareness

developing your potential Cyber Security Training

EXIN Information Security Foundation based on ISO/IEC Sample Exam

Information Security Awareness Training

I ve been breached! Now what?

SUPPLIER SECURITY STANDARD

National Cyber Crime Unit

Is your business secure in a hosted world?

Cyber Essentials Scheme

Information Technology Risk Management

Classify, Protect, Audit: New Approach to SAP Data Security. Aparna Jue, SECUDE

Cyber Security. John Leek Chief Strategist

Wireless (In)Security Trends in the Enterprise

Improving Residual Risk Management Through the Use of Security Metrics

Bachelor of Information Technology (Network Security)

Securing the Service Desk in the Cloud

Unit title: Cyber Security Fundamentals (SCQF level 4)

Cyber Security - What Would a Breach Really Mean for your Business?

McAfee Server Security

Newcastle University Information Security Procedures Version 3

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

The Cyber Threat Profiler

Guidelines. London School of Economics & Political Science. Remote Access and Mobile Working Guidelines. Information Management and Technology

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh

Data Security. So many businesses leave their data exposed, That doesn t mean you have to Computerbilities, Inc.

Cyber Security & Managing KYC Data

FIVE PRACTICAL STEPS

Cybercrime: risks, penalties and prevention

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

If you can't beat them - secure them

Enterprise Computing Solutions

What Directors need to know about Cybersecurity?

Certified Secure Computer User

Fortinet Solutions for Compliance Requirements

Critical Controls for Cyber Security.

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

Overview TECHIS Carry out risk assessment and management activities

A HELPING HAND TO PROTECT YOUR REPUTATION

Cyber Security solutions

Microsoft Security Development Lifecycle for IT. Rob Labbé Application Consulting and Engineering Services

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise

ICT Barriers, High Tech Crime, and Police

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Small businesses: What you need to know about cyber security

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

State of Security Survey GLOBAL FINDINGS

Protecting your information

Unisys Security Insights: Germany A Consumer Viewpoint

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Reducing Cyber Risk in Your Organization

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Ensuring security the last barrier to Cloud adoption

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

7 VITAL FACTS ABOUT HEALTHCARE BREACHES.

Cloud Security In Your Contingency Plans

Utica College. Information Security Plan

Security Practices for Online Collaboration and Social Media

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

How To Protect Your Organization From Insider Threats

Microsoft s cybersecurity commitment

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

10 Smart Ideas for. Keeping Data Safe. From Hackers

2015 Information Security Awareness Catalogue

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Information Security Policy

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

Managing IT Security with Penetration Testing

Can Your Organization Brave The New World of Advanced Cyber Attacks?

Transcription:

Information Security is not an IT problem! Enterprise Risk & Security Management Raymond Slot Security Seminar 20 maart 2015

Some Security Incidents in 2014 Anthem 80 million customer records exposed JPMorgan Chase -- 76 million private customer and an 7 million small businesses records stolen Sony Pictures attack -- exposing new movies and emails Gemalto -- Attack to obtain SIM card encryption keys Attack on a Large European Bank ATM s NFC hack on Chilean Transport Public systems 2

Security Attacks Over 2014 more than 4.400 corporate sector targets in at least 55 countries worldwide The number of victims affected by targeted attacks in 2014 is 2.4 times that of 2013, when up to 1.800 corporate targets were discovered. Attacks move from general attacks to targeted, long-term attacks. Example Targeted Attacks Attacks specifically aimed at C-level and senior management in hotels Attacks aimed at banks and at billing companies Attacks to obtain encryption keys Attacks on home banking systems Source Kaperski, 2014 3

Cost of Cyber Crime? UK 0,16% of GDP 4.8 billion Euro Netherlands 1.5 % of GDB 8.8 billion Euro Germany 1,6% of GDP 56 billion Euro Global losses are estimated from $ 375 Billion to $ 575 Billion Source McAfee, 2014 4

Reasons for increased attack rates We are heading for a security meltdown of our economy 1. Attacking is technically becoming easier and cybercrime is target of criminal big-money 2. In the Internet of Things, security is considered often as an afterthought 3. High visibility successes attract new cybercriminals 4. Risks for cybercriminals are relatively low Legislation has not kept pace International nature makes prosecution almost impossible 5. Cyberterrorism and Cyber Warfare are facts of life 6. We are building more and more large mission-critical IT systems, without including security at a key designcriterion Source Sessions, 2015 5

Cost vs. Risk Trade-Off High Low Low 6

Uitgaven versus Niveau van Veiligheid Expense 7

Characteristics of Enterprise Risk & Security Management Goal: acceptable residual risk at a minimal cost Based on business risks Key questions What risks are we exposed to? What is for our organization an acceptable level of risk? These questions are business questions. IT cannot answer it. For these questions to be answered by business, business has to have insight into the risks and acceptable residual risks. The role of security architecture is to provide business managers with this insight. 8

Secure Enterprise Architecture There two approaches to a secure enterprise architecture bolt-it-on (usual) build-it-in (much more safe) Go for inherently secure designs Examples Android Snowman SOA architecture Business Architecture Information Architecture Security Application Architecture Data Architecture Technical Architecture Instead of Security Architecture we should speak of a Secure Enterprise Architecture 9

Security Niveaus Strategic Security Policy Security organization Acceptable Risk level Tactical Gap between Policy en Operation Operational Fire Wall Virus Checking 10 Network Zones

Security Approach Drivers Business Domain Policies Threats Opportunities Responsibilities Risks Vulnerabilities Security requirements Firewall Architecture Virus Scanning Measures Authentication Access control Solution Domain 11

Security process Risk Analysis en Policy definition Security Requirements Definition Security Measures Residual Risk Security Architecture 12

Non-Functional Requirements Security Requirements Confidentiality Authentication Integrity Non-repudiation Auditability Governance Requirements Availability Contingency Incident resolvability Ability for administration and configuration Cost Accountability Scalability Traceability Volumetric Requirements Performance Throughput Response time Currency (data) Correctness (data) % Modified (data) Simultaneous Users # Transactions Storage Development Requirements Maintainability Portability Reusability Testability Green Requirements Energy efficiency Environmental Friendly Materials Sustainability 13

Non-functional Aspects (ISO 25010) Source: ISO 14

Levels of Security Requirements Level Integrity Authentication Availability Performance High Medium Low It is very difficult to compromise the accuracy and completeness of data, both in storage and in transport It is fairly difficult to compromise the accuracy and completeness of data, both in storage and in transport No value is attached to the accuracy and completeness of data. Example It is very difficult to assume somebody else s identity Sufficient measures are taken so that the average user will not be capable of assuming someone else s identity There is no need to identify the actor. 7 * 24 hour 6 * 12 hour Office hours Very fast response time (< 0,5 sec) Fast response time (<2 sec) Internet level response times unmanaged 15

Security Requirement Profile Profile Name Example Integrity Authentication Confidentiality Availability Performance Public Level Standard Level Confidential Level People surfing the website Information is freely available Company-confidential actions Information is freely available within the organisation Confidential actions Information availability is Restricted High Low Low High Medium Medium Medium Medium Medium Medium High High High Medium Medium Example Security requirement profiles - Organizations require 5-10 profiles 16

Security Use Case ACTOR executing an ACTIVITY (using some INFO) 1. Client retrieving Product Information 2. Client inquiring Account Balance 3. Client executing Financial Transaction 4. Employee conducting Standard Operation (e.g., developing product) 5. Employee conducting High-risk Operations (e.g., handling financial sums above 500.000) Number of Security Use Cases in an Organization is about 20 17

Classification of Security Use Case Security Requirements Profile Security Use Case Public Stand. Conf. 1.Client retrieving Product Information t 2. Client inquiring Account Balance t 3. Client executing Transactions t 4. Employee conducting Standard Operations 5. Employee conducting High-risk Operations t t 18

Use Case Context: Locations Internal Access Hotel Company Office Client Location Home External Access 19

Use Case Context: and Platforms PC / Laptop Tablet Phone 20

Define Security Measures Security Requirement High-Secure (Confidential Level) Example Measures Multi-Level Authentication 4-eyes principle Personnel screening Baseline (Standard Level) Virus Checking Application Virtualization Network Zones Firewall Below Baseline (Public Level) No Access Control Accessible from Internet 21

Example 1: End-to-End Security Measures for a Security Context Specification Use Case: Employee conduction standard Operation from External Location Security Requirements Profile: Standard Level Location: External Access Platform: PC Measures are ISO 27.000 Based 22

Example 2: End-to-End Security Measures for a Security Context Specification Use Case: Cklient conduction standard Operation from External Location Security Requirements Profile: Standard Level Location: External Access Platform: Phone! 23

Definition of Security Architecture Security Use Cases Actor Activity & Information Security Requirements Profile Use Case Context Platform Location Use Case Measures Organizations require 20-30 Use Case Descriptions 24

Security Architecture Cycle 6. Gaps and Residual Risks 5. Measures per Use Case Measures 1. Risk Analysis Analysis Requirements 2. Policy and Acceptable Risk 3. Security Requirements 1. Risk analysis provides insight 2. Policy determines the acceptable risks level (Risk Appetite) 3. Requirement profile describes the required level of confidentiality, integrity, etc. 4. Each security use case gets assigned a requirement profile 5. For each use case and requirement profile a set of security measures is defined, the target security architecture 6. Gaps are identified between the actual situation and the sites integration 4. Classify Use Cases 25

Qualitative Risk Assessment Loss event frequency (LEF) Risk Vulnerability (Vuln) 26

A Risk Overlay for ArchiMate 27

A Risk Overlay for ArchiMate 28

Example 29

Lessons Learned 1. Do not assume that information security is okay 2. Take the lead as business management in Information Security 3. Operational continuity and justification of information security costs is a responsibility by management 4. Analysis of existing security environments shows Security too high ( All authorization need to be two-factor ) Security too low ( Wait, does that process also use medical data!?! ) 5. Business management needs insight in actual and target residual risks and the gaps 6. Plan how to handle security gaps Information Security is not an IT problem! 30

Concluding Business management is responsible for cyber security Policies & compliance Sensitivity of information Acceptable risk levels Execution is the responsibility of IT HR Facilities Finance Architecture bridges the gap Clear relation between needs and measures In business terms Business is in control Effective and efficient use of resources 31

Questions? Raymond Slot r.slot@bizzdesign.com +31 646 00 23 78 Webinars, blogs, e-books, customer stories, training portfolio, software and more on www.bizzdesign.com 32

2014 BiZZdesign. All rights reserved. BiZZdesign and BiZZdesign logos are registered trademarks of BiZZdesign Company.