Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown



Similar documents
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Cybercrime Security Risks and Challenges Facing Business

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Addressing Cyber Risk Building robust cyber governance

Italy. EY s Global Information Security Survey 2013

F G F O A A N N U A L C O N F E R E N C E

Defending Against Data Beaches: Internal Controls for Cybersecurity

Click to edit Master title style

Cybersecurity The role of Internal Audit

External Supplier Control Requirements

Big Data, Big Risk, Big Rewards. Hussein Syed

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Critical Controls for Cyber Security.

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Payment Card Industry Data Security Standard

A NEW APPROACH TO CYBER SECURITY

Transformational Smart Cities: cyber security and resilience

The Protection Mission a constant endeavor

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

defense through discovery

Sytorus Information Security Assessment Overview

Cloud Security Introduction and Overview

Microsoft s cybersecurity commitment

Developing National Frameworks & Engaging the Private Sector

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Chapter 1 The Principles of Auditing 1

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Gregg Gerber. Strategic Engagement, Emerging Markets

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Caretower s SIEM Managed Security Services

Cyber Security - What Would a Breach Really Mean for your Business?

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

SANS Top 20 Critical Controls for Effective Cyber Defense

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

How To Manage Security On A Networked Computer System

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Security Risk Management Strategy in a Mobile and Consumerised World

Information Security and Risk Management

How to ensure control and security when moving to SaaS/cloud applications

Defending against modern cyber threats

Cyber Essentials Scheme

Domain 1 The Process of Auditing Information Systems

CESG Certification of Cyber Security Training Courses

North American Electric Reliability Corporation (NERC) Cyber Security Standard

McAfee Security Architectures for the Public Sector

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

How RSA has helped EMC to secure its Virtual Infrastructure

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

CYBER SECURITY, A GROWING CIO PRIORITY

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

IoT & SCADA Cyber Security Services

CONSULTING IMAGE PLACEHOLDER

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

Managing IT Security with Penetration Testing

Preemptive security solutions for healthcare

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Introduction to Cyber Security / Information Security

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh

Certified Information Systems Auditor (CISA)

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber security Building confidence in your digital future

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Security Issues in Cloud Computing

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

The Education Fellowship Finance Centralisation IT Security Strategy

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

IBM Security Strategy

Logging In: Auditing Cybersecurity in an Unsecure World

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

A COMPLETE APPROACH TO SECURITY

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Security Analytics for Smart Grid

Seamus Reilly Director EY Information Security Cyber Security

Address C-level Cybersecurity issues to enable and secure Digital transformation

The Benefits of an Integrated Approach to Security in the Cloud

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Cybersecurity: What CFO s Need to Know

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Transcription:

Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1

2

Network + Technology + Customers = $$ 3

Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available Technology (malware authors) 3) Money!! 4) Minimal Awareness 4

Before jumping in what is Cybercrime exactly? The simple answer is It is complicated Council of Europe - Cybercrime Treaty defines it as: data used for criminal purposes, all the way to copyright infringement While United Nations include Fraud, Forgery and unauthorized access as Cybercrimes. Symantec Any crime using a computer, hardware device or network where the computer is an agent, facilitator or target of the crime. 5

6

Is Mauritius under attack? SPAM ZOMBIE MALICIOUS CODE 7

8

Robert Mueller, FBI Director RSA Conference 2011 There are only two types of companies: those that have been hacked, and those that will be. Even that is merging into one category: those that have been hacked and will be again.

What This All Means to Business Technology and business are indelibly linked. 80% of new business growth to customers is via Internet Eliminating all risk is impossible and it impedes agility. 1. Organizations need to define their risk appetite 2. Goal is to become Cyber Resilient 10

What is Cyber Resilience? Some existing definitions : 1. Resilience is defined as the ability of an ecosystem to return to its original state after being disturbed. (Wikipedia) 2. Cyber-resilience is the organization's capability to withstand negative impacts due to known, predictable, unknown, unpredictable, uncertain and unexpected threats from activities in cyberspace. (Information Forum) 3. Cyber-resilience is defined as the ability of systems and organizations to withstand cyber events, measured by the combination of mean time to failure and mean time to recovery. (Word Economic Forum) Cyber CIA Cyber Resilience Defined Process Governance Framework Multiple stakeholders 11

Source: ISF - Cyber Strategies

HOW CAN WE IDENTIFY AND PRIORITIZE THE KEY THREATS WHEN THERE ARE SO MANY? 13

IF AN ATTACK IS SUCCESSFUL HOW CAN WE RESPOND QUICKLY TO CONTAIN THE IMPACT AND RECOVER? 14

HOW CAN WE BEST USE THE RESOURCES AND CAPABILITIES WE HAVE TO PROTECT OUR ORGANIZATION? 15

HOW CAN WE MEASURE AND DEMONSTRATE THE VALUE OF OUR SPENDING ON SECURITY? 16

What is Driving Cyber Phenomena? Hyper Connected World Rapid IT Evolution Agile Targeted Threat Cyber Risk Increased dependency on connected services and information exchange IT platforms, devices & services evolving at a pace we have never seen before Threats & Actors leveraging hyper connectivity, IT evolution and weak traditional boundary style security approaches INCREASEED BUSINESS IMPACT (i.e. Online & On- Demand Web and Cloud Services) (i.e. Mobile, Virtualisation, Social Media Technologies) (i.e. APT s, Hackitivism, Insider Abuse, Reputation Damage) Cyber Threats & Cyber Resiliency Blueprint

What does that mean for our approach to? Changing the focus for Cyber Cyber Assessment IT Control & Visibility External Threat Intelligence Business Awareness & Involvement Advanced Threat Protection Traditional Approach 85% Incident Response, Malware Analysis & Forensics Enhanced Intelligence Exchange & Sharing Cyber Threats & Cyber Resiliency Blueprint

19

Increasing benefits and influence Management Maturity Model Defined is not enough Risk Reactive Mode: Respond to incidents and requests Awareness Mode: More comprehensive security controls, beginning to integrate in silos Informed Mode: More holistic view of threat landscape, & IT infrastructure, look for efficiencies Innovative Mode: Measurable and auditable IT, proactive, and preventative risk-based approach Strategic Mode: Innovative offerings, business alignment, dynamic Functional Maturity IT NOT VALUED IT Seen as TACTICAL Resource IT Seen as a COMMODITY IT Seen as an ENABLER IT seen as a PARTNER 1 2 3 4 5 Initial Repeatable Defined Managed Optimised Cyber Threats & Cyber Resiliency Blueprint

The Cyber Risk Reality Cyber Risk: An overlapping set of Business & Technical Challenges Cyber Risk Challenges Requirements for Cyber Resilience Lack of Business Ownership Organisational ownership does not support the desired level of cyber resilience Business Ownership People & Process Evolving Technologies Architecture Poor cyber security appreciation, inappropriate staff behaviours & non compliance to security policies Evolving IT Trends (Cloud, mobility, virtualisation & Web 2.0) increase complexity & cost to defend against cyber risks Weakly integrated security architectures & disparate security technologies provide opportunities for targeted cyber attacks Education, Awareness & Monitoring Effective Strategy Lack of Visibility Lack of situational awareness results in poor incident visibility Integrated Information Centric Solutions 21

Where can I get help with my Strategy? Navigate the maze of cyber strategies, standards & guidance Nation State Cyber Regulation, Directives and Strategies US Directives EU Directives EU State Cyber Strategies (UK) Organisational Cyber Standards PAS 555 ISO 2700X ISF SOGP Some excellent guidance but find what fits your organization Cyber Frameworks & Best Practices Cyber Technical Standards & Advisories NIST 2013 Framework ENISA COBIT NIST technical Standards NERC Standards CSIRT (CERT) CSIS Standards CSA Cloud Standard SCAP STIX Cyber Guidance & Tools World Economic Forum (WEF) CESG/BIS 10 Steps to Cyber National Checklist Program Cyber Diagnostic Tools Consultancies & Vendors Cyber Threats & Cyber Resiliency Blueprint

For Less Mature Organizations Get The Basics Right CESG 10 Steps to Cyber Cyber guidance from CESG (Communications- Electronics Group), the UK Government's National Technical Authority for Information Assurance. Get Assessed against the CESG Guidance with the Symantec CyberV Risk Calculator Cyber Threats & Cyber Resiliency Blueprint

For More Mature Organizations Adopt a Cyber Standard WEF Framework Framework, Principals and Guidelines Traditional Controls Based Standard ISO 27001 PAS 555 New outcome based Standard from Cyber Alliance Cyber Threats & Cyber Resiliency Blueprint

For All Organizations Leverage Partners & Vendors To Help Less Mature More Mature All Symantec CyberV Risk Calculator Aligned to CESG 10 Steps to Cyber Provides rapid assessment of Cyber Resilience against CESG Guidance Identifies areas of prioirty Symantec Enterprise CyberV Assessment Detailed Cyber Resilience Assessment Assess current and desired state of Cyber Resilience Provides detailed report inc prioities and recommendations on achieving cyber resilience CyberV Assessments Endorsed and Supported by the ISF Symantec Technical Cyber Assessments Threat Monitroing Service Vulnerability Assessment Taregtted Attack Assessment Data Loss and Discovery Assessment Malicious Activity Assessment Cyber Threats & Cyber Resiliency Blueprint

High-Level Information Domains Governance Practices Processes & Procedures Threat/ Vulnerability Awareness & Management Configuration and Patch Management Architecture & Planning Policies & Procedures Provisioning & Implementation Strategy Governance & Definition of Roles Secure Operations Identity Management Program Metrics & Quality Policy and Regulatory Compliance Management Logging, Monitoring, & Reporting Executive Sponsorship Risk Management Audit Function Legal Framework Partner & Third Party Integration Information Classification Organization Awareness Business Continuity Asset Management Personnel Contingency / Disaster Planning Incident Handling & Response Physical Media Control & Handling Backup, Recovery, & Archiving Infrastructure Mobility & Wireless Secure Network Design Remote & Extranet Connections Secure Builds & Host Hardening Network & System Malicious Code Protection Perimeter Directory Services Authentication & Authorization Application Product Secure Design and Coding Privacy Confidentiality & Segmentation Encryption Secure Communications Intrusion Detection & Prevention Data Data Integrity Storage Clustering and Data Availability Cyber Threats & Cyber Resiliency Blueprint 26

Immediate Risk Reduction Initiatives Infrastructure Operations & Management Critical Information Protection IT Policies & Procedures User Protection & Awareness Critical Server Protection Network Protection Mobile Endpoint Patch Management Monitoring Incident Response & Management Operations Threat & Vulnerability Management Early Warning System Data Backup Data Encryption Data Protection Emergency Response Risk Management Crisis Management Forensics Governance & Compliance Identity & Access Management 2 Factor Authentication Awareness & Training Cyber Threats & Cyber Resiliency Blueprint 27

Risk Reduction Level Low High IT Initiatives vs. Risk Reduction Short Term Value Realization Long Term Infrastructure Operations & Management Critical Information Protection IT security Policies and Procedures User Protection & Awareness The Size of the bubble represents the effort & investment required to implement / improve the initiative. Cyber Threats & Cyber Resiliency Blueprint 28

Call to Action! 1. Establish your risk profile and know your exposure 2. Make the people part of Cyber Resilience Educate the employee s Educate the supply chain 3. Use Cyber Resilience as long term strategic competitive advantage. 4. Reference existing frameworks / Engage vendors 29

Partner With Symantec We Know We protect 1 billion systems around the world We review 8 billion email messages and 1.4 billion web requests a day The Largest IT Company in the world Track 60,000+ vulnerabilities for over 16,000 vendors and 43,000 products 30