Cyber Security Management



Similar documents
How To Test For Security On A Network Without Being Hacked

Technical Testing. Network Testing DATA SHEET

Information Security Services

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

Managing IT Security with Penetration Testing

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Information Technology Security Review April 16, 2012

Defending Against Data Beaches: Internal Controls for Cybersecurity

Five keys to a more secure data environment

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Passing PCI Compliance How to Address the Application Security Mandates

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Overview. Figure 1 - Penetration testing screenshot examples showing (i) PACS image and (ii) breached Electronic Health Record system

Agenda. Agenda. Security Testing: The Easiest Part of PCI Certification. Core Security Technologies September 6, 2007

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

How-To Guide: Cyber Security. Content Provided by

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

PENETRATION TESTING GUIDE. 1

Security Management. Keeping the IT Security Administrator Busy

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

I ve been breached! Now what?

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

How To Protect Your Computer From Attack

Assessing the Effectiveness of a Cybersecurity Program

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Managed Security Services

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

SECURITY CONSIDERATIONS FOR LAW FIRMS

NASCIO 2015 State IT Recognition Awards

Application Security in the Software Development Lifecycle

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

future data and infrastructure

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY

Penetration Testing //Vulnerability Assessment //Remedy

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Information Technology Risk Management

Fighting Advanced Threats

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Protecting against cyber threats and security breaches

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

AUTOMATED PENETRATION TESTING PRODUCTS

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

State of Security Survey GLOBAL FINDINGS

A HELPING HAND TO PROTECT YOUR REPUTATION

Why should I care about PDF application security?

Top five strategies for combating modern threats Is anti-virus dead?

Impact of Data Breaches

Defending the Database Techniques and best practices

Achieving and Maintaining PCI DSS Compliance with Centralized, Automated Application and Middleware Change Control TECHNICAL WHITE PAPER

AUTOMATED PENETRATION TESTING PRODUCTS

Things To Do After You ve Been Hacked

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

developing your potential Cyber Security Training

Avoiding the Top 5 Vulnerability Management Mistakes

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Information Security Organizations trends are becoming increasingly reliant upon information technology in

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report

Defensible Strategy To. Cyber Incident Response

Cybercrime: risks, penalties and prevention

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

NATIONAL CYBER SECURITY AWARENESS MONTH

Two Approaches to PCI-DSS Compliance

Security Best Practices for Mobile Devices

INTRODUCTION TO PENETRATION TESTING

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Cisco Security Optimization Service

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Transcription:

Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies focusing their investments in IT security, consistent testing of servers, programs, websites and networks, it is time to act! Nevertheless this is not enough to protect businesses from groups of attackers and the resulting losses and fines for the breaches that were detected. Contrary to the common justification of we are too small for hackers to care about startups and small businesses are essentially perceived as laid-back targets by hackers. Immediately after you have registered your domain, setup hosting and email, you are on the grid and at risk. In the Federal world, the Office of Management and Budget (OMB) was hacked, accessing sensitive federal information of both federal employees and contractors and putting at risk over 21.5 million security clearances. For small businesses that want to do business with the Federal government, getting a facility clearance and background clearances in 2015 has almost been non-existent! This is a burden for small business enterprises that are already at a disadvantage over their larger business competitors. The Federal government already takes forever to process paperwork. In fact a lot of small businesses go out of business waiting on the process to be completed. And at a time when the government is pushing to help small businesses get funding faster, however, the focus on the process has become analysis paralysis. I for one, have a small business focusing on IT services at POWERNET America, Inc., and I need a facility clearance and an update to my personal clearance, but since the government has not been open to follow Federal Information Security Modernization Act (FISMA)

and NIST standards regularly, has hurt my business because government contracts in Huntsville have dried up. Even when trying to create partnerships, become a subcontractor to a Prime, or just simply find a partial task order has been non-existent, because there are very few contracts being issued, or have been over 18 months since a Request for Proposal (RFP) was submitted without closure of a win. I have been without work, without a paycheck or even an opportunity with a contract since I created the company, and after talking with other company executives, I find they are in the same boat. So was it worth not having a good cyber security process in place for OMB, NO! Information security and privacy are constantly major focuses, but as we get closer to 2016 the malaise seems to be spinning like a vortex, with no sight of it slowing. In the last year, the world has seen high-profile cyberattacks on businesses and governments, making us focus our attention on topics surrounding data protection, encryption, privacy and surveillance like never before. So having your online information hijacked is a nightmare, and, should it happen to your business, it could cost you customers. Cybersecurity is a must for any business with a presence online. Whether you have a website, online accounts or any type of Web-based infrastructure, you are at risk for a cyberattack. Although the public typically only hears about cyberattacks against highprofile companies, banks and government websites like Target and Home Depot. Now small businesses make prime targets for cybercriminals, competitors and disgruntled parties. And due to their lack of resources, small businesses have the leastprotected websites, accounts and network systems, making cyberattacks a relatively easy job. When a security breach occurs, the company or business concerned not only loses valuable and/or sensitive data, but it also suffers damage to its brand or reputation that can take a lot of time and money to repair. So it is imperative that you have a secure, trustworthy hosting company to keep the bad guys out and your content up and running," says Wright. "It is also very important to keep your content management system updated in order to stay one step ahead of the hackers." Detection over prevention - Hackers have gotten very refined, and avoiding breaches entirely is impossible, so businesses need a two-element approach focusing on breach prevention and breach detection and remediation. So first implement a continuous monitoring and mitigation approach, and then identify all perilous resources and the potential attack surface. Then implement a detection and response solution and finally implement an ongoing process for security posture assessment and improvement. Penetration Testing - Penetration testing should be performed on a regular basis to ensure more consistent IT and network security management by revealing how newly discovered threats or emerging vulnerabilities may potentially be assailed by attackers. In addition to regularly scheduled analysis

and assessments required by regulatory mandates, tests should also be run whenever: o New network infrastructure or applications are added o Significant upgrades or modifications are applied to infrastructure or applications o New office locations are established o Security patches are applied o End user policies are modified A penetration test is a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system vulnerabilities, including OS, service and application flaws, improper configurations, and even risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as end-users adherence to security policies. Penetration tests are typically performed using manual or automated technologies to systematically compromise servers, endpoints, web applications, wireless networks, network devices, mobile devices and other potential points of exposure. Once vulnerabilities have been successfully exploited on a particular system, testers may attempt to use the compromised system to launch subsequent exploits at other internal resources, specifically by trying to incrementally achieve higher levels of security clearance and deeper access to electronic assets and information via privilege escalation. Information about any security vulnerabilities successfully exploited through penetration testing is typically aggregated and presented to IT and network systems managers to help those professionals make strategic conclusions and prioritize related remediation efforts. The fundamental purpose of penetration testing is to measure the feasibility of systems or end-user compromise and evaluate any related consequences such incidents may have on the involved resources or operations. Security literacy - Security starts from within a business. Instituting safety practices and ensuring all employees are aware of them is significant in your overall plan. Ensure you have an IT policy and education plan to educate your employees. It will go a long way toward better security posture, especially in this age where advanced threat actors increasingly resort to social engineering tactics in their threat campaign. Server Hardening - The server, operating system and applications that run your services are critical to securing. Hardening your server is the difference between running through a parchment wall or a brick wall. Anthony of POWERNET This is an area it is usually best to hire an experienced IT security consultant or employ a seasoned systems administrator, or utilize a managed hosting provider to take care of for you. Although your developers may be capable, that does not mean they know how to secure a server properly, just as you would not hire a

landscaper to do build your home even though both are handy. Server hardening is also not a one-time event, but is a continuous process of monitoring, patching and upgrading over time as new vulnerabilities are discovered. Anthony Goodeill, of POWERNET requires all of his hosting customer maintain a SiteLock on every server account. Going through a managed hosting partner like POWERNET makes it easier because they already have systems in place to automate this process as well as additional security layers including firewalls, IDS (Intrusion Detection Systems) and other more robust security solutions in place such as SiteLock which you can benefit from. Most of the time server can get you a better price on these monthly costs. Cyber Security: Social Engineering Today s cyber criminals don t need high-tech methods to hack into your computer systems. They take advantage of basic human behavior to get what they want. Social engineering is a non-technical intrusion that tricks unsuspecting employees into breaking normal security procedures and giving network access to attackers. Here are some of the focus areas POWERNET checks for, and so should you: Phishing - Email phishing is one of the most common social engineering methods. Users of critical data are tricked into revealing passwords or clicking on links that contain malware. As a part of POWERNET s social engineering services, we conduct controlled phishing assessments in order to measure employees IT security awareness. Pretexting - In pretexting, social engineers invent scenarios to engage targeted victims in such a way as to increase the possibility of obtaining sensitive data. To protect your organization from pretexting, POWERNET conducts controlled pretexting assessments to identify weak points in your employee defenses. Physical Social Engineering - Criminals often take advantage of vulnerabilities in an organization s physical environment in order to walk directly into an office to get what they want. Generally, the social engineer looks and acts as if they belong in the office in order to avoid suspicion. To ensure the security of your physical environment, POWERNET s experts conduct physical social engineering exercises in an attempt to circumvent your security measures and identify vulnerabilities. Cyber Security Risk Management Cyber security and information security management are like many other aspects of your business. If you think about aspects such as customer service, credit control and ordering goods, your organization has a system or process so that everyone in the business knows what they need to do, how to do it and when they need to do it. Cyber and information security are no different. Demonstrating that you have robust systems for data protection is becoming increasingly important for three reasons:

To reduce the risk of fines Protect your organization s reputation Winning new customers, especially when tendering for new business You need a set of systems and processes called a Cyber Security Management System (CSMS) sometimes known as an Information Security Management System (ISMS). POWERNET helps businesses with data protection and cyber compliance, protecting both your data, helping you with your Cyber Security Management and that of your clients. The 5 steps to your Cyber Security Management System 1. Appoint a person with overall responsibility 2. Identify the risks in your organization 3. Mitigate those risks with security solutions 4. Issue cyber security policies based on your risks 5. Train your staff on your risks and policies, and then test their awareness The POWERNET CSMS is a thorough and practical way of ensuring all risks are considered and mitigated. Aided by a series of work programs, checklists and structured working papers a fully documented audit trail is created showing the assessment of risk and the rationale for decisions made on risk mitigation. This fully documented audit trail is important evidence to show that your organization has done everything it can reasonably be expected to do to minimize the risk of data loss and if something does go wrong you can find out how and why it went wrong. Finally NIST has several tools and workshops to help companies better understand and respond to cybersecurity issues such as the Cybersecurity Framework within the Computer Security Division Computer Security Resource Center. They have a series of small business workshops to help owners and managers understand better risk management strategies. If you need assistance answering these questions in your business, POWERNET America would be happy to help. About the authors: K. Anthony Goodeill is the Founder and President/CEO of POWERNET America, Inc. in Huntsville, Alabama. POWERNET provides Fast Track IT consulting services to the Tennessee Valley and to government contracts.