Cyber Risk Management with COBIT 5



Similar documents
WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

PACB One-Day Cybersecurity Workshop

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

New challenges in Data privacy.

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Executive Cyber Security Training. One Day Training Course

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

Developing National Frameworks & Engaging the Private Sector

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Cybersecurity: Protecting Your Business. March 11, 2015

North Texas ISSA CISO Roundtable

Who s Doing the Hacking?

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

CYBERSECURITY NEXUS CSX. 15 October 2014 ISACA Winchester Chapter

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH

KEY TRENDS AND DRIVERS OF SECURITY

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

What Directors need to know about Cybersecurity?

Presented By: Corporate Security Information Security Treasury Management

Cyber Security. John Leek Chief Strategist

Prepare Yourself for the Digital Battlefield. Christopher May. 27 Feb 2014

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Nuclear Security Requires Cyber Security

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Cybersecurity and Cloud Briefing December 3, 2015

Data Security Breach. How to Respond

Network Security & Privacy Landscape

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

Cybernetic Global Intelligence. Service Information Package

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Cybersecurity Awareness. Part 1

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

October 24, Mitigating Legal and Business Risks of Cyber Breaches

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA

Internet threats: steps to security for your small business

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Cybersecurity Workshop

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Rethinking Cyber Security Threats

CYBERSECURITY HOT TOPICS

The Impact of Cybercrime on Business

Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

CyberArk Privileged Threat Analytics. Solution Brief

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

Your Customers Want Secure Access

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP

Security Intelligence Services. Cybersecurity training.

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer

Security and Privacy

Executive Management of Information Security

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Cybersecurity Strategy of the Republic of Cyprus

Data Breach Lessons Learned. June 11, 2015

Cyber Security. The changing landscape. Financial Sector. March 4-5, 2014

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

How To Cover A Data Breach In The European Market

How to Protect Sensitive Corporate Data against Security Vulnerabilities of Your Vendors

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Collateral Effects of Cyberwar

What s Lurking in Your Network & The Business Impact of Data Breaches. Colby Clark Director of Incident Management FishNet Security

Data Security: Fight Insider Threats & Protect Your Sensitive Data

U. S. Attorney Office Northern District of Texas March 2013

Cyber Security Risks for Banking Institutions.

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

The EU s approach to Cyber Security and Defence

Protecting against cyber threats and security breaches

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

OCIE Technology Controls Program

DISCLAIMER AND NOTICES

Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies

Transcription:

Cyber Risk Management with COBIT 5 Marco Salvato CISA, CISM, CGEIT, CRISC, COBIT 5 Approved Trainer 1

Agenda Common definition of Cyber Risk and related topics Differences between Cyber Security and IS Security Understand the Cyber Warfare: the threats, the actors, the behavior and the motivations How ISACA support us dealing with the Cyber Risk 2

Security Risk? Cyber Risk Cyber Crime Cyber Resiliance 3

4

The Internet of Things (IoT) 5

Why we should take care about cyber risk How many cyber attacks are there in the world? 6

Why we should take care about cyber risk Ten Million Cyber attacks A Day (link) Cyber-attacks Cost $1 Million on Average to Resolve (link) 7

Norse Dark Intelligence http://map.ipviking.com 8

Digital Attack Map http://www.digitalattackmap.com DDOS attack data from Google Datacenters + Arbor Networks 9

Cybersecurity definitions - ISACA The term Cyber Security addresses the governance, management and assurance that go beyond standard information security. Cybersecurity focuses on specific, highly sophisticated forms of attack and covers the technical and social aspects of the attack. Many definitions exist for cybersecurity, and the term is often misunderstood. The official EU definition follows: Cyber Security commonly refers to the safeguards and actions that can be used to protect the cyber domain, both in the civilian and military fields, from those threats that are associated with or that may harm its interdependent networks and information infrastructure. Cyber Security strives to preserve the availability and integrity of the networks and infrastructure and the confidentiality of the information contained therein. Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 10

Cybersecurity definitions - ISACA ISACA defines Cyber Security as follows: The protection of information assets by addressing threats to information that is processed, stored and transported by internetworked information systems. In its Transforming Cybersecurity publication, ISACA further describes Cyber Security as follows: Cyber Security encompasses all that protects enterprises and individuals from intentional attacks, breaches and incidents as well as the consequences. In practice, Cyber Security addresses primarily those types of attack, breach or incident that are targeted, sophisticated and difficult to detect or manage. the focus of Cyber Security is on what has become known as advanced persistent threats (APTs), cyberwarfare and their impact on enterprises and individuals. Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 11

Cybersecurity definitions - ISACA Cyber Risk is an ever-present threat, defined as any risk of financial loss, disruption or damage to the reputation of the organization from some sort of failure to its information technology systems. (Institute of Risk Management) It is possible to identify some main risk categories: losses due to cyber crime and cyber terrorism and cyber sabotage accidental loss of your own or someone else s data physical loss of systems (Critical information infrastructure break down) liability for your information/data (business data, online activities, emails, ) Moreover, Cyber Risk is the risk arising from Cyber Crime, defined by Canadian Law is as follows: Crimes in which the computer is the target of the criminal activity; Crimes in which the computer is a tool used to commit the crime, and; Crimes in which the use of the computer is an incidental aspect of the commission of the crime. Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 12

Cybersecurity definitions - ISACA There are two similar characteristics between Cyber Risk and Cyber Crime: they all have a potential great impact they were all once considered improbable Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 13

Cyber Attack Taxonomy - ISACA Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 14

Information Security and Cybersecurity Focus (PESTLE) - ISACA Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 15

Attacks and Threat Levels - ISACA Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 16

The Threat Attack Techniques Source: McAfee Labs Threat s Report Report Fourth Quarter 2013 17

The Threat Motivation Behind Attacks Source: McAfee Labs Threat s Report Report Fourth Quarter 2013 18

The Threat Distribution of Targets Source: McAfee Labs Threat s Report Report Fourth Quarter 2013 19

The Threat Source: McAfee Labs Threat s Report Report Fourth Quarter 2013 20

The Threat 21

The Target Story (2014) Company background Founded in 1902 Second largest discount retailer in the US after Walmart Ranked 36 th on Fortune 500 (2013) 1,916 stores Revenue (2013) US$72.6 (Source: Wikipedia) The attack Attacked not the central systems of the company but Point Of Sales (PoS) systems. Targeted Windows OS used to acquire data from Card readers. The System perform data encryption in memory: the malware scans the machine memory for Credit Card data. Data is sent externally of the company Data is used for Card Cloning. Attack vector from external third party (Fazio Mechanical Service - FMS): Malware via Phishing email to FMS No enterprise AV used Stolen credentials used to get inside Target systems via HVAC system of FMS in Target. (Source: McAfee Labs Threat Advisory EPOS data Theft) 22

The Target Story (2014) Timeline and costs 23 Dec Company sued by customers Phone scam campaign starts Phishing campaign start 28 Dec All card data stolen Also PIN 7 Feb Credit cards stolen reissued (@ 10$/card, expected 700M $) 18 Feb Target Security reports available from October 2013 but no action taken 24 Feb Share buy-back halted (4M $) 26 Feb Profit -46% for Quarter -5,3% sales Shares value -11% 5 March CIO Resign Compliance Office fired 18 March Target was PCI- DSS compliant: not enough July New CEO appointed Earning -20% Share value 20% Costs: 148M $ (38M $ covered by insurance) December 2013 January 2014 February March July 19 Dec Breach notice to 40M customers 10% discount offered Offered free credit checks to customers 10 Jan Damage perimeter re-estimated: 70M customers 13 Jan Malware detected and removed 22 Jan Lay off 475 employees Stop hiring of 700 planned employees 29 Jan Forensic analysis confirm usage of partner poor security for HVAC system to get inside the network (Fazio Mechanical) 26 March Target sued by banks to recover card reissuing costs Target security auditor sued April - June 100 lawsuits active Regulators investigations 23

The Target Story (2014) Stock effects 19 Dec Breach notify July Operative results published 26 March Bank sues Target 10 Jan 70M breach notify April - June Banks sues Target 24

Cybersecurity Governance Governance over cybersecurity has a much wider scope than governance over information security, due to the multiple facets of cybercrime and cyberwarfare. The cybersecurity governance framework covers enterprise security, social elements and technology. Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 25

ISACA & ENISA ISACA as a nonprofit, global membership association for IT and information systems professionals, ISACA is committed to providing its diverse constituency of more than 115,000 worldwide with the tools they need to achieve individual and organizational success. The benefits offered through our globally accepted research, certifications and community collaboration result in greater trust in, and value from, information systems. Through more than 200 chapters established in more than 80 countries, ISACA provides its members with education, resource sharing, advocacy, professional networking, and a host of other benefits on a local level. ENISA the European Union Agency for Network and Information Security, working for the EU Institutions and Member States. ENISA is the EU s response to these cyber security issues of the European Union. As such, it is the 'pace-setter' for Information Security in Europe, and a centre of expertise. The objective is to make ENISA s web site the European hub for exchange of information, best practices and knowledge in the field of Information Security. This web site is an access point to the EU Member States and other actors in this field. 'ENISA- Securing Europe's Information Society' 26

ISACA European Cybersecurity Implementation Series Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation Series 27

ISACA European Cybersecurity Implementation Series Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 28

ISACA European Cybersecurity Implementation Series Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation Series 29

ISACA Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 30

ISACA European Cybersecurity Implementation Series Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation Series 31

ISACA European Cybersecurity Implementation Series Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation Series 32

ISACA European Cybersecurity Implementation Series Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation 33

ISACA European Cybersecurity Implementation Series Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 34

ISACA European Cybersecurity Implementation Series Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 35

ISACA European Cybersecurity Implementation Series Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 36

ENISA Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 37

ISACA European Cybersecurity Implementation Series Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 38

ISACA European Cybersecurity Implementation Series Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 39

ISACA European Cybersecurity Implementation Series Source: ISACA, 2014, European Cybersecurity Implementation Series, European Cybersecurity Implementation: Overview 40

41

Cybersecurity Nexus 42

In conclusione ISACA ha concentrato i propri sforzi nella realizzazione di molte pubblicazioni sul tema, tra cui la European Cybersecurity Implementation Series, per fornire un supporto all implementazione della sicurezza informatica, in linea con i requisiti europei e le good practise internazionali. Per maggiori informazioni, visitate: www.isaca.org/cobit5 www.isaca.org/cobit5forrisk http://www.isaca.org/chapters5/venice/pages/default.aspx Domande? 43