How to Explain Cyber Security to the Board Using a Simple Metaphor: FIRE



Similar documents
Level E Placement Worksheet & Student Passage. Level 1 Placement Worksheet & Student Passage. Level 2 Placement Worksheet & Student Passage

The Conjectural November 2015 Transcript 1 of 5

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Case Study for. The Torch Tower. Dubai Marina. Presented by; Lieutenant Colonel Ali Almutawa Operations Director Dubai Civil Defence

Fry Phrases Set 1. TeacherHelpForParents.com help for all areas of your child s education

Cyber Watch. Written by Peter Buxbaum

A study of the nature of fire risks in tall buildings

Components of a Reading Workshop Mini-Lesson

California Treasures High-Frequency Words Scope and Sequence K-3

INTRODUCTION TO TEAMWORK AND GROUP DEVELOPMENT CORPORATE LEARNING COURSE TEAMBUILDING BLOCK SEMINAR 3.2

Hidden Job Market. Remember, you are in a worksite setting! Hello, trainees. Today we will cover the hidden job market.

Florida Pioneer Homes By Lance Corlew & Ron Miller

Transportation: Week 2 of 2

Fire Safety Risk Assessment Checklist for Residential Care Premises

xxx Lesson Comprehend the writing process 2. Respond positively to the writing process

FLA S FIRE SAFETY INITIATIVE

Viruses, Worms, and Trojan Horses

Average producers can easily increase their production in a larger office with more market share.

Incident Response. Six Best Practices for Managing Cyber Breaches.

Rosa Parks. Stop and think: Have you ever been fed up with a situation? What did you do? How did things change?

A Primer on Cyber Threat Intelligence

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software

LESSON TITLE: Parable of the Workers in the Vineyard

10k. 8-week training program

DATE: What is Halloween?

THE VICTORIANS ON THE CANALS

Bible for Children. presents JOSHUA TAKES CHARGE

Co-authored by: Michelle Frechette Ames, MBA. Marketing Diva

Enterprise Cybersecurity: Building an Effective Defense

6 SECRETS TO OFFERING EXCEPTIONAL CUSTOMER SERVICE

Earn Money Sharing YouTube Videos

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Calling for Help in an Emergency

God is Eternal Lesson 1

How to Evaluate DDoS Mitigation Providers:

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

miracles of jesus 1. LEADER PREPARATION

Cambridge ESOL Entry 3 Certificate in ESOL Skills for Life

GET READY FOR A BUSH FIRE FOUR SIMPLE STEPS TO MAKING YOUR BUSH FIRE SURVIVAL PLAN

Palliser Regional Schools. Summary of feedback

Sunflowers. Name. Level and grade. PrimaryTools.co.uk

LESSON TITLE: Jesus is the Way, the Truth, and the Life

ONLINE SAFETY TEACHER S GUIDE:

How To Optimize your Marketing Strategy with Smart WiFi

Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose

Buyer Beware: How To Be a Better Consumer of Security Maturity Models

CREATIVE S SKETCHBOOK

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

User s Guide. Security Systems D220

* Dry Cleaning and Laundry Services Picked Up and Delivered to Your Home or Business

exit routes and fire protection

Why Your Business Needs a Website: Ten Reasons. Contact Us: Info@intensiveonlinemarketers.com

Multiplication Rules! Tips to help your child learn their times tables

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Hazard Identification and Risk Assessment

How to fill every seat in the house. An event manager s guide to SMS Marketing

Security Defense Strategy Basics

Availability and Disaster Recovery: Basic Principles

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses.

Lesson 1.1 P.WRITE, Gr. 2 & 3, PWRITE: POW + TREE: LESSON # 1 Part 1

6 SECRETS TO OFFERING EXCEPTIONAL CUSTOMER SERVICE salesforce.com, inc. All rights reserved.

Using a Concept Definition Map

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES

B1 certification. March Reading and Writing

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

Sailing the 7 C s The C of Commitment: Noah

WELCOME TEAM CAPTAINS!

Family Emergency Preparedness Plan

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them


The Challenge of Helping Adults Learn: Principles for Teaching Technical Information to Adults

Why Crisis Response and Business Continuity Plans Fail

Information Security for the Rest of Us

The Psychology of (In)Security

BUSINESS CONTINUITY PLAN

Shooting Uphill and Downhill. Major John L. Plaster, USAR (ret) Of all the ways a precision rifleman must compensate when firing such as for distance,

Lesson 35. The Tabernacle. Exodus God lives among his people

in: (R) Luke 18: 31 33

Continuity of Operations Planning. A step by step guide for business

Ten Strategies to Encourage Academic Integrity in Large Lecture Classes

Christmas Theme: The Light of the World

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Penetration Testing //Vulnerability Assessment //Remedy

Disaster Recovery Plan Checklist

Development of a Risk-Based Decision Support Tool to Assist Fire Departments in Managing Unwanted Alarms SupDet 2013 Conference

Five Core Principles of Successful Business Architecture. STA Group, LLC Revised: May 2013

Nine Steps to Smart Security for Small Businesses

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Transcription:

SESSION ID: PROF-M04 How to Explain Cyber Security to the Board Using a Simple Metaphor: FIRE John Elliott Head of Information Security Principality Building Society @withoutfire

Why? Smart people Time limited Non-technical Talking to the C-suite or the board is challenging brilliant Smart people Get risk Perspective Who grasp concepts quickly and can apply them to the current situation 2

Smart people Time limited Non-technical 3

But we ve spent $x million over the past n years making sure this won t happen to us What do you mean by INAMOIBW! 4

Why do we have fire extinguishers?

Smart people Get risk Perspective Who grasp concepts quickly and can apply them to the current situation 6

Everyone has a good sense about fire ouch

Everyone has a good sense about fire drill

Everyone has a good sense about fire not a toy

Everyone has a good sense about fire tell a teacher

Everyone has a good sense about fire also not toys

Everyone has a good sense about fire strict rules

What s this got to do with cyber security?

there s no such thing as common sense, just common knowledge Ira Winkler, RSA Conference 2012

our metaphors comprise the conceptual spectacles through which we view the world Immanuel Kant, Critique of Pure Reason 1781

Why is fire a great metaphor? Societal knowledge Fire is an opportunistic threat Fire does not care what you did yesterday (or plan to do tomorrow) Fire is happy to exploit the smallest vulnerability Fire does not stop until it absolutely owns everything (Until there are no more assets to compromise) 16

A brief history of two landmark fires 17

London, 1666

17 th Century fire-fighting techniques 19

Three days of fire 20

Effects 13,200 Homes 75,000 Homeless 80% of the City of London destroyed 10 Dead Affects the British economy for years 21

Chicago 1871

But this is 1871 17 horse drawn fire engines 180 fire fighters 1 pumping station (but with a wooden roof)

Effects 120 miles of wooden sidewalk burnt 33% of buildings destroyed 100,000 people homeless 24

Metaphors and lessons 25

A reminder I know you know this Aim: How to better explain things

Metaphors and lessons those who cannot remember the past are condemned to repeat it George Santayana, The Life of Reason 1905

Prevent Detect Respond Recover 28

Perfect threat storm Very dry Strong winds 29

Prevent London Vulnerable construction of basic components. Wood & straw No segmentation. Narrow streets, overhanging buildings Manual controls Chicago Better construction but significant vulnerabilities: tar roofing, decorative wooden cornices and advertisements Segmentation easily defeated. Wooden sidewalks, wind blew sparks across the river Manual controls 30

Prevent It is too late to fix architectural problems when you re on fire Unpatched applications? Flat networks Vulnerable OS? Too many admins? 31

Detect London Detection too late to prevent total compromise of the asset. Chicago Detection too late to prevent total compromise of the asset. 32

Detect There is a golden hour Treat every incident as unique 33

Respond London Strategy relied on sacrifice of compromised asset and neighboring assets. Unprepared to follow strategy No plan B. Everyone acted individually. Lack of skilled resources. Lost control quickly. Chicago Strategy relied on fast response to limit fire to a single asset. Too hot, wind too strong so fire spread too quickly on wind Response mechanisms vulnerable to attack. Wooden roof on pumping station 34

Respond Be decisive What if your response Are there known issues? mechanisms are vulnerable? 35

Recovery: individual Move assets London Secure assets Chicago 36

Attribution London Chicago 37

Attribution Attribution close to the event is unreliable 38

Comparison London Chicago Surprise! Again? 39

Or that men do not learn very much from the lessons of history is the most important of all the lessons of history Aldous Huxley, Collected Essays 1959

Comparison RSA, Google etc. Sony Surprise! Again? 41

What about today? 42

What about today? What did fire safety get right? Prevent Detect Respond Recover in depth with high maturity 43

Control maturity (CMMI) Fire management Optimized Quantitatively Managed Defined Managed Initial/ ad hoc 44

Why? fire has a low tolerance for control failure John Elliott, 2016

Prevent in depth with high maturity 46

Detect reliable almost eliminate false positives with high maturity 47

Respond in depth with high maturity 48

Recover with high maturity 49

Always learning When fire starts in a tall building restrict to a floor safe evacuation route sprinklers dry riser 50

Always learning 51

Fire v Cyber security Prevent Detect Respond Recover 0 1 2 3 4 5 52

How did we get better at FIRE? insurance regulation 53

So what? 54

Reminder I know you know this Aim: How to better explain things

How to use this when you talk to Prevent Detect Respond Recover Optimized Quantitatively Managed Defined Managed Find a story Initial/ ad hoc 56

Pick your favorite metaphors LONDON: Indecisive management This is not a problem CHICAGO: Wooden sidewalks, wooden advertisements BOTH: Sparks carried on the wind defeated firebreaks CHICAGO: Fire safes that were not PROBABILITY: Dry, strong winds, failure of manual preventative control 57

Understand your own environment What are your fire controls How mature are they? Can you describe your current Prevent Detect Respond Recover In respect of maturity? 58

How to use this when you talk to Prevent Detect Respond Recover Fire management is based on the premise that fires will happen What do you mean by INAMOIBW! false positives 59

How does what you propose Prevent Detect Respond Recover Optimized Quantitatively Managed Defined Managed Initial/ ad hoc 60

How does what you propose Prevent Detect Respond Recover What changes? Optimized Quantitatively Managed Defined Managed Initial/ ad hoc 61

But most importantly Get comfortable with the metaphor

and remember Like an attacker, fire has zero tolerance for control failure

Questions