Cyber Incident Response Management: Breaking Glass. Presented by Darrell Switzer Sr. Director Incident Response Services BAE Systems



Similar documents
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

FFIEC Cybersecurity Assessment Tool

Top 10 Baseline Cybersecurity Controls Banks Aren't Doing

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Ed McMurray, CISA, CISSP, CTGA CoNetrix

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

DUUS Information Technology (IT) Incident Management Standard

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?

Italy. EY s Global Information Security Survey 2013

IT AUDIT WHO WE ARE. Current Trends and Top Risks of /9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

Performing Advanced Incident Response Interactive Exercise

GEARS Cyber-Security Services

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Information Security Program CHARTER

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

Cybersecurity: What CFO s Need to Know

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

Data Breach Response Planning: Laying the Right Foundation

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

Organizational Structure What Works

Click to edit Master title style

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

Incident Response 101: You ve been hacked, now what?

Department of Management Services. Request for Information

Information Technology Policy

Building Reference Security Architecture

IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS

Vendor Management: An Enterprise-wide Focus. Susan Orr, CISA CISM CRISC CRP Susan Orr Consulting, Ltd.

NIST Cybersecurity Framework & A Tale of Two Criticalities

Vendor Risk Management Financial Organizations

What Directors need to know about Cybersecurity?

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

International Diploma in Risk Management Syllabus

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Computer Security Incident Response Team

ipatch System Manager - HIPAA Compliance

CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1

RISK MANAGEMENT FRAMEWORK. 2 RESPONSIBLE PERSON: Sarah Price, Chief Officer

(Instructor-led; 3 Days)

The Governance of Corporate Forensics using COBIT, NIST and Increased Automated Forensic Approaches

Achieving SOX Compliance with Masergy Security Professional Services

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

ICBA Summary of FFIEC Cybersecurity Assessment Tool

Defending Against Data Beaches: Internal Controls for Cybersecurity

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Public Private Partnerships and National Input to International Cyber Security

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

BC / DR Implementation Tying Disaster Recovery Investment to Measurable Business Value

Information Security for the Rest of Us

Continuous Network Monitoring

Cyber Incident Response

Evaluating, choosing and implementing a SIEM solution. Dan Han, Virginia Commonwealth University

Case Study: Hiring a licensed Security Provider

Identifying and Managing Third Party Data Security Risk

MASSACHUSETTS GAMING COMMISSION: CHIEF INFORMATION OFFICER JOB DESCRIPTION

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Current IBAT Endorsed Services

A CobiT Case Study. Drawing on CobiT for the implementation of an Enterprise Risk Management Framework. December 2008

Computer Security Incident Response Team

CORE Security and GLBA

Cybersecurity Issues for Community Banks

Cybersecurity The role of Internal Audit

Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

RISK MANAGEMENT OVERVIEW 2011 RISK CONFERENCE SPONSORED BY THE FEDERAL RESERVE BANK OF CHICAGO AND DEPAUL UNIVERSITY

This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

Vendor Management Panel Discussion. Managing 3 rd Party Risk

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance

Working with the FBI

Cybersecurity y Managing g the Risks

THE EVOLUTION OF CYBERSECURITY

ISO COMPLIANCE WITH OBSERVEIT

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber

I n f o r m a t i o n S e c u r i t y

Cyber Security Metrics Dashboards & Analytics

EXECUTIVE CRISIS MANAGEMENT TRAINING. Presented by Roseanne Rostron, CBCP Raido Response

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN

Transcription:

Cyber Incident Response Management: Breaking Glass Presented by Darrell Switzer Sr. Director Incident Response Services BAE Systems

About BAE Systems $25B Annual Revenue 80,000+ Employees Operates in 40+ Countries With Major Clients in Banking, Insurance, Energy/Utilities, Healthcare, Media and Government $2B Invested Annually in R&D Cyber Security Financial Crime Communications Intelligence Core Heritage in Secure Government and Agencies

Incident Response Money Is The Target FFIEC Overview Critical Steps To Prepare

WHY INCIDENT RESPONSE?

The Incident Response Life Cycle From: NIST 800-61

FFIEC Overview Business Continuity Planning The board & senior mgmt are responsible for business continuity planning Including assigning personnel & allocating resources BCP is divided into 4 steps: 1. Business Impact Analysis 2. Risk Assessment 3. Risk Management 4. Risk Monitoring & Testing BCP process uses the word should throughout Not backed by legislation or regulations

FFIEC Overview Information Security Gramm-Leach-Bliley Act of 1999 (GLBA) section 501(b) Provides enforcement if institutions establish & maintain adequate information security programs FFIEC information security process defines 5 areas: 1. Information Security Risk Assessment 2. Information Security Strategy 3. Security Controls Implementation 4. Security Monitoring 5. Security Process Monitoring and Updating

FFIEC Overview Information Security Security objectives: Availability Integrity Confidentiality Accountability Assurance Integrity + Accountability = Non-Repudiation

FFIEC Overview Chief Executive Officer Responsibilities: Develop a plan to conduct the assessment Lead employee efforts during assessment to facilitate timely responses Set target state of cyber security preparedness that aligns with the board of directors Review, approve & support plans to address risk mgmt & control weaknesses Analyze & present results for executive oversight Oversee ongoing monitoring to address evolving cyber security risk Supervise changes to maintain or increase cyber security preparedness

FFIEC Overview The Board Responsibilities: Engage mgmt in establishing the institution s vision, risk appetite & strategic direction Approve plans to use the assessment Review analysis of assessment results Evaluate decision of whether the institution s cyber security preparedness aligns with its risks Assess & approve plans to address risk mgmt or control weaknesses Examine results of ongoing monitoring of the institution s exposure to & preparedness for cyber threats

The ability to respond to an incident is only as good as an organization s ability to detect the incident.

Having proper analysis capabilities requires both trained personnel and the proper tools to perform the analysis.

Plan vs. Framework No plan of operations extends with certainty beyond the first encounter with the enemy s main strength. -Helmuth Karl Bernhard Graf von Moltke

Framework Authority and Scope Team Members and Responsibilities Logistics Process to Determine Severity and Escalation Post-Incident Activities Supporting Documentation

The most critical component in any Incident Response Practice Authority and Backing from Executive Management

Scope Will define what areas of the business the Incident Response Practice affects, i.e., any computing device, Wifi, etc.

Incident Response Team Primary Team Extended Team Third Parties

Primary Team Security Team Incident Response Lead Operations Team Service Desk Team

Extended Team Executives Legal Communications Human Resources Compliance Physical Security

Third Parties Outsourced IT (Help Desk, Server Support) Forensic Firms ISPs Legal Counsel Law Enforcement Public Relations Teams

Logistics Email Distribution / Call Bridge for Communication War Room Computing Equipment Evidence Locker Often Overlooked Items: Succession of Command Catering Shipment of Evidence OpTempo

Escalation Department/LOB/ Branch/Group of VIPs (High) Small Group of Users or VIP (Medium) Core Business Services (High) Support Services (Medium) Non-Urgent Services (Low) Critical High High Critical High Medium Single User (Low) High Medium Low

Post-Incident Root Cause Analysis: Determining an addressable cause that led to the incident

Supporting Documents Incident Tracking Forms Chain of Custody Form Indicator of Compromise Matrix

Building an Indicator of Compromise Matrix Firewall DNS Server Log Active Directory NetFlow IP Address X X Domain Name X Registry MD5 Username X

Recall Roster All members of the incident response team should have their contact information documented. For third parties, supporting information, such as PoCs, contract numbers, etc., should be included.

Create an Incident Response Playbook

Testing Incident Response High Level Audit Review of documentation Discussion based interview of capabilities Objective Based Assessment Technical tasks requested of the IR team Tabletop Exercise War Game

Thank You