Cyber Security Incident Management



Similar documents
Lessons from Defending Cyberspace

Into the cybersecurity breach

Cybersecurity and internal audit. August 15, 2014

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

A Primer on Cyber Threat Intelligence

IT Security Incident Management Policies and Practices

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard

External Supplier Control Requirements

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

External Supplier Control Requirements BCM

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Cyber Incident Response

FINRMFS9 Facilitate Business Continuity Planning and disaster recovery for a financial services organisation

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

GEARS Cyber-Security Services

CYBERSECURITY INVESTIGATIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

State of South Carolina Policy Guidance and Training

A COMPLETE APPROACH TO SECURITY

2015 CEO & Board University Taking Your Business Continuity Plan To The Next Level. Tracy L. Hall, MBCP

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Things To Do After You ve Been Hacked

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Cybersecurity Awareness. Part 1

Overview TECHIS Manage information security business resilience activities

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Guideline on Vulnerability and Patch Management

Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain

Critical Controls for Cyber Security.

I N T E L L I G E N C E A S S E S S M E N T

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Ty Miller. Director, Threat Intelligence Pty Ltd

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

How Secure is Your SCADA System?

CISM Certified Information Security Manager

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Microsoft s cybersecurity commitment

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

The Cyber Threat Profiler

Advanced Threat Protection with Dell SecureWorks Security Services

FACT SHEET: Ransomware and HIPAA

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Information Security Services

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Presented by Frederick J. Santarsiere

Developing Secure Software in the Age of Advanced Persistent Threats

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

TO AN EFFECTIVE BUSINESS CONTINUITY PLAN

IMS-ISA Incident Response Guideline

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Report on Cyber Security Alerts Processed by CERT-RO in 2014

Accenture Cyber Security Transformation. October 2015

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

SANS Top 20 Critical Controls for Effective Cyber Defense

Cybersecurity The role of Internal Audit

Zak Khan Director, Advanced Cyber Defence

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Qatar Computer Emergency Team

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

Cyber Security Evolved

Cloud Courses Description

Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Fostering Incident Response and Digital Forensics Research

Defending Against Cyber Attacks with SessionLevel Network Security

Symantec Advanced Threat Protection: Network

Italy. EY s Global Information Security Survey 2013

Stay ahead of insiderthreats with predictive,intelligent security

Active Threat Control

Working with the FBI

National Cyber Security Policy -2013

Use of The Information Services Active Directory Service (AD) Code of Practice

Transcription:

Cyber Security Incident Management Dr Syed Naqvi syed.naqvi@bcu.ac.uk

Outline Introduction Stages of Cyber Incident Response Challenges of Cyberspace Best practices 2

3

Cyber Incident Response 4

Preparation Threats/risks analysis Operational, elevated, severe, strategic Strategies and resources Guidelines for operations staff & first respondents, response & recovery teams, tools and trainings Management support Boardroom awareness, allocation of resources Regular reviews and Exercises Periodicity of reviews, gaps analysis, capability analysis 5

Detection Anomaly detection Routine operations/processes are not running normally Abnormal performance, crashes, etc. Complain received Clients or operators signalled some problems Detection is not easy for espionage attacks (Trojan horses) as they do not disrupt routine operations. Efficient monitoring of processes is required to detect their presence. 6

Containment Containment strategy Part of the incident response plan Examples: full/partial shut-down, changing security controls, lock access to some services, moving to offline mode,... Preserve the electronic evidence To identify the action that triggered the incidence Containment could be delayed to gather further information of attacker (Honeypot) Containment through complete shutdown/offline has to be evaluated against the impact of service interruptions. 7

Analysis Generally third party specialised intervention Evidence collection, examination, analysis and presentation 8

Eradication Eliminating the cause of the incident Removing malware, infected software/files, malicious accounts,... Reset changes in the system parameters that were introduced by the attacker SAM (Security Account Manager) database in Windows.forward files in Linux/Unix... Quarantine Enhanced monitoring of ports, logs,... 9

Remediation Remediation of vulnerabilities Installation of patches, more powerful antivirus,... Restoration of the system Full system restoration (from good media) Restoration of data (from redundant drives, recent full backup,...) Return to routine services Normal logging and monitoring Execution of regular business services 10

Follow-up Feedback Preparation phase Operations department Lessons learnt Shortcomings and gaps Communications and coordination Claims and settlements Demarcation of responsibilities, litigation,... 11

Dealing with sophisticated threats Better preparation Timely and proactive installation of patches, fixes, new solution,... DRP (Disaster Recovery Planning) & BCP (Business Continuity Planning) should reflect the worst case scenarios for the cyber attacks. Deterrence Stern administrative and legal actions against the collaborators/ perpetrators. 12

Dealing with sheer volume of data Identify sensitive data Structured and unstructured Instances of data leakage Intellectual property & trade secrets Advanced data analytics techniques and tools Business intelligence Data mining Data visualisation Big data 13

Focusing gigantic infrastructures Federated & flexible infrastructures Elasticity Abstraction/Virtualisation Cross-border deployments Example: Cloud computing Imaging of a Cloud require another Cloud Analysis of a Cloud s contents need power of an additional Cloud Access details from terminal PCs 14

Sharing information & knowledge Threat landscape is constantly evolving Incident response planning requires knowledge of threat paradigm Information related to vulnerabilities and their exploits helps improve contingency planning Sharing information and return of experience among the peers Publication of exploits reports and lessons learnt Sharing of detailed information through trusted parties national CERTs Without compromising corporate reputation! 15

Staff s operational readiness Specialised training of the prospective Cyber fighters Need to have such specialised training offerings Regular participation in refreshing courses & professional bodies It is important for the cyber incident response team members to be ready to embrace the change Creation of Cyber reservists who can be called to reinforce cyber incident response teams Could be third party specialists with framework agreement & NDA 16

Filling the skills gap Very specialised domain Scarcity of vocational/ educational programs Stakes are much higher than other fields Challenging environments requiring good level of knowledge 17

Cyber exercises The best way of testing an incident response plan Coordination of different actors Like integration testing of a product Can be used as a deterrence tactic against potential attackers Helps observe the readiness of various stakeholders Identifies gaps Justifies remedies including resources allocation Expensive but more reliable evaluation mechanism Like Hot Sites in DRP/BCP 18