Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting



Similar documents
Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Cybersecurity Protecting Yourself, Your Business, Your Clients

National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

Attack Intelligence: Why It Matters

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Continuous Network Monitoring

Webinar: Creating a Culture of Cybersecurity at Work

SMALL BUSINESS PRESENTATION

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Click to edit Master title style

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Cyber Security Management

WHITE PAPER: THREAT INTELLIGENCE RANKING

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Defending Against Data Beaches: Internal Controls for Cybersecurity

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

CORE Insight Enterprise

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

Minimizing Risk Through Vulnerability Management. Presentation for Rochester Security Summit 2015 Security Governance Track October 7, 2015

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit

Cyber Security Metrics Dashboards & Analytics

White Paper. IT Security in Higher Education

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

2011 Forrester Research, Inc. Reproduction Prohibited

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

Cybersecurity: What CFO s Need to Know

FIVE PRACTICAL STEPS

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

How to Spot and Combat a Phishing Attack Webinar

Cyber R &D Research Roundtable

SMALL BUSINESS PRESENTATION

The SIEM Evaluator s Guide

Review: McAfee Vulnerability Manager

How To Test For Security On A Network Without Being Hacked

High End Information Security Services

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Cybersecurity Vulnerability Management:

Auditing emerging cyber threats and IT controls

Vulnerability Management

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

IBM Security Strategy

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

PCI DSS Overview and Solutions. Anwar McEntee

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

October 24, Mitigating Legal and Business Risks of Cyber Breaches

The Value of Vulnerability Management*

BIG SHIFT TO CLOUD-BASED SECURITY

Best Practices for Threat & Vulnerability Management. Don t let vulnerabilities monopolize your organization.

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Social-Engineering. Hacking a mature security program. Strategic Penetration Testing

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

How To Handle A Threat From A Corporate Computer System

VULNERABILITY MANAGEMENT

Penetration Testing - a way for improving our cyber security

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

Vulnerability management lifecycle: defining vulnerability management

Social Media Marketing for Small Business Success

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Total Protection for Compliance: Unified IT Policy Auditing

Extreme Networks Security Analytics G2 Vulnerability Manager

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

STATE OF NEW JERSEY IT CIRCULAR

THE EVOLUTION OF SIEM

RETHINKING CYBER SECURITY Changing the Business Conversation

The #GivingTuesday Event Marketing Toolkit

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Cyber Security Awareness Kids Safe Online Poster Contest OFFICIAL RULES

Bringing Continuous Security to the Global Enterprise

BDPA Education & Technology Foundation (BETF) United Way Marketing Plan

Transcription:

Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting September 2, 2015 1 www.vita.virginia.gov 1

ISOAG September 2, 2015 Agenda I. Welcome & Opening Remarks Michael Watson, VITA II. Dealing with Overload Eric Cowperthwaite, Core Security III. National Cyber Security Awareness Month IV. Upcoming Events Ed Miller, VITA Bob Baskette/Michael Watson, VIT V. Partner/Operation Update Bob Baskette, VITA, Michael Clark, NG 2

Welcome and Opening Remarks Michael Watson September 2, 2015 www.vita.virginia.gov 3 3

Dealing with Overload Eric Cowperthwaite, Core Security September 2, 2015 www.vita.virginia.gov 4 4

CISO Overload Eric W. Cowperthwaite Vice President Advanced Security and Strategy PAGE

Without Change, We Die Looks at why Homo Sapiens survived and Neanderthals did not A key issue was that Neanderthals didn t adapt to new threats Security today is behaving like Neanderthals 6

Another Military Analogy We are preparing for the last war Much like the French Maginot Line in WWII Our defenses are aimed at 2003 SQL Slammer Email viruses Lost and stolen devices We are fighting WWI and they are fighting WWII Who s going to win that fight? 7

And The Reality Is Our current concept says: Build a strong outer defense Know who everybody on the network is Defend all systems with a standard set of security controls In spite of this, the bad guys seem to be able to break in to whatever organization they want to. 8

Anatomy of a Breach Adobe breached by exploiting a ColdFusion vulnerability, according to Krebs on Security Attacker discovered vulnerabilities the defender didn t know about. 9

The Problem - Overload Security teams are overloaded Data vulnerabilities, networks, viruses, SIEM, oh my Regulations Required security, reports, mandatory activity, oh my 10

Data Overload The advent of virtualization Data center sprawl End points, mobility, Internet of Things Vulnerability proliferation (Adobe) Event proliferation (Neiman Marcus) 11

Regulatory Overload HIPAA, GLBA, FISMA, PCI State breach notification laws State security regulations Commonwealth s Information Security Standard 12

Let s Start Here... Predictive Security is a real term What it means is... Predictive security solutions enable you to understand the strengths and weaknesses of your infrastructure, network and human security and predict where an attacker is most likely to attack and exploit them successfully. 13

And Modern, innovative security solutions. Are a force multiplier Deal with regulatory reality Improve security 14

How About Some Nuts & Bolts Need to understand your network, servers, & vulnerabilities And then be able to think like a hacker would Validate and prioritize vulnerabilities Demonstrate appropriate security Satisfy auditors and regulators 15

This Is A Big Data Problem My previous employer has over 100,000 nodes How many vulnerabilities? How many possible attack paths? Are the vulnerabilities exploitable Does the attack path lead to sensitive data 7 different regulations and security frameworks to satisfy 16

What s The Advantage? Instead of defending everything/nothing You will know where the attacks will happen Defend the attack path Harden critical systems Increase the cost/difficulty for the bad guy 17

Bottom Line This is the future of Information Security Success is going to require innovation Big Data solutions are crucial Must understand what the bad guy will do Must know where to expend limited resources Have to change the game from blind defense to intelligent defense 18

Visualizing the Problem Collect Remediate Nessus MVM IP360 Qualys Nexpose Etc. DATA The Problem: Mountains of Data 1000 s of Vulnerabilities No Relevance to Business The traditional solution: Try to patch everything Priority based on CVE score No business context epo GRC SIEM Remediation IT/Network Ops Trustwave Qualys NTO Web Inspect App Scan Etc. 19

Visualizing the Solution Collect Nessus MVM IP360 Qualys Nexpose Etc. Analyze Remediate & Report Attack Intelligence Platform Remediation IT/Network Ops DATA Consolidate security data Simulate attack paths The traditional solution: Try to patch everything Priority based on CVE score No business context Prioritize business risk Validate vulnerabilities Actionable Information Reporting Leadership/Audit Trustwave Qualys NTO Web Inspect App Scan Etc. 20

Attack & Threat Intelligence Platform Information Gathering Network Discovery Vulnerability Scanning Phishing Risk Analysis Attack Simulation Threat Modeling Exploit Correlation Exploit Validation Attack Path Testing Penetration Testing Compliance & Reports Risk Reports Role-based Reports Business Reports Compliance Reports Attack Paths Correlation Rules Critical Asset Risk Attack Intelligence Platform Integration Framework Service Desk Remediation Vulnerability data Configuration data Event data VM NSM SIEM 21

What Does It Look Like In Practice? Further test and validate vulnerable systems on attack paths Attack Point Web Application Server Vulnerable Database Pivot Point Print Server Critical Business Asset (Ex. credit card database) 22

CISO Dashboard Relieves Overload 23

Continue The Conversation 24

National Cyber Security Awareness Month 25 www.vita.virginia.gov 25

National Cyber Security Awareness Month is observed annually in October. This year marks the 12 th anniversary of NCSAM and the 5 th anniversary of Stop.Think.Connect Campaign 26 www.vita.virginia.gov 26

http://www.stopthinkconnect.org/ The Anti-Phishing Working Group (APWG) and National Cyber Security Alliance (NCSA) led the development of the STOP. THINK. CONNECT. campaign. The U.S. Department of Homeland Security provides the Federal Government's leadership for the STOP. THINK. CONNECT. campaign. 27 www.vita.virginia.gov 27

http://www.stopthinkconnect.org/ The Anti-Phishing Working Group (APWG) and National Cyber Security Alliance (NCSA) led the development of the STOP. THINK. CONNECT. campaign. The U.S. Department of Homeland Security provides the Federal Government's leadership for the STOP. THINK. CONNECT. campaign. 28 www.vita.virginia.gov 28

Stop. Think. Connect. National Cyber Security Awareness Month Partner Packet 29 www.vita.virginia.gov 29

Start Planning Now 1. Determine weekly themes relevant to your agency 2. Solicit ideas from departments within your agency for NCSAM 3. Identify what communications channels you will use to distribute your tips or resources i.e. webpage, social media, tweets, instagram 4. Determine how you will distribute your information i.e. posters, tip cards, informational materials. 5. Most importantly, make it your own brand You know the unique needs of your agency. www.vita.virginia.gov 30 30

Planning Checklist: Countdown Time September 1. Continue planning your event 2. Brief your leadership on your plans and solicit their support 3. Work with your communications teams to develop a strategy to promote NCSAM 4. Publicize your event October 1. Post a message on your website or newsletter to announce NCSAM 2. Add a NCSAM auto signature to your emails 3. Post cybersecurity and safety messages on social media throughout the month 4. Post cyber security blogs 5. Hold agency events for employees to attend 31 www.vita.virginia.gov 31

Activity List Examples Week 1 General Cyber Security Awareness Information 1. Upload the NCSAM banner to your website 2. Post a cyber security message on your website or on social media announcing NCSAM Week 2 Creating a Culture of Cybersecurity at Work 1. Share tips on protecting your workplace 2. Encourage employees to use a NCSAM auto signature. i.e. Cybersecurity is a shared responsibility, etc. Week 3 Staying Protected While Connected 1. Post a mobile safety tip on social media 2. Share a link to a cybersecurity video on your website 3. Hold a cybersecurity event 32 www.vita.virginia.gov 32

Activity List Examples Week 4 Your Evolving Digital Life 1. Post a cybersecurity story in an online newsletter 2. Email a cybersecurity tip to employees Week 5 Building the Next Generation of Cyber Professionals 1. Share a news story about the importance of cybersecurity 2. Post a cybersecurity fact or figure on social media 33 www.vita.virginia.gov 33

Additional Resources www.stopthinkconnect.org ftc.gov/bulkorder Order free resource materials from the Federal Trade Commission ww.staysafeonline.org/stay-safe-online/ www.microsoft.com/security/default.aspx www.us-cert.gov/ncas/tips www.dhs.gov/national-cyber-security-awareness-month. 34 www.vita.virginia.gov 34

VITA Activity List Week 1 Cyber Security: It s Our Shared Responsibility 1. Open Message from VITA s CIO to employees about the importance of National Cyber Security Awareness Month 2. Cyber security games, videos and informational links will be emailed to all employees 3. We will kick off the MS ISAC s annual Kids Safe Online Poster Contest for school age kids K through 12 4. Oct 1 Brown bag lunch and learn session featuring a Security Family Feud Game to test employees knowledge of cyber security etiquette 5. Setup a Cyber Security Information table in the hallway 6. Publish the Governor s Cyber Security Month Proclamation 7. Post Security Awareness Toolkit on our website 8. Post weekly Cyber Security Awareness Blog by David Ihrie, Center for Information Technology 9. Twitter Thursday Invite employees to tweet security awareness tips based on the theme of the week www.vita.virginia.gov 35 35

VITA Activity List Week 2 Social Media Be Careful What you Post 1. Social Media related security games, videos and informational links will be emailed to all employees 2. Cyber Security Information table in the hallway 3. Oct 7 Information Security Officers Advisory Group (ISOAG) monthly meeting. Security Awareness posters and pamphlets will be distributed to all attendees. 4. Post weekly Cyber Security Awareness Blog by David Ihrie, Center for Information Technology 5. Twitter Thursday Invite employees to tweet security awareness tips based on the theme of the week 36 www.vita.virginia.gov 36

VITA Activity List Week 3 Securing Our Work Environment (If you see something, say something) 1. Securing Our Work Environment games, videos and informational links will be emailed to all employees 2. Cyber Security Information table in the hallway 3. Oct 13 Employee Popcorn Social to celebrate National Cyber Security Awareness Day 4. Oct 14 - Brown bag lunch-and-learn session on Protecting Our Infrastructure presented by the Department of Homeland Security 5. Link to weekly Cyber Security Awareness Blog by David Ihrie, Center for Information Technology 6. Cyber Security Information table in the hallway 7. Post weekly Cyber Security Awareness Blog by David Ihrie, Center for Information Technology 8. Twitter Thursdays Invite employees to tweet security awareness tips based on the theme of the week 37 www.vita.virginia.gov 37

VITA Activity List Week 4 Protecting Your Privacy Online Know the Risks 1. Privacy related games, videos and informational links will be emailed to all employees 2. Cyber Security Information table in the hallway 3. Oct 21 - A brown bag lunch-and-learn session presentation by Special Agent James LaMattina, United States Secret Service in conjunction with Capital One on ATM Skimming 4. Post weekly Cyber Security Awareness Blog by David Ihire, Center for Information Technology 5. Twitter Thursday Invite employees to tweet security awareness tips based on the theme of the week 38 www.vita.virginia.gov 38

VITA Activity List Week 5 Keeping Children Safe Online 1. Keep Children Safe online security related games, videos and informational links will be emailed to all employees 2. Oct 28: Brown bag lunch-and learn session presentation by Captain Robert P. Chappell, Virginia State Police. Captain Chappell is the author of the book Child Identity Theft : What Every Parent Needs to Know. 3. Oct 29: Cyber Security bake and cyber games for donations to benefit the Commonwealth of Virginia Charities 4. Post weekly Cyber Security Awareness Blog by David Ihrie, Center for Information Technology 5. Twitter Thursday Invite employees to tweet security awareness tips based on the theme of the week 39 www.vita.virginia.gov 39

2016 Kids Safe Online Poster Contest VITA will be kicking off the 2016 MS ISAC Kids Safe Online Poster Contest this month. The contest is open to students in grades kindergarten through 12. The contest is sponsored by the Virginia Information Technologies Agency (VITA) in conjunction with the Multi-State Information Sharing and Analysis Center (MS-ISAC). This is a national contest which encourages our youth to use the Internet safely and securely. 40 www.vita.virginia.gov 40

2016 Kids Safe Online Poster Contest The top three winning posters from Virginia for each grade group (K-5, 6-8 and 9-12) will be submitted to the national Multi-State Cyber Security Awareness poster contest. The national winning posters in each age group will have their artwork displayed in the 2017 National Stay Safe Online Calendar. The calendar will be distributed throughout the country and may also be used in campaigns to raise awareness among children of all ages about internet and computer safety. Virginia has three national winners in last two years. 41 www.vita.virginia.gov 41

2016 Kids Safe Online Poster Contest The 2015 Virginia national winners posters can be found on our website www.vita.virginia.gov/security/default.aspx?id=11232 **more details will be forthcoming 42 www.vita.virginia.gov 42

43 www.vita.virginia.gov 43

Questions or Assistance with NCSAM Contact: CommonwealthSecurity@vita.virginia.gov Tina.Harris-Cunningham@vita.virginia.gov 44 www.vita.virginia.gov 44

Upcoming Events www.vita.virginia.gov 45 45

IS Orientation When: Thursday, September 24, 2015 Time: 1:00 pm to 3:00 pm Where: CESC, Room 1211 Register here: http://vita2.virginia.gov/registration/session.cfm?meetingid=10 46

Announcement: VASCAN Conference 2015 They Will Get In. What Are We Doing About It? Date: October 1-2, 2015 Location: UVA, Newcomb Hall Ballroom Topics: information security advanced defense techniques IT risk management IT regulatory compliance Bonus Content: SANS:Incident Response Management MGT535 Meals Breakfast and lunch both days Conference reception Thursday evening, October 1 To Register: http://www.virginia.edu/vascan2015/ 47

Future ISOAG October 7, 1:00-4:00 pm @ CESC Speaker: Mike Watson, VITA ISOAG meets the 1 st Wednesday of each month in 2015 48

ADJOURN THANK YOU FOR ATTENDING Picture courtesy of www.v3.co.uk 49