Cyber Supply Chain Risk Management Portal



Similar documents
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Project Por)olio Management

Proof Of Concept For An ICT SCRM Enterprise Assessment Package

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

PROJECT PORTFOLIO SUITE

Adding a Security Assurance Dimension to Supply Chain Practices

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

How To Protect Your Data From Being Hacked

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities

Partnership for Cyber Resilience

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology

Sytorus Information Security Assessment Overview

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements

FREQUENTLY ASKED QUESTIONS

Health Industry Implementation of the NIST Cybersecurity Framework

Panorama Consulting Group. PERFECT Fit ERP Selection Framework

Manufacturing Operations Management

2012 North American Managed Security Service Providers Growth Leadership Award

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

October 24, Mitigating Legal and Business Risks of Cyber Breaches

De-Risking the Supply Chain: Cisco s Risk Intelligence and Analytic Tools

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR

Towards a standard approach to supply chain integrity. Claire Vishik September 2013

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Managing Risk in Global ICT Supply Chains

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes

Implementing Program Protection and Cybersecurity

Cybersecurity The role of Internal Audit

UNCLASSIFIED/FOR OFFICIAL USE ONLY. Department of Homeland Security (DHS) Continuous Diagnostics & Mitigation (CDM) CDM Program Briefing

DTCC Data Quality Survey Industry Report

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50%

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Piloting Supply Chain Risk Management Practices for Federal Information Systems

DOD Medical Device Cybersecurity Considerations

Strategic Progress Update July 2014 March 2015

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Continuous Network Monitoring

The Real Score of Cloud

Cyber Security for Advanced Manufacturing Next Steps

High End Information Security Services

The Importance of Cybersecurity Monitoring for Utilities

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Cyber Information-Sharing Models: An Overview

HP Fortify Software Security Center

Combating Cyber Risk in the Supply Chain

Factories of the Future Horizon 2020: LEIT ICT WP FoF : Digital Automation

The Next Generation Security Operations Center

Secure by design: taking a strategic approach to cybersecurity

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

Evolution Of Cyber Threats & Defense Approaches

THE TOP 4 CONTROLS.

Preventing Cyber Security Attacks Against the Water Industry

April 28, Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC

Managed Security Services

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

How To Be A Successful Health Care Security Consultant

Big Data, Big Risk, Big Rewards. Hussein Syed

Who s next after TalkTalk?

Transcription:

Cyber Supply Chain Risk Management Portal Dr. Sandor Boyson, Director, Supply Chain Management Center& Holly Mann, Chief InformaBon Officer R.H. Smith School Of Business

The Cyber Supply Chain Challenge Accelera3ng globaliza3on and outsourcing of both so:ware & IT hardware Only 20% of all computer chips are made in the U.S. Counterfeits are flooding our federal IT systems In 2010, a Florida company (Vision Tech) sold 60,000 counterfeit integrated circuits from Asia that went into DOD missile programs, DHS radia3on detectors and DOT high speed trains

The Malicious Threat Criminal organiza3ons and foreign intelligence services are targe3ng the supply chain In 2007, hard drives produced in Thailand by an American firm had report back mechanisms embedded in them by a foreign intelligence service. These hard drives were sent to DOD, copied all the classified files stored on them, and transmived the files via the internet back to the foreign intelligence service.

Need For A New Assurance Model In the late 1990s, the globaliza3on, outsourcing and fragmenta3on of produc3on accelerated the development of an integrated corporate management process: supply chain risk management. Today, the same factors in ICT produc3on are driving the growth of cyber supply chain risk management.

Cyber- SCRM Is An Emerging Discipline Cyber- SCRM combines enterprise risk management, supply chain management and cybersecurity into a fusion discipline. This discipline is aimed at gaining visibility and control over the end to end opera3ons (facili3es, people and processes) that integrate hardware, so:ware and network connec3vity into systems.

Cyber-SCRM: A Holistic Model Ring #3: Opera3ons Networks People Ring #2: Systems Integra3on/Shared Services Ring #1 Governance: Supply Chain Champion/Orchestrator Risk Board facilitates extended Enterprise Risk Management Group (e.g. Council of Interests) Network Map Crea3on Data Ring #1: Governance Plants/ Factories Ring #2 Systems integrabon: Stewardship of cyber/ physical asset network map Ensures network asset visibility and real- 3me monitoring of processes System- integrator/enforcer of chain of custody Ring #3 OperaBons: Enterprise Applica3ons So:ware Code IT Hardware Ac3on/ Field Layer Blend Physical /Cyber- Asset Visibility & Management Ac3ve Quest For Process Excellence 6

Corporate Uptake Of Cyber- SCRM Is Slow In our NIST- sponsored ICT SCRM Vendor Survey, we found that on the strategic side of risk management: 47.6% of our sample of 200 companies never uses a Risk Board or other execu3ve mechanisms to govern risk; - 46.1% never uses a shared Risk Registry, an online database of IT supply chain risks; 49.4% never uses an integrated IT supply chain risk management dashboard; and 44.9% say they never use a supply chain risk management plan." (ibid, p. 20) Most companies do not use automated business rules and sensor- driven responses, e.g. they cannot sense and respond to risks in real 3me. 7

Community Cyber- SCRM IniBaBves Have A Lot of Gaps Our team built a Cyber Supply Chain Framework that incorporated our corporate survey results and other research. We used this Framework to review 60 public & private sector SCRM Ini3a3ves and evaluate their extent of coverage of the end to end Cyber Supply Chain.

Findings The graph above shows a clear clustering of efforts around the internally- oriented systems development and supplier- oriented sourcing func3ons. At the high end of the defense in depth axis, there appear to be extensive gaps in ini3a3ves coverage of Risk Governance. In fact, deficiencies in coverage of the enterprise risk management func3on also prevent the coordina3on of adequate defense in breadth measures across the extended supply chain. 11

Building A Cyber SCRM Capability/Maturity Model Recently, we took our composite knowledge base and under NIST sponsorship built a Portal and a formal Capability/Maturity Enterprise Assessment Tool Set for Cyber Supply Chain Risk Management

Summary Of Cyber- SCRM Portal Features The E- Mail Sent Out By NIST to its User Community On April 28,2014: The first of its kind Cyber Risk Management Portal and its pornolio of state of the art enterprise assessment and network mapping tools is now complete and ready for user tes3ng. Sponsored by the NaBonal InsBtute Of Standards & Technology (NIST) and developed over four years by the University Of Maryland in consulta3on with industry leaders, this highly secure community portal will enable your organiza3on to anonymously benchmark itself against the very latest IT and Supply Chain Risk Management standards and prac3ces. Enterprise Risk Assessment Tool based on the President's Execu3ve Cyber Security Framework that factors in your organiza3on's governance, network design and systems management prac3ces. Supply Chain Assessment Tool based on latest NIST guidelines and prac3ces that evaluates your organiza3on's strategic control over its end to end IT supply chain and uses advanced algorithms to plot your organiza3on's capability/maturity posi3on. Mapping Tool to determine the vulnerability of key hubs and nodes in your IT supply chain Insurance Risk Analysis Tool, developed in partnership with Willis Insurance, one of the largest insurance brokers in the world, that enables your publically- traded organiza3on to benchmark itself against a database of cyber security breaches by industry. Easy to Use ExecuBve Dashboard to display and access assessment results. News feeds and alerts rela3ve to cyber security Please go to: hvp://cyberchain.rhsmith.umd.edu and register for an account.

Conclusions Cyber SCRM is an important new branch of ERM & SCRM. It is an avempt to gain strategic management control over the rapidly globalizing cyber chain. It can help compensate for deficiencies in purely technical approaches to security and assurance. New management tools are under development and will impact the field.