70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready?



Similar documents
CForum: A Community Driven Solution to Cybersecurity Challenges

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

How To Write A Cybersecurity Framework

Cybersecurity Framework: Current Status and Next Steps

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

NIST Cybersecurity Framework What It Means for Energy Companies

ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

Framework for Improving Critical Infrastructure Cybersecurity

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity

Health Industry Implementation of the NIST Cybersecurity Framework

Leveraging SANS and NIST to Evaluate New Security Tools

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Cybersecurity & Public Utility Commissions

Delving Into FCC's 'Damn Important' Cybersecurity Report

ITIL Foundation. Learn about process improvements, benefits, and challenges of ITIL, and get your ITIL Foundation certification.

Building Security In:

Why you should adopt the NIST Cybersecurity Framework

NICE and Framework Overview

Cybersecurity: What CFO s Need to Know

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Framework for Improving Critical Infrastructure Cybersecurity

istockphoto/ljupco 36 June 2015 practicallaw.com 2015 Thomson Reuters. All rights reserved.

Framework for Improving Critical Infrastructure Cybersecurity

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity

Applying Framework to Mobile & BYOD

Happy First Anniversary NIST Cybersecurity Framework:

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

Implementing the U.S. Cybersecurity Framework at Intel A Case Study

Framework for Improving Critical Infrastructure Cybersecurity

The NIST Cybersecurity Framework

Navigating the NIST Cybersecurity Framework

PROTIVITI FLASH REPORT

The Unique Alternative to the Big Four. Identity and Access Management

SESSION 706 Wednesday, November 4, 9:00am - 10:00am Track: Framework Fusion

ISE Northeast Executive Forum and Awards

Cyberprivacy and Cybersecurity for Health Data

NIST Unveils Preliminary Cybersecurity Framework

Sustainable Compliance: A System for Ongoing Audit Readiness

IIA Conference. September 18, Paige Needling Director, Global Information Security Recall, Inc.

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

CIP Supply Chain Risk Management (RM ) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

Consolidated Audit Program (CAP) A multi-compliance approach

Accenture Cyber Security Transformation. October 2015

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

Compliance and Cloud Computing

CONCEPTS IN CYBER SECURITY

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

Critical Manufacturing Cybersecurity Framework Implementation Guidance

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C Direct: agarg@thinkbrg.

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

FY 2015 Schedule at a Glance

NIST Cybersecurity Framework & A Tale of Two Criticalities

SECURITY RISK MANAGEMENT

Business Continuity for Cyber Threat

Comprehensive Course Schedule

Bridging the HIPAA/HITECH Compliance Gap

Ed McMurray, CISA, CISSP, CTGA CoNetrix

NIST Cloud Computing Program

NIST Cloud Computing Program Activities

Hosted Virtual Desktops (VDI)

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013

Cybersecurity Strategy

Cyber Security and Privacy - Program 183

Data, Data, Who Has The Data?

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Applying IBM Security solutions to the NIST Cybersecurity Framework

The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School

An Introduction to the Information Security Program Model (ISPM)

Q Utility Rebate Report. Fort Worth, TX

Data Center Consolidation Work Group (DCCWG) Meeting

IA Metrics Why And How To Measure Goodness Of Information Assurance

Transcription:

SESSION ID: GRC-W04 70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready? Tom Conkle Cybersecurity Engineer G2, Inc. @TomConkle Greg Witte Senior Security Engineer G2, Inc. @thenetworkguy

Compliance standards have historically defined risk thresholds for organizations 2

Compliant does not always mean secure 3

4

Agenda Why the Cybersecurity Framework was needed What is the Cybersecurity Framework Why you should care about the Cybersecurity Framework Preparing for using the Cybersecurity Framework 5

More breaches every day despite increased compliance requirements and billions in spending $46 billion in Cybersecurity spending in 2013 Cybersecurity spending increased by 10% in 2013 $3.5M average cost of data breach Up 15% 6

Communicating cybersecurity risk enables appropriate spending 7

Executive Order 13636 asked for the creation of a Cybersecurity Framework applicable to all sectors Executive Order Requirements Be flexible Be non-prescriptive Leverage existing approaches, standards, practices Be globally applicable Focus on risk management vs. rote compliance Framework for Improving Critical Infrastructure Cybersecurity Referred to as The Framework Issued by NIST on February 12, 2014. 8

The Framework was developed in partnership among industry, academia and government San Diego, CA July 10-12, 2013 3 Pittsburg, PA May 29 31, 2013 2 Washington, DC April 3, 2013 1 Dallas, TX Sep 11-13, 2013 4 Raleigh, NC Nov 14-15, 2013 5 NIST Conducted 5 workshops Tampa, FL Oct 29-30, 2013 6 Released 2 RFIs 9

The Framework establishes three primary components Framework Core Implementation Tiers Framework Profiles 10

The Framework Core establishes a common language for describing a cybersecurity program A set of cybersecurity activities, desired outcomes, and applicable references that are common across critical infrastructure sectors. Consists of 5 Functions - Identify, Protect, Detect, Respond, Recover. These provide a high-level, strategic view of the lifecycle of an organization s management of cybersecurity risk. Categories and Subcategories for each Function, matched with example Informative References such as existing standards, guidelines, and practices for each Subcategory. Framework Core 11

The subcategories describe expected outcomes Framework Core 12

Organizations select an Implementation Tier based on their risk threshold Three attributes of Tiers: - Risk Management Process - Integrated Risk Management Program - External Participation Tier 4 may not always be the goal 13

Current and Target state profiles help organizations capture their cybersecurity program 14

The Framework establishes a common language for cybersecurity 15

Communications can occur at all levels within an organization using the Framework 16

The Framework identifies seven steps for developing/improving a cybersecurity program Step 1: Prioritize and Scope Step 2: Orient Step 3: Create a Current Profile Step 4: Conduct a Risk Assessment Step 5: Create a Target Profile Step 6: Determine, Analyze, and Prioritize Gaps Step 7: Implement Action Plan (Build a Roadmap) 17

Organizations identify their business and mission objectives to initiate the process 18

The orient step aligns the business goals, assets, and regulatory requirements for the program Risk Thresholds People 19

Next organization assess their current and target cybersecurity programs to identify gaps 20

The final step is to implement and monitor an action plan to close identified gaps 21

Using the Framework improves communications and eases compliance HIPAA PCI SOC FedRAMP Cybersecurity Program Identify Protect Detect Respond Recover 22

Regulators are using the Framework to increase efficiencies and decrease redundancy The Framework has been mapped to industry leading regulations HIPAA PCI CIP 5 etc Organization not voluntarily aligning to the Framework may see increased burden demonstrating compliance 23

There are several resources available to help you use the Framework Government Programs Department of Homeland Security s C3 Voluntary Program NIST Industry Resources Internet Resource Centers Cybersecurity Framework (CForum) 24

Apply: 70%+ of organizations can benefit from using the Framework Next week you should: Prioritize and scope your organizations cybersecurity program In the first three months following this presentation you should: Initiate a pilot implementation of the cybersecurity Framework Understand areas of improvement within your organization Within six months you should: Begin addressing the roadmap items Expand on the pilot program throughout your organization 25

Q&A Tom Conkle Cybersecurity Engineer G2, Inc. @TomConkle Greg Witte Sr. Security Engineer G2, Inc. @thenetworkguy 26