Cybersecurity as a Risk Factor in doing business



Similar documents
Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

How To Write A Cybersecurity Framework

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework: Current Status and Next Steps

Asia Policy Partners LLC 2015

National Institute of Standards and Technology Smart Grid Cybersecurity

Protecting Your Organisation from Targeted Cyber Intrusion

Did you know your security solution can help with PCI compliance too?

Additional Security Considerations and Controls for Virtual Private Networks

The Education Fellowship Finance Centralisation IT Security Strategy

Logging In: Auditing Cybersecurity in an Unsecure World

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Cyber Security. John Leek Chief Strategist

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

Microsoft s cybersecurity commitment

Data Management Policies. Sage ERP Online

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Cloud Security Trust Cisco to Protect Your Data

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

A Decision Maker s Guide to Securing an IT Infrastructure

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Cloud Computing Governance & Security. Security Risks in the Cloud

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Central Agency for Information Technology

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Security Overview Enterprise-Class Secure Mobile File Sharing

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

SECURITY RISK MANAGEMENT

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Cyber Essentials Scheme

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Cybersecurity Health Check At A Glance

Cisco Advanced Services for Network Security

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Industrial Security for Process Automation

Achieving SOX Compliance with Masergy Security Professional Services

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

Jort Kollerie SonicWALL

Security Controls for the Autodesk 360 Managed Services

PCI Data Security Standards (DSS)

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

Building Security In:

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Cyber Essentials Questionnaire

Franchise Data Compromise Trends and Cardholder. December, 2010

Defending Against Data Beaches: Internal Controls for Cybersecurity

Enterprise Cybersecurity: Building an Effective Defense

Cybersecurity Enhancement Account. FY 2017 President s Budget

Addressing Cloud Computing Security Considerations

FINRA Publishes its 2015 Report on Cybersecurity Practices

Enterprise Cybersecurity: Building an Effective Defense

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

THE BLUENOSE SECURITY FRAMEWORK

Nine Steps to Smart Security for Small Businesses

McAfee Security Architectures for the Public Sector

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Research Information Security Guideline

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

HEC Security & Compliance

Technology Risk Management

Best Practices for PC Lockdown and Control Policies. By Dwain Kinghorn

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Seven Strategies to Defend ICSs

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Certified Information Security Manager (CISM)

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Endpoint protection for physical and virtual desktops

Information Security and Risk Management

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Italy. EY s Global Information Security Survey 2013

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Cloud Computing and Records Management

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Transcription:

Cybersecurity as a Risk Factor in doing business 1 Data is the new raw material of business Economist UK, 2013. In trying to defend everything he defended nothing Frederick the Great, Prussia 1712-86. A M C H A M A P C A C 2 0 1 4 M A N I L A P H I L I P P I N E S M I C H A E L M U D D S E C R E T A R Y G E N E R A L - A P A C T H E O P E N C O M P U T I N G A L L I A N C E L O N D O N U K 3/12/2014

Today 2 The Threat The Framework The Action The Future 3/12/2014

The Threat: Why am I here today?

Cyber attacks on the increase 4 Web-based malware attacks doubled in the second half of 2013* Web-based attacks represented 26% of total Conficker worm next with 20%. Macattacks saw 51 new variants Mobile attacks on the increase Android accounted for 97% of all in 2013; 208>804 Symbian 3% Nil on any other mobile O/S (BB/MSFT/IOS) Ouroboros Cyber weapon used in Ukraine 2014 * F-Secure Labs March 2014 3/12/2014

One Example - Target stores 5 Date; Nov. 27 to Dec. 15 Credit card data stolen ; 40 Million Estimate used for fraud ; 10-15%* Estimate fraud per card ; $300* Value of Fraud ;$1.4-2.2bn* Losses to both banks and Target Does not include fines for data breach Or reputational damage Card holders put on credit watch lists VISA now insisting on Chip/Pin deployment *Jeffries Securities 2014 3/12/2014

Encountered Malware by Region 2Q13 Microsoft

RSA 2012 Cybercrime Report 8 3/12/2014

Percent of reporting computers Threat categories 12% 10% 8% 6% 4% 2% 0% Singapore Worldwide Microsoft

Its not all about software 10 From Team Cymru; cross-site request forgery 3/12/2014

The NIST Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity It is the policy of the United States to enhance the security and resilience of the Nation s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties NIST is directed to work with stakeholders to develop a voluntary framework for reducing cyber risks to critical infrastructure This Cybersecurity Framework is being developed in an open manner with input from stakeholders in industry, academia, and government, including a public review and comment process, workshops, and other means of engagement. Courtesy Tim Grance, Cybersecurity Head, NIST 11

The Cybersecurity Framework include a set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks. provide a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, to help owners and operators of critical infrastructure identify, assess, and manage cyber risk. identify areas for improvement that should be addressed through future collaboration with particular sectors and standardsdeveloping organizations able technical innovation and account for organizational differences include guidance for measuring the performance of an entity in implementing the Cybersecurity Framework. Courtesy Tim Grance, Cybersecurity Head, NIST 12

THEMES CATEGORY Cybersecurity Framework Categories and Themes FRAMEWORK PRINCIPLES COMMON POINTS INITIAL GAPS Flexibility Impact on Global Operations Risk Management Approaches Leverage Existing Approaches, Standards, and Best Practices Senior Management Engagement Understanding Threat Environment Business Risk / Risk Assessment Separation of Business and Operational Systems Models / Levels of Maturity Incident Response Cybersecurity Workforce Metrics Privacy / Civil Liberties Tools Dependencies Industry Best Practices Resiliency Critical Infrastructure Cybersecurity Nomenclature Courtesy Tim Grance, Cybersecurity Head, NIST 13

Framework Core Functions and Profile 14 Enables organizations to establish a roadmap to reducing cybersecurity risk Can be used to describe current state and desired target state of specific cybersecurity activities Created by determining which Categories are relevant to a particular organization, sector, or other entity An organization s risk management processes, legal / regulatory requirements, business / mission objectives, and organizational constraints guide the selection of activities during Profile development Courtesy Tim Grance, Cybersecurity Head, NIST

Organizational Information and Decision Flows Courtesy Tim Grance, Cybersecurity Head, NIST 15

The Action : Do s and Don ts Someone must be ultimately responsible If you protect your paper clips and diamonds with equal vigor, you will soon have more paper clips and fewer diamonds Dean Rusk (US Secretary of State, 1961 1969) Start with simple data classification Know your risks. What are they, where are they? Behind every security problem is a human being Do have anti virus on every machine - Including mobile and tablets If you need help, consider Cloud Providers Microsoft

The Australian Government approach Patch & update to current applications Patch & update to current operating systems Host inspection of Microsoft Office Files Host based intrusion detection & prevention Patch & update to current operating systems Australia s Top 35 Network Segmentation & Segregation Monitor System Infrastructure Protect the Endpoint Inbound Host-based Firewall Use gateway and desktop antivirus Lock down operating environments Restrict NetBIOS Monitor Traffic with Network IDPS Capture All Network Traffic Monitor the Network Educate Users Social engineering education Enforce strong passphrases Filter email content by whitelist Force domain IP lookup Protect Email Strong Authentications Restrict administrative privileges Use multi-factor authentication Implement TLS between email servers Filterweb content Whitelist web domains Whitelist HTTP/SSL connections Enforced border gateway Firewall Force domain IP lookup Defend the Web Harden Web & Server Apps Implement data execution prevention Harden server applications Disable LanMan Blacklist domains at the border gateway

The top four actions that will stop 90% 0f all threats Australia s Top 4 Updating applications and using the latest version of an application (Turn on autoupdate) Patching operating systems Keeping admin rights under strict control (and forbidding the use of administrative accounts for email and browsing) Whitelisting applications Microsoft

The Future 19 A new model of computing in emerging. Layered security from the edge (the weakest) to the centre (the Fort Knox ). Protect what is important, not what is just data. What is important is critical infrastructure, national heritage, personal data and the financial system - ultimately every citizens personal data and wealth. As was seen in Japan in 2011 and Leyte in 2013, this all can be destroyed in minutes unless this risk is mitigated. 3/12/2014

Securing Critical Data via the Cloud 10 years ago Security and privacy top of mind Hacking, virus propagation, cyberespionage and cyberwarfare on the rise Enforcement officials need tools & training Vehicles for cross-border collaboration inadequate Today Security and privacy top of mind Hacking, virus propagation, cyberespionage and cyberwarfare on the rise Enforcement officials need tools & training Vehicles for cross-border collaboration inadequate

So what has changed? Its all about trust What are the security issues (and benefits) of the cloud? Service provider practices Does the service provider have a documented information security program, and what does it say? What security certifications does the service provider have? Do they comply with your audit and the regulators, needs? What are the responsibilities of each party, e.g., in the event of a data breach? The key is in the contract the same as captive outsource service providers today

Audits and Certifications 27001 SAS 70 Certified

Cross - Border Data Flows Efficiencies and benefits of cloud computing are best achieved when data information - flows freely across borders APEC, TPP, AEC. The same as business in general; its all global now Privacy laws that overly restrict such flows can be an impediment to economic growth. Its the audit trail that is Govt regulators - customers and investors - real concern. This has been done for decades by the FSI via captive outsourcing.

A Regulatory Framework for your Money Security is about deterring attack Privacy is about creating trust Framework and certifications on security Digital privacy is a top of mind concern for customers of banks, insurance and securities Protect what is critical, not what is just data. How much should the location of the data matter? A ten point approach for regulators

A Framework CONFIDENTIALITY System and Location Transparency SP s should be fully transparent as to where data will be located. Limits On Data Use An SP must not use customers data for any purpose other than that which is necessary to provide the contracted cloud service(s). Data Separation/Isolation A customer s data must be segregated from other data held by the SP. Conditions on Subcontracting SP s may only use subcontractors if the subcontractors are subject to equivalent controls as the SP

A Framework INTEGRITY Due Diligence and Service Provider Compliance A customer should have in place a risk management plan that includes measures to address the risks associated with the use of a SP s cloud service(s). Security and Confidentiality Customers should only contract for services with a SP that has been certified to have and to maintain robust security measures and comprehensive security policies in place Review, Monitoring and Control An SP must provide regular reporting and information to demonstrate their continued compliance with agreed standards, legal and contractual requirements throughout the duration of service provision. Audit and Access Rights An SP should provide access and inspection rights to Regulators (and those regulated) and to demonstrate compliance with all legal and contractual requirements, including regular independent third party audit results (to SSAE 16 SOC1 type ii, for example).

A Framework AVAILABILITY Resilience and Business Continuity An SP must have an effective business continuity plan with appropriate service recovery and resumption times Conditions on Termination Customers must have contractual rights to terminate their contracts with SP s. To the extent the customers requires doing so, the SP s must, upon termination of the contract, work with the customer to return the customers data within the agreed contractual period. The SP must permanently delete all backups/copies of the data from the SP s systems after the customers data is returned. If the Data is not to be returned the SP must permanently delete the Customers Data upon termination of the contract

Acknowledgments; NIST; Tim Grance Microsoft; Pierre Noel 28 THANK YOU! MICHAEL MUDD +(852) 2830 9936 0 9 0 6 4 7 13450 M M U D D @ A S I A P O L I C Y P A R T N E R S. C O M W W W. O P E N C O M P U T I N G A L L I A N C E. O R G 3/12/2014