Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance



Similar documents
Preservation of longstanding, roles and missions of civilian and intelligence agencies

Docket No. DHS , Notice of Request for Public Comment Regarding Information Sharing and Analysis Organizations

The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter

1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Data Breach Response Planning: Laying the Right Foundation

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

LEGAL ISSUES IN SHARING CYBER THREAT INTELLIGENCE: WHAT ARE THE REAL CONCERNS?

Logging In: Auditing Cybersecurity in an Unsecure World

Legislative Language

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR

Report on CAP Cybersecurity November 5, 2015

Partnership for Cyber Resilience

Chairman Johnson, Ranking Member Carper, and Members of the committee:

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Cybersecurity Risk Information Sharing Program (CRISP): Bi-Directional Trust

BSA GLOBAL CYBERSECURITY FRAMEWORK

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

Coordinating Attack Response at Internet Scale (CARIS)

Information Security Program CHARTER

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

Actions and Recommendations (A/R) Summary

Into the cybersecurity breach

S. ll IN THE SENATE OF THE UNITED STATES A BILL

Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

An Overview of Large US Military Cybersecurity Organizations

[STAFF WORKING DRAFT]

Cybersecurity and Information Sharing: Comparison of H.R and H.R. 1731

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum

Legislative Language

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

Cyber-Security. FAS Annual Conference September 12, 2014

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Billing Code: 3510-EA

How To Write A National Cybersecurity Act

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Public Law th Congress An Act

How To Understand And Manage Cybersecurity Risk

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Cybersecurity and Privacy Hot Topics 2015

FINRA Publishes its 2015 Report on Cybersecurity Practices

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

Big Data, Big Risk, Big Rewards. Hussein Syed

2015 List of Major Management Challenges for the CFPB

Network Security Deployment (NSD)

The Comprehensive National Cybersecurity Initiative

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

Client Update SEC Releases Updated Cybersecurity Examination Guidelines

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Preventing and Defending Against Cyber Attacks June 2011

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

Comments :Incentives To Adopt Improved Cybersecurity Practices

Transcription:

Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance

Agenda CSA History CloudCERT White House Legislative Announcements How is CSA addressing the issue of information sharing? Cloud CISC Pilot Demo Next Steps Questions?

CSA History - CloudCERT CloudCERT was conceived of at the same time as the Cloud Security Alliance (CSA) Broad goal is to improve defenses of the cloud ecosystem against attackers Emphasis was placed on developing CSA due to broader scope and potential impact in industry CloudCERT initiative was formally announced 2010 Working Group has been meeting once a month since January 2011

White House Announcements The President signed an Executive Order encouraging and promoting information sharing. Promotes private sector and government information sharing as well as private to private via Information Sharing and Analysis Organizations (ISAO s) Requires DHS, DoJ, and Privacy and Civil Liberties Board to develop disclosure guidelines

Congressional Action the House The U.S. House is expected to vote on two bills this week which will focus on enabling information sharing between companies and with the Department of Homeland Security. The bills originate from the Homeland Security Committee (HR 1731) and Intelligence Committee (HR 1560). The House Judiciary Committee has provided language regarding liability protections for sharing data. The Rules Committee meets tonight to examine dozens of amendments. Both bills are thought to be complimentary and compatible but will require reconciliation which will probably not occur until the Senate passes its bill The bills define cyber threat indicators as well as cyber defense indicators. The bills require companies to take reasonable efforts to redact or encrypt sensitive information that is unrelated to a cyber attack. Both encourage private-to-private sharing as well as sharing with the DHS s National Cybersecurity and Communications Integration Center. Cloud Security Alliance, 2014.

Congressional Action the Senate The Senate Intelligence Committee passed a measure (S 754) similar to the House s proposed bills. It offers liability protection for sharing between companies and with the Department of Homeland Security. The Senate s vote on this measure may be delayed by agreement of extension of the Patriot Act which expires on June 1. A deal on the Patriot Act is reportedly in the works, but privacy advocates remain concerned. The bottom line: the prospects are good that we will have a law signed before Memorial Day. House and Senate leadership agree that an information sharing law is necessary. However.it is Washington. Cloud Security Alliance, 2014.

How is addressing the issue of information sharing?.

The Problem Attacks are becoming incredibly sophisticated. Knowing what happened is one thing. Knowing what to look for to see if it is happening to you is key. ISAC s have had limited success ISAC model is segmented by vertical (Financial Services, Energy, etc.). View across the sectors is critical to protecting companies today. ISACs do not allow for a Cloud Segment

The Problem ISAC Model requires sending sensitive data to a trusted third party. Company identity is known. Snowden incident has made sharing with trusted third parties undesirable today. Need is clear a trusted method of sharing is required. Company identity is not known so not subject to subpoena s, etc. Incident data submission is quick and simple. Rapid analysis of data including correlation with other reports and open source data Alerts sent in minutes, not days/weeks Ability to anonymously discuss attacks with others and share solutions.

The Solution Cloud CISC CSA Cloud Cyber Incident Sharing Center Cloud adoption is progressing at an accelerating pace. We are concerned that the lack of a robust, automated incident sharing function will inhibit the timely resolution of security incidents, hamper our ability to minimize the damage caused by incidents, and could ultimately have a serious negative impact on the industry. The CSA Cloud CISC will: Provide a truly anonymous, global cyber security incident sharing platform for enterprises; Educate the public and private community on Cloud Security Develop vendor neutral best practices and technical standards Develop policies aligning Cloud CISC to industry and governmental standards on an international basis.

How to get Involved Work Group Co-chair Currently seeking leadership for this initiative 2-3 Co-chairs (1appointed by CSA) Co-chair Requirements Appointed Co-chair must be an employee of a CSA Member Company Additional Co-chairs are decided by vote Time commitment required Contact research@cloudsecurityalliance.org for additional details and questions

How to get Involved Work Group Participant Currently seeking Volunteers for the following areas: Sub Group to focus on Researching, Developing & Promoting Vendor Neutral Best Practices Sub Group to define technical standards for information sharing Sub Group focused on Information Sharing Policy development and outreach Sub Group that will liaise with the standard development communities (SDOs) Contact research@cloudsecurityalliance.org if you are interested in getting involved

How to get Involved We need support from our CSA Provider Community to participate in Cloud CISC Pilot CALL TO ACTION: Submit Incident Report Data Data Types Title Date Region Type of Attack Known Remediation Contact pilot@cloudsecurityalliance.org if you are interested in getting involved with the pilot

How to get Involved CISC Pilot Participant We need support from our CSA Provider Community to participate in Cloud CISC Pilot CALL TO ACTION: Submit Incident Report Data Examples: Subject Date of incident Region Type of Attack Known Remediation

How the Cloud CISC Pilot Works Anonymous Authentication When users transmit sanitized reports, we execute a public anonymous authentication protocol that: Confirms the user is a member of the community, without disclosing the identity of the user, and Delivers a mathematic proof that the user has connected with TruSTAR and that TruSTAR does not know identity of the user.

A patent-pending technology that allows for easy sharing while preserving complete anonymity. 5 Rate & Collaborate 1 Scrub Reports are rated to Incident Reports increase relevance and of Identifying members collaborate Information with Cloud CISC Protects customer PII and Coordinator. corporate IP mitigating 4 Alerts & Review discovery concerns. Alerts members to new report for review along with correlated, actionable information 2 Share 3 Correlate & Analyze Immediately correlates report with open source and other submitted reports Unattributable Reports Protects company identity Powered by

CISC Pilot Demo.

Cloud CISC Next Steps Kick-Off Call & Develop a 4 month Information Sharing Pilot Starting in May/June 2015 Develop and deliver educational programs on Cloud Security and the need for information sharing for both the public and private sector ongoing based on results Identify areas of potential CSA research based on Pilot results Q1 2016 Identify best practices and need for technical standards Nov 2015 - May 2016 Identify need for policies and alignment across industries and governments. Nov 2015 May 2016

????