Cyber Intrusions: More than an IT Challenge



Similar documents
The Homeland Security Exercise and Evaluation Program (HSEEP)

Homeland Security Exercise and Evaluation Program (HSEEP) SELF-HELP GUIDE AGENCY LOGO

Homeland Security Exercise and Evaluation Program Terminology, Methodology, and Compliance Guidelines

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Defensible Strategy To. Cyber Incident Response

Overview Of Emergency Management Exercises

With the large number of. How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning. Virginia A. Jones, CRM, FAI RIM FUNDAMENTALS

SUPPORT ANNEX 16 TRAINING AND EXERCISES

Homeland Security Exercise and Evaluation Program. Volume 1: HSEEP Overview and Exercise Program Management. Revised March 2006

Report on CAP Cybersecurity November 5, 2015

Homeland Security Exercise and Evaluation Program. Volume IV: Sample Exercise Documents and Formats U.S. DEPARTMENT OF HOMELAND SECURITY

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Business Continuity for the New Professional. Britt Corra Enterprise BCM Erika Voss Senior BCM

1) Introduction. Why do Organizations Conduct Exercises? Exercises are used by organizations to:

After Action Report/Improvement Plan

Surviving Contact with Reality Crisis exercises as a key element of cyber incident and crisis management response.

How To Write A National Exercise And Evaluation Program

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

CONSULTING IMAGE PLACEHOLDER

National Cyber Security Policy -2013

The Path Ahead for Security Leaders

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Managing Cyber Risks to Transportation Systems. Mike Slawski Cyber Security Awareness & Outreach

HSEEP Exercise Documentation

Using Evaluation Theory to Analyze the Homeland Security Exercise and Evaluation Program (HSEEP)

How To Manage Security On A Networked Computer System

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Cyber Security Awareness Workshop

How To Protect Your Data From Theft

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

Is Your Company Ready for a Big Data Breach?

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience

CYBER SECURITY INFORMATION SHARING & COLLABORATION

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Into the cybersecurity breach

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Overcoming Five Critical Cybersecurity Gaps

AT A HEARING ENTITLED THREATS TO THE HOMELAND

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

2010 Data Breach Investigations Report

Homeland Security Exercise and Evaluation Program

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Cybersecurity. Are you prepared?

New Mexico Homeland Security and Emergency Management REQUEST TO USE FEDERAL GRANT FUNDS For Training, Conferences or Exercise Activities

Protecting Your Organisation from Targeted Cyber Intrusion

Data Breach Response Planning: Laying the Right Foundation

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Good Practice Guide on National Exercises

DHS, National Cyber Security Division Overview

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

NICE and Framework Overview

Cyber Security Evolved

How IT Can Help Companies Make Better, Faster Decisions

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Defending the Database Techniques and best practices

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Identity and Access Management. Key Initiative Overview

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Human Resource s Role in Crisis Events

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

Logging In: Auditing Cybersecurity in an Unsecure World

Protecting against cyber threats and security breaches

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

Perspectives on Cybersecurity in Healthcare June 2015

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

CyberNEXS Global Services

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Public Health Coalition Exercise Request for Proposal (RFP)

Guidance on data security breach management

Middle Class Economics: Cybersecurity Updated August 7, 2015

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Building a Cyber Security Operations Center

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Priority III: A National Cyberspace Security Awareness and Training Program

CISM Certified Information Security Manager

NIMS Study Guide. Lesson One: What Is the National Incident Management System (NIMS)? What is NIMS?

Transcription:

Cyber Intrusions: More than an IT Challenge ICSJWG Fall Meeting October 16, 2012 Presented by: Bridgette Walsh DHS Cyber Exercise Program (CEP)

State of the World: Cyber Realities Increasing frequency, scope, and complexity of cyber attacks against the private/public sectors. Underscores need for a more robust organizational cyber incident response capability. All-hazards integration - Where does cyber fit in? Presents unique challenges due to diverse attack vectors, widespread impacts, and complex mitigation. 2

Underlying Challenges How can an organization effectively balance traditional incident response needs with those necessitated by a cyber intrusion? How can an organization ensure a robust cyber incident response capability when faced with limited security resources? 3

Good IT is a given IT staff are key to effective cyber response: Play mission-critical role in cyber incident response Traditional first responders to a cyber breach Possess the technical know-how to respond to and contain the immediate impacts of a breach However, good IT is only one piece of the response puzzle. 4

The IT Communications Gap IT management alone of a cyber incident is not the key to an effective whole organization response must have robust communications across the organization: Example: Sony PlayStation3 breach took 6 days to warn customers of potential breach of personal information/credit card data Told customers passwords were stored in database as unencrypted and did not fully explain (until much later) that stolen passwords were hashed could IT, external affairs, and the rest of the organization have communicated more effectively with one another? 5

Cyber Incident Management Team IT staff must work closely with other key organizational entities to guide/inform effective incident response. C-Suite Senior Management How can this coordination be defined, practiced, and formalized? Crisis Response Group/ Business Continuity IT Staff External Affairs HR Legal 6

Cyber Exercises: A Proven Tool Cyber exercises help organizations: Prepare for current threats, emerging vulnerabilities, and direct/indirect impacts associated with a cyber attack Reveal organizational, policy, and operational gaps/overlaps Encourage joint action and collaboration across a wide range of internal and external stakeholders Not a question of if but when practice how you fight! 7

Cyber Exercises: Types Functional Full-Scale Drills Workshops Tabletops Games Capability Seminars Planning/Training 8

Do we exercise? If so, how? Most organizations do conduct cyber exercises, but what types? Technical in nature solving an IT problem Contain the breach; analyze the malcode; perform forensics reinforce training Test defined response plans/protocols/ procedures Business Continuity Plans; Crisis Response Frameworks function/division specific Good, but these exercises of validation are not all-encompassing. 9

Essential Tool: Exercises of Discovery Exercises of discovery : Seek to involve the broader response elements of an organization Address not only the technical mitigation of a cyber attack but also key internal and external communications processes Forge response relationships, communications channels, and help define response roles Identify capability gaps and areas for improvement Inform strategic planning and security investment 10

So what are we discovering? What are the main organizational trends that we see revealed through cyber exercises? 11

Trend 1: Cyber Information Sharing IT should be the primary clearinghouse for cyber threat, vulnerability, and incident information. However, information received by IT is not always shared with the broader response elements of an organization IT staff must be able to effectively communicate: Cyber risk realized/potential impacts Recommended courses of action To senior leaders, external affairs, legal, etc. all in understandable terms 12

Trend 2: Command and Control (CC) Organizations typically implement adequate CC mechanisms for internal cyber incidents. However, when involving external entities in cyber incident response e.g., law enforcement, state/government agencies, other sector partners/thirdparty security vendors: CC can often become overly complex and lack clear definition. Organizations must strive to clearly define incident command roles and responsibilities associated with small, medium, and large-scale cyber attacks. 13

Trend 3: Internal/External Comms IT and continuity often do not collaborate closely with one another on a regular basis resulting in an uninformed perception of the other s roles/available resources that can be leveraged during a cyber incident. IT and external affairs must communicate effectively during a cyber incident these channels ensure customer messaging is timely, accurate, and intelligible. IT and legal department must communicate effectively regarding any legal implications/restrictions involved in cyber incident response. 14

Trend 4: Cyber Training and Education Biggest challenge orgs face: lack of user awareness and cyber-ed. While many orgs do conduct some form of cyber awareness training for employees, this training is often: Infrequent (i.e., only for new-hires or on an ad-hoc basis) Lacking in current/relevant material Non-mandatory resulting in poor user retention or general lack of awareness among employees. One solution: Involve employees in a cyber exercise! 15

How do I plan a cyber exercise? What are the main considerations for planning a cyber exercise at my organization? 16

Cyber Exercises: Planning Considerations Planning requirements depend on exercise type, scope, and determined objectives. At the organizational level, successful planning typically requires several weeks to months Organizations should form an exercise design team: Comprised of key incident response elements (e.g., IT, legal, HR, external affairs, crisis management, senior leadership) Meet regularly to develop and reach consensus on exercise goals and objectives, exercise scenario, participants, and exercise logistics 17

Cyber Exercise: Scenario Development Scenarios should be realistic, grounded in exercise objectives, and should drive exercise discussion/action among all players. Orgs need not spend an exorbitant amount of money to make an exercise interactive, entertaining, or highlyoperational. A successful exercise often involves a half or full-day, facilitated tabletop discussion among a diverse group of key organizational players. 18

Cyber Exercises: Common Challenges Resource Constraints Effective cyber exercises can be done with little or no cost to an organization Senior Leader Buy-In Unfortunately, cyber threats are often not given due consideration until a significant incident occurs Design the exercise to serve as the guiding component of an organization s regular business impact/risk analysis process 19

Cyber Exercises: Common Challenges Lack of Exercise Subject-Matter Expertise Not rocket-science/call CEP! Nobody is available to participate? If senior leaders buy-in so will others We never learn anything from exercises Then you are not conducting the right type of exercise. Exercises should be challenging, thoughtprovoking, even uncomfortable at times. 20

Building a Culture of Exercising: CTEP Organizations should establish a Comprehensive Training and Exercise Program (CTEP) to ensure cyber exercises continue on a regular basis, key outcomes are documented, and improvements are made. CTEP has four distinct phases: Plan Train Exercise Improve It s a continuous process! 21

How can CEP Help? CEP works closely with Federal, state, local, international, and private sector stakeholders to provide: Design, execution, and evaluation support for both discussion-based and operations-based cyber exercises Exercise planning and facilitation, scenario and injects development, after-action analysis, and overall cyber exercise design consultation LLIS.gov CEP page wealth of cyber exercise resources CEP Cyber Scenario Sampler and SitMan Library Critical Infrastructure TTX in a Box (Chemical, Health, Critical Manufacturing so far) Joint CSEP TTX in a Box Post CSEP Assessment * *To be developed 22

Conclusion/Wrap-Up Questions? 23

DHS Cyber Exercise Points of Contact Bridgette Walsh Deputy Director, CEP National Cyber Security Division bridgette.walsh@dhs.gov 703-235-2887 Cyber Exercise Program National Cyber Security Division CEP@DHS.gov Presenter s Name June 17, 2003 24