Similar documents
CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

Risk Management in Global Operating Industry

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Small businesses: What you need to know about cyber security

A NEW APPROACH TO CYBER SECURITY

Cybercrime Security Risks and Challenges Facing Business

Small businesses: What you need to know about cyber security

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Addressing Cyber Risk Building robust cyber governance

Cybersecurity The role of Internal Audit

September 20, 2013 Senior IT Examiner Gene Lilienthal

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM

2012 Bit9 Cyber Security Research Report

Institute of Internal Auditors Cyber Security. Birmingham Event 15 th May 2014 Jason Alexander

Marble & MobileIron Mobile App Risk Mitigation

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

Practical Steps To Securing Process Control Networks

I ve been breached! Now what?

Cyber Security for audit committees

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

The Cyber Threat Profiler

Threat analytics solution

If an alert falls in the forest, does your SOC hear it?

BT Assure Threat Intelligence

Cyber Security & Digital Privacy What Family Offices Need to Know

Cybercrime: risks, penalties and prevention

How To Create An Insight Analysis For Cyber Security

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cyber Security Issues - Brief Business Report

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Cyber security Building confidence in your digital future

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Protecting Malaysia in the Connected world

REPORT. Next steps in cyber security

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

External Supplier Control Requirements

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

BAE Systems Cyber Security Survey Report

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Security for the Cloud of Clouds

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise

Identifying Cyber Risks and How they Impact Your Business

DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION.

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Plan of Attack 5 Step Plan

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Policing Together. A quick guide for businesses to Information Security and Cyber Crime

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Cyber Security Evolved

Security & Privacy Current cover and Risk Management Services

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Who s next after TalkTalk?

PENETRATION TESTING GUIDE. 1

New challenges in Data privacy.

Information Technology Security Review April 16, 2012

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

CYBER SECURITY Audit, Test & Compliance

Website Security: It s Not all About the Hacker Anymore

SPEAR PHISHING UNDERSTANDING THE THREAT

External Communication to Third Parties

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Protecting against cyber threats and security breaches

Cybersecurity and Privacy Hot Topics 2015

CYBERSECURITY HOT TOPICS

Advanced Threat Protection with Dell SecureWorks Security Services

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

How To Protect Your Organization From Insider Threats

ADVANCED THREAT DETECTION G-CLOUD SERVICE DEFINITION

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES

Cybersecurity Awareness. Part 1

Top five strategies for combating modern threats Is anti-virus dead?

10 Smart Ideas for. Keeping Data Safe. From Hackers

Cybersecurity: Protecting Your Business. March 11, 2015

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

idata Improving Defences Against Targeted Attack

Are your people playing an effective role in your cyber resilience?

Corporate Spying An Overview

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Security strategies to stay off the Børsen front page

Secure by design: taking a strategic approach to cybersecurity

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

THE HUMAN COMPONENT OF CYBER SECURITY

How do we Police Cyber Crime?

Transcription:

CYBER SECURITY PROTECTING YOUR BUSINESS James Hatch Director, Cyber Services BAE Systems Applied Intelligence 1

CYBER SECURITY AT BAE SYSTEMS Professional Services Technical Services Prepare Protect Cyber Products Respond Monitor Managed Security 2

CONTENTS Cyber risk why it is different Challenges and organising to address them My suggestions for internal audit 3

CYBER SECURITY IN PHYSICAL TERMS Images from http://commons.wikimedia.org: "Three Surveillance cameras" by Hustvedt, "HH Polizeihauptmeister MZ" by Daniel Schwen, "Janeskh11leakedphoto" by Naval Intelligence Support Center, "T-72 Ajeya1" by Vivek Patankarderivative 4

CURRENT TRENDS Cyber crime Continued industrialization and specialization of digital criminality International law enforcement disruptions Point-of-sale and mobile emerging but still localised DDoS and data breaches continue to grab headlines 5

SHYLOCK FINANCIAL CRIME OPERATION 50k machines compromised globally but mainly in Western Europe and United States UK US IT BR TW UA DE Other 6

CURRENT TRENDS Cyber crime Cyber espionage Continued industrialization and specialization of digital criminality International law enforcement disruptions Point-of-sale and mobile emerging but still localised DDoS and data breaches continue to grab headlines More revelations about nation state activity US authorities increasing pressure on Chinese cyber-espionage Security community focusing more on Russian groups More specialist companies dealing in exploits and malware 7

MONITORING THE EVOLVING THREAT SOC threat intelligence Incident Response Team Malware feeds Open source & security research communities Active & passive tracking Social media & hacker forums 93 Attack Groups tracked; 5 do not have a known location Intelligence exchange with trusted partners 8

CURRENT TRENDS Cyber crime Cyber espionage Cyber activism Continued industrialization and specialization of digital criminality International law enforcement disruptions Point-of-sale and mobile emerging but still localised DDoS and data breaches continue to grab headlines More revelations about nation state activity US authorities increasing pressure on Chinese cyber-espionage Security community focusing more on Russian groups More specialist companies dealing in exploits and malware Low-level activity continues under Anonymous banner Crossover between nation state operations and activism Anti-security activism and research Middle East hot-bed for cyber-attacks and terrorism crossover 9

ANATOMY OF SONY PICTURES ATTACK Phishing Initial compromise Skilled attackers arrive Attacker network Announce Multiple spear phishing e-mails Some users visit convincing website Website drops custom remote access and inventory tools Command and control Admin credentials Data removed through encrypted files Network destroyed Sony Pictures network 10

EVOLUTION OF CYBER THREATS 11

CONTENTS Cyber risk why it is different Challenges and organising to address them My suggestions for internal audit 12

CHALLENGES OF ACHIEVING CYBER SECURITY Labour intensive Scarce resources BEING EFFICIENT Swamped in data Automation and integration Asymmetric threat Situational awareness EFFECTIVE AGAINST REAL THREATS The threat keeps changing Compliance is not security Trap of risk acceptance Achieving coverage IMPLEMENTING CONTROLS Funding and prioritisation Project execution Suppliers and processors KNOWING YOUR ESTATE Shadow IT and BYOD Legacy systems and data Weak architecture and change 13

CYBER SECURITY LAYERS ORGANISATION & GOVERNANCE SECURITY MANAGEMENT SECURITY OPERATIONS Long-term priority (years) Focus on building and overseeing a mature and capable organisation Medium-term priority (months) Focus on understanding and managing down specific security risks Short-term priority (hours / days) Focus on defending against and dealing with live incidents 14

SUMMARY VIEW OF CYBER SECURITY ORGANISATION & GOVERNANCE STRATEGY CAPABILITY BUILD CULTURE AND LEADERSHIP RISK REPORTING MATURITY SECURITY MANAGEMENT PRIORISATION CHANGE PROCESS CONTINUOUS IMPROVEMENT SITUATIONAL AWARENESS TESTING & ASSURANCE SECURITY OPERATIONS 15

KEY STANDARDS AND GUIDANCE ORGANISATION & GOVERNANCE SECURITY MANAGEMENT SECURITY OPERATIONS Three Lines of Defence Operations Assurance Audit BSI PAS555 Cyber risk governance Leadership and governance Risk assessment Protection and mitigation Detection and response Recovery Capability based ISO27000 family 1. Specification for Information Security Management System 2. Potential controls 3. Implementation guidance 4. Measurement and metrics 5. Risk management 6. Certificating organisations Key issues are scope and appetite 10 Steps to Cyber Security Cyber Essentials Critical Security Controls Council on Cyber Security Formerly SANS Top 20 Industry-specific standards Eg Payment Card Industry Data Security Standard Tend to have high overlap and narrow scope 16

CONTENTS Cyber risk why it is different Challenges and organising to address them My suggestions for internal audit 17

ORGANISATIONS SHOULD SHOW THAT THEY Are clear who is responsible Understand their cyber risk Make active decisions on risk Plan for resilience Support strategic priorities 18

ORGANISATIONS SHOULD SHOW THAT THEY Are clear who is responsible Who on the board is responsible? Who explains the risk to them? On what information will we make decisions? Understand their cyber risk Make active decisions on risk Plan for resilience Support strategic priorities 19

CYBER RESPONSIBILITY SOME CHALLENGES Personal experience poor guide Many legitimate demands Nature Sustaining interest is difficult Much is deliberately hidden Moves suddenly from hypothetical to emotional Culture Organisations underestimate their significance / attractiveness Security often treated as compliance or IT issue Skill / language Needs three different skills: Strategic (Impact) Technical (Vulnerability) Intelligence (Threat) People struggle to cover breadth Bad news Not about making money Often asking for cash FD risk owners focussed on cost control Negative baseline 20

ENGAGING WITH BOARD MEMBERS IS THIS A KEY CONCERN FOR THE NEXT 5 YEARS? HOW CAN I HAVE A SECURE BUT AGILE, COMPETITIVE AND GROWING BUSINESS? CEO/Chairmen/ CFO and NEDs HOW SECURE IS MY SUPPLY CHAIN? CFO/COO/CIO HOW DO WE GET CYBER ON THE BOARD AGENDA? General Counsel and NEDs A CYBER AWARE BOARD WHAT IS MY MOST VALUABLE INFORMATION AND WHAT S OUR RISK APPETITE? CRO/CIO WHAT S THE BUSINESS CASE FOR CYBER SECURITY? CFO/CRO/CIO WHAT S THE FINANCIAL IMPACT OF CYBER ATTACK? CFO/CRO/CIO Different board members worry about different questions Find the one whose agenda matches your concern 21

ORGANISATIONS SHOULD SHOW THAT THEY Are clear who is responsible Understand their cyber risk Who on the board is responsible? Who explains the risk to them? On what information will we make decisions? What information is most important to us? What types of cyber risk do we care about? How exposed are we to those risks? Make active decisions on risk Plan for resilience Support strategic priorities 22

CYBER RISK PRINCIPLES Assets Confidentiality Integrity Availability Consequences Risk Impact x Likelihood Vulnerability x Threat Systems Configuration Connectivity Third parties Controls Effectiveness Actors Motivation Intent Tools and techniques 23

UNDERSTAND THEIR CYBER RISK Censure and Embarrassment Client Loss How big is our risk? Direct Fraud Sabotage What type is it? Cyber Espionage Do we care? 24

ORGANISATIONS SHOULD SHOW THAT THEY Are clear who is responsible Understand their cyber risk Make active decisions on risk Who on the board is responsible? Who explains the risk to them? On what information will we make decisions? What information is most important to us? What types of cyber risk do we care about? How exposed are we to those risks? What is our appetite for risk? Have we communicated this to all functions? Are our resources deployed efficiently? Plan for resilience Support strategic priorities 25

MAKE ACTIVE DECISIONS ON RISK 26

EXAMPLE SCENARIO Chris Retail Marketing Campaigns Manager Despite working long hours and over the weekend for the last year, Chris does not get promoted. He applies for another job with a competitor. His new manager invites him out for drinks before he starts the new job to meet the team and suggests he takes some of the customer data with him when he leaves Chris downloads thousands of records via a printer onto a USB stick, for which he has rights. He uploads the details onto the CRM system at his new employer when he joins. The team are then able to use this information to try to win over the customers as it contains details about their accounts and rates. This is made worse by One of the customers that is persistently contacted by the competitor is not happy, she wants to know how they got her details. When no satisfactory answer is forthcoming the customer reports the incident to the Information Commissioner s Office and FSA. The source is traced back to the Bank; there is extensive media coverage with very negative headlines; people lose patience with responses of an ongoing internal investigation and calls are made for the Retail Customer Service Director s resignation. What this means Customers unaware that their details have been leaked are successfully persuaded to switch providers, the organisation loses revenue nadmarket share Negative media coverage. Reputation with customers and within industry is damaged. Additional funds in social media monitoring and a campaign to counter the affect of negative sentiment. FSA and ICO fines. Where we have seen this happen before? A well-publicized data breach can translate into lost business opportunity to the tune of 71 per leaked customer record, according to the Ponemon study A survey by the Ponemon Institute reveals that one-third (34 percent) of customers would move their business to another supplier after learning about a single security breach Blizzard s General Manager for China quit in Dec 2010 after a large data breach involving global subscriber details, financial data and the games release roadmap 27

RISK TREATMENT DECISIONS AVOID REDUCE SHARE RETAIN Bring decisions together in an integrated, prioritised plan 28

ORGANISATIONS SHOULD SHOW THAT THEY Are clear who is responsible Understand their cyber risk Make active decisions on risk Plan for resilience Who on the board is responsible? Who explains the risk to them? On what information will we make decisions? What information is most important to us? What types of cyber risk do we care about? How exposed are we to those risks? What is our appetite for risk? Have we communicated this to all functions? Are our resources deployed efficiently? Do we cover 10 Steps to Cyber Security? How will we know we are being attacked? How will we thrive despite attacks? Support strategic priorities 29

BEING CYBER SECURE PROTECTION DETECTION RESPONSE INTELLIGENCE SECURITY OPERATIONS RISK MANAGEMENT 30

ORGANISATIONS SHOULD SHOW THAT THEY Are clear who is responsible Understand their cyber risk Make active decisions on risk Plan for resilience Support strategic priorities Who on the board is responsible? Who explains the risk to them? On what information will we make decisions? What information is most important to us? What types of cyber risk do we care about? How exposed are we to those risks? What is our appetite for risk? Have we communicated this to all functions? Are our resources deployed efficiently? Do we cover 10 Steps to Cyber Security? How will we know we are being attacked? How will we thrive despite attacks? Does our risk mitigation facilitate and enable growth? Are our controls delaying or blocking progress? Are we agile enough to exploit market opportunities? 31

SUPPORT STRATEGIC PRIORITIES Risks identified early can be managed without compromising opportunity Opportunity Executives focus on pursuing opportunity while managing cost and risk Piecemeal decisions often balance risk and opportunity poorly Business cases for new projects often defer consideration of cyber risk Risk Cost Information security often identifies risk late and in isolation from business Weak costing of information assets and risks means they are ignored Good risk management focuses spend where it is most needed. 32

ORGANISATIONS SHOULD SHOW THAT THEY Are clear who is responsible Understand their cyber risk Make active decisions on risk Plan for resilience Support strategic priorities Who on the board is responsible? Who explains the risk to them? On what information will we make decisions? What information is most important to us? What types of cyber risk do we care about? How exposed are we to those risks? What is our appetite for risk? Have we communicated this to all functions? Are our resources deployed efficiently? Do we cover 10 Steps to Cyber Security? How will we know we are being attacked? How will we thrive despite attacks? Does our risk mitigation facilitate and enable growth? Are our controls delaying or blocking progress? Are we agile enough to exploit market opportunities? 33

CONTACT DETAILS James Hatch Director, Cyber Security Services BAE Systems Applied Intelligence Surrey Research Park Guildford Surrey GU2 7YP United Kingdom T: +44 (0)1483 816086 E: james.hatch3@baesystems.com Copyright BAE Systems 2015. All rights reserved. BAE SYSTEMS, the BAE SYSTEMS Logo and the product names referenced herein are trademarks of BAE Systems plc. BAE Systems Detica and BAE Systems Applied Intelligence are trading names of Detica Limited registered in England (No.1337451) with its registered office at Surrey Research Park, Guildford, England, GU2 7YP. 34