Assessing the Effectiveness of a Cybersecurity Program



Similar documents
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Looking at the SANS 20 Critical Security Controls

Critical Controls for Cyber Security.

Defending Against Data Beaches: Internal Controls for Cybersecurity

Professional Services Overview

The Protection Mission a constant endeavor

THE TOP 4 CONTROLS.

Building a More Secure and Prosperous Texas through Expanded Cybersecurity

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Attachment A. Identification of Risks/Cybersecurity Governance

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Check Point and Security Best Practices. December 2013 Presented by David Rawle

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Leveraging SANS and NIST to Evaluate New Security Tools

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Top 20 Critical Security Controls

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

PCI DSS AND THE TOP 20 CRITICAL SECURITY CONTROLS COMPARING SECURITY FRAMEWORKS SERIES

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

SANS Top 20 Critical Controls for Effective Cyber Defense

Information Technology Risk Management

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

OCIE CYBERSECURITY INITIATIVE

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

SCAC Annual Conference. Cybersecurity Demystified

Cybersecurity The role of Internal Audit

Cyber Security Management

Jumpstarting Your Security Awareness Program

Altius IT Policy Collection Compliance and Standards Matrix

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

PCI Compliance for Cloud Applications

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Cybersecurity: What CFO s Need to Know

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Cybersecurity and internal audit. August 15, 2014

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

ICANWK406A Install, configure and test network security

NERC CIP VERSION 5 COMPLIANCE

Security Management. Keeping the IT Security Administrator Busy

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

The Role of Security Monitoring & SIEM in Risk Management

(Instructor-led; 3 Days)

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Enterprise Computing Solutions

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

FINRA Publishes its 2015 Report on Cybersecurity Practices

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

MEDICAL DEVICE Cybersecurity.

Chapter 1 The Principles of Auditing 1

Our Commitment to Information Security

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

Developing National Frameworks & Engaging the Private Sector

Into the cybersecurity breach

F G F O A A N N U A L C O N F E R E N C E

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Enterprise Cybersecurity: Building an Effective Defense

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cybersecurity Framework Security Policy Mapping Table

Program Overview and 2015 Outlook

INCIDENT RESPONSE CHECKLIST

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

Five keys to a more secure data environment

5 Steps to Advanced Threat Protection

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

Certified Information Security Manager (CISM)

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

Application Security in the Software Development Lifecycle

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Microsoft s Compliance Framework for Online Services

KEY TRENDS AND DRIVERS OF SECURITY

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

State of Oregon. State of Oregon 1

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

External Supplier Control Requirements

Security Controls in Service Management

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

Transcription:

Assessing the Effectiveness of a Cybersecurity Program Lynn D. Shiang Delta Risk LLC, A Chertoff Group Company

Objectives Understand control frameworks, assessment structures and scoping of detailed reviews Understand practical steps for assessing the Cybersecurity Program Understand that It CAN happen or it MAY have already happened

Commercial vs. Industrial Networks Commercial Networks Failure could have financial impact on XYZ Co. and its business partners, shareholders, brand reputation, etc. Cyber-terrorists, hackers, industry competitors pose well-known threats to commercial networks XYZ Co. may incur fines, penalties or lawsuits Industrial Networks (especially critical infrastructure organizations) Failure could have severe, regional or nation-wide health and safety effects Cyber-terrorists organizations pose a great threat to industrial networks (especially critical infrastructure systems) Fines/penalties may be the least of the organization s worries

Network Comparisons Drawing obtained from: Introduction to Industrial Control Networks, Galloway, Brendan & Hancke, Gerhard, 2012

Security Issues for SCADA Systems The reliable function of SCADA systems in our modern infrastructure is crucial to public health and safety. Lack of attention to security, availability, integrity, change management and authentication in design, testing, deployment and operation of some existing SCADA networks and applications Belief that SCADA systems have the benefit of security through obscurity through the use of specialized protocols and proprietary interfaces Belief that SCADA networks are secure because they are physically secured Belief that SCADA networks are secure because they are disconnected from the Internet Industrial Control Systems (ICS) were not designed or built for security

Popular Control Frameworks NIST SP 800-53 rev. 4 (CSF) CoBIT ISO 2700x family SANS Critical Security Controls (CSC)

Choosing a Framework Considerations: Industry best practices Regulatory requirements Intellectual property or critical information values Quantity, location, criticality of business critical systems Nation-wide critical infrastructure relevance (DHS) Current maturity vs desired maturity

ISO 27002 Domains 1. Information security policies 2. Organization of information security 3. Human resource security 4. Asset management 5. Access control 6. Cryptography 7. Physical & environmental sec 8. Operations security 9. Communications security 10. System acquisition, development & maintenance 11. Supplier relationships 12. Information security incident management 13. Information security aspects of business continuity management 14. Compliance

NIST CSF Framework (SCADA) 1. Asset Management 2. Business Environment 3. Governance 4. Risk Assessment 5. Risk Management Strategy 6. Access Control 7. Awareness & Training 8. Data Security 9. Information Protection Processes & Procedures 10. Maintenance 11. Protective Technology 12. Anomalies & Events 13. Security Continuous Monitoring 14. Detection Processes 15. Response Planning 16. Communications 17. Analysis 18. Mitigation 19. Improvements 20. Recovery Planning

SANS Common Security Controls (CSC) 1. Inventory of devices 2. Inventory of software 3. Security configurations (hardware, software, servers, workstations) 4. Continuous vulnerability assessment & remediation 5. Malware defenses 6. Application software security 7. Wireless device control 8. Data recovery capability 9. Security skills assessment & training 10. Secure configurations for network devices (firewalls, routers, switches) 11. Limits & controls on network ports, protocols, and services 12. Controlled use of admin privileges 13. Boundary defense 14. Maintenance, monitoring and analysis of security audit logs 15. Controlled access based on need-toknow 16. Account monitoring and control 17. Data loss prevention 18. Incident response management 19. Secure network engineering 20. Penetration tests and red team exercises

Implementing a Framework Asset protection (information security) is a journey Consistent improvement is the realistic goal Figure out where you are in the journey (baseline assessment) Determine where you should be (baseline to do s ) Define the reasonable and realistic (12-18 mos.) strategic, tactical, operational and educational plans to get there (Management Action Plan - MAP) Check progress of efforts no less than annually; ideally quarterly Educate on risks and report risk management progress to C-level committees and Board of Directors quarterly

Who? Assessing Information Security Capabilities Who performs the assessment? Defined by scope and objectives External, qualified information security consulting firm Continuous self-assessment Internal Audit

What? Assessing Information Security Capabilities What gets assessed? Administrative Processes, or Technical Safeguards, or Physical Safeguards, or Full Information Security Management System, or Newly mitigated audit/assessment findings, or

Assessing Information Security Capabilities When? When should an assessment occur? Self assessment continually External program assessment every two years Internal program assessment yearly Specialized program area assessments twice yearly Specialty topics as necessary

Why? Assessing Information Security Capabilities Why should an assessment occur? Regular risk & compliance management process SCADA conformance Focused problem areas (e.g., validation of mitigation of previous audit or breach findings) SSAE 16 completion for service organizations Board of Directors, Shareholders, stakeholders

Structuring the Assessment Determine: Scope (e.g., one division, policies, firewalls, etc.) Assessment objectives Provider (in-house or external) Assessment Project Leader (accountable manager) Framework of record (ISO 27002, NIST, CSC, etc.) Results reporting content & format (define presence & effectiveness or maturity ratings) Closure processes, schedules, logistics, etc.

Methodology A Full ISMS Assessment approach (not all-inclusive) Review documentation (e.g., policies, procedures, configurations, network drawings, security program structure, committee charters, etc.) Interview stakeholders, accountable managers, Legal, Audit, C-level leadership, etc.) Rate each framework element or domain (CMMI?) Correlate data and develop prioritized recommendations (based on risk, quick win, other strategies, etc.)

Methodology B Technical approaches (not all-inclusive) Network vulnerability assessment Application security assessment Exercises and red team activities Penetration testing PMO management of information security inside the SDLC Log management and aggregation assessment Firewall placement and configurations

Methodology C Administrative approaches (not all-inclusive) Governance & information security organization Policies, framework & lifecycle management Change management program User lifecycle management Human Resources processes Security awareness & education programs

Methodology D Physical Security approaches (not all-inclusive) Social engineering Awareness testing Monitoring & surveillance infrastructure Guard competency Incident response & recovery capabilities

Real-World Events Social engineering Distributed Denial of Service (DDoS) Data Integrity hacking un-awareness Lack of policies & processes Carelessly restricted system admin privileges An unidentified group of hackers targeting natural gas pipeline companies gained access to the corporate systems of several of their targets and "exfiltrated" -- that's security-speak for "stole" -- data on how their control systems work. (CNN news 2012)

Verizon s 2015 DBIR

Thank You Lynn D. Shiang Delta Risk LLC, A Chertoff Group Company O: 314.918.7499 C: 314.650.4498 www.delta-risk.net