Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards



Similar documents
Logging In: Auditing Cybersecurity in an Unsecure World

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

Italy. EY s Global Information Security Survey 2013

Stay ahead of insiderthreats with predictive,intelligent security

Security Controls What Works. Southside Virginia Community College: Security Awareness

Cyber-Security. FAS Annual Conference September 12, 2014

Defending the Database Techniques and best practices

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Top Ten Technology Risks Facing Colleges and Universities

Cloud Security and Managing Use Risks

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Cloud Security: The Grand Challenge

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Securing the Cloud Infrastructure

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Cybersecurity: Protecting Your Business. March 11, 2015

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Vendor Management Panel Discussion. Managing 3 rd Party Risk

Intelligence Driven Security

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Information Security for the Rest of Us

Secure Cloud Computing

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

Defending Against Data Beaches: Internal Controls for Cybersecurity

Developing Secure Software in the Age of Advanced Persistent Threats

Cyber Security Risks for Banking Institutions.

Developing National Frameworks & Engaging the Private Sector

A Decision Maker s Guide to Securing an IT Infrastructure

CyberArk Privileged Threat Analytics. Solution Brief

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

The Onslaught of Cyber Security Threats and What that Means to You

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cisco SAFE: A Security Reference Architecture

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

A Flexible and Comprehensive Approach to a Cloud Compliance Program

Analyzing HTTP/HTTPS Traffic Logs

KEY STEPS FOLLOWING A DATA BREACH

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

10 Smart Ideas for. Keeping Data Safe. From Hackers

Consolidated Audit Program (CAP) A multi-compliance approach

Executive Cyber Security Training. One Day Training Course

Middle Class Economics: Cybersecurity Updated August 7, 2015

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Trends in Information Technology (IT) Auditing

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Achieving Governance, Risk and Compliance Requirements with HISP Certification Course

How To Protect Yourself From A Hacker Attack

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Cybersecurity The role of Internal Audit

SECURITY RISK MANAGEMENT

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

IBM Security Strategy

Cloud Computing Governance & Security. Security Risks in the Cloud

Hands on, field experiences with BYOD. BYOD Seminar

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Cyber Security An Exercise in Predicting the Future

Big Data, Big Risk, Big Rewards. Hussein Syed

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Are you prepared to be next? Invensys Cyber Security

Governance, Risk, and Compliance (GRC) White Paper

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Top 5 Reasons to Choose User-Friendly Strong Authentication

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

2015 VORMETRIC INSIDER THREAT REPORT

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Cyber Risks in the Boardroom

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

Certified Information Systems Auditor (CISA)

Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security

VENDOR MANAGEMENT. General Overview

Cloud Security Trust Cisco to Protect Your Data

Transcription:

Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards Paul de Graaff Chief Strategy Officer Vanguard Integrity Professionals March 11, 2014 Session 14976

AGENDA Current Threat Landscape 1 This part of the presentation discusses the current threat landscape and how enterprises are dealing with the challenges. Regulatory Compliance 2 This part of the presentation discusses the challenges enterprises face with interpreting the regulatory requirement both domestic and international. Security versus Compliance 3 This part of the presentation discusses the Security versus Compliance debate and provides examples that without security there is no compliance Page 2

Setting the Scene ENTERPRISE CHALLENGES

Enterprise Challenges Changes Impacts 4 Page 4

Security Challenges Virtualization/Cloud Dynamic Workloads Cloud Bursting Elasticity Impact Where is my data? Requires Dynamic Security Controls High Audit Requirements Security Intelligence Who wants to harm me What are they after? What methods are used? Impact Where is my IP? How is it protected and monitored? Data Loss Prevention (DLP) Mobility/BYOD Explosion mobile devices BYOD seen as cost saver Data Loss inevitable Impact Requires different set of IT services; Accelerates Cloud Adoption (Dropbox etc.) Page 5

Impact to Enterprises CURRENT THREAT LANDSCAPE

Statistics Note: 2013 Information Security Breaches Survey UK Department of Business Innovation & Skills Page 7

Threat Actors Nation States: State sponsored Cyber Warfare Hacktivism : Individuals that want to cause harm for social reasons INTELLECTUAL PROPERTY Organized Crime : less expensive using digital capabilities than physical Malicious Insider: people with access to sensitive information and using it for profit or other ideals Page 8

Sophistication SCRIPT KIDDY HACKER NATION STATE Low Level Medium Level High Level Motivation: Fun, nothing else to do; Target: anybody Funding: None Motivation: Reputation or Social; Target: Corporations, Governments, High Profile People; Funding: Limited funds but deep expertise; Motivation: Espionage, Influence, Trade Secrets, Inside Information; Target: Government Agencies, Contractors, Think Tanks, Corporations Funding: Well funded and deep expertise; Page 9

Sophistication 10 Page 10

Traditional Security - Set of Layered Defenses Preventive Controls FW, IPS, WAF, DDoS, Awareness, Training Detective Controls IDS, AV, SIM, VA, etc Why do we fail to detect / prevent APT type attacks? Corrective Controls / Response Procedures IR Plans, BCP, DDoS Page 11

Reality versus Ignorance Reality Ignorance 12 Page 12

The ever present checklist REGULATORY COMPLIANCE

The World of Compliance Laws US State Privacy Laws EU Privacy Laws HIPAA GLBA FISMA BASEL II/III Solvency II Industry Standards PCI FFIEC HITECH HITRUST CSA Common Practices COBIT 4.1 ISO 27001 ISO 27002 NIST SP 800-53 ITIL ISF Internal Sources Internal Documents that state security/privacy requirements (your company policies on security and privacu) Contractual Requirements Contractual agreements with 3 rd parties you need to comply with. This may be application or system specific Page 14 14

Traditional Regulatory Compliance Approach Collect This is the data collection phase of all regulatory requirements one has to comply with. Normalize This is the normalization phase where the analysis is done of all the regulatory requirements and determine overlap or conflict. Assess This is assessment phase where the compliance organization assesses the enterprise for compliance with various regulations. Report This is the report phase where the compliance department tells the senior management how bad the state of compliance is. 1 2 3 4 Page 15

Compliance Assessment Methodologies Maturity Spreadsheet Model GRC Solution Page 16

GRC Solution Benefits Pros 1. Control already weighted with requirements 2. saves time and effort on enterprise effort Cons 1. you may need to re-adjust the weight of the controls 2. No GRC Vendor has done all Regulation/Law Controls Mapping Benefits 1. Controls Mapping Done With Various Regulations 2. Maintenance of Regulations done by GRC Vendor 3. Web Based Assessment Capabilities 4. Controls Testing (Vendor Integration) Page 17

No Compliance without Security SECURITY VERSUS COMPLIANCE

Evolution of Security SIM/SIEM IT GRC BIG DATA Operations Focused Compliance Focused Risk Focused Page 19

Security Operations (SIM/SIEM) Security Operations Center Event Driven Limited Correlation Fix and Forget Ticket Closure Measurement Page 20

The Times They Are A-Changing Security Operations Security Intelligence Traditionally: (security) event driven; limited correlation with other events; Fix and Forget; Team is/was measured on how many tickets closed within a certain SLA/OLA; Now: Contextual aware; Correlated and aggregated event information; Isolate and understand attack behavior; Team is now measured on understanding attack vectors and actors and improve the company s layered defenses; Page 21

Weather Report Intelligence Example Most of us produce at best yesterday s weather report as it relates to security!!!! 22 Page 22

Dashboard Opinions 23 Page 23

Security versus Compliance - STEP 1 Establish Security Policies Business Policies Regulatory / Industry Requirements 1 Security Policies Personnel must be authenticated and authorized prior to be being granted access to Company Information Resources. Security Controls Technical Implementation Enforcement / Measurement Page 24

Security versus Compliance - STEP 2 Define related Security Controls Business Policies Regulatory / Industry Requirements Security Policies 2 Security Controls Technical Implementation Access to Company Information Resources should be controlled by unique User IDs and use the following authentication methods: passwords, tokens or biometrics based on the risk identified Passwords should be eight characters in length and contain at a minimum lower and upper case characters and one(1) numeric Enforcement / Measurement Page 25

Security versus Compliance - STEP 3 Implement Technical Controls Business Policies Regulatory / Industry Requirements Security Policies Security Controls 3 Technical Implementation Enforcement / Measurement Page 26

Security versus Compliance - STEP 4 Enforce Policy / Measure Compliance Business Policies Regulatory / Industry Requirements Security Policies Security Controls Technical Implementation 4 Enforcement / Measurement Policy Enforcement Process Change Management (ITIL) Process Page 27

Security versus Compliance Auditors / Regulators Business Policies Regulatory Requirements Security Policies Security Controls Technical Implementation Enforcement / Measurement People Process Technology Page 28

Data Access Governance Process PCI Example DATA LIFECYCLE PROCESS DIAGRAM 1 2 3 4 5 Discover The first phase of the data lifecycle process is to discover where the PCI data in question resides; Asses The second phase of the data life cycle is to assess the protection of the PCI data discovered in Phase I; Remediate The third phase of the data life cycle is to remediate ACL s concerns with the PCI data protection assessed in Phase II Enforce The fourth phase of the data life cycle is to ensure no unauthorized changes are made to ACL s for the PCI data set profiles. Monitor The fifth phase of the data life cycle is the ongoing monitoring of access to the PCI data. Page 29

Wrapup SECURITY VERSUS COMPLIANCE

z/os Security Process Maturity Model First step in the z/os Security Maturity Model is establishing an I&AM framework to properly provison and deprovision access to z/os resources and enhance the productivity of the oragnization through Role Based Access models. Productivity Second step in the z/os Security Maturity Model is establishing a security operations monitoring framework that effectively monitors the z/os environment for intrusions and misuse of resources. Monitor Integrity Third step in the z/os Security Maturity Model is establishing a security policy for z/os and ensuring the policy is enforced at all times to ensure the integrity of the z/os platform. Integration Fourth step in the z/os Security Maturity Model is establishing integration the data security wharehouse where risk analysis is performed to determine unusual data usage patterns that may be an indication of a security breach or fraud. IDENTITY & ACCES MANAGEMENT OPERATIONAL EXCELLENCE POLICY ENFORCEMENT RISK ANALYTICS Page 31

I must be getting old 32 Page 32

Questions & Answers Page 33

Thank You Call us at 800-794-0014 or email us at info@go2vanguard.com Page 34