Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA



Similar documents
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Cybersecurity and internal audit. August 15, 2014

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

Logging and Auditing in a Healthcare Environment

Cisco Security Optimization Service

Assessing the Effectiveness of a Cybersecurity Program

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Payment Card Industry Data Security Standard

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

SANS Top 20 Critical Controls for Effective Cyber Defense

SECURITY. Risk & Compliance Services

The Value of Vulnerability Management*

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Data Centric Security Management. Protecting information in a rapidly evolving and interconnected future

IBM QRadar Security Intelligence April 2013

Third Party Risk Management 12 April 2012

ISE Northeast Executive Forum and Awards

Cybersecurity The role of Internal Audit

PCI Solution for Retail: Addressing Compliance and Security Best Practices

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

External Supplier Control Requirements

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Defending Against Data Beaches: Internal Controls for Cybersecurity

PCI Compliance for Cloud Applications

Breaking down silos of protection: An integrated approach to managing application security

Big Data, Big Risk, Big Rewards. Hussein Syed

Cisco SAFE: A Security Reference Architecture

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

IBM Security QRadar Vulnerability Manager

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

How To Buy Nitro Security

Ecom Infotech. Page 1 of 6

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

How To Test For Security On A Network Without Being Hacked

Top 20 Critical Security Controls

High End Information Security Services

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Delivering IT Security and Compliance as a Service

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

IBM Security X-Force Threat Intelligence

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Online Lead Generation: Data Security Best Practices

Critical Controls for Cyber Security.

FDA Releases Final Cybersecurity Guidance for Medical Devices

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

FINRA Publishes its 2015 Report on Cybersecurity Practices

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

End-user Security Analytics Strengthens Protection with ArcSight

Privacy Risk Assessments

Address C-level Cybersecurity issues to enable and secure Digital transformation

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

Attachment A. Identification of Risks/Cybersecurity Governance

Security Controls What Works. Southside Virginia Community College: Security Awareness

Proven LANDesk Solutions

The Business Case for Security Information Management

Click to edit Master title style

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards

The Education Fellowship Finance Centralisation IT Security Strategy

Application Security Manager ASM. David Perodin F5 Engineer

How to Define SIEM Strategy, Management and Success in the Enterprise

Cybersecurity: Protecting Your Business. March 11, 2015

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Aberdeen City Council IT Security (Network and perimeter)

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Cyber Risks in the Boardroom

Conducting due diligence and managing cybersecurity in medical technology investments

Extreme Networks Security Analytics G2 Vulnerability Manager

Presented by Evan Sylvester, CISSP

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Into the cybersecurity breach

Transcription:

www.pwc.com Vulnerability Management (TVM) Protecting IT assets through a comprehensive program Chicago IIA/ISACA 2 nd Annual Hacking Conference

Introductions Paul Hinds Managing Director Cybersecurity and Privacy Practice Chicago, IL paul.hinds@pwc.com David Eccles-Ambrose Senior Associate Cybersecurity and Privacy Practice Chicago, IL david.eccles-ambrose@pwc.com Vulnerability Management (TVM) 2

Agenda 1. Changing Risk and Protection Models 2. Vulnerability Management Programs 3. Questions Vulnerability Management (TVM) 3

Changing Risk and Protection Models Vulnerability Management (TVM) 4

Data Privacy & Information Security Risks Compliance with government or industry regulations (HIPAA, PCI, GLBA, COPPA, FTC Act) Compliance with selfregulatory frameworks (i.e., U.S.-EU Safe Harbor, TRUSTe, DMA OBA Principles) Compliance Financial Companies face several financial risks associated with a breach: Federal or state regulatory fines Stock price decline Remediation efforts Reputational Risk Factors Legal Companies are experiencing increasing lawsuits from: Employees Customers Investors Negative impact to the brand Loss of employee, customer, & investor confidence Vulnerability Management (TVM) Regulatory Enforcement actions from federal and state agencies Regulatory inquires may require long-term third party remediation in order to verify regulatory compliance 5

What kinds of questions should you be asking? 1 Company Culture What are the company s compliance requirements? What is the culture of the company and what is the philosophy regarding data privacy and security? Who will lead the efforts for information security & privacy (e.g., Steering Committee)? How does the company ensure alignment between the management and staff? What is the company trying to achieve with its information security/privacy program? 2 Sensitive Information What sensitive data does the company collect, use, disclose, dispose, etc.? Is there a process to ensure customers are provided proper notice, choice, and consent with respect to the company s data collection, use, and disclosure practices? How does the company ensure data practices comply with customer privacy notices/policies? Has the company classified and inventoried that data? 3 Threats Has the company's data been exposed and would management know if it were? Does the company know what breach indicators it should be monitoring? Has the company released any new products that collect PII/SPI (i.e., websites, mobile apps, etc.)? Has the company introduced any new technologies that access or store sensitive information (i.e., mobile devices, social media sites, cloud service providers, etc.)? 4 Building Protections Has the company established formal governance and controls around the data privacy lifecycle (i.e., notice, consent/choice, collection, access, disclosure, use, retention, disposal, security, etc.)? Are such controls and safeguards periodically tested and monitored? Have the controls and safeguards been updated to respond to changing business models? 5 Responding to Incidents Has the company established formal plans to respond to privacy and security incidents when they occur? Is there a cross-functional team in place to monitor, investigate and respond to incidents? Is the company prepared to respond to legal actions? If a regulator were to inquire or investigate, would the company be prepared to respond? Vulnerability Management (TVM) 6

Having a Program In Place to Protect Data A comprehensive program is needed to address the myriad of compliance requirements, and to protect consumer information and sensitive company information. Incident Response Governance Monitoring & Auditing Risk Assessment Training & Awareness Processes & Controls Technical Security & Controls Vulnerability Management (TVM) 7

Global State of Information Security Survey Industry practice or tool Percent of respondents using the respective practice or tool Have an overall information security strategy 81% Employ Chief Information Security Officer 74% Employ security information & event management (SIEM) technologies Established security baselines/standards for external partners/customers/suppliers/vendors Security strategy for employee use of personal devices on the enterprise 66% 64% 62% Intrusion-prevention tools 60% Vulnerability scanning tools 60% Intrusion-detection tools 60% Active monitoring/analysis of information security intelligence 59% Vulnerability assessments 54% www.pwc.com/gsiss2015

Vulnerability Management (TVM) Programs Vulnerability Management (TVM) 9

Breach Indicator Methodology 1 Baseline Network Scan Acquire running state information from information technology network using WMI/Linux shell scripts Configure scanning tools to network specifications Use initial scan data to represent current state of network Why? Customize and tune our solution for the client network 2 Analysis of Running Processes Review and analyze collected running process information for workstations and servers Analyze for statistical anomalies and compare against our proprietary list of known breach indicators Determine present state deviation from baseline 3 Network Log Analysis Review collected information for network connections May request certain log data from monitoring technologies for analysis (firewall, proxy, Web server, Intrusion Detection System, etc.) Provide a thorough picture of the state of the network Correlate end-point results with expanded network knowledge 4 Output Analysis / Threat Intelligence Review Work with internal information technology teams to determine business justification for processes and network connections that exist within environment Establish baseline limited to authorized system or network activity Validate technical results and build threat profile 5 Report Findings Categorize the assessment observations by risk in a detailed observations matrix for leadership to review Business impact discussion with key stakeholders Document results for stakeholder remediation decisions Vulnerability Management (TVM) 10

Components of a TVM Program Defining program ownership, policies and procedures, and integration with enterprise risk management program Actively monitoring and enhancing the TVM program TVM Security Strategy & Planning Detecting breaches, rogue technologies, and malicious activities. vulnerability management program Isolating and resolving asset security issues once identified Vulnerability Evaluation Actively identifying asset weaknesses before they can be exploited by an attack Vulnerability Management (TVM) Evaluating threats and vulnerabilities and establishing communication and tracking mechanisms 11

TVM Program 20 Integrated Capabilities Program ownership Policy and procedures Integration with risk management Program maturity enhancement Threat awareness Reporting Security infrastructure implementation Security remediation Incident response TVM Security Strategy & Planning vulnerability management program Vulnerability Evaluation Intrusion monitoring Malicious program detection Rogue technology discovery Log activity analysis Compliance testing Vulnerability scanning Penetration testing Intelligence analysis Vulnerability Management (TVM) Security intelligence Communication and tracking Controls effectiveness evaluation 12

TVM Program Scorecard Program ownership Policy and procedures Integration with risk management Program maturity enhancement Threat awareness Reporting Security infrastructure implementation Security remediation Incident response TVM Security Strategy & Planning vulnerability management program Vulnerability Evaluation Intrusion monitoring Malicious program detection Rogue technology discovery Log activity analysis Compliance testing Vulnerability scanning Penetration testing Intelligence analysis Vulnerability Management (TVM) Security intelligence Communication and tracking Controls effectiveness evaluation 13

TVM Security Strategy & Planning Assessment Program ownership The governance structure must ensure that designated individuals have the capacity to hold asset owners accountable. Policy and procedure Management s intent and directives are documented in the relevant policies and procedures, but must be enhanced with additional security awareness training. Integration with risk management An integrated TVM program which enhances the overall enterprise information security risk management program TVM Security Strategy & Planning vulnerability management program Vulnerability Evaluation Defining program ownership, policies, procedures, and integration with enterprise risk management program Vulnerability Management (TVM) 14

Threat Detection Capabilities Analysis Intrusion monitoring There s lots of options- host based like OSSEC, or network based like SNORT, but how do you assess the effectiveness of the intrusion monitoring? Malicious program detection Rogue security software, adware, and spyware. Rogue technology discovery It can be difficult to detect, prevent, and control rogue technologies in most enterprise environments. Network Access Control (Cisco ISE), detect unapproved wireless device with Cisco CleanAir. Log activity analysis How do you effectively manage your log monitoring and anomaly detection capabilities? SIEM tools like AlienVault, LogRythm, and Splunk? Breach indicator analysis Immature organizations lack basic capabilities to identify indicators of a security breach. TVM Security Strategy & Planning vulnerability management program Vulnerability Evaluation Actively identifying and isolating threats to minimize their impact upon assets Vulnerability Management (TVM) 15

Vulnerability Detection Analysis Compliance testing How do you evaluate conformance with established security guidelines and policies and compliance monitoring techniques? Unreliable scanning or time consuming audits? Vulnerability scanning Enhance vulnerability scanning capabilities by assessing factors such as tools, techniques, scope and frequency Nessus, Nexpose, QualysGuard. Penetration testing Penetration testing assesses factors such as methodology, attack scenarios, scope and frequency. Intelligence analysis Security intelligence should be gathered from multiple sources and effectively leveraged through use of intelligence tools. TVM Security Strategy & Planning vulnerability management program Vulnerability Evaluation Actively identifying asset weaknesses before they can be exploited by an attack Vulnerability Management (TVM) 16

Vulnerability Evaluation Analysis Security intelligence Big data analytics approach (ArcSight or QRadar) ensures assimilation and correlation of security information and the process of responding to the identified issues Communication and tracking How are identified threats and vulnerabilities being communicated and tracked until closure? Controls effectiveness evaluation Assess the process of evaluating the controls and mitigating mechanisms TVM Security Strategy & Planning vulnerability management program Vulnerability Evaluation Evaluating threats and vulnerabilities and establishing communication and tracking mechanism Vulnerability Management (TVM) 17

Vulnerability Remediation and Response Analysis Security infrastructure implementation Enforce change management and configuration management processes to ensure infrastructure and controls are implemented consistently with the company s security standards, such that they achieve the desired benefits and functionality. Security remediation Security remediation of the vulnerabilities detected should be a key performance indicator for the security program. TVM Security Strategy & Planning vulnerability management program Vulnerability Evaluation Incident response Adopt mature IT service management (ITSM), i.e. ITIL. Isolating and resolving asset security issues once identified Vulnerability Management (TVM) 18

Security Information Management and Sustenance Analysis Program maturity enhancement Continually monitor and enhance the program s maturity. Threat awareness Enhance the organization s defenses with security awareness activities to educate relevant users on threats. Reporting Identify key performance and key risk indicators for reporting the status of the TVM program and the actions taken in response improve the current capabilities. TVM Security Strategy & Planning vulnerability management program Vulnerability Evaluation Actively monitoring and enhancing the TVM program Vulnerability Management (TVM) 19

Questions? 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved. refers to the US member firm, and may sometimes refer to the network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details. This content is general information purposes only, and should not be used as a substitute for consultation with professional advisors. US helps organizations and individuals create the value they're looking for. We're a member of the network of firms, which has firms in 157 countries with more than 195,000 people. We're committed to delivering quality in assurance, tax and advisory services. Find out more and tell us what matters to you by visiting us at www.pwc.com/us.