Data Analytics & Information Security



Similar documents
January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Middle Class Economics: Cybersecurity Updated August 7, 2015

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

An Overview of Large US Military Cybersecurity Organizations

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

CONSULTING IMAGE PLACEHOLDER

Developing a Mature Security Operations Center

CYBERSECURITY INDEX OF INDICES

National Initiative for Cyber Security Education

Romanian National Computer Security Incident Response Team CERT-RO.

Into the cybersecurity breach

Developing a robust cyber security governance framework 16 April 2015

Information Technology Risk Management

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Cybersecurity Threats, Responses & Best Practices Claudia Rast Butzel Long rast@butzel.com Scott Bailey N1 Discovery scott.bailey@n1discovery.

Department of Homeland Security Federal Government Offerings, Products, and Services

CYBERSECURITY RISK MANAGEMENT

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

National Cybersecurity & Communications Integration Center (NCCIC)

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Managing Cyber Risks to Transportation Systems. Mike Slawski Cyber Security Awareness & Outreach

The 5 Cybersecurity Concerns You Can t Overlook

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

INFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE

Addressing Cyber Risk Building robust cyber governance

Risk Analytics for Cyber Security

Presidential Summit Reveals Cybersecurity Concerns, Trends

2011 Forrester Research, Inc. Reproduction Prohibited

MISSION-ESSENTIAL INTELLIGENCE AND CYBER SOLUTIONS

CYBER SECURITY, A GROWING CIO PRIORITY

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

Working with the FBI

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Cyber R &D Research Roundtable

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Cyber Security Metrics Dashboards & Analytics

Managing cyber risks with insurance

ICBA Summary of FFIEC Cybersecurity Assessment Tool

FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness

Confrontation or Collaboration?

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

How To Write A National Cybersecurity Act

U. S. Attorney Office Northern District of Texas March 2013

WORKSHOP Rethinking Cyber Security for Industrial Control Systems

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World

How GCs And Boards Can Brace For The Cybersecurity Storm - Law360

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

2012 CyberSecurity Watch Survey

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014

S. ll IN THE SENATE OF THE UNITED STATES

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Cyber Security Research and Development: A Homeland Security Perspective

Introducing... FedVTE and FedCTE

RSA ARCHER OPERATIONAL RISK MANAGEMENT

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

INFRAGARD.ORG. Portland FBI. Unclassified 1

Information Security Risk and Compliance Series Risking Your Business

Cybersecurity: What CFO s Need to Know

Cyber Risks in Italian market

Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection

Business Continuity for Cyber Threat

Vendor Risk Management Financial Organizations

things you haven t done to protect your business from cybercrime

CERT/CC Overview & CSIRT Development Team Activities

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Transcription:

Data Analytics & Information Security

About The Speaker Practice Director at ERM M.S. Information Networking and Security CERT Coordination Center - Carnegie Mellon University Carnegie Mellon CyLab

Agenda Why Is This Important? Data Analytics In Information Security In Action Questions & Answers

Trying Times The Internet We ve come a long way! Information security is mission critical. Key IS metrics have become measurable and drive organization bottom lines. Tight budgets, aggressive metrics CISOs accountable.

Cybercrime & CyberWarfare The cyber threat will surpass terrorism as the country s number one threat. - Robert Mueller (FBI Director) Congress in the process of preparing cybersecurity legislation. Getting Serious DoD: Cyber Command FBI: Cyber Division DHS: National Cyber Security Division

It s Complicated Individual Hackers. Commercial Hacking Groups The New Mafia. Hacktivists WikiLeaks, Anonymous. Cyber Patriots What did you just call my country? Nope, that s not a crime in Elbonia.

What s The Big Deal? Prime Targets The National Power Grid, Gas Pipeline Infrastructure, Water Treatment Facilities, Banking Sector. A cyber-pearl Harbor would cause physical destruction and the loss of life, an attack that would paralyze and shock the nation and create a profound new sense of vulnerability. - Leon Panetta (Defense Secretary)

Phew, I m Not Directly Affected You Could Well Be! Indirect Responsibility Your organization s computers used in an attack. Direct Target Cyber Extortion. Please also read ERM s 2010 newsletter titled Commercial Hacking The Mafia Returns.

Need Of The Hour A good defense is the best offense. Quick, Accurate, and Timely cybersecurity decisions. Graphical representations of What exactly are you talking about? Business Intelligence spanning across the enterprise.

Information Overload A sea of information, while all factually correct, means nothing. Decisions made around a fixed (and often small) budget, need to be right. It s not about the information it s about the meaning. If it s simple, it will enable decisions.

Enter Data Analytics Graphical encapsulation of the who, what, when, where, how, and why. We re talking dashboards, enterprise-wide snapshots, and decision-making tools. Your loyal friend in the Boardroom. Customization limited only by imagination.

Let s Imagine What are we spending and where? Where is my information? Real-time decision making. What would happen if we? Employee Security Awareness Training.

What Are We Spending and Where? Boardroom Question: So, how efficiently are we spending the information security budget? CISO: I ll let Dash here do the talking.

Where Is My Information? Critical Question. Relieves CISO stress. Dashboards are populated from data stores. Catch: Data stores will need to be created and maintained.

Real-Time Decision Making New vulnerabilities, new platforms, new technologies and interconnectivities. Real-time risk snapshot of your organization can tell you most significant exposures and impacts. Patch up in aisle 5 please! Trend reporting, infrastructure decisions, etc.

What Would Happen If We? Cybersecurity decision making involves several what ifs. Policy levers anyone?

Employee Security Awareness Training We just discussed policy levers. Specialized custom dashboards with policy levers that simulate organizational security posture. Interactive training sessions. I see I remember!

In Action #1 Simulation of organizational network. Tool performs attacks on the network simulation by probing various entry routes. Can help organization test-drive a network design before implementing. Canned simulations used to train technical staff.

In Action #2

Last Words The partnership is here to stay. Dashboards enable business intelligence save time and money. Customization and tailoring is the meat the rest is salad. Boardroom meetings can be fun.

Your go to advisors for all matters in information security. Upcoming Webinars December 13, 2012: January 23, 2013: Incident Command Systems (10 AM to 11 AM) Pruebas de Intrusión de Aplicación (11 AM to 12 PM) www.emrisk.com