Selling Cyber Security to the Finance Officers



Similar documents
Enterprise Cybersecurity: Building an Effective Defense

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Security Controls What Works. Southside Virginia Community College: Security Awareness

Big Data, Big Risk, Big Rewards. Hussein Syed

The silver lining: Getting value and mitigating risk in cloud computing

Logging In: Auditing Cybersecurity in an Unsecure World

SCAC Annual Conference. Cybersecurity Demystified

INFORMATION SYSTEMS. Revised: August 2013

How small and medium-sized enterprises can formulate an information security management system

Altius IT Policy Collection Compliance and Standards Matrix

The Protection Mission a constant endeavor

The STAGEnet Security Model

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Four Top Emagined Security Services

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Smart (and safe) Lighting:

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Defending Against Data Beaches: Internal Controls for Cybersecurity

THE BLUENOSE SECURITY FRAMEWORK

The Next Generation of Security Leaders

Information Security Insights From and For Canadian Small to Medium Sized Enterprises

Information Technology Security Program

What is Management Responsible For?

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

ICANWK406A Install, configure and test network security

Cybersecurity Challenges in Healthcare. Doug Copley Beaumont Health & Michigan Healthcare Cybersecurity Council

Obtaining Enterprise Cybersituational

Cybersecurity Framework: Current Status and Next Steps

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

FINRA Publishes its 2015 Report on Cybersecurity Practices

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

A Comparison of Oil and Gas Segment Cyber Security Standards

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

Bellevue University Cybersecurity Programs & Courses

Anthony J. Albanese, Acting Superintendent of Financial Services. Financial and Banking Information Infrastructure Committee (FBIIC) Members:

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

This is a preview - click here to buy the full publication

Leveraging Regulatory Compliance to Improve Cyber Security

IT Governance: The benefits of an Information Security Management System

Ed McMurray, CISA, CISSP, CTGA CoNetrix

NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH

ISACA rudens konference

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Data Security and Healthcare

Healthcare Security: Improving Network Defenses While Serving Patients

Cybersecurity Health Check At A Glance

Click to edit Master title style. How To Choose The Right MSSP

Outsourcing and Information Security

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Building Security In:

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Enterprise Security Governance, Risk and Compliance System. Category: Enterprise IT Management Initiatives. Initiation date: June 15, 2013

F G F O A A N N U A L C O N F E R E N C E

Compliance, audit, risk, security what s the difference and why do we need it?

Guideline on Auditing and Log Management

Human Factors in Information Security

How To Manage Security On A Networked Computer System

Program Overview and 2015 Outlook

The Heart of the Matter:

CESG Certification of Cyber Security Training Courses

CDW-G Federal Cybersecurity Report: Danger on the Front Lines. November CDW Government, Inc.

Library Systems Security: On Premises & Off Premises

Enterprise Cybersecurity: Building an Effective Defense

Securing the Service Desk in the Cloud

Cyber Education triangle clarifying the fog of cyber security through targeted training

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

Security aspects of e-tailing. Chapter 7

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Cybersecurity in an All-IP World Are You Prepared?

Click to edit Master title style

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

How To Implement An Information Security Management System

Happy First Anniversary NIST Cybersecurity Framework:

Which cybersecurity standard is most relevant for a water utility?

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

PREPARED DIRECT TESTIMONY OF SCOTT KING ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY

Microsoft s cybersecurity commitment

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS

US Cyber Marathon. David Ambrose, Chief Security Officer and Chief Privacy Officer Bureau of the Fiscal Service U.S. Department of the Treasury

CONCEPTS IN CYBER SECURITY

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

Cyber Security Symposium 2015 September 29,2015

Security Awareness. ITS Security Training. Fall 2015

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM

OCIE CYBERSECURITY INITIATIVE

Personal Security Practices of the CAO

Cloud Service Providers Overcoming security and compliance barriers

Attachment A. Identification of Risks/Cybersecurity Governance

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

Cybersecurity for Medical Devices

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations. WMACCA September 16, 2014

Transcription:

Selling Cyber Security to the Finance Officers Presented by, Phil Bertolini, Deputy County Executive & CIO Oakland County, MI www.oakgov.com/it/presentations September 2015

Agenda Introduction Business Challenge Technical Challenge CySAFE Recommendations 9/21/2015

Introduction

Agenda Introduction Business Challenge Technical Challenge CySAFE Recommendations 9/21/2015

Business Challenges How to get started with a cybersecurity initiative? How to prioritize efforts? How to gauge impact / risk of needs? How to measure results and progress? 9/21/2015

Cyber Security

Cyber Security

Cyber Security

Agenda Introduction Business Challenge Technical Challenge CySAFE Recommendations 9/21/2015

9/21/2015

9/21/2015

Technical Challenge Numerous cybersecurity standards exist 9/21/2015

9/21/2015

9/21/2015

9/21/2015

Framework for Improving Critical Infrastructure Cybersecurity Developed by NIST under a Presidential initiative Targeted for government 39 Pages of summary and references to other frameworks 98 Controls 9/21/2015

9/21/2015 NIST

ISO 27000 The ISO/IEC 27000-series (also known as the 'ISMS Family of Standards' or 'ISO27k' for short) comprises information security standards published jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). The series provides best practice recommendations on information security management, risks and controls within the context of an overall information security management system (ISMS), similar in design to management systems for quality assurance (the ISO 9000 series) and environmental protection (the ISO 14000 series). 9/21/2015

ISO 27000 The series is deliberately broad in scope, covering more than just privacy, confidentiality and IT or technical security issues. It is applicable to organizations of all shapes and sizes. All organizations are encouraged to assess their information security risks, then implement appropriate information security controls according to their needs, using the guidance and suggestions where relevant. Given the dynamic nature of information security, the ISMS concept incorporates continuous feedback and improvement activities, summarized by Deming's "plan-do-check-act" approach, that seek to address changes in the threats, vulnerabilities or impacts of information security incidents. 9/21/2015

9/21/2015 ISO 27000

20 Critical Controls. 9/21/2015

20 Critical Controls Clear examples of control outputs based on current maturity and end goal More Technical than Management Recommend order of implementation debatable 9/21/2015

9/21/2015

Measuring Risk What is the Risk Equation? Risk = Impact X Probability/Cost 9/21/2015

9/21/2015

Agenda Introduction Business Challenge Technical Challenge CySAFE Recommendations 9/21/2015

www.g2gmarket.com

CySAFE Team Phil Bertolini, Chris Burrows Oakland County Ed Winfield, Jeff Small Wayne County Andy Brush Washtenaw County Rich Malewicz Livingston County Colleen Hinzmann Monroe County Jessica Moy State of Michigan

A practitioner's experience with these standards Need an organized approach that addresses IT Security Management issues and Technical controls 95/5 Rule (36 Controls out of 379) All controls factor (Cost / Time / Risk) Reports built-in with trending and graphs Private (only you have the data) Takes 60 minutes to complete the assessment FREE

9/21/2015

9/21/2015

9/21/2015

9/21/2015

9/21/2015

9/21/2015

9/21/2015

Summary CySAFE tool is an effective way to assess and plan your cybersecurity efforts Designed for any size government entity In 60 minutes, you have a Priority List and Graphs Data is private; Only stored in Excel format Built for governments by governments / FREE Available for all via G2G Cloud Solutions http://www.g2gmarket.com CySAFE for BUSINESS at www.advantageoakland.com 9/21/2015

Agenda Introduction Business Challenge Technical Challenge CySAFE Recommendations 9/21/2015

Oakland County Initiatives 1. Secure endpoints by removing ADMIN access 2. ITSEC Training 3. Multi-Factor Authentication 4. Create Cyber Incident Response Plan 5. Improving patching life cycle timing

Recommendations free or low cost Removing Admin rights Turning on Windows Firewall Bitlocker Use a VPN (there are very cheap cloud based VPNs with low cost monthly fees) No hardware or administration costs required Turn Brower add-ons on like WOT (Web of Trust), HTTPS only Use Least Privilege Model Communicate with staff about Risks and current threats. Ask the users to report suspicious activity/emails Patch often Use a shredder Create a IT Security Policy and communicate it to users Add multifactor authentication Change Passwords and make them complex Use a Password Manager Check your backups Stay current with Web Browers (IE and Firefox) and any other systems that touch the internet Segment your network

Recommendations Hire a CISO # 1 priority for entire IT department What standard are you measuring against? ISO 27000 NIST SANS 20 Critical Controls Prepare to react, respond and recover Training is key to success The world of cyber security has changed Use CySAFE!!!

Wrap Up & Take-Aways Phil Bertolini, Deputy County Executive & CIO Oakland County, MI bertolinip@oakgov.com