2003 10 00 larry clinton isa best practices presentation at global security conference
TRANSCRIPT
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
1/41
Larry ClintonOperations Officer
Internet Security [email protected]
202-236-0001
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
2/41
Who we are What we believe Why we must take action What should business should do? A coherent program of cyber
security
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
3/41
The Internet Security Alliance
The Internet Security Alliance is a collaborative effort between
Carnegie Mellon UniversitysSoftware Engineering Institute (SEI)
and its CERT Coordination Center (CERT/CC) and the Electronic
Industries Alliance (EIA), a federation of trade associations with
over 2,500 members.
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
4/41
Sponsors
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
5/41
What We Believe
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
6/41
What We Believe
Internet is privately owned and operated Its our responsibility to demonstrate leadership There will be national and international attemptsto regulate Government mandates are doomed to fail Government mandates could be dangerous We must show real progress to forestall
regulation
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
7/41
Why We Must Act
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
8/41
The Past
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
9/41
Source: http://cm.bell-labs.com/who/ches/map/gallery/index.html
The Present
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
10/41
Human Agents
Hackers Disgruntled employees White collar criminals Organized crime Terrorists
Methods of Attack
Brute force Denial of Service Viruses & worms Back door taps &
misappropriation,
Information Warfare (IW)techniques
Exposures
Information theft, loss &corruption
Monetary theft & embezzlement
Critical infrastructure failure Hacker adventures, e-graffiti/
defacement
Business disruption
Representative Incidents Code Red, Nimda, Sircam CD Universe extortion, e-Toys
Hactivist campaign,
Love Bug, Melissa Viruses
The Threats The Risks
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
11/41
Growth in Incidents Reported
to the CERT/CC
1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002
132
110,000
55,100
21,756
9,8593,7342,1342,5732,4122,3401,3347734062526
0
20000
40000
60000
80000
100000
120000
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
12/41
The Dilemma: Growth in Number ofVulnerabilities Reported to CERT/CC
4,129
2,437
171345 311 262
417
1,090
0
500
1,000
1,500
2,000
2,500
3,000
3,500
4,000
4,500
1995 2002
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
13/41
Attack Sophistication v. Intruder
Technical Knowledge
High
Low
1980 1985 1990 1995 2000
password guessing
self-replicating code
password cracking
exploiting known vulnerabilities
disabling audits
back doors
hijackingsessions
sweepers
sniffers
packet spoofing
GUI
automated probes/scans
denial of service
www attacks
Tools
Attackers
IntruderKnowledge
AttackSophistication
stealth / advancedscanning techniques
burglaries
network mgmt. diagnostics
DDOSattacks
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
14/41
Computer Virus Costs (in
billions)
0
30
60
90
120
150
'96 '97 '98 '99 '00 '01 '02 '03
Ran e
(Through Oct 7)
$
billion
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
15/41
Attacks are Inevitable
According to the US Intelligence community Americannetworks will be increasingly targeted by malicious actors
both for the data and the power they possess. National
Strategy to Secure Cyberspace, 2/14/02
The significance of the NIMDA attack was not in the amountof damage it caused but it foreshadows what we could
face in the future CIPB
Things are getting worse not better. NYT 1/30/03
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
16/41
Wont Advanced Technology
Protect Us?
Installing a network security device is not asubstitute for a constant focus andkeeping our defenses up to date There
is no special technology that can make anenterprise completely secure.
National Plan to Secure Cyberspace, 2/14/03
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
17/41
What Should You Do?
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
18/41
The Private Sector and
National CyberSecurity
US government is holding companiesresponsible for their security
Fiduciary and oversight responsibility isbeing enforced
Corporate governance, vision and goalsreside at the executive level
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
19/41
1.Invest in Cyber Security2.Consider Risk Mitigation
3.Become Involved in the PolicyDebate
4. Implement Best practices
5.Join with us in information sharing
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
20/41
Step 1 Invest in Cyber
Security
US Government increasing spending64 % for cyber security.
*****For Business there is a 21% ROI for early
incorporation of security
- CSO Magazine 12/02
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
21/41
Step 2. Become Involved
in Policy Debate Calls for security mandates are being heard
federal, state and internationally
The structures for dealing with these issues arebeing erected now
If industry wants to maintain control over theInternet they must make it secure
A coordinated message is needed
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
22/41
Putnam Legislation
Risk Assessment Risk Mitigation Incident Response Program Tested Continuity plan Updated Patch management program
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
23/41
Ridge May Support
Concept
Companies that sell stock to the public may be
required to disclose what they are doing to protecttheir computer systems, Homeland Security
Secratery Tom Ridge said.
---Atlanta Journal Constitution October 10, 2003
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
24/41
Mandates or Incentives ?
Government mandates standards ? SEC reporting ? California style reporting ? Tax Credits for security investment? Insurance Discounts? Model Private Sector Programs ?
AIG Visa
Nortel Verizon
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
25/41
Step 3. Risk Mitigation/Cyber
Insurance
Consider Cyber Insurance
Are you covered? Should you be covered?
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
26/41
Chief Technology OfficersKnowledge of their Cyber Insurance
34% Incorrectlythought they werecovered
36% Did not haveInsurance
23% Did not know ifthey had insurance
7% Knew that theywere insured by aspecific policy
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
27/41
ISAlliance Cyber-Insurance
Program
Coverage for members
Free Assessment through AIG Market incentive for increased security practices 10% discount off best prices from AIG Additional 5% discount for implementing ISAlliance
Best Practices (July 2002)
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
28/41
Step 4. Adopt and
Implement Best Practices
Cited in US National DraftStrategy to Protect Cyber
Space (September 2002)
Endorsed by TechNet for CEOSecurity Initiative (April 2003)
Endorsed US India BusinessCouncil (April 2003)
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
29/41
Cooperative work on
assessment/certification TechNet CEO Self-
Assessment Program
Bring cyber security to theC-level based on ISA BestPractices
Create a baseline ofsecurity even CEOs canunderstand
American SecurityConsortium 3-Party
Assessment program
Risk Prearadness Index forassessment and
certification
Develop quantitativeindependent ROI for cybersecurity
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
30/41
Common Sense Guide
Top Ten Practice Topics
Practice #1: General ManagementPractice #2: PolicyPractice #3: Risk ManagementPractice #4: Security Architecture & DesignPractice #5: User IssuesPractice #6: System & Network ManagementPractice #7: Authentication & AuthorizationPractice #8: Monitor & AuditPractice #9: Physical SecurityPractice #10: Continuity Planning & Disaster Recovery
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
31/41
ISAlliance/CERT Training
Concepts and Trends In Information Security Information Security for Technical Staff OCTAVE Method Training Workshop Overview of Managing Computer Security Incident
Response Teams
Fundamentals of Incident Handling Advanced Incident Handling for Technical Staff Information Survivability an Executive Perspective
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
32/41
Macro Step 5
Join and participate in a cyber-security
information sharing organization
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
33/41
Benefits
Share critical information across industries andacross national boarders
Provide secure setting to work on commonproblems
Provide economic incentive programs Develop model industry programs Give policy makers an alternative to regulatory
models
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
34/41
CERT Knowledgebase
Examples
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
35/41
Benefits of Information Sharing
Organizations
May lesson the likelihood of attackOrganizations that share information about computer break ins are less
attractive targets for malicious attackers. NYT 2003
Participants in information sharing have theability to better prepare for attacks
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
36/41
Benefits of Information Sharing
Organizations
SNMP vulnerability CERT notified Alliance members Oct. 2001 Publicly disclosed Feb. 2002
Slammer worm CERT notified Alliance members May 2002 Worm exploited Jan. 2003
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
37/41
Why ISA Info Sharing
Works Carnigie Mellon/CERT leadership and credibility History, and regularity build up trust Enforce the rules builds trust Cross-sector/international model lessens
competitive concerns
Success breeds greater success
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
38/41
A Coherent 10 step
Program of Cyber Security
1. Members and CERT create best practices
2. Members and CERT share information
3. Cooperate with industry and government todevelop new models and products consistent with
best practices
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
39/41
A Coherent Program of
Cyber Security
4. Provide Education and Training programs based
on coherent theory and measured compliance
5. Coordinate across sectors
6. Coordinate across boarders
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
40/41
A coherent program
7. Develop the business case (ROI) for improvedcyber security
8. Develop market incentives for consistent
maintenance of cyber security
9. Integrate sound theory and practice into public
policy
10. Constantly expand the perimeter of cybersecurity by adding new members
-
7/31/2019 2003 10 00 Larry Clinton ISA Best Practices Presentation at Global Security Conference
41/41
Larry ClintonOperations Officer
Internet Security Alliance
202-236-0001