how to steer cyber security with only one kpi: the cyber risk

42
SESSION ID: #RSAC Jan Nys How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience CXO-F02 Nys@Jankbc777

Upload: vuongthuan

Post on 08-Feb-2017

225 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: How to Steer Cyber Security with Only One KPI: The Cyber Risk

SESSION ID:

#RSAC

Jan Nys

How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience

CXO-F02

Nys@Jankbc777

Page 2: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

I Did Not Find It Either…

Page 3: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

KBC at a Glance

Geographical spread

Belgium, Czech Republic , Hungary, Slovakia, Bulgaria, Ireland, …

Different business areas

Retail banks, Insurance, Lease, Securities, Asset Managers, …

Local accountability

IT systems interconnected

~1,600 bank branches worldwide ~36,000 FTEs worldwide, 45% in Belgium, and 51% in Central and Eastern Europe

Page 4: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Challenge: How to Take Control Over This Risk Area

Back in time:

Attacks to KBC companies were happening all the time

A high risk of financial loss, negative publicity, and unavailability of online banking

The protective measures were no longer sufficient

We work in a very diverse Group geographically, and also in terms of business and available resources

KBC PEARL mission

Page 5: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Cyber Risk : The Next Gear

Mission of the Program

Get Cyber defense on acceptable level for

all companies of KBC Group

Report to the KBC GEXCO (*) the status and

mitigating activities of Cyber risk for the

different Business Entities in the Group

Embed business ownership of Information

Security in all entities of the Group

*GEXCO: Group Executive Committee

Page 6: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Group-wide Strategic Objectives

Strengthen Cyber defense in KBC Group while respecting and stimulating the Pearl spirit

Implement proactive threat-based Cyber Risk Management

Create an information highway to be able to respond appropriately to trends and incidents at all levels of the organization

Check and track maturity on Cyber Risk Management: compare to internal peers per business unit and to external peers for KBC Group

Enable to prevent and detect Cyber-attacks in KBC Group companies

Prepare for response on Cyber-attacks and for crisis management

Manage priorities in mitigation actions and guard balance between cost & risk appetite

Prepare for reporting on Cyber Risk

Page 7: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Search for Support

Get heavyweight sponsorship within the company

Chief Risk Officer for IT+ IS (Information Security)

Chief Risk Officer for Group

Get support from top managers

Country Teams (Belgium, Czech Republic, Slovakia, Ireland, Bulgaria)

Management Teams (Asset Management, Securities, …)

Start a program under the auspice of top management

Group Executive Committee

Page 8: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Poll 1

8

How many levels exist between your CISO and your GEXCO/Board?

1 Level

2 Level

More than 2 Levels

Page 9: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Model = Information Security Wheel

Chart all capabilities that have an influence on this risk

Security Event Monitoring Correlation between events

Forensic research How did the attack happen? What’s the

damage? Build a remediation plan.

Secure Software Development Life Cycle Making software safe, “from cradle to grave”

Some examples :

Cyber Threat Intelligence Analysis of threats, incidents and trends

Information Protection

Identity & access

Page 10: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

The Concept of Maturity

Level 2 Repeatable

Documented but discipline is

unlikely to be rigorous

Level 4 Managed

Using process metrics, management can effectively steer &

control

Continuous improvement

Level 5 Optimizing

Level 1 Initial

Ad hoc,

Undocumented,

uncontrolled

Level 3 Defined

Standards are

established

Page 11: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

The Concept of Required Maturity

Basic network protection

Cyber attack simulation

Criminal hacker surveillance

Automated discovery &

forensics

Page 12: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Cyber Threat Assessment

Define Business Services

Define Interfaces for each Business Service

Define Characteristics of Business Services and

Interfaces

Define Vulnerability of each Interface per Threat

Page 13: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Capability Assessment

Required and current maturity level is defined for each of the 8 capabilities and 24 sub-capabilities

Required maturity based on business services, interfaces and threat landscape

Current maturity based on questionnaires & evidence and Challenged

Page 14: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Methodology

Final result is a multi-year roadmap that will close the gap between Current and Required Maturity.

The yearly security action plan is the part of the roadmap that will be implemented within the next year.

Page 15: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Making the Risk Visible: How to Steer with One KPI – Cyber Resilience

Page 16: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Page 17: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Cyber Resilience: Legend for Next Slides

EOY 2015

62,7% The Cyber Resilience shows how close this organization is compared to the maturity that is required for its specific threat landscape

Color coding

This shows the moment in time for the presented values … assuming technology doesn’t change … assuming the threat landscape doesn’t shift … assuming all planned projects can/will be implemented

Page 18: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Roadmap Evolution & Simulations: Example

Now EOY 2NNN EOY 2NNN

93,4% 85,6% 73,3%

Business Unit – Entity x

Green is not necessarily equal to 100% OK

Page 19: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Threat Landscape : Vulnerability Levels

Page 20: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Spider Diagram: Example

Per: - country - business service - interface

Per capability: - Blue: current maturity - Red: intermediate target - Yellow: required maturity

Page 21: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Group-wide Strategic Objectives

Strengthen Cyber defense in KBC Group while respecting and stimulating the Pearl spirit

Implement proactive threat-based Cyber Risk Management

Create an information highway to be able to respond appropriately to trends and incidents at all levels of the organization

Check and track maturity on Cyber Risk Management: compare to internal peers per business unit and to external peers for KBC Group

Enable to prevent and detect Cyber-attacks in KBC Group companies

Prepare for response on Cyber-attacks and for crisis management

Manage priorities in mitigation actions and guard balance between cost & risk appetite

Prepare for reporting on Cyber Risk

Page 22: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Cyber Risk Management on Group Level Services

Page 23: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Provide Supporting Services to Group Members

Page 24: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Cyber Intelligence - Sharing

Page 25: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Non exhaustive list

Intelligence - Sources

Cyber Competence

Center

Public Sector

Federal Computer Crime Unit

KBC Group

Financial Sector

Direct Contact European level National level

FI-ISAC

Providers & Partners

Training

Cross Sector Initiatives

Open Source Intelligence

Page 26: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Provide Supporting Services to Group Members

Page 27: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Cyber Surveillance

Detection of malware targeting KBC companies and shutting down malicious servers (command & control servers)

Detection of phishing activities and shutting down malicious websites

Monitoring of mobile app stores for fake mobile apps of KBC Group companies

Detection of customer/employee credentials on drop zones

Page 28: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Provide Supporting Services to Group Members

Page 29: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Breach Investigation

29

Forensic Investigation

Malware Analysis

Page 30: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Provide Supporting Services to Group Members

Page 31: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Crisis Management

31

Central team steps in when:

Right profiles unavailable

Too many incidents/crises at the same time

Crisis gets out of control

Global Cyber crisis

In 2016

Page 32: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Provide Supporting Services to Group Members

Page 33: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

45%

56% 47%

37% 31%

21%

32%

50%

7% 4%

33% 37% 37%

19%

31% 23%

11%

22%

33%

13%

3%

23%

0%

20%

40%

60%

80%

100%

Scenario 1 Scenario 2 Scenario 3 Scenario 4 Scenario 5 Scenario 6 Scenario 7 Scenario 8 Scenario 9 Scenario 10 Average

Click Rate - suspicious links in emails

Clicked phase 1 Clicked phase 2

Large Scale Phishing Campaign

Number of “clickers” dropped to 23% Continue the efforts this year

Page 34: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Provide Supporting Services to Group Members

Page 35: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Cyber Resilience & Readiness Testing

Vulnerability scanning of all websites in KBC Group

Vulnerability scanning of all mobile apps in KBC Group

Ethical Hacking of our companies

Vulnerability scanning on our internal network

35

Page 36: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Cyber Resilience & Readiness Testing

36

If you didn’t start to scan your websites for vulnerabilities yet, do it now !

114

85

63 60

25

0

25

50

75

100

2011 2012 2013 2014 2015

Positive impact of vulnerability scan

Number of severe Vulnerabilities (all websites)

Page 37: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Poll 2

37

Who has done an Ethical Hacking exercise?

Never

Yes

I do not know what Ethical Hacking means

Page 38: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Reporting to Top Level: Dashboard

Page 39: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Page 40: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

Group-wide Strategic Objectives

Strengthen Cyber defense in KBC Group while respecting and stimulating the Pearl spirit

Implement proactive threat-based Cyber Risk Management

Create an information highway to be able to respond appropriately to trends and incidents at all levels of the organization

Check and track maturity on Cyber Risk Management: compare to internal peers per business unit and to external peers for KBC Group

Enable to prevent and detect Cyber-attacks in KBC Group companies

Prepare for response on Cyber-attacks and for crisis management

Manage priorities in mitigation actions and guard balance between cost & risk appetite

Prepare for reporting on Cyber Risk

Page 41: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC

41

Next week you should:

Not lose time in discussions about ‘the best’ Information Security Framework. Choose one!

Start getting your Top Level Buy-in

In the first three months following this presentation you should:

Involve your Information Security Officers, get them to speak the same language based on your Framework

Define measurable target(s) for your risk appetite and approve them at the Board Level

Within six months you should:

Define your program charter, get it decided at the Board Level and go for it !

Apply What You Have Learned Today

Page 42: How to Steer Cyber Security with Only One KPI: The Cyber Risk

#RSAC