send in the marines! federal oversight and the alphabet ......send in the marines! federal oversight...

61
Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

Upload: others

Post on 08-Jun-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security

Inga Goddijn, CIPP/US

Risk Based Security

Page 2: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

A State of (in)Security

Page 3: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

A State of (in)Security

2015 topped the

charts with the

most data loss

events reported in

a single year, with

over 4,000 publicly

disclosed breaches

Source: Cyber Risk Analytics, Risk Based Security

Page 4: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

A State of (in)Security

Everyone Has Something of Value!

Set of business application account credentials in the Brazilian Underground:

$155 - $193

Set of entertainment site credentials in the Chinese Underground:

$325

Set of credit card credentials in the Russian Underground:

$4

A combination of phone number, work email address and social media credentials:

Brazil: $1,931 China: $145 Russia: $200

Source: http://www.trendmicro.com/vinfo/us/security/special-report/cybercriminal-underground-economy-series/global-black-

Page 5: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

A State of (in)Security

Source: VulnDB

Page 6: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

A State of (in)Security

So many vulnerabilities, in fact, it’s difficult to

keep up

Searching Shodan.io, there are 224,858 Internet connected

systems still vulnerable to Heartbleed.

Page 7: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

A State of (in)Security

Networks,

systems and the

methods we use

to access them

are growing in

complexity, not

shrinking

Page 8: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

A State of (in)Security

Questionable

coding and

development

practices,

especially

when it comes

to emerging

technologies

Page 9: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

A State of (in)Security

Even the best security can’t always overcome

basic human nature

Page 10: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

A State of (in)Security

Bottom line: Security pros are being asked to

“get it right” all day, every day. Hackers only

need to be right once to win

Page 11: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

How do we shift the odds in our favor?

By focusing on how to best manage the risk

through the use of formalized and systematic

security standards and frameworks

A State of Security

Page 12: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Standards

The Beauty of Standards is That There Are So Many to Choose From

Page 13: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

A Closer Look At Security Frameworks

Some standards have been with us for many years:

HIPAA/HITECH Security Rules

FFIEC

ISO/IEC 27001/2

COBIT

NIST SP-800 53

ITIL

PCI - Data Security Standard

While some are very new:

NIST – Framework for Improving Critical Infrastructure (Introduced 2014)

CISA – Cybersecurity Information Sharing Act, Section 405 of Title IV, directing HHS to create best practices standards under HIPAA (Effective January 2016)

Page 14: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Information Security Frameworks

Descriptive Models Allow Discretion In

The Selected Controls

Prescriptive Models Detail Required

Mitigation

Page 15: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

NIST Cybersecurity Framework

NIST Cybersecurity Framework

“Recognizing that the national and economic security of theUnited States depends on the reliable functioning of criticalinfrastructure, the President issued Executive Order (EO)13636, Improving Critical Infrastructure Cybersecurity, inFebruary 2013.

“The Order directed NIST to work with stakeholders todevelop a voluntary framework – based on existing standards,guidelines, and practices - for reducing cyber risks to criticalinfrastructure”

Source: http://www.nist.gov/cyberframework/

Page 16: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

NIST Cybersecurity Framework

What, exactly, is “Critical Infrastructure”?

Page 17: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

NIST Cybersecurity Framework

Does this apply to our members?

Excellent question!

“The Executive Order tasked NIST to design

the Framework for voluntary use by private

sector organizations that are part of the critical

infrastructure”

Page 18: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

NIST Cybersecurity Framework

Core• Activities &

Outcomes

Tiers

• Degree of Adoption & Process Maturity

Profile

• Degree of Alignment With Objectives

Page 19: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

NIST CyberSecurity Framework

Function • 5 Distinct Function Groups

Category • 22 Security Domains

Subcategory • 98 Objectives

Page 20: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Framework Core - Functions

• Develop the organizational understanding to manage security risk to systems, assets, data and capabilitiesIdentify

• Develop & implement appropriate safeguards Protect

• Develop & implement activities needed to identify a security eventDetect

• Taking action in response to a detected security eventRespond

• Maintain plans for resilience and restore servicesRecover

Page 21: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Implementation Tiers

Applicable to the

organization’s cyber risk

strategy and risk mitigation

processes

Page 22: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Framework Profile

Current Profile vs Target ProfileAligning Core items with business requirements, risk tolerance

and available resources to create a roadmap toward reducing

information security risk

Page 23: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

NIST Cybersecurity Framework

Details Worth Knowing

Entirely voluntary at this point, even if you’re a provider of

Critical Infrastructure

The framework is intended to be a “living document”, to be

updated and modified over time

There is no clear mechanism for sharing threat intelligence,

but it is encouraged

Conformity assessments are also encouraged, but also no

methodology established as yet

Page 24: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

ISO27001/2:2013

ISO27001/2:2013

Information Security Management System

Page 25: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

ISO 27001/2:2013

Management of the Security System

Control Objectives & Corresponding Controls

Page 26: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

ISO 27001/2:2013

Management Domains

Security in

Organizational ContextOperation

LeadershipRisk Treatment

Planning Performance Evaluation

Support Improvement

Page 27: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

ISO27001/2:2013

Control Domains

Information Security Policies Operations Security

Organization of Information Security

Practices

Communications Security

Human Resources Security System Acquisition, Development and

Maintenance

Asset Management Supplier Relationships

Access Control Incident Management

Cryptography Business Continuity Management

Physical Security Compliance

Page 28: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

ISO27001/2:2013

Principles

Policies

Controls

Process

How Do We Put This To Work for Us?

Page 29: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Why Should We Do This?

Survey Says? Best Practices Are IN!

PWC Global State of Information Security 2016 Study

Page 30: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Why Should We Do This?

The #1 Benefit

Shared Language For Talking About

Acceptable Risk!

Page 31: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Where Do We Start?

Bes

t P

ract

ices

Take Care Of The Security Basics!

Understand what are the most critical assets and how

they are at risk

Make sure everyone is on the same page with a

documented program

Have a plan should the worst happen

Page 32: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

The Basics

When it comes to setting priorities for controls, the SANS 20 Critical Security

Controls for Effective Cyber Defense is an

excellent reference.

www.sans.org/critical-security-controls

Page 33: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

The Basics

Security 101 – Taking Care of the Basics

Vulnerability Scans

– Routine testing of web applications, external and

internal network to uncover overlooked

weaknesses, missed patches and

misconfigurations

– Like going to the doctor - should be checked

out every year

Page 34: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

The Basics

Vulnerability Scan or Pen Test?

It’s the same thing, right?

Page 35: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

No matter the framework or standard, the

process must start with a risk assessment

Moving Beyond the Basics

Page 36: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Risk Assessment

IMPLEMENT THE PLAN!

Identify Residual Risk & Determine if Acceptable

Identify Controls to Mitigate the Risk

Assess The Impact

Identify Threats & Vulnerabilities

Identify & Value Assets

Risk Assessment Method

Page 37: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Risk Assessment

Information Assets & Criticality

• Critical Network Hardware

• Applications

• Data Center

• Student Records

• HR Records / Payroll

• Contracts

Vulnerabilities & Likelihood

• Hackers

• Lost Equipment

• Outdated Systems

• No Redundancy

• Employee Error

• Power Outage

• Flood / Fire / Tornado

Severity x Probability = Risk Score

• Likelihood of the event (x) the severity of the damage if it happens = risk score

• Low

• Moderate

• High

• Scale of 1-10

Page 38: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Risk Assessment

Why it matters

It provides the foundation for understanding:

• Which are the most critical assets;

• What is an acceptable level of risk to each asset;

and

• Evaluating recommended practices against the

actual need for controls.

Page 39: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Document The Security Program

Getting Everyone On The Same Page

Most frameworks require written polices

Should be established by leadership

Communicated to everyone that needs to know

Regularly reviewed

Page 40: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

What About Vendors?

Let’s outsource IT! They promise great

security!

Page 41: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

What About Vendors?

Recent Breaches atTechnology Service Providers

Fortinet

firewall maker1/12/2016

hard-coded backdoor access discovered and

credentials for exploiting the weakness

published on line

Linode

cloud hosting service1/5/2016

usernames, emails addresses and hashed

passwords visible on external server

QS Unisolution

educational SaaS1/6/2016

Over 1,000 student PII exposed due to site

misconfiguration

NGP VAN

voter database management service

12/18/2015

A programming error allowed confidential

voter metrics belonging to the Clinton

campaign to be accessed by members of the

Sander campaign

WPEngine

website hosting service12/12/2015

A hacker exposes up to 150,000 user

passwords

Page 42: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

What About Vendors?

Using third party services doesn’t transfer the security burden, it changes it

• We must demand better security from all of our vendors!

• Take the time to evaluate software & services

– Define requirements in agreements

– New features are great, but not at the expense of a breach

– Vote with $$; select vendors that take security seriously

Page 43: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Incident Response

Developing a controlled approach to incident

response is included in most ‘best practice’

frameworks

Page 44: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Incident Response

Benefits of Planning Ahead

• A roadmap to follow in the midst chaos

• It saves money in the long run

• Can be used to identify trigger points for

escalating the event AND help map to most

critical insurance needs!

Page 45: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Incident Response

Event Response, Incident Response, Breach

Response. It’s all the same thing, Right?

Page 46: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Incident Response

A “security incident” can be

any event that impacts:

the availability of critical data

and systems;

the integrity of data; or

the confidentiality of non-

public information

“Breach response”, the

primary focus of most cyber

insurance coverage offered

by pools and insurers, tends

to refer more narrowly to

unauthorized activity and

compromise of personally

identifiable information

Page 47: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Incident Response

Why It Matters

Verizon DBIR 2015 Report

Page 48: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Incident Response

Event

• Something has occurred but handled automatically or not yet fully investigated

Vulnerability

• Event was analyzed and a weakness discovered that COULD lead to a compromise or business impact

Incident

• Reasonable probability data was exposed but risk-of-harm to individuals not likely or clear impact on business operations

Breach

• Data has been exposed and there is a high potential for misuse and/or harm to persons is reasonably likely

Incident response planning starts with a process for evaluating security events

Got Cyber Cover? Time to report it!

Page 49: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Incident Response

• A security incident management policy

• A designated point person to lead the effort

• Establishes who is a part of the incident response team

• Includes a key contact list (internal and external)

• Defines a communication plan (what, by whom, to whom,

when & how)

• Includes training for IRT members in roles and

responsibilities

• Conducting incident response exercises

Response Plans Should Include

Page 50: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Incident Response

A mature incident response process also

includes a method for collecting event

information in order to learn and improve

Learn

ApplyImprove

Page 51: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Incident Response

• Look for the root cause – not just the symptoms

• What actions would prevent recurrence?

• Follow-up at the end of the process to ensure

prevention plans have been fully implemented

• Review policies, procedures and possibly include

awareness training to reflect the lessons learned from

the investigation

• Did the plan work? Update the breach response plan to

improve the response process

Lessons Learned

Page 52: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Security Events and Threat Sharing

Looking Ahead

Page 53: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Cyber Security Information Sharing Act

Key Facts To Know:

A system for voluntary sharing of cyber security information between private entities and the federal government

Department of Homeland Security (DHS) will act as the central hub for information sharing

Requires the sharing of information in real time

Launched sharing portal on 3/17

6 companies currently enrolled

Page 54: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Cyber Security Information Sharing Act

Pros:

It’s a start, and we need to start somewhere

Sharing can help identify where attackers came from and what their methods look like

cyber threat indicators (CTIs): the tactics, techniques, and procedures used by malicious actors to compromise the computer networks of their victims

Page 55: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Cyber Security Information Sharing Act

Cons:

Can’t fix bad security practices

Won’t catch zero-days - or previously

unknown malware

Protections may not be enough incentive to

share the gory details of a security failure

High degree of sophistication needed to

participate

Page 56: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Cyber Security Information Sharing Act

What can we take from CISA?

Pooling community is UNIQUE –

Shared purpose

Shared constituencies

Many commonly used vendors, applications,

services

A Lot, Actually

Page 57: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

Some Observations From The Trenches

Regardless of how extensive the security

program or number of controls, the best

security programs share seven traits.

Page 58: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

A Program At Its Best Is:

1. An Integral Component of Organization Management

2. Comprehensive & Integrated Throughout the Business

3. Supports the Mission of the Business

4. Sensitive to Social Factors

5. Cost Effective Relative to the Risk

6. Responsibility and Accountability Is Explicit

7. Periodically Reassessed and Refined

Page 59: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

N O T J U S T S E C U R I T Y , T H E R I G H T S E C U R I T Y

A Program At Its Worst:

Likewise, there are some signs the program

might fall short

1. Done to Check a Box

2. Not Including a Risk Assessment

3. Treating All Information Equally

4. Not Following Through

5. Taking On Too Much At Once

Page 60: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

“Ultimately, security is about people – not technology.”

Foundations of Information Privacy and Data Protection

P. Swire & K. Ahmed, 2012

Page 61: Send in the Marines! Federal Oversight and the Alphabet ......Send in the Marines! Federal Oversight and the Alphabet Soup of Cyber Security Inga Goddijn, CIPP/US Risk Based Security

Thank You!