Cybersecurity - What’s Next? June 2017

Slides:



Advertisements
Similar presentations
Security Controls – What Works
Advertisements

Security+ Guide to Network Security Fundamentals
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
The Way Ahead for Information Systems Security: What You Don’t Know Can Hurt You Christopher Baum Research Vice President Global Government NYSCIO Conference.
Computer Security: Principles and Practice
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Session 3 – Information Security Policies
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Website Hardening HUIT IT Security | Sep
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
SEC835 Database and Web application security Information Security Architecture.
Information Security Issues at Casinos and eGaming
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA COMPLIANCE WITH DELL
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Dell Connected Security Solutions Simplify & unify.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Note1 (Admi1) Overview of administering security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Security and resilience for Smart Hospitals Key findings
Principles Identified - UK DfT -
Your Partner for Superior Cybersecurity
Your security risk is higher than ever.
Team 1 – Incident Response
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Security Standard: “reasonable security”
Compliance with hardening standards
Cybersecurity Policies & Procedures ICA
Cyber Protections: First Step, Risk Assessment
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Security Engineering.
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
Forensics Week 11.
I have many checklists: how do I get started with cyber security?
Risks & Reality Cyber Security Risks & Reality
Andy Hall – Cyber & Tech INSURANCE Specialist
PBA.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
How to Mitigate the Consequences What are the Countermeasures?
Drew Hunt Network Security Analyst Valley Medical Center
IS4680 Security Auditing for Compliance
Risk Mitigation & Incident Response Week 12
Cybersecurity Threat Assessment
Managing IT Risk in a digital Transformation AGE
Cyber Security in a Risk Management Framework
DSC Contract Management Committee Meeting
In the attack index…what number is your Company?
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Cloud Computing for Wireless Networks
Presentation transcript:

Cybersecurity - What’s Next? June 2017

Complacency – Your Worst Enemy http://www8.hp.com/us/en/solutions/security/thewolf.html

Technology & Infrastructure: Data Breaches Source: Verizon 2017 Data Breaches Investigation Report

Types of Threat Bus hacking & remote control Website penetration Network intrusion Physical building intrusion Ransomware DOS & DDOS Weak password policy Lack of multi factor authentication Bots Printers Insider threats Social engineering

Technology & Infrastructure Key Concerns Protect Assets Endpoint Security Web Application Vulnerability Password Protection PCI/PII HIPAA Recognize External Threats Ransomware and espionage Physical theft/POS device attacks Compromise of assets (vehicles)

Technology & Infrastructure: Vehicle Hacking “Security By Obscurity” No Longer Applies CAN-Bus Vulnerability Open J1939 standards “Risk Points”: Brakes, Powertrain, GPS Hacking Activities Packet Snooping, Data Collection, Packet Injection Vulnerability Mitigation Securing the Vehicle CAN Bus Network Segregation & Isolation Intrusion Detection Tools Message Verification & Authentication Passwords On All Externally Facing Devices Vendor Review & Due Diligence Source: University of Michigan Transportation Research Institute

What is your level of maturity on information security?

Development Of A Security Strategy Determine acceptable levels of risk against how much investment is needed to meet business goals. Emerging Trends Could Do Should Do Must Do Risk-Based Decisions to Achieve Business Goals Proactive management Protection of Business Assets Baseline protection Compliance & Regulatory

One Option: SAMM Approach SAMM: Software Assurance Maturity Model SAMM defines four critical Business Functions. Each Business Function is a category of activities related to software development. For each Business Function, SAMM defines three Security Practices. Each Security Practice is an area of security-related activities that build assurance for the related Business Function. Overall, there are twelve Security Practices that are the independent silos for improvement that map underneath the Business Functions of software development.

Another Option: CESG Approach

CESG - 10 Steps to Cyber Security User Education and Awareness Produce user security policies covering acceptable and secure use of the organisation’s systems Establish a staff training programme Maintain user awareness of the cyber risks Headline Activities Status Simplified policies defined working through approvals 1 # Lack of budget Cyber risk survey carried out & emails sent to users Home and Mobile Working Develop a mobile working policy and train staff to adhere to it Apply the secure baseline build to all devices Protect data both in transit and at rest 2 Secure Configuration Apply security patches and ensure that the secure configuration of all ICT system is maintained Create a system inventory and define a baseline build for all ICT devices 3 Removable Media Controls Produce a policy to control all access to removable media Limit media types and use Scan all media for malware before importing onto the corporate system 4 Managing User Privileges Establish account management processes and limit the number of privileged accounts Limit user privileges and monitor user activity Control access to activity and audit logs 5 Policy defined & awaiting HR sign off and distribution In Place Servers OK PCs to be controlled by AV software Policies need enforcing In place Green does not mean we are comfortable with security in that area but shows management and focus is in place

CESG - 10 Steps to Cyber Security Incident Management Establish an incident response and disaster recovery capability Produce and test incident management plans Provide specialist training to the incident management team Report criminal incidents to law enforcement Headline Activities Status DR Yes / Incident response NO 6 # Plans in place and testing underway IT Training given but no wider In Place Monitoring Establish monitoring strategy and produce supporting policies Continuously monitor all ICT systems and networks Analyse logs for unusual activity that could indicate an attack 7 Malware Protection Produce relevant policy and establish anti malware defences that are applicable and relevant to all business areas Scan for malware across the organisation 8 Network Security Protect your networks against external and internal attack Manage the network perimeter Filter out unauthorised access and malicious content Monitor and test security controls 9 Defining and communicating your Board’s Information Risk Management Regime is central to your organisation’s overall cyber security strategy. CESG recommend you review this regime – together with the nine associated security areas described below in order to protect your business against the majority of cyber threats 10 Monitoring in place, policies under way Product being reviewed in US AV in place and active monitoring be done Monitoring in place Managed by 3rd party Green does not mean we are comfortable with security in that area but shows management and focus is in place

Priorities For Transportation Cybersecurity Standards, Policies and Procedures Develop, formalize and document policies and procedures in protecting against threats and improving resilience to such incidents. Information System Technology & Infrastructure Ensure the capability, maintenance, serviceability and interoperability of the organization’s physical and virtual infrastructure. Awareness, Training & Education: Focus on developing a general culture of awareness on cybersecurity Testing the awareness and maturity Risk Management Integrate security into the organization’s risk management strategy from the very top to align with the organization’s strategy, mission and goals. Source: “Cybersecurity Considerations for Public Transit” , American Public Transportation Association

Questions?