Public Facilities and Cyber Security

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
David A. Brown Chief Information Security Officer State of Ohio
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lecture 11 Reliability and Security in IT infrastructure.
CYBER CRIME AND SECURITY TRENDS
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Securing Information Systems
Law Firm Data Security: What In-house Counsel Need to Know
Securing Information Systems
Cyber Issues for Design Professionals
BUSINESS DRIVEN TECHNOLOGY
Risk management.
Ilija Jovičić Sophos Consultant.
Three Bad Outcomes (and how to address them)
Cyber intelligence made easy.
Cybersecurity - What’s Next? June 2017
Cloud Firewall.
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Data Center Firewall.
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
Data Compromises: A Tax Practitioners “Nightmare”
Current ‘Hot Topics’ in Information Security Governance Auditing
Cyber Protections: First Step, Risk Assessment
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Dissecting the Cyber Security Threat Landscape
Securing Information Systems
CSI Survey 2007 Tiffany Gorman
Today’s Risk. Today’s Solutions. Cyber security and
Risks & Reality Cyber Security Risks & Reality
Cybersecurity Strategy
Federal Protective Service
INFORMATION SYSTEMS SECURITY and CONTROL
Security as Risk Management
How to Mitigate the Consequences What are the Countermeasures?
Forensic and Investigative Accounting
Business Compromise and Cyber Threat
Cybersecurity Framework For Energy Sector
Tom Murphy Chief Information Security Officer
Texas Assisted Living Association 2019 Conference
CYBER RISKS IN SECURITIES SERVICES
Security Policies and Implementation Issues
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

Public Facilities and Cyber Security Mike Hamilton 28 September 2018

Critical Infrastructure

On Terrorism DHS is your SSA No sector-specific plan apart from NIPP DHS will evaluate your physical security for free CSA program, local resource

Free services from the Department of Homeland Security

Public Sector Facilities Operate as a business with back operation IT Conduct financial transactions Are subject to some regulatory requirements Operate cameras, access card readers, and likely mobile devices House records that may meet the state's definition of data breach, if disclosed Provide connectivity services for attendees May facilitate communication with law enforcement May act as emergency shelter in a disaster

Three Categories of Bad Outcomes Records disclosure Theft of funds or information Critical service disruption

Extra For Public Facilities Surveillance/Compromise of Attendees “Evil Twin” attack

Financial Impacts Records Breach: $200/record Theft: $75K-$1.2M in our region, multiple millions elsewhere Disruption: Loss of business continuity or operating capacity, loss of life for critical services

Bonus Bummers FTC: Deceptive Trade Practices Claims of Executive Negligence Class-Action Suits

Threat Actors Unsophisticated criminals of opportunity Insiders Hacktivists Organized crime Nation-States Terrorists Hybrids

Threat Actors Unsophisticated criminals of opportunity Insiders Hacktivists Organized crime Nation-States Terrorists Hybrids

Threat Actors Unsophisticated criminals of opportunity Insiders Hacktivists Organized crime Nation-States Terrorists Hybrids

Threat Actors Unsophisticated criminals of opportunity Insiders Hacktivists Organized crime Nation-States Terrorists Hybrids

Threat Actors Unsophisticated criminals of opportunity Insiders Hacktivists Organized crime Nation-States Terrorists Hybrids

Threat Actors Unsophisticated criminals of opportunity Insiders Hacktivists Organized crime Nation-States Terrorists Hybrids

Threat Actors Unsophisticated criminals of opportunity Insiders Hacktivists Organized crime Nation-States Terrorists Hybrids

Preventive Controls Threat Actors are Good at Defeating These Firewall – exists to poke holes in the network URL filtering – only as good as the reputation list E-mail security – also reputation and signature-based Intrusion Prevention System – automatic blocking can have unintended effects Anti-virus / end point security – about 30% effective User training – best use of limited funding, but not perfect Threat Actors are Good at Defeating These

Detective Controls Intrusion detection system Log aggregation and review Active Directory / Domain Controller Critical / valuable servers DNS traffic Security Information and Event Management Managed Detection and Response

How Malware Works Victim hits bad website, opens bad attachment, inserts bad USB drive Small binary drops, due to vulnerability exploit or user admin privileges Binary beacons out to command and control network Actual payload drops, to: Send SPAM Install a backdoor Monitor keystrokes Seek out and steal data or records Encrypt and extort Etc. Can be broad, unspecific attack or highly targeted

What We’ve Covered So Far An inventory of critical information technology assets An analysis of outcomes we’d like to avoid The estimated cost of those outcomes A review of regulatory requirements we must meet A review of the capabilities and motivations of threat actors that are likely to exploit our vulnerabilities An examination of possible controls to deploy

What’s Left Identifying your vulnerabilities Estimating how likely each can be exploited Selecting the appropriate controls Budgeting Procurement Deployment Operation and Maintenance

How do I know what’s required, reasonable and achievable? Key Questions How likely is it, than any of those threat actors have the capability, motivation, and opportunity to create a bad outcome? What controls are necessary, appropriate, and affordable to reduce that risk? What are the regulatory responsibilities? How do I know what’s required, reasonable and achievable?

Figuring That Out The NIST Cybersecurity Framework

Our stuff keeps your stuff from becoming their stuff Michael.Hamilton@Criticalinformatics.com The IT Security news blast: https://criticalinformatics.com/it-security-news/