Internet Security Alliance

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

Robert Gregg CEO ID Experts
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Larry Clinton President Internet Security Alliance
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Corporate Ethics Compliance *
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Competency Models Impact on Talent Management
Information Technology Audit
Internal Auditing and Outsourcing
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
Larry Clinton President Internet Security Alliance
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Larry Clinton Operations Officer Internet Security Alliance
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Placing Information Security within an Organization
New A.M. Best Cyber Questionnaire
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
Business Continuity Planning 101
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Introduction to Enterprise Risk Management (“ERM”)
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Draft - Enterprise Risk Management Risk Universe
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
Law Firm Data Security: What In-house Counsel Need to Know
BruinTech Vendor Meet & Greet December 3, 2015
Information Security Program
New A.M. Best Cyber Questionnaire
MGMT 452 Corporate Social Responsibility
Data Minimization Framework
Introduction to Business (MRK 151)
COSO and ERM Committee of Sponsoring Organizations (COSO) is an organization dedicated to providing thought leadership and guidance on internal control,
Meeting Planners Association
Gender statistics in Information and Communication Technology for Women’s Empowerment and Gender Equality Dorothy Okello, Annual.
GENDER STATISTICS IN INFORMATION AND COMMUNICATION
Построение культуры integrity в компании Aнар Каримов партнёр «ЭКВИТА»
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
Ken Baker ISA President October 2006
Contract Approvals & Signature Authority
National Cyber Strategy Preparedness: 8 Preparatory Questions
#IASACFO.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Board of Directors Roles and Responsibilities
The Financial Impact of Cyber Risk 50 Questions Every CFO Should Ask
Corporate Governance It is a system by which companies are managed and directed in the best interests of the owners and shareholders. It refers to the.
Cybercrime and Canadian Businesses
Cybersecurity ATD technical
Neil Kirton and Zoë Newman
Stewardship in biotechnology
Strategic threat assessment
Managing IT Risk in a digital Transformation AGE
Session 8: Innovative Uses of Captives: Cyber and Beyond
Radiopharmaceutical Production
Anatomy of a Common Cyber Attack
Presentation transcript:

Internet Security Alliance Larry Clinton President Internet Security Alliance lclinton@isalliance.org 703-907-7028 202-236-0001

ISA Board of Directors J. Michael Hickey, 1st Vice Chair VP Government Affairs, Verizon Marc-Anthony Signorino, Treas. National Assoc. of Manufacturers Ty Sagalow, Esq. Chair President Innovation Division, Zurich Tim McKnight Second V Chair, CSO, Northrop Grumman Ken Silva, Immediate Past Chair. CSO VeriSign Gen. Charlie Croom (Ret.) VP Cyber Security, Lockheed Martin Jeff Brown, CISO/Director IT Infrastructure, Raytheon Eric Gureno, SVP/CIO, bank of New York/Mellon Financial Lawrence Dobranski, Chief Strategic Security, Nortel Pradeep Khosla, Dean Carnegie Mellon School of Computer Sciences Joe Bounomo, President, DCR Bruno Mahlmann, VP Cyber Security, Perot Systems Linda Meeks, VP CISO Boeing corp.

Core Principles The Internet Changes Everything Cyber Security is not an "IT" issue Government and industry must rethink and evolve new roles, responsibilities and practices to create a sustainable system of cyber security

ISAlliance Mission Statement ISA seeks to integrate advancements in technology with pragmatic business needs and enlightened public policy to create a sustainable system of cyber security.

The Economy is reliant on the Internet The state of Internet security is eroding quickly. Trust in online transactions is evaporating, and it will require strong security leadership for that trust to be restored. For the Internet to remain the juggernaut of commerce and productivity it has become will require more, not less, input from security. PWC Global Cyber Security Survey 2008

CURRENT ECONOMIC INCENTIVES FAVOR ATTACKERS Attacks are cheap and easy Vulnerabilities are almost infinite Profits from attacks are enormous ($ 1 TRILLION in 08) Defense is costly (Usually no ROI) Defense is often futile Costs of Attacks are distributed

The need to understand business economics to address cyber issues If the risks and consequences can be assigned monetary value, organizations will have greater ability and incentive to address cybersecurity. In particular, the private sector often seeks a business case to justify the resource expenditures needed for integrating information and communications system security into corporate risk management and for engaging partnerships to mitigate collective risk. Government can assist by considering incentive-based legislative or regulatory tools to enhance the value proposition and fostering an environment that encourages partnership.” --- President’s Cyber Space Policy Review May 30, 2009 page 18

Financial Management of Cyber Risk It is not enough for the information technology workforce to understand the importance of cybersecurity; leaders at all levels of government and industry need to be able to make business and investment decisions based on knowledge of risks and potential impacts. – President’s Cyber Space Policy Review May 30, 2009 page 15 ISA-ANSI Project on Financial Risk Management of Cyber Events: “50 Questions Every CFO should Ask ----including what they ought to be asking their General Counsel and outside counsel. Also, HR, Bus Ops, Public and Investor Communications & Compliance

Senior Exec do ARE NOT analyzing Cyber Risk adequately “There is still a gap between IT and enterprise risk management. Survey results confirm the belief among IT security professionals that Boards and senior executives are not adequately involved in key areas related to the governance of enterprise security.” (2008 Carnegie Mellon University CyLab Governance of enterprise Security Survey)

Communication Across Corp. structures is inadequate “Intra company communication on privacy and security risks was lacking. Only 17% of respondents indicated they had a cross organizational privacy/security team.” “Less than half had a formal enterprise risk management plan.” (47%) “1/3 of those with a plan did not include IT-related risks in the plan.”--- (CMU 2008)

Financial Impact of Cyber Risk October, 2008

The Economic Assessment of Cyber Security: 50 ?s for CFOs Business Operations General Counsel Compliance Officer Media (Investors and PR) Human Resources Rick Manager/Insurance

Calculate Net Financial Risk Threat (frequency of risk event/probably number of events per year) X Consequence (Severity of risk event/possible loss form event) X Vulnerability (likelihood or % of damages/given mitigation actions) MINUS Risk Transferred (e.g. insurance) = NET FINANCIAL RISK

Sample Questions: Legal Analyzed liabilities? What legal rules apply to us or 3-parties? Vulnerable class action/shareholder suits? Leg Exposure to Gov investigations? Do our contracts protect us enough? Multi-state laws apply? Exposed to trade secrete theft?

Sample Questions: Compliance Inventory of applicable regulations? Where is our “regulated” data”? Valid reasons for holding all our data? Policies & procedures documented? Can we opt-out of reg requirements? Are we tracking compliance? Are we reviewing and updating privacy compliance?

Sample Questions: Business Operations What’s our single biggest vulnerability? How long are we down? Want to be up? Are we complying w/ SoA standards? Are we properly staffed? Have we assessed physical security Incident response/continuity plans? Risk exposure vendors? How often to we re-evaluate risks?

Sample Questions: Human Resources Does everyone understand our $ Risk? Attract/retain the right personnel? Are we managing the human vulnerability? Is the org structured for team work? Audit network access (esp at termination)? Address soc. Networking & pub sites? HR assessment include cyber security? Discipline policy adequate for monitoring?

Sample Questions: Media/Crisis Management Team Do we have segmented responses for all stakeholders? Documented crisis communication plan? Identified and trained all who need to be? Have the external contacts we need? Have we run a mock trial? Are we budgeted for a crisis?

Sample Questions: Risk Manger/Insurance Are we insured for this? (probably no) What can we get insurance for? What is the D & O Exposure? Where can we find cyber insurance and what does it cover (& doesn’t it cover)? What’s the cost benefit to insurance? How do we evaluate policies?

Releasing the Cyber Security Social Contract November, 2008

ISA Cyber Social Contract Similar to the agreement that led to public utility infrastructure dissemination in 20th C Infrastructure develop -- market incentives Consumer protection through regulation Gov role is more creative—harder—motivate, not mandate, compliance Industry role is to develop practices and standards and implement them

ISA Model: Create a Market for Best Practices and Standards Studies show nearly 90% of breaches could be prevented by following known best practices and standards Priv Sector should continue to develop standards, practices technologies Govt. test them for effectiveness Govt. should motivate adoption via sliding scale of market incentives

President Obama’s Report on Cyber Security (May 30 2009) The United States faces the dual challenge of maintaining an environment that promotes efficiency, innovation, economic prosperity, and free trade while also promoting safety, security, civil liberties, and privacy rights. (President’s Cyber Space Policy Review page iii) Quoting from Internet Security Alliance Cyber Security Social Contract: Recommendations to the Obama Administration and the 111th Congress November 2008

President Obama’s Report on Cyber Security (May 30, 2009) The government, working with State and local partners, should identify procurement strategies that will incentivize the market to make more secure products and services available to the public. Additional incentive mechanisms that the government should explore include adjustments to liability considerations (reduced liability in exchange for improved security or increased liability for the consequences of poor security), indemnification, tax incentives, and new regulatory requirements and compliance mechanisms. President’s Cyber Space Policy Review May 30, 2009 page v Quoting Internet Security Alliance Cyber Security Social Contract: Recommendations to the Obama Administration and 111th Congress

Internet Security Alliance Larry Clinton President Internet Security Alliance lclinton@isalliance.org 703-907-7028 202-236-0001