Or, How to Spend Your Weekends… Fall 2007 Agenda General Overview of the CISO Arena Technical Security Information Security Strategic Security Kirk Bailey.

Slides:



Advertisements
Similar presentations
DETECTING A CYBER-ATTACK SOURCE IN REAL TIME R. Romanyak 1), A. Sachenko 1), S. Voznyak 1), G. Connolly 2), G. Markowsky 2) 1) Ternopil Academy of National.
Advertisements

Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
The Technology Tool Kit version 2.0 August 2014 Presenter: Deborah Watson InfraGard Houston Chapter - SIG Security Guide & Tool Development Manager.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
1  Carnegie Mellon University System Security and U. Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh, PA
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Controls – What Works
Increasing customer value through effective security risk management
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
IS 380 OME 1 Fall 2010 Class 1. Administrative Roster Syllabus Review Class overview 10 domains overview.
Threats and Attacks Principles of Information Security, 2nd Edition
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
DDos Distributed Denial of Service Attacks by Mark Schuchter.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Bank Crime Investigation Techniques by means of Forensic IT
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Slide 1 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle Nine Tough Questions Mayors Should Ask Their Geeks For Mayors’
Computer Crime and Information Technology Security
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Lecture 1 Introduction Basic Security Concepts
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
1  Carnegie Mellon University Protecting Information Infrastructures Rich Pethia Software Engineering Institute Carnegie Mellon University Pittsburgh,
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Larry Clinton Operations Officer Internet Security Alliance
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Communications-Electronics Security Group. Excellence in Infosec.
IS Network and Telecommunications Risks Chapter Six.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Scott Charney Cybercrime and Risk Management PwC.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
Information Security Program
Cybersecurity - What’s Next? June 2017
Secure Software Confidentiality Integrity Data Security Authentication
Legal and Ethical Issues in Computer Security
Enterprise Roles and Structures:
امنیت اطلاعات و ضرورت آن
Chapter 9 E-Commerce Security and Fraud Protection
Intrusion Detection system
In the attack index…what number is your Company?
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Or, How to Spend Your Weekends… Fall 2007

Agenda General Overview of the CISO Arena Technical Security Information Security Strategic Security Kirk Bailey – CISO, UW Ernie Hayden – CISO, Port of Seattle Q & A

Technology Security Information Security Firewalls Intrusion Detection Network Security Viruses, Worms, Crimeware System Hardening Encryption Engineering Technology Problems Risk Management Business Continuity / Disaster Planning Intellectual Property Business / Financial Integrity Regulatory Compliance Industrial Espionage Privacy Forensics & Investigations Business Problems Chart Based on Forrester, April 2005 And Enhanced/Modified by Kirk Bailey and Ernie Hayden Critical Security Problems Strategic Security SECURITY PROFESSION EXPERTISE LEVELS R E S E A R C H Terrorism & CyberCrime Regional Interests (Including Cyber and Natural Disasters) Nation State Interests Intelligence Professional Alliances Politics Strategies and Tactics

WHY “STRATEGIC SECURITY” It is not pretty out there…

,000,000 of ‘em out there! “In the world of networked computers every sociopath is you neighbor.” Troubling Realities Dan Geer Chief Scientist Verdasys

High Low password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sweepers sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools Attackers Technical Skills Intruder Knowledge Attack Sophistication “stealth” / advanced scanning techniques burglaries network mgmt. diagnostics distributed attack tools Cross site scripting Staged attack Cyber Attack Sophistication Continues To Evolve bots Source: CERT 2004

RESISTANCE IS FUTILE. PREPARE TO BE ASSIMULATED? Species 8472

Cybercrime and Money… McAfee CEO: “Cybercrime has become a $105B business that now surpasses the value of the illegal drug trade worldwide”

Symantec Internet Security Threat Report Threat landscape is more dynamic than ever Attackers rapidly adapting new techniques and strategies to circumvent new security measures Today’s Threat Landscape.. Increased professionalism and commercialization of malicious activities Threats tailored for specific regions Increasing numbers of multi-staged attacks Attackers targeting victims by first exploiting trusted entities Convergence of attack methods

Kirk Bailey, CISSP, CISM Objectives (Confidentiality, Availability, Integrity) Intelligence Trusted Alliances Innovative Thinking Risk Management (Liability Protection) Compliance Challenges Contractual Statutory & Regulatory Industry Standards

Ernie Hayden, CISSP Key Functions: Information & Computer Security Business Continuity/Continuity of Operations (COOP)/ Disaster Recovery Planning Privacy Critical Infrastructure Protection Policy Emergency Communications

A Sampling of Projects Administration Budgets Audits (e.g., Deloitte/State) Policies & Procedures Appropriate Use – Update/Revision Security Policy - General Cell Phone Disposal RCW Response Security Management Security Strategy Top 10 List Metrics, Dashboard Security Governance Security Domain Architecture Committees Architecture Management Board Corporate Security Council Change Management Board Technology Issues VOIP Security Web Application Security Employee Awareness Monthly Brownbags Secure Coding – Web Development Home PC Security Training BCP/DRP Incident Response Procedure IT Disaster Recovery Policy Drills, Tabletops NIMS & ICS Emergency Communications SendWordNow WebEOC - Emergency Operations Center Visualization Tool

Strategic Security Plan Elements Organization & Authority Controls Policy Risk Management Program Intelligence Program Audit & Compliance Program Privacy Program Incident Management Education & Awareness Program Operational Management Technical Security & Access Controls Monitoring, Measurement & Reporting Physical & Environmental Security Asset Identification & Classification Employee & Related Account Management Practices

What Do You Think? Prioritize this task/response list: Key Application Vendor Contract Review 100’s of Incoming Spam Complaints Forensic Report on New Rootkit Compromises (30 machines) Patch Management Process Concerns Service Interruptions New Credit Card Processing System for Husky Stadium Requires CISO Approval Electronic Harassment of an Employee

Thoughts… The CISO of the future is the one who can run the risk-management organization. The days of security being handled by the 'network person' who did security in their spare time are over and increasingly we are seeing seasoned professionals with real business experience and business school qualifications stepping into the security space. Quotes by Paul Proctor

Technology Security Information Security Firewalls Intrusion Detection Network Security Viruses, Worms, Crimeware System Hardening Encryption Engineering Technology Problems Risk Management Business Continuity / Disaster Planning Intellectual Property Business / Financial Integrity Regulatory Compliance Industrial Espionage Privacy Forensics & Investigations Business Problems Chart Based on Forrester, April 2005 And Enhanced/Modified by Kirk Bailey and Ernie Hayden Critical Security Problems Strategic Security SECURITY PROFESSION EXPERTISE LEVELS R E S E A R C H Terrorism & CyberCrime Regional Interests (Including Cyber and Natural Disasters) Nation State Interests Intelligence Professional Alliances Politics Strategies and Tactics

THANKS!! Kirk Bailey, CISSP, CISM CISO, University of Washington Ernie Hayden, CISSP CISO / Manager Enterprise Information Security Port of Seattle 2711 Alaskan Way Seattle, WA