Download presentation
Presentation is loading. Please wait.
1
Cybersecurity Policies & Procedures ICA
April 2017
2
Q: Who is Responsible for Cybersecurity? Isn’t it just IT’s Problem?
3
Risk Responsibility YOU!
Cyber risk is an imperative for everyone within the enterprise – but ultimate responsibility for overseeing risk rests with top leaders. YOU!
4
Managing Business Risk…..
Boards & Top Managers should ask some basic questions: Do we demonstrate due diligence and effective management of cyber risk? Do we have the right leadership and organizational talent? Have we established an appropriate cyber risk escalation framework?
5
….Managing Risk What have we done to protect the company against third-party cyber risks? Can we rapidly contain damages and mobilize response resources when a cyber incident occurs? How do we evaluate the effectiveness of our company’s cyber risk program?
6
EVERY DEPARTMENT’s PROBLEM: Functions Most Likely to Be Affected by a Breach
Operations 36% Finances 30% Brand Reputation 26% Customer Retention 26% Regulatory Scrutiny 19% Cisco 2017
7
Cyber Security & Employees
“Things have changed over the past few years…cyber criminals are now focusing increasingly on employees … as the weak link in the security chain” Think HR Not just Management Not just IT Department
8
NIST Cybersecurity Framework
When will we implement all the good ideas from the conference? When we have Time? When we can figure out How? When we can find someone to put it together?
9
Right Here…….Right Now NO MORE EXCUSES: Pull out your Pencils or Pens
Open the Portfolios WE ARE GOING TO WORK!
10
Framework Core [one more time]
IDENTIFY What assets need protection? PROTECT What safeguards are available? DETECT What techniques can identify incidents? RESPOND What techniques can contain impacts of incidents? RECOVER What techniques can restore capabilities?
11
IDENTIFY – Asset Management
Physical devices & systems are inventoried Software platforms & applications are inventoried Communication & data flows are mapped External info systems are catalogued Resources prioritized based on classification, criticality & business value
12
IDENTIFY – Asset Management
Roles & Responsibilities “ETHICS POLICY”
13
IDENTIFY Business Environment
Role in supply chain is identified & communicated Place in critical infrastructure is identified & communicated Priorities for mission, objectives & activities are established and communicated Dependencies & critical functions for delivery of critical services are established Resilience requirements to support delivery of critical serves are established
14
IDENTIFY – Governance Information security policy is established
Information security roles & responsibilities are coordinated and aligned with internal roles & external partners Legal and regulatory requirements regarding cybersecurity including privacy and civil liberties obligations are understood and managed Governance and risk management processes address cybersecurity risks
15
IDENTIFY – Risk Assessment
Asset vulnerabilities are identified and documented Threat and vulnerability information is received from information sharing forums and sources Threats, both internal and external, are identified and documented Potential business impacts and likelihoods are identified Threats, vulnerabilities, likelihoods and impacts are used to determine risk Risk responses are identified & prioritized
16
IDENTIFY – Risk Management Strategy
Risk management processes are established, managed and agreed to by organizational stakeholders Risk tolerance is determined and clearly expressed Determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis
17
PROTECT – Access Control
Identities & credentials are managed for authorized devices and users “PASSWORD PROTECTION POLICY”
18
PROTECT – Access Control
Physical access to assets is managed and protected “ACCEPTABLE USE POLICY”
19
PROTECT – Access Control
Remote access is managed Access permissions are managed, incorporating the principles of least privilege and separation of duties Network integrity is protected, incorporating network segregation where appropriate
20
PROTECT – Awareness & Training
All users are informed & trained Privileged users understand roles & responsibilities Third-party stakeholders [e.g. suppliers, customers, etc.] understand roles & responsibilities Senior executives understand roles & responsibilities
21
PROTECT – Data Security
Data-at-rest is protected Data-in-transit is protected Assets are formally managed throughout removal, transfer and disposition Adequate capacity to ensure availability is maintained Protections against data leaks are implemented Integrity checking mechanisms are used to verify software, firmware and information integrity The development and testing environments are separate from the production environment
22
PROTECT – Information Protection Processes & Procedures
A baseline configuration of information technology/industrial control systems is created and maintained “ POLICY”
23
PROTECT – Information Protection Processes & Procedures
A System Development Life Cycle to manage systems is implemented Configuration change control processes are in place Backups of information are conducted, maintained and tested periodically Policy & regulations regarding the physical operating environment for organizational assets are met
24
PROTECT – Information Protection Processes & Procedures
Data is destroyed according to policy Protection processes are continuously improved Effectiveness of protection technologies is shared with appropriate parties Response plans and recovery plans are in place and managed Response and recovery plans are tested
25
PROTECT – Information Protection Processes & Procedures
Cybersecurity is included in human resources practices [e.g. deprovisioning, personnel screening] “CLEAN DESK POLICY”
26
PROTECT – Information Protection Processes & Procedures
A vulnerability management plan is developed and implemented
27
PROTECT - Maintenance Maintenance and repair of organizational assets is performed and logged in a timely manner, with approved and controlled tools Remote maintenance of organization assets is approved, logged and performed in a manner that prevents unauthorized access
28
DETECT – Anomalies & Events
A baseline of network operations and expected data flows for users and systems is established and managed Detected events are analyzed to understand attack targets and methods Event data are aggregated and correlated from multiple sources and sensors Impact of events is determined Incident alert thresholds re-established
29
DETECT – Security Continuous Monitoring
The network is monitored to detect potential cybersecurity events The physical environment is monitored to detect potential cybersecurity events Personnel activity is monitored to detect potential cybersecurity events Malicious code is detected
30
DETECT – Security Continuous Monitoring
Unauthorized mobile code is detected External service provider activity is monitored to detect potential cybersecurity events Monitoring for unauthorized personnel, connections, devices and software is performed Vulnerability scans are performed
31
DETECT – Detection Process
Roles & responsibilities for detection are well defined to ensure accountability Detection activities comply with all applicable requirements Detection processes are tested Event detection information is communicated to appropriate parties Detection processes are continuously improved
32
RESPOND – Response Planning
Response plan is executed during or after an event “SECURITY RESPONSE PLAN POLICY”
33
RESPOND - Communications
Personnel know their roles and order of operations when a response is needed Events are reported consistent with established criteria Information is shared consistent with response plans Coordination with stakeholders occurs consistent with response plans Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness
34
RESPOND - Analysis Notifications from detection systems are investigated The impact of the incident is understood Forensics are performed Incidents are categorized consistent with response plans
35
RESPOND - Mitigation Incidents are contained Incidents are mitigated
Newly identified vulnerabilities are mitigated or documented as accepted risks
36
RESPOND - Improvements
Response plans incorporate lessons learned Response strategies are updated
37
RECOVER – Recovery Planning
Recovery plan is executed during or after an event “DISASTER RECOVERY PLAN POLICY”
38
RECOVER - Improvements
Recovery plans incorporate lessons learned Recovery strategies are updated
39
RECOVER - Communications
Public relations are managed Reputation after an event is repaired Recovery activities are communicated to internal stakeholders and executive and management teams
40
Emergency Plan What’s Your Plan???? P R A KEY ‘P’
Ops Eng IT Dep HR Dep PRE-EMERGENCY PREPARATION IT Data backup and protection P Generator Maintenance R PREPARATION JUST BEFORE EVENT Verify backup & Protection of IT Data Verify protection of IT Network RESPONSE DURING EVENT Monitor status of systems Manage EOC RECOVERY AFTER EVENT Assess Network Damage & Status Initiate System Repair & Recovery Account for all Personnel A What’s Your Plan???? KEY ‘P’ Perform Task [champion] “A” Assists with Task “R” Resource Support
41
We’ve Got A Good Start “Cyber risk concerns stretch well beyond IT and well beyond the walls of the enterprise – to every partner, to every customer, to every worker, and to every business process.” Deloitte
42
Sources Deloitte Cisco Think HR Unitel Network World US Telecom NIST
SANS Institute
43
If you’d like to continue conversation…..
Judi Ushio GVNW Consulting, Inc.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.