WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

David A. Brown Chief Information Security Officer State of Ohio
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
DHS, National Cyber Security Division Overview
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Network security policy: best practices
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Information Sharing Challenges, Trends and Opportunities
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Scott Charney Cybercrime and Risk Management PwC.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
New A.M. Best Cyber Questionnaire
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
Chapter 15 Telecommunication Department Management.
Cyber-Security among American Local Governments Donald F. Norris, Anupam Joshi and Timothy Finin University of Maryland, Baltimore County Baltimore, Maryland.
Information Security Proposal POP’S POP SPRITZERS JULY 2016.
Cybersecurity as a Business Differentiator
Michael Wright • Chief Security Officer • Tech Lock
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Performing Risk Analysis and Testing: Outsource or In-house
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Information Security Program
New A.M. Best Cyber Questionnaire
Cybersecurity - What’s Next? June 2017
Compliance with hardening standards
Lecture 14: Business Information Systems - ICT Security
Joe, Larry, Josh, Susan, Mary, & Ken
I have many checklists: how do I get started with cyber security?
Andy Hall – Cyber & Tech INSURANCE Specialist
Data Privacy and Breaches
Red Flags Rule An Introduction County College of Morris
Cyber Trends and Market Update
Cybersecurity compliance for attorneys
Neopay Practical Guides #2 PSD2 (Should I be worried?)
In the attack index…what number is your Company?
Security Policies and Implementation Issues
Discussion Government Private Business Tools for prevention Congress
Anatomy of a Common Cyber Attack
Presentation transcript:

WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore City Government

FEDERAL AND STATE REQUIREMENTS WHEN NOT, IF

PCI DSS and PII - restrictions and guidelines In February 2013, President Obama issued Executive Order “Improving Critical Infrastructure Cybersecurity” NIST - Commerce Department's National Institute of Standards and Technology framework guidelines provides the description of what's needed for a comprehensive cybersecurity program CJIS – data security protection for CJI (add CJIS if necessary) Md 304 Governmental Procedures – Security and Protection of Information Requiring State and local government units, when destroying records of an individual that contain personal information of the individual, to take reasonable steps to protect against unauthorized access to or use of the personal information under specified circumstances; requiring a government unit that collects specified personal information of an individual to implement and maintain specified security procedures and practices; etc. Synopsis of Laws Enacted 127 Chapter No. EFFECTIVE JULY 1, 2014 Federal and State Requirements WHEN, NOT IF

CONCERNS! The Ponemon Institute published “2015 Cost of Data Breach Study” in May The study stated “The cost of (a) or (data breaches) data breach varies by industry. The average global cost of (a) data breach per lost or stolen record is $154. However, if a healthcare organization has a breach the average cost could be as high as $363 and in education the average cost could be as high as $300. The lowest cost per lost or stolen record is in transportation ($121) and public sector ($68). The retail industry’s average cost increased dramatically from $105 last year to $165 in this year’s study.” Symantec April 2015 Volume 20 Report Internet Security Threat Report Government reports “a 183 percent increase in DNS amplification attacks between January and August 2014”. Distributed Denial of Service - DDoS WHEN, NOT IF

CONCERNS! New Ransomware As reported by CBS news on April 11, 2016 – “ An unusual strain of virus-like hacker software that exploits computer server vulnerabilities -- without requiring human interaction -- is a leading example of a new generation of "ransomware," according to a new report by Cisco Systems Inc.new generation of "ransomware," Hackers use such software to target large-scale networks and hold data hostage in exchange for bigger payments. Last year's 2,453 reports of ransomware hackings to the FBI totaled a reported loss of $24.1 million, making up nearly one-third of the complaints over the past decade. They also represented 41 percent of the $57.6 million in reported losses since Such losses are significantly higher than any paid ransoms because companies routinely include remediation costs, lost productivity, legal fees and sometimes even the price of lost data in their estimates. WHEN, NOT IF

Concerns! Insufficient Funding Lack of Resources How to Educate Non IT Staff How to Educate Citizens Lack of Control over External Devices Identification of Acceptable and Non-Acceptable Risk Identification of All Assets WHEN, NOT IF

Employees Partners VendorsCitizens

Educate Users Partnerships Review 3 rd Party Contracts Review and Update Policies Implement Tools HOW DO WE PREPARE WHEN, NOT IF

EDUCATE USERS Weakest Link verses Strongest Link Can spot and report oddities Should be suspicious Must use Strong Passwords Connect to Internet with Caution Must Secure mobile Devices WHEN, NOT IF

PARTNERSHIPS Industry or Sector Information sharing Teams and Committees Government Officials (I changed it, it was misspelled) Vendors Regional Committees Fusion Centers (A fusion center is a collaborative effort of two or more agencies that provide resources, expertise and information to the center with the goal of maximizing their ability to detect, prevent, investigate, and respond to criminal and terrorist activity) Local Universities FBI Regional Cyber Security Office Homeland Security Federal Agencies In-House Facilities Management In-House Risk management In-House Procurement In-House Human Resources WHEN, NOT IF

HVAC Electronic Identification Electrical 3 rd Party processing Websites ISP Providers REVIEW 3 RD PARTY CONTRACTS WHEN, NOT IF

Times have changed Physical security and electronic access Physical infrastructure and remote access User Remote Access Internet access Termination REVIEW AND UPDATE POLICIES WHEN, NOT IF

IMPLEMENT TOOLS In order to fight the Cyber-War and be in compliance with State and Federal laws, we must implement the CyberSecurity policies in line with state and federal laws, identify and mitigate risks while implementing software and/or equipment designed to:  Detect and Stop  Expose the Cyber-Attack Life Cycle  Report Cyber-Attack  Produce Forensic Attack Details WHEN, NOT IF

CELEBRATE CYBER SECURITY MONTH OCTOBER WHEN, NOT IF

Ever Changing Digital Environment More Sophisticated Attacks More Technology Vulnerabilities Human Element Policy (Policies) and Practices Trained Technical Staff Budget