David Cronkright Chuck Dudinetz Paul Jones Corporate Auditing The Dow Chemical Company February 16, 2012 Auditing Protection of Intellectual Property.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

© Peter Readings Data Leakage Pete Readings CISSP.
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Computer Fraud Chapter 5.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Session 3 – Information Security Policies
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Steering Committee CSRIC Working Group 2A Cyber Security Best Practices October 7, 2010.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
General Awareness Training
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Intrusion Detection MIS ALTER 0A234 Lecture 11.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA COMPLIANCE WITH DELL
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Jeff Miller Tamra Pawloski IT Procurement Summit headline news…
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Security Mindset Lesson Introduction Why is cyber security important?
New EU General Data Protection Regulation Conference 2016 Managing a Data Breach Prevention-Detection-Mitigation By Gerard Joyce Dun Laoghaire Feb 24 th.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Welcome to the ICT Department Unit 3_5 Security Policies.
Information Security Management Goes Global
OIT Security Operations
Risk management.
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
Current ‘Hot Topics’ in Information Security Governance Auditing
Lecture 14: Business Information Systems - ICT Security
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
I have many checklists: how do I get started with cyber security?
CRITICAL INFRASTRUCTURE CYBERSECURITY
How to Mitigate the Consequences What are the Countermeasures?
IS Risk Management Framework Overview
Strategic threat assessment
Presentation transcript:

David Cronkright Chuck Dudinetz Paul Jones Corporate Auditing The Dow Chemical Company February 16, 2012 Auditing Protection of Intellectual Property

Agenda About Dow What is IP and why do we care? Whats the risk? What are the key controls? How do we audit information protection controls? Questions & Answers

Agenda About Dow What is IP and why do we care? Whats the risk? What are the key controls? How do we audit information protection controls? Questions & Answers

IP is an asset to be protected… Technology Business intelligence Personal Data What is IP and why do we care?

IP can take a number of forms… Explicit –Electronically stored –Hardcopy –The object itself Tacit –Conversations –Presentations What is IP and why do we care?

Loss of IP can have significant consequences… –Loss of competitive advantage loss of business –Loss of licensing revenue –Loss of prospective M&A partner –Non-compliance with legal/regulatory requirements –Damage to reputation –Sabotage What is IP and why do we care?

About Dow What is IP and why do we care? Whats the risk? What are the key controls? How do we audit information protection controls? Questions & Answers Agenda

Whats the risk ? Risk = Threat x Vulnerability x Consequence

9 Whats the risk ?

Threats… Industrial Espionage Targeting & recruitment of insiders Cyber intrusions Dumpster diving Establishment of business relationships … Increasingly highly organized, funded, and resourced Hacktivism Politically or socially motivated Cause reputation damage Cyber Crime Profit motive Whats the risk ?

Potential Vulnerabilities… Inherent vulnerabilities Targeted industry ? Geographic presence Company culture Culture of trust ? Collaborative culture ? Education & awareness Weak policies & procedures … translate to behaviors Whats the risk ?

Potential Vulnerabilities (Contd) … Workforce dynamics Outsourcing Turnover Hiring practices Employee morale Facility Weak physical security Multi-tenancy 3 rd Party service providers Open work space Waste segregation and disposal Poor handling of printed documents, portable media Whats the risk ?

Potential Vulnerabilities (Contd) … I/T Weak computer room security Broadly accessible network ports Unsecure data transfer Inappropriate access to electronic repositories Network perimeter Susceptibility to malware Whats the risk ?

About Dow What is IP and why do we care? Whats the risk? What are the key controls? How do we audit information protection controls? Questions & Answers Agenda

Controls : Mitigate the likelihood and/or impact of the threat exploiting a vulnerability What are the Controls ?

Governance Assessing Risk Organization design/steering Communication Monitoring Preventive Secure the network perimeter (Firewalls, IPS) Secure the data (repository-level access control, DRM, DLP) Physical security (badge access) Confidentiality agreements Workforce education (culture, behaviors) Secure disposal of media (including hardcopy) Contractual verbiage/third party assurance (for outsourced data) What are the Controls ?

Detective –Intrusion detection (NIDS, HIDS) –Critical log review –Workforce monitoring (behavior changes, hoarding data) –Monitoring of information extraction/downloading What are the Controls ?

Preventive Detective I/T Non-I/T Information handling policies Confidentiality agreements Background checks Layering of Controls Workforce onboarding & offboarding Workforce behavior monitoring Badge access Work area segregation Clean desk policy Locked cabinets Document & media disposal Computer room security Secured network ports Encrypted data transfer Data Loss Prevention (DLP) Firewalls Intrusion Prevention Antivirus Information access monitoring Patching Intrusion Detection Information classification I/T access control - Repository level - Data level (DRM) Strong passwords Elevated access Network segmentation Egress traffic Security incident response Logging - Capture - Retention - Analysis Vulnerability scanning Asset identification & inventory Application whitelisting Workforce offboarding Employee education Physical security surveillance Investigative processes Vehicle inspections

–Network Perimeter audits Common Network access points VPN/RAS, Firewalls/Proxy Servers, Circuits, Modems, Physical Controls –Intellectual Property specific audits Where the data lives (ex: Crown Jewels) Site, Application, Project specific or Hybrid –Cyber Security audits Organizations ability to sense and respond to changing threat landscape Governance and Control assessments –Integrated audits (strategy going forward) How do we audit information protection controls ?

Network Perimeter Audit Preventive Detective I/T Non-I/T Information handling policies Confidentiality agreements Background checks Workforce onboarding & offboarding Workforce behavior monitoring Badge access Work area segregation Clean desk policy Locked cabinets Document & media disposal Computer room security Secured network ports Encrypted data transfer Data Loss Prevention (DLP) Firewalls Intrusion Prevention Antivirus Information access monitoring Patching Intrusion Detection Information classification I/T access control - Repository level - Data level (DRM) Strong passwords Elevated access Network segmentation Egress traffic Security incident response Logging - Capture - Retention - Analysis Vulnerability scanning Asset identification & inventory Application whitelisting Workforce offboarding Physical security surveillance Investigative processes Vehicle inspections Employee education

Intellectual Property Audit Preventive Detective I/T Non-I/T Information handling policies Confidentiality agreements Background checks Workforce onboarding & offboarding Workforce behavior monitoring Badge access Work area segregation Clean desk policy Locked cabinets Document & media disposal Computer room security Secured network ports Encrypted data transfer Data Loss Prevention (DLP) Firewalls Intrusion Prevention Antivirus Information access monitoring Patching Intrusion Detection Information classification I/T access control - Repository level - Data level (DRM) Strong passwords Elevated access Network segmentation Egress traffic Security incident response Logging - Capture - Retention - Analysis Vulnerability scanning Asset identification & inventory Application whitelisting Workforce offboarding Physical security surveillance Investigative processes Vehicle inspections Employee education

Much more than just I/T controls Sense and respond approach (peripheral vision) Consider effectiveness of controls as a whole –Layering of controls –Audit judgment required Position to avoid pre-audit window dressing Finding broader issues Intellectual Property Audit - Learnings

Cyber Security Audit Preventive Detective I/T Non-I/T Information handling policies Confidentiality agreements Background checks Workforce onboarding & offboarding Workforce behavior monitoring Badge access Work area segregation Clean desk policy Locked cabinets Document & media disposal Computer room security Secured network ports Encrypted data transfer Data Loss Prevention (DLP) Firewalls Intrusion Prevention Antivirus Information access monitoring Patching Intrusion Detection Information classification I/T access control - Repository level - Data level (DRM) Strong passwords Elevated access Network segmentation Egress traffic Security incident response Logging - Capture - Retention - Analysis Vulnerability scanning Asset identification & inventory Application whitelisting Workforce offboarding Physical security surveillance Investigative processes Vehicle inspections Employee education

External Threat – Cyber Security It use to be that each company was its own little cyber kingdom and physical access was the king of control for external threats Thanks to the internet - everything touches everything so vulnerabilities have increased The number, ability and motives of external threats are also increasing Updated External Threat audit programs two years ago

External Threat – Cyber Security While press releases of APT compromises were out there little else was available on APT what and how Lacked expertise / experience to understand threat termed APT (Advanced Persistent Threat) Researched several firms specializing in APT The project looked at the threat, its motives, processes used to compromise a target and the controls required to slow down, detect and eradicate it.

External Threat – Cyber Security The APT is real and has more time and money to get at your IP than you have time and money to secure it. It is a paradigm shift from a controls perspective. The logic is They will get to your data…. Preventive controls are there to slow them down so detective controls have time to identify the breach. Proper response is required to assure you get all of the comprise before they know youre on to them. To date espionage has been the primary objective

External Threat – Cyber Security Results - Two high level audit programs and insight into the new breed of Cyber Threat Governance Organization & strategy Key Relationships Training and Awareness Establishing the bar; COSO observations Control Assessment Preventive Detective Response

About Dow What is IP and why do we care? Whats the risk? What are the key controls? How do we audit information protection controls? Questions & Answers Agenda