© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.

Slides:



Advertisements
Similar presentations
Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
The Way Ahead for Information Systems Security: What You Don’t Know Can Hurt You Christopher Baum Research Vice President Global Government NYSCIO Conference.
Chapter 12 Strategies for Managing the Technology Infrastructure.
Computer Security: Principles and Practice
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Protective Measures at NATO Headquarters Ian Davis Head, Information Systems Service NATO Headquarters Brussels, Belgium.
HIPAA COMPLIANCE WITH DELL
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter 6 of the Executive Guide manual Technology.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information Systems Security Operations Security Domain #9.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Engineering Essential Characteristics Security Engineering Process Overview.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Role of Technical Agencies Responsible for Hazard Assessment, Monitoring, Observations, Data and Analysis Dr. David Green National Oceanic and Atmospheric.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Information Security Management Goes Global
ISSeG Integrated Site Security for Grids WP2 - Methodology
Cybersecurity - What’s Next? June 2017
Agenda Control systems defined
System Management Issues for the Future Real-Time University Environment Tom Board September 22, 2004 Northwestern University Information Technology.
Compliance with hardening standards
Introduction to the Federal Defense Acquisition Regulation
IS4680 Security Auditing for Compliance
IS Risk Management Framework Overview
Cyber Security in a Risk Management Framework
In the attack index…what number is your Company?
Presentation transcript:

© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005

© BT PLC 2005 Objectives of the presentation To review the drivers and challenges Dealing with collaboration Risk reviews & modelling Compliance Testing Summary Questions

© BT PLC 2005 Defence Drivers & Trends Modernisation of armed forces Reduction in defence budgets Rapid deployment of armed forces on overseas missions Global role - Nation’s eyes only Interoperability of Command & Control Prime contracting (PFI) - partners take share of responsibility / risk The increased threat from cyber space Foreign intelligence services and identity theft management Homeland / National ICT Defence Increase in overseas peace keeping commitments with other foreign powers Increased infrastructure attack from Cyber terrorism

© BT PLC 2005 Additional Drivers I ncreased pressure for Information Governance Regulatory Compliance Need to demonstrate Stake holder value Public monies being put to good use Accurate information available for C3I decision making CC3I – Command Control Communication Information!

© BT PLC 2005 Challenges Maintaining the confidentiality, integrity and availability of defence infrastructure Protection of defence infrastructure against attack from foreign powers (covert / overt) Information Assurance (defence accreditation of information and systems such as NATO Classified) Modernisation of armed services on reduced budgets Recruiting and retaining the right personnel Increased use of ‘ICT Networks’ to deliver Command & Control

© BT PLC 2005 Commercial Risk–Based Management: Defence in Depth Balanced assessment of risk probability v risk impact v cost of mitigation etc: Dynamically translated into strategies, rules, practices, processes and procedures etc. Regularly reviewed. The People Includes: Recruiting, selection, clearances, access rights and other controls (both on joining and on leaving the organisation), alternate resource pools, monitoring, auditing, communication, awareness, training etc. The physical infrastructure Includes: Sites and their locations, adjacent “threats” (natural and man- made), utility service provision and back-ups, alternate sites, physical hardware assets (down to granular levels – e.g. – signed off holdings of desk-top assets), access controls, guarding, alerting, monitoring, testing, auditing etc. The information infrastructure Includes: Data, voice and IP network information transfer systems, and associated information storage and back-up facilities etc. Information retention policies also apply.

© BT PLC 2005 Security In Depth People, not just technology Policy, communication and awareness Firewalls (interconnect policies) Define allowed traffic in and out of security domain Intrusion detection systems and penetration tests Monitoring and alert Security configuration compliance Servers Server sensors, patching and configuration check Desktop Anti-virus software, patching and configuration Web filters Where are your people going, what are they doing? Logging and auditing

© BT PLC 2005 Key Collaboration Partners Field Command Air force Civilian Defence Units & Local Govt offices Central & Intergovernmental Organisations e.g.: NATO / EU Transfer of real time critical data & information securely via multi- channel methods Collaboration and sharing of data Policy / direction setting & legislation Intelligence Civil defence contingency plans, directives, command control & coordination of action Mobile Personnel navyarmy

© BT PLC 2005 Risks Field Command Air force Civilian Defence Units & Local Govt offices Central & Intergovernmental Organisations e.g.: NATO / EU Mobile Personnel navy army More sophisticated attacks on information infrastructure interoperability of systems - vulnerabilities unauthorised access to sensitive data e.g.: intelligence Downtime / Denial of Service e.g.: during deployment downtime & reliability nation’s eyes only real time response to threat resilience - maintaining of comm’s in battle-space breach of classification levels of data secure comm’s from remote locations cost

© BT PLC 2005 How Effective is this Risk Management!

© BT PLC 2005 Critical Infrastructure Risk Model Protagonist Model Business Model AttackLikelihood Assessment Risk Analysis Framework Solutions Impact Analysis priorities Technology Integration Process People Capability Opportunity Motivation Criticality Continuity Dependency Protection Detection Reaction Risk Managed Solutions Vulnerability Model

© BT PLC 2005 Business Requirements Business Continuity Strategy Business Continuity Plans Security Risk Analysis and Management Security Policy Non- Technical Security Operating Procedures Technical Security Architecture Technical Security Components and Tools - Technical Solution Security Incident Handling and Reporting Security Awareness Security Audit/ Compliance Checking Security Assurance Testing/ Evaluation Reports Business Continuity Plan Test Security Management Community Security Policy Identification of Security Countermeasures Regular Security Audit/ Compliance Checking Monitoring System in Operational Use Feedback into Risk Analysis etc. Overall Security Process Information Security Summary Accredited Service Implemented in a Secure Environment Live System Environment Firewall Policies Accreditation

© BT PLC 2005 Compliance Security audit/compliance checks business security health check Gap analysis (e.g. against ISO27001, (UK) MPS/JSP440) Security evaluation services IT security testing services Compliance against regulatory requirements such as Data Protection

© BT PLC 2005 IT security testing services Automated Vulnerability Scan Network Mapping Penetration Testing Level 1 Level 3 Technical Security Check Level 2 Includes 1. Technical security policy review 2. Vulnerability Assessment Options 3. Firewall Rulebase Analysis 4. Physical Computer Room Check 5. Social Engineering 6. Web Application Testing Automated Vulnerability Scan Network Mapping Penetration Testing Level 1 Level 3 Technical Security Check Level 2 Includes 1. Technical security policy review 2. Vulnerability Assessment Options 3. Firewall Rulebase Analysis 4. Physical Computer Room Check 5. Social Engineering 6. Web Application Testing

© BT PLC 2005 Proactive Monitoring & Management & Testing Network Management Effective network design Ensure efficient operation Ensure High Availability Firewalls in place Provide connectivity Security Management Effective security design Manage vulnerability Monitor - internal/external Integrate and Interpret Build IRP Best Practice is a blend of network & security operations

© BT PLC 2005 Can commercial security deliver for NATO? Accountable Retain experienced staff Government cleared personnel Setting Standards Availability 365 x 24 x 7 Information sharing ‘FIRST’, trade partners, government agencies etc.

© BT PLC 2005 Potential benefits Reduced technological and operational risks Reduced costs Expertise – Know-how Linked into ‘in-country’’ Critical National Information Infrastructure Global capability Regular audits & reviews Invariable Commercial Of The Shelf (COTS) solutions

© BT PLC 2005 Questions? Malcolm Page Business Continuity, Security & Governance Practice