The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions 631-692-5175 Steve Katz, CISSP Security.

Slides:



Advertisements
Similar presentations
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
Security Controls – What Works
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Securing Information Systems
Information Security– SNO International Zanzibar, Tanzania Joe Beaulac, Sr. Manager – Cyber Defense Center & Risk/Vulnerability Management 23 September.
General Awareness Training
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Defining Security Issues
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
C8- Securing Information Systems
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 6 of the Executive Guide manual Technology.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
ACM 511 Introduction to Computer Networks. Computer Networks.
Ali Alhamdan, PhD National Information Center Ministry of Interior
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Cyber Security Management Lesson Introduction ●Understand organizational context for cyber security ●Understand the people, process and technology dimensions.
Computer Skills and Applications Computer Security.
Open Malicious Source Symantec Security Response Kaoru Hayashi.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
MIS323 – Business Telecommunications Chapter 10 Security.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Information Management System Ali Saeed Khan 29 th April, 2016.
Washington State Auditor’s Office Cybersecurity Preparing for the Inevitable Washington State Auditor’s Office Peg Bodin, CISA, Local IS Audit Manager.
Securing Information Systems
Proactive Incident Response
Securing Information Systems
Compliance with hardening standards
Securing Information Systems
I have many checklists: how do I get started with cyber security?
Contact Center Security Strategies
Presentation transcript:

The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security Risk Solutions

Mission  To prevent, detect and respond to acts that could impact the ability of a company to provide essential services.  To maintain public/customer confidence in a company’s ability to ensure the confidentiality, integrity and availability of information and services.  To enable a company to pursue business opportunities while meeting security and privacy commitments.  To create a culture where security is an integral part of the business governance process.  To prevent, detect and respond to acts that could impact the ability of a company to provide essential services.  To maintain public/customer confidence in a company’s ability to ensure the confidentiality, integrity and availability of information and services.  To enable a company to pursue business opportunities while meeting security and privacy commitments.  To create a culture where security is an integral part of the business governance process.

Key Drivers  The Need to Deliver Trust to Customers, Partners and Staff  Legal/Regulatory  ISO17799/ISF/BITS/COSO/COBIT Security Standards  Company Policy, Standards and Practices  Internal Audit Practices and Procedures  The Need to Deliver Trust to Customers, Partners and Staff  Legal/Regulatory  ISO17799/ISF/BITS/COSO/COBIT Security Standards  Company Policy, Standards and Practices  Internal Audit Practices and Procedures

Operating Assumptions  All companies are targets  All technology is vulnerable to intrusion  Web commerce systems are the windows to the company  Internet based Malware is a prevalent reality  What is secure today, won’t be tomorrow  Ongoing assessment is mandatory  Security is a Journey NOT a Destination  Metrics – If You Can’t Measure It, You Can’t Manage It!  All companies are targets  All technology is vulnerable to intrusion  Web commerce systems are the windows to the company  Internet based Malware is a prevalent reality  What is secure today, won’t be tomorrow  Ongoing assessment is mandatory  Security is a Journey NOT a Destination  Metrics – If You Can’t Measure It, You Can’t Manage It!

Some Top Concerns  Not Having An Effective Vulnerability/Patch Management Process.  Not Using Vulnerability Assessment and IDS/IPS Tools.  Not Analyzing Source Code.  Not Having Effective End Point Security.  Not Having Effective Application Level Security.  Having Improperly Secured Remote Access.  Unprotected Laptop Computers Being Stolen.  Ineffective Security For Web Services.  Not Having An Effective Vulnerability/Patch Management Process.  Not Using Vulnerability Assessment and IDS/IPS Tools.  Not Analyzing Source Code.  Not Having Effective End Point Security.  Not Having Effective Application Level Security.  Having Improperly Secured Remote Access.  Unprotected Laptop Computers Being Stolen.  Ineffective Security For Web Services.

Some Top Concerns  Having Improperly Configured Firewalls & Servers.  Not Having Effective Security Over Stored and Transmitted Data.  Using Non-secured for Restricted/Private Information.  Not “Pen-Testing” Internet Based Applications.  Not Analyzing Security Event Logs  Not Changing/Deleting Entitlements after Changes in Job or Employment Status.  Not Effectively Communicating with Business Management and the Board.  Having Improperly Configured Firewalls & Servers.  Not Having Effective Security Over Stored and Transmitted Data.  Using Non-secured for Restricted/Private Information.  Not “Pen-Testing” Internet Based Applications.  Not Analyzing Security Event Logs  Not Changing/Deleting Entitlements after Changes in Job or Employment Status.  Not Effectively Communicating with Business Management and the Board.

Classification of Threat First Generation  Spread via , or sharing files, disks, etc.  Examples would be the common viruses of the 80s/90s.  Remedy: Human action and anti-virus programs  Spread via , or sharing files, disks, etc.  Examples would be the common viruses of the 80s/90s.  Remedy: Human action and anti-virus programs

Classification of Threat Second Generation  Threat: usually self propagating worms.  Leverage known vulnerabilities.  Mostly non-destructive.  Remedy: Identify the vulnerability and fix ASAP.  Threat: usually self propagating worms.  Leverage known vulnerabilities.  Mostly non-destructive.  Remedy: Identify the vulnerability and fix ASAP.

Classification of Threat Third Generation  Leverage known and unknown vulnerabilities where patches may not be available.  May be targeted attacks.  May hide behind encryption.  Attacks aimed at obtaining information, including phishing/pharming.  Remedy: Automated vulnerability management tools and processes.  Leverage known and unknown vulnerabilities where patches may not be available.  May be targeted attacks.  May hide behind encryption.  Attacks aimed at obtaining information, including phishing/pharming.  Remedy: Automated vulnerability management tools and processes.

2005 Symantec Report Based on 24,000 Sensors in 180 Companies  Increasing use of sophisticated, Worms, Trojans, and Bots sold to the highest bidder.  Information Theft is on the rise: 74% of code submitted could steal information.  Almost 11,000 new Malware programs identified in first half of 2005; up 48% over  Increase in number of Phishing attacks.  Average time from disclosing an exploit to a working attack: 6 days.  Average time between exploit and patch release: 54 Days  Biggest Threat: worms, trojans, viruses and bots.  Number of attacks is decreasing - severity of attacks is increasing.  Increasing use of sophisticated, Worms, Trojans, and Bots sold to the highest bidder.  Information Theft is on the rise: 74% of code submitted could steal information.  Almost 11,000 new Malware programs identified in first half of 2005; up 48% over  Increase in number of Phishing attacks.  Average time from disclosing an exploit to a working attack: 6 days.  Average time between exploit and patch release: 54 Days  Biggest Threat: worms, trojans, viruses and bots.  Number of attacks is decreasing - severity of attacks is increasing.

Vulnerability-to-Exploit Window Vulnerability Discovered Vendor Notified Patch Release Last System Patched

2005 CSI/FBI Security Survey  700 Respondents vs. 494 in 2004  Causes of Financial Loss  Viruses42.8M  Unauthorized Access31.2M  Theft of Information30.9M  DOS 7.3M  700 Respondents vs. 494 in 2004  Causes of Financial Loss  Viruses42.8M  Unauthorized Access31.2M  Theft of Information30.9M  DOS 7.3M

2005 CSI/FBI Security Survey  Security Technology Used  Firewalls 97%  Antivirus 96%  IDS 72%  Server Based ACLs 70%  Encrypting Data in Transit 68%  Encrypted Files 46%  Password Tokens 42%  Biometrics 15%  Security Technology Used  Firewalls 97%  Antivirus 96%  IDS 72%  Server Based ACLs 70%  Encrypting Data in Transit 68%  Encrypted Files 46%  Password Tokens 42%  Biometrics 15%

Need To Look At Additional Tools  Risk, Vulnerability & Remediation Management  Vulnerability Assessments & Threat Alerts  Impact Assessment  Patch Validation & Distribution  Anti-phishing/anti-pharming tools  Identity & Access Management  End Point Security Products  Event Log Analyzers  Network Security Intelligence  Source Code Analysis  Web Services/XML Security Tools  Risk, Vulnerability & Remediation Management  Vulnerability Assessments & Threat Alerts  Impact Assessment  Patch Validation & Distribution  Anti-phishing/anti-pharming tools  Identity & Access Management  End Point Security Products  Event Log Analyzers  Network Security Intelligence  Source Code Analysis  Web Services/XML Security Tools

People-WhoProcess-WhatTechnology-How Prevention Awareness Programs Security Training Policy & Standards Trust Permit Risk Acceptance Anti-Virus ID & Access Management App. Code Review Detection Security Report Violation Logs Event Logs IDS Report Analysis Violation Analysis Tools IDS Event Log Analysis Tools Investigation & Forensics Cyber Security Investigators SIRT Data Mirroring/Forensics Tools Recovery & Reconstitution Verification & Validation Metrics Pen Testing War Games Assessment Tools Remediation Verification App. Code Analysis Security & Risk Framework

Thank You