Cyber Security Management Lesson Introduction ●Understand organizational context for cyber security ●Understand the people, process and technology dimensions.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Policies.
1 An Overview of Computer Security computer security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
The Way Ahead for Information Systems Security: What You Don’t Know Can Hurt You Christopher Baum Research Vice President Global Government NYSCIO Conference.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
1 Pertemuan 9 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Introduction to Network Defense
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
A First Course in Information Security
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
General Awareness Training
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
The State of Computer & Data Security in Corporations Independent Survey.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Note1 (Admi1) Overview of administering security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
Enterprise Cybersecurity Strategy
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Security Mindset Lesson Introduction Why is cyber security important?
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Santa Clara, CA (408)
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Information Security Program
Team 1 – Incident Response
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
Compliance with hardening standards
Lecture 14: Business Information Systems - ICT Security
Cyber Protections: First Step, Risk Assessment
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Securing Information Systems
Chapter 3: IRS and FTC Data Security Rules
CSI Survey 2007 Tiffany Gorman
Information Security: Risk Management or Business Enablement?
I have many checklists: how do I get started with cyber security?
Security Threats Severity Analysis
12 STEPS TO A GDPR AWARE NETWORK
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
Presentation transcript:

Cyber Security Management Lesson Introduction ●Understand organizational context for cyber security ●Understand the people, process and technology dimensions of cyber security management ●Assessing cyber risk and its relationship to security management

Managing Security ●Technical controls (authentication, access control etc.) are used to reduce the risk of attacks on valuable assets. ●What assets need to be secured and from whom?

Organizational Context ●Legal and compliance drivers for cyber security ●Financial and health data ●What technical controls should be deployed? ●Must understand risks posed by threats ●Costs and benefits of security measures

Key Challenges ●What assets are under risk? ●What are the threats and how serious is the risk posed by them? ●Likelihood of successful attack and its impact

Key Challenges ●What technological solutions/controls exist to counter threats? ●How can we address risk in a cost- effective manner? ●Cost is less than reduction in risk ●How do we understand people and process aspects of cyber security management?

Network Use Policy Quiz Cyber security planning and management in an enterprise must define allowed computer and network use by employees. Georgia Tech’s computer and network use policy strives to do this for students, faculty and staff. Check all that you think are required by this policy: Georgia Tech account passwords should be changed periodically. A compromise of a computer should be reported to someone responsible for cyber security at Georgia Tech. Georgia Tech computers cannot be used to download illegal content (e.g., child pornography).

Botnet Quiz A botnet operator compromises a number of computers in a company. The malware executed by the bots only sends large amounts of spam but does not exfiltrate sensitive data or interfere with legitimate activities. Choose the appropriate action by the company in this situation: The company should detect and prevent abuse of its resources by unauthorized parties. Since it poses no risk to company’s sensitive data or normal operations, it can be ignored.

Security Planning ●What needs to be secured? ●Who is responsible for it? ●What technical/non-technical controls should be deployed? ●How are people supported to do what they need to do? ●What if something goes wrong? ●Response and recovery ●Accountability and consequences

●What Needs to be Secured? ●Hardware, software and services Servers, routers, switches, laptops and mobile devices OS, databases, services and applications Data stored in databases or files ●From whom? ●Remote hackers? ●Insiders? Assets and Threats

The need to manage cyber security for over a million devices each running many services Lack of sense of urgency in fixing cyber vulnerabilities. Choosing to support key functions even when this could introduce vulnerabilities. Security Audit Quiz A news story in 2014 reported that an inspector general’s report gave Veteran Affairs (VA) a failing grade for 16 th straight year. The CIO of VA discussed a number of challenges that could explain this grade. Mark the ones that you think could be possible reasons: (See the instructor notes for a link to the article)

CISO Quiz Chief Information Security Officer (CISO) is the executive who is responsible for information security in a company. Did Target, the major retailer, have a CISO when it suffered the serious breach? Choose the best answer. Yes No

Security Planning: Controls ●Identity and access management (IAM) ●Credentialing, account creation and deletion ●Password policies ●Network and host defenses ●Firewalls, IDS, IPS ●Anti-virus ●VPN and BYOD ●Vulnerability patching ●User awareness and education ●Phishing attack awareness (Phishme)

Security Planning: Security Policy ●High level articulation of security objectives and goals ●Legal, business or regulatory rationale ●Do’s and don’ts for users –Password length –Web and policies –Response to security events ●Address prevention, detection, response and remediation as it concerns/impacts users

Georgia Tech Computer and Network Use Policy ●States guiding principles ●Protect GT IT resources ●Ensure no state or federal laws are violated ●Some interesting highlights ●Copyright and IP ●Export control ●Who is responsible? ●Network – Office of Information Technology ●Devices – Units or individual

Computer Use Policy Quiz Does Georgia Tech’s computer and network use policy prohibit personal use of university resources? Choose the best answer. Yes No

Student Privacy Quiz Georgia Tech systems store student data such as grades. The Institute must protect such data due to... Choose the best answer. Regulatory reasons Because the data is sensitive it can only be disclosed to student and his/her family

Anthem Breach Quiz Anthem suffered from a major breach in Based on an analysis of its response to the breach, did Anthem respond well to the breach? (see the instructor notes for a link to the analysis) Choose the best answer. Yes No

Cyber Risk Assessment ●Investments in cyber security are driven by risk and how certain controls may reduce it ●Some risk will always remain ●How can risk be assessed?

Quantifying Cyber Risk Risk exposure = Prob. [Adverse security event] * Impact [ adverse event] Risk leverage > 1 for the control to make sense

Managing Cyber Risk How do we assess and reduce cyber risk? ●Impact ●Expected loss (reputational, recovery and response, legal, loss of business etc.) ●Risk management ●Accept, transfer (insurance) and reduce ●Reduction via technology solutions, education and awareness training

Security Breach Quiz A company stores sensitive customer data. The impact of a breach of such data must include... Mark all applicable choices. Cost of purchasing identify theft protection for customers Loss of business due to reduced customer confidence Compensation for new cyber security personnel the company hires to better manage cyber security in the future

Reducing Exposure Quiz A company is considering two possible IDS solutions to reduce its exposure to attacks on its network. The first one costs $100K and reduces risk exposure by $150K. The second one costs $250K but reduces risk exposure by $500K. Which solution would you recommend? Choose the best answer. Cheaper solution that costs $100K More expensive solution that costs $250K

Cyber Insurance Quiz Cyber insurance is still not very popular. Based on a 2014 survey, what percentage of customers of major insurance brokers were interested in buying cyber insurance? (see the instructor notes for a link to the survey) Choose the best answer. Less than 25% Over 50%

Enterprise Cyber Security Posture ●Reactive: ●Regulation/compliance ●Customer demands ●In response to a breach (Target or Home Depot) ●In response to events

Enterprise Cyber Security Posture ●Proactive: ●Champion of an organization who has influence ●Board level conversation about cyber security and risk

Enterprise Cyber Security Posture ●Economic value argument: ●Return on investment (RoI) ●Estimating costs and benefits is tricky ●Perception vs. data-driven risk

Security Planning and Management ●Values at risk ●Assets, reputation etc. ●Threats and attack vectors ●Plan, implement and manage ●Deploy appropriate controls ●Empower people and hold them responsible ●Plan for response and remediation (do not be surprised) ●User awareness ●Understand and proactively address risk Bringing It All Together!

Cyber Security Budgets Quiz Are cyber security budgets increasing as the number of reported incidents increases (see the instructor notes for a link to the PwC report)? Choose the best answer. Yes No

Proactive Security Quiz An example of proactive security measure is... Choose the best answer. Making sure the company complies with all regulatory requirements Chief risk officer (CRO) of the company addressing cyber risk regularly at highest level (e.g., board) when other risks are discussed

Cyber Security Management Lesson Summary ●Managing cyber security is a complex process that involves technology, people and processes ●Organizational context and cost/benefit analysis is necessary for security controls ●Risk based argument for cyber security