Presentation is loading. Please wait.

Presentation is loading. Please wait.

Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.

Similar presentations


Presentation on theme: "Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security."— Presentation transcript:

1 Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security

2 The Self-Assessment purpose  Snapshot of where the nation is Educate participants  Identify strengths and weaknesses  Identify gaps  Allocate responsibilities  Establish priorities  Provide input to a national cyber security strategy 10/19/10

3 The self-assessment audience  All participants – the ultimate target But to ensure national action, the self-assessment must be addressed to key decision makers in  Government (executive and legislative)  Business and industry  Other organizations and institutions  Individuals and the general public 10/19/10

4 key elements 10/18/104 Legal Framework Culture of Cybersecurity Incident Management Collaboration and Information Exchange Key Elements of a National Cybersecurity Strategy

5 The Self-Assessment key elements D. Culture of Security:  Develop security awareness programs for and outreach to all participants, for example, children, small business, etc.  Enhance science and technology (S&T) and research and development (R&D)  Other initiatives 10/19/10

6 Yael Weinman Counsel for International Consumer Protection Office of International Affairs U.S. Federal Trade Commission September 2010 A Cultural Shift: Cybersecurity Gets Personal

7 Federal Trade Commission  General jurisdiction consumer protection agency  Enforcement through federal district court and administrative litigation  Small agency  www.ftc.gov

8 Federal Trade Commission Three-prong approach:  Individual Culture  Organizational Culture  FTC Enforcement Components of Cybersecurity  Privacy and Data Security  Spam  Spyware  Identity Theft How the FTC Can Help  Consumer and Business Education  Research and Consultation  International cooperation

9 Personal Culture Privacy and Data Security It is every individual’s responsibility You don’t need computer expertise or to be a member of IT to ensure data privacy and security

10 Organizational Culture Privacy and Data Security Build in privacy and data security from the ground up Privacy Impact Assessments Routine use of data security hardware and software

11 Enforcement Privacy and Data Security

12 Personal Culture Spam and Phishing Don’t open unknown emails Never open attachments unless you know the sender Type URLs into the address bar rather than clicking Don’t respond with account or personal information

13 Organizational Culture Spam and Phishing Let customers know how you will use their personal information—and stick to it Know the rules on sending unsolicited commercial email (UCE) Know how to communicate with your customers

14 Enforcement Spam and Phishing $2.5 Million court-ordered fine for weight loss spam $413,000 fine under a settlement with an X rated website

15 Personal Culture Spyware Don’t install software from an unknown source on your computer Be aware that games and other freeware can contain spyware Maintain virus protection software

16 Organizational Culture Spyware A consumer’s computer belongs to him or her, not software distributors Full disclosures must be clear and conspicuous A consumer must be able to uninstall or disable downloaded software

17 Enforcement Spyware Zango: $3 million disgorgement Seismic Entertainment ERG Ventures

18 Identity Theft

19

20 Identity Theft Task Force

21 Strategy – 4 key areas  keeping sensitive consumer data out of the hands of identity thieves through better data security and more accessible education;  making it more difficult for identity thieves who obtain consumer data to use it to steal identities;  assisting the victims of identity theft in recovering from the crime; and  deterring identity theft by more aggressive prosecution and punishment of those who commit the crime

22 Consumer and Business Education  Guidance to Business  Consumer Education  Communicating effectively

23 OnGuardOnline

24 En Español

25 Spam

26 Spyware

27 Identity Theft

28 1.Take stock. 2.Scale down. 3.Lock it. 4.Pitch it. 5.Plan ahead. "Protecting PERSONAL INFORMATION: A Guide for Business" Five Key Principles

29 Additional Resources National Institute of Standards and Technology (NIST) Computer Security Resource Center. www.csrc.nist.govwww.csrc.nist.gov NIST’s Risk Management Guide for Information Technology Systems. www.csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf www.csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf Department of Homeland Security’s National Strategy to Secure Cyberspace. www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf SANS (SysAdmin, Audit, Network, Security) Institute’s Twenty Most Critical Internet Security Vulnerabilities. www.sans.org/top20www.sans.org/top20 United States Computer Emergency Readiness Team (US-CERT). www.us- cert.govwww.us- cert.gov Carnegie Mellon Software Engineering Institute’s CERT Coordination Center. http://www.cert.org/certcc.html http://www.cert.org/certcc.html Center for Internet Security (CIS). www.cisecurity.orgwww.cisecurity.org The Open Web Application Security Project. www.owasp.orgwww.owasp.org Institute for Security Technology Studies. www.ists.dartmouth.eduwww.ists.dartmouth.edu OnGuard Online. www.OnGuardOnline.govwww.OnGuardOnline.gov

30 Thank you Yael Weinman Counsel for International Consumer Protection Office of International Affairs U.S. Federal Trade Commissionyweinman@ftc.gov

31 Questions? Thank You Joseph Richardson 10/19/10


Download ppt "Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security."

Similar presentations


Ads by Google