View transcript

advertisement
Module 7
Cybersecurity
Rob Clyde: Everyone in an organization owns cyber security. Why? Because we are all
potential targets.
Jagdish Rao: Just as the people who are engaged in protection are becoming better and better,
the same thing is happening for the people who want to penetrate these defenses and take
advantage of them.
Greg Bell: We’re dealing with a changing set of bad actors, a changing set of risks…
Marty Hodgett: Boards of directors don’t always understand the depth and breadth of the
security landscape.
Greg Bell: If an organization is not discussing cyber risk on an annual basis, they are not
performing due care.
Larry Teverbaugh: What new rules do we have to have in place, what new policies do we have to
have in place. How do we prepare our employees as well as our clients and our suppliers for the
introduction of this new technology.
Cybersecurity
The Risk Landscape
Jagdish Rao: The threats that pose the greatest risk not only to our industry but any important
vital player in infrastructure or important industries are the following …
Malware
Jagdish Rao: Malware which is bad software which is injected from the outside, whether its
destructive malware or different kinds of malware which is just interested in stealing
information. The destructive kind of malware is the kind which actually gets deposited
unknowingly and then actually wipes out entire operating systems and causes chaos. The other
kind of malware, which is more traditional, is what comes in unobtrusively and then actually
steals information without you knowing it and takes away your credentials.
Larry Teverbaugh: The way you have to address that is expect that it is going to happen. An
administrative assistant, a data entry clerk, could be the CEO who is doing three things at once,
multi-tasking, someone interrupts them, they’re on the phone, an email comes in, they
inadvertently click on a link on an email that was very targeted to them. And suddenly their
system is compromised and maybe the network is compromised based upon what their access
might be.
Rob Clyde: Every employee is a potential target. Attackers can use employees in order to get to
other employees or other systems. That’s one of the reasons why we are all at risk and it takes
vigilance on the part of every single employee within an organization to make it secure.
Human Error
Marty Hodgett: Human error is going to – are definitely going to happen. We will send emails to
people who shouldn’t get emails. People will lose their phone. People will lose their computer.
We probably will have partners that share data that they shouldn’t share.
John Hotta: One of the big cyber security breaches was for some company that was extremely
secure from the outside, was created by an HR employee who actually downloaded a Facebook
app onto her machine which created a vulnerability within that one person’s computer which
then affected the whole network which then that government was able to access the entire
network and entire system. So that’s an example of how human error, lack of knowledge, lack of
training can create a cyber security risk for a company.
Advanced Persistent Threats
Jagdish Rao: This is what the intelligence community deems today as when you have extremely
well-funded organizations nation states with huge manpower and technology power behind them
launching concerted attacks, which weaken the defenses of an organization. And once they do
so, then they come in through the back door and install destructive malware to take advantage of
at a later date.
The Insider Threat
John Hotta: Cyber security is not only an external issue which I think we think about all the
time. There also are lots of threats within the company as well too. Unhappy employees who are
actually behind the firewall who are accessing data, who are actually creating security risks
within companies.
Jagdish Rao: You can have a very well-fortified perimeter. You can take care of your network.
You can have great resilient infrastructure, but somebody from inside the company exposes you
and actually is the cause for either theft of information or fraud or losses either inadvertently or
deliberately.
Larry Teverbaugh: What policies do you have in place or what technologies do you have in
place to be able to deal with those kind of events? And that goes all the way back to your hiring
practices, what are you doing in terms of your vetting of employees. It goes back to your
practices associated with who has access to this kind of information.
Third Party Threats
Jagdish Rao: Compromise of third-party systems of course is very important because there are a
lot of third parties who actually connect with you. That’s a big threat and a growing threat as
well.
Gail Coury: If you’re going out to use, a third party service, what kind of supplier security and
privacy commitments are you getting from that particular provider? What are they willing to
sign up for and is that data that you’re sending to that service the appropriate data.
Jagdish Rao: You could be very well fortified, but if the machines of your customers and clients
have got bad software on them or are not protected, that can actually flow through into your
systems.
Gail Coury: You can outsource your operation, but you can’t outsource your accountability for
your customer information or the information that you’re gathering on your ecommerce
transactions you are ultimately accountable as the business owner of that information.
Denial of Service Attacks
Jagdish Rao: Denial of service attacks, which are increasingly being perpetrated all the time.
This is where you have massive activity of people, basically machines trying to access your
systems and, therefore, they clog down and slow down the system to an extent where genuine
customers can’t get in anymore.
Compromised Systems
Jagdish Rao: And finally, compromising of the embedded systems themselves, which take a long
time to get detected. Sophisticated targeted attacks on applications, planting of back doors inside
applications which enable access by people who are unauthorized to access those systems and
applications from the outside. It’s often years before you know that your system got
compromised maybe at the time when it was being developed itself.
Mitigating Risk: The Board’s Role
Larry Taverbaugh: While there’s been an increase in boards looking at governance as it relates
to cyber security, there is still a lot that can be done and should be done associated with
managing that type of risk.
Rob Clyde: One of the questions I like is, how do we know that we haven’t been attacked or
infected? What type of assurance and mechanisms do we have in place? And many times the
honest answer is we don't, but here’s how we might find out if we have.
Larry Taverbaugh: Do we have policies in place that basically say that every board meeting
we’re going to get a report as it relates back to our risk profile and on that risk profile, what
metrics are we using to be able to identify that risk profile? Do we have policies in place both
from an insurance standpoint as well as a legal standpoint? Do we have a team of people that are
ready to be able to respond to this?
Rob Clyde: Questions that I would be asking management would be, for example, who do we
have that is in charge of this internally? What’s the structure? Do we have, for example, an
information security officer, also often called a CISO, who does he report to or she report to? Is
that the CIO? How does that flow up into the CEO?
Greg Bell: When the business need, the technology deployment and the control environment
becomes out of alignment, that’s where risk really starts to get introduced. Any time there is
significant business change, an acquisition or a merger or we’re expanding our services or taking
some big massive change, it’s often a good time to say what does this do to our control
environment.
Gail Coury: So making sure there’s that structure and that there’s regular assessments going on
and that the board is getting reported to at least annually, at a minimum, on the state of security
until the board has a certain amount of confidence that the business has been able to address the
risks and put in the proper controls to prevent these types of incidents.
Larry Teverbaugh: In the event that there is a data breach, Is our communications department
prepared to be able to respond to the media and what is our plan for actually reaching out to the
clients, to our suppliers, to the public at large or regulatory agencies we don't have time to put
together something when it happens, these things have to be prepared in advance and practiced.
Rob Clyde: And ideally have some type of independent verification that in fact attests that
you’re doing things that will, in fact, meet industry norms and do in fact mitigate the risk to a
level that is acceptable.
Download