Presentation - NonProfit Pro Emerging Tech

advertisement
KEYNOTE
Two Perspectives for
Cybersecurity Best Practices
Jane LeClair, Phd
Chief Operating Officer
National Cybersecurity Institute
(NCI) at Excelsior College
Lisa Lori
Partner
Klehr, Harrison, Harvey,
Branzburg LLP
POWERED BY:
#NPPROTGC
The Challenges of
Cybersecurity
Dr. Jane LeClair
Chief Operating Officer
National Cybersecurity Institute
at Excelsior College
POWERED BY:
#NPPROTGC
A Connected World
POWERED BY:
#NPPROTGC
Malicious Intent
4
Staggering Losses
Financial Losses





Cyber crime costs the global economy $1 trillion annually
Merchants lose $190 billion to credit card fraud annually
Banks lose $11 billion in ATM fraud annually
Identify theft costs Americans $37 billion annually
Over 70 million people in the US were cyber victims last year
POWERED BY:
#NPPROTGC
Well Known Breaches
POWERED BY:
#NPPROTGC
Cyber Breaches Are
Everywhere
Hackers Attack Everywhere
Banks
Defense contractors
Learning institutions
Medical facilities
Government agencies
The White House
And….Non-profit organizations
POWERED BY:
#NPPROTGC
What Are They After?
DATA!!
•Hackers are seeking data from any source they can obtain it
•Personally Identifiable Information (PII)
•Data is ‘mined’ and used for further intrusions
•Information is leveraged to gain higher access
POWERED BY:
#NPPROTGC
But More Than That . . .
Cyber Warfare
•Defined as “actions by a nation state to penetrate another
nation’s computers or networks for the purposes of causing
damage or disruption” (Clarke and Knake, 2010)
•Goal of gaining access to many of America’s digital
infrastructures
POWERED BY:
#NPPROTGC
So What’s Changing
Higher Level of Sophistication
•Computer virus
•Network worms
•Sophisticated malware
•Targeted attacks, mobile attacks, espionage, cyber warfare
POWERED BY:
#NPPROTGC
How That Impacts You
Gateway
•Attacks are rising
•Vulnerability increased through the backdoor
•Increased costs when systems down
•Increased access to clients, partners, donors, contractors, etc.
POWERED BY:
#NPPROTGC
Organizational Structure
Challenges
•Ability and Desire to secure systems make you unique
•Generally centralized management
•Limited specialized cyber staff
•Relaxed culture often has limited formal cyber policies
•Large numbers do not have formal cyber security plan
•Large numbers do not have a formal internet security policy
•Often ignore cyber due to day-to-day operations
•Competing with large organizations, intel groups, military,
government for workforce
POWERED BY:
#NPPROTGC
Organizational Structure
Challenges
•Often ignorant of extent of security threats
•May feel it’s a given….why worry….flawed perceptions
•Not concerned about internal threats
•Don’t have expertise to develop and implement plans/policies
•Often feel that a data breach would have no effect on them
•Large numbers of owners/operator are responsible personally
•Forced to depend on advice from vendors/consultants
•Physical/Cyber security not made a priority
POWERED BY:
#NPPROTGC
What You Are Facing
Threats
•Increased basic attacks and more sophisticated
•Focus of attacks has been easily exploitable weaknesses
•Trojans used to lurk within and be a watering hole
•Attackers play on low knowledge level, limited resources,
inexperience in design configuration and implementation of
controls such as passwords, updated security settings,
patch management, phishing
POWERED BY:
#NPPROTGC
What You Can Do
Realization
Awareness
Preparation
POWERED BY:
#NPPROTGC
Realization
• All digital systems are vulnerable
• It isn’t a matter of IF, but WHEN you will be
attacked
• Work to reduce your chances of a cyber
breach
POWERED BY:
#NPPROTGC
Realizing Your Vulnerability
POWERED BY:
#NPPROTGC
Awareness
• Reduce your risk
• Increase awareness
• Educate and train your employees
POWERED BY:
#NPPROTGC
Cyber Threats
•
•
•
•
•
Sophisticated Malware
Impact of Internet of Things
Bring Your Own Devices
Expanded Black Market
Increased Website Hijacking
POWERED BY:
#NPPROTGC
Cybersecurity is a
People Problem





#NPPROTGC
Wired communication pathway between
the digital network and the Internet
Wireless communication pathway
between the digital network and the
Internet
Connection (authorized and
unauthorized) of portable digital media
and computing devices to the digital
network
Physical access (authorized and
unauthorized) to the digital network
(insider threat)
Hardware/software supply chain
(equipment from a supplier) POWERED BY:
Integrating the Domains
Ensure the
right
technology,
configuration
maintenance
and integration
Ensure
awareness,
acceptance
and tech
personnel
required
Ensure policies/
procedures are
in place to
define scope,
application, use
and exceptions
POWERED BY:
#NPPROTGC
Cyber Focus
Social engineering is the #1 method of initiating a breach
ALL of us house personally identifiable information
If you don’t have the expertise… hire it!
You can build better ‘mousetraps’
Pay attention to Cloud security
Be aware of your supply chain
POWERED BY:
#NPPROTGC
Prepare
Prepare for the Inevitable
 Install an Intrusion Detection System (IDS)
 Appoint and train a cybersecurity response team
 Develop a cybersecurity disaster and recovery plan
POWERED BY:
#NPPROTGC
Disaster Recovery




Key steps to reduce the pain of a data breach
Legal issues after a data breach
What to tell the media, customers, vendors
How to reduce the chances of a future attack
POWERED BY:
#NPPROTGC
Key Steps After a
Data Breach
 Assemble internal team
 Perform initial internal investigation
 Document who and how it was discovered and what might
have been stolen
 Contact law enforcement
 Hire specialists
 Prepare for media coverage, social media
POWERED BY:
#NPPROTGC
Key Steps After a
Data Breach






Communicate with your customers
Perform in-depth investigation
Continue in-depth documentation
Implement fixes
Validate the fixes
Enhance overall cybersecurity measures
POWERED BY:
#NPPROTGC
Documentation




Document the potential scope of the attack
What parts of the network were attacked?
What data may have been stolen?
How was the attack identified?
POWERED BY:
#NPPROTGC
Investigation
 Evidence Preservation
• View your system as a physical crime scene. Evidence
must be protected and an initial investigation conducted
quickly and with as little contamination as possible.
• Retain system, application, database, and network device
logs and avoid making changes to the system suspected of
being compromised before data is preserved.
POWERED BY:
#NPPROTGC
Investigation
Forensic Data Collection
• Consult an expert to assist you in acquiring a forensic image
of the hard drive and the live memory of the systems
suspected of being compromised
• Follow the proper chain of custody procedures. The more
details you can save, the better chance there is to identify the
criminals.
POWERED BY:
#NPPROTGC
Legal Issues After a
Data Breach




Expect Lawsuits
Determine Notification Requirements
Be prepared to share breach documentation
Determine what outside help needed
POWERED BY:
#NPPROTGC
How to Reduce Chances
of a Future Attack
Implement stronger security measures. It can happen to
you again
POWERED BY:
#NPPROTGC
How to Reduce Chances
of a Future Attack
 Conduct employee awareness training:
• Each person needs to be cautious
• Do role-playing with phishing examples
• Practice social engineering tricks so your people
can identify someone trying to do it
POWERED BY:
#NPPROTGC
Response Planning
Create a list of key people to involve for your response to an attack:
 Management: Senior officers or owners
 IT: Employee or outsourced key contact
 Financial: Employee or outside bookkeeper
 Marketing/PR: Communications to customers, vendors, partners
as well as media responses and press releases
POWERED BY:
#NPPROTGC
Response Planning
 Human Resources: Communications to employees and
how to handle questions from customers or the media.
 Telecommunications: How to communicate with staff,
vendors and customers if work-provided phones and
email system are compromised.
POWERED BY:
#NPPROTGC
Cyber Education and Training
Requirements










Web and Email Security
Cyber Law Requirements
Social Media
Data Storage
End/Host Security
Mobile Security
Wireless Security
Cloud Security
Disaster Recovery and Business Continuity Planning
Senior Management Responsibility
POWERED BY:
#NPPROTGC
Recommendations and
Best Practices












Know your risk from a Technical and Human standpoint
Know how your information is used and stored
Ensure TOTAL integrity
Implement Robust password policies
Have a Disaster/Recovery plan
Ensure encryption on all devices
Scan emails and files to prevent introduction of viruses
Keep Patch management updated
Ensure employee education
Have and update policies
Improve cyber culture within the organization
Consider Cyber Insurance
POWERED BY:
#NPPROTGC
Best Practices
Plan Ahead






Assess assets, risks, resources
Build policies
Choose controls
Deploy controls
Educate executives, employees, vendors
Continually assess, audit and test
POWERED BY:
#NPPROTGC
Future Trends




There will be an increase in cyber attacks
Small organizations will continue to be gateways
Increased interconnection of organizations and clients
Growing need to develop a cyber culture
POWERED BY:
#NPPROTGC
National Cybersecurity
Institute
The National Cybersecurity Institute (NCI) at Excelsior College
is an academic, research and training center located in
Washington, D.C. Its mission is to assist government, industry,
military, and academic sectors meet our cyber security
challenges, with a particular focus on shaping the cyber security
workforce.
POWERED BY:
#NPPROTGC
National Cybersecurity
Institute
 Provide training on security awareness
 Professional development training for cyber professionals
 Support research / publications conducted by leading cyber security
experts
 Facilitate workshops to educate stakeholders on important
dimensions of cyber security
 Present webinars to widely disseminate cutting edge policy and
research
 Help you develop your cyber plan, risk assessment, incident
response and training
POWERED BY:
#NPPROTGC
Questions?
Dr. Jane LeClair
Chief Operating Officer
National Cybersecurity Institute
2000 M St NW Suite 500
Washington, D.C.
nci@excelsior.edu
www.excelsior.edu
POWERED BY:
#NPPROTGC
Download