National Webcast Initiative Performing a Cyber Security Risk Assessment Why? When? and How? Cyber Security Workshop August 26, 2004 3:00pm – 4:00pm Eastern National Webcast Initiative William F. Pelgrin Joint Partnership between MSISAC and DHS US-CERT Coordinated through the New York State Office of Cyber Security and Critical Infrastructure Coordination and the New York State Forum Webcast Attendees 94 Federal Government 491 State Government 117 Local Government 145 Academia, non-profit Current Listing of Vendors Interested In Participation Jay Dee Systems Accenture Keane AT&T Microsoft Aon Nortel Networks Computer Associates Novell CDW-G NYSTEC CGI Oracle CMA SAIC D&D Consulting SAS Ernst & Young Sybase Gartner Symantec HP Veritas IIC This listing will continue to evolve over time Today’s Speakers 3:00pm-3:15pm Introduction and Opening Remarks • William Pelgrin, Chair of the Multi-State ISAC; Director, New York State Office of Cyber Security and Critical Infrastructure Coordination • Lawrence C. Hale, Deputy Director, National Cyber Security Division, US CERT, Department of Homeland Security 3:15pm-4:00pm Performing a Cyber Security Risk Assessment • Graeme Payne, CA, CISSP, CISM, CISA; Partner, Security & Technology Solutions, Ernst & Young • Rick Trapp, Vice President, Product Management, Computer Associates US-CERT US-CERT – established in September 2003 and is the operational arm of the National Cyber Security Division at the Department of Homeland Security. US-CERT is the nation’s focal point for preventing, protecting against, and responding to cyber security threats and vulnerabilities. US-CERT interacts with all federal agencies, private industry, the research community, state and local governments, and others on a 24x7 basis to disseminate timely and actionable cyber security information. US-CERT US-CERT and the Multi-State ISAC are working together on a number of programs, including this webcast series, to help enhance our Nation’s cyber security readiness and response. The Multi-State ISAC has recently become a member of the HSIN/US-CERT portal, which provides a secure mechanism for sharing information between and among partners, improving cyber preparedness, readiness and response capabilities. US-CERT also hosts a public website, at www.us-cert.gov, which provides a wealth of information regarding cyber security – helpful tips for protecting against cyber security threats; cyber security alerts and bulletins, as well as the ability to sign up to receive free cyber security alerts via email. Graeme Payne Ernst & Young CA, CISSP, CISM, CISA Partner, Security & Technology Solutions Rick Trapp Computer Associates Vice President, Product Management Today’s Objectives Identify reasons for performing a CyberSecurity Risk Assessment Identify key components of a CyberSecurity Risk Assessment Understand considerations in performing a CyberSecurity Risk Assessment Today’s Agenda Developing a Common Language Why Perform Cyber Security Assessments? When to perform a CyberSecurity Risk Assessment? How to perform a CyberSecurity Risk Assessment Q&A Developing a Common Language What is a Risk Assessment? Source: GAO/AIMD-00-33 Definitions Refer: Glossary of Terms Customers Hackers Partners Malware Contractors Spam Why Perform CyberSecurity Risk Assessments? The Need for CyberSecurity Risk Assessments Reported vulnerabilities rose from 417 in 1999 to 3,784 in 2003 (CERT Coordination Center) 2004 CSI/FBI Computer Crime and Security Survey respondents reported nearly $142 million in total losses as a result of computer security incidents Helpful Hint Objectives of a CyberSecurity Risk Assessment Baseline • Where am I today? • What controls do I have in place? Evaluate effectiveness of security controls • Where do I want to be? • Identify gaps or opportunities for improvement Establish awareness of threats and vulnerabilities Lay foundation for development of security improvement plan When to Perform a CyberSecurity Risk Assessment When to Perform Periodic • • • • Often event driven Typically year-over-year comparison Generally labor-intensive Most organizations start with periodic assessments Continuous • • • • Part of the normal workflow Provides “real-time” risk view Often supported by technology and analysis tools Integrated with other IT/business processes Helpful Hint How to Perform a CyberSecurity Risk Assessment Key Steps 1. 2. 3. 4. 5. Define the objectives Define deliverables Establish workplan Perform assessment Review results and develop risk mitigation plans 6. Plan next assessment (steps 1-5) 1. Define the Objectives Consideration Examples Scope of assessment Standards to be applied Coverage Helpful Hint High level – identify gaps in policies and practices Detailed – identify risks for specific assets ISO17799 HIPAA, GLBA NIST Comprehensive Representative sample 2. Determine the Deliverables Consideration Examples Intended audience Format Distribution Executive – business impact Operational – technical focus Technical Report Summary Presentation Risk Database Internal External – consider sensitivity 3. Establish the Workplan Consideration Documents to be reviewed Examples Interviews Technical procedures Helpful Hint Policies, standards, procedures System configuration Application design standards Executive management Operations Business units 3rd Parties Asset discovery and valuation Threat analysis Vulnerability analysis 3. Establish the Workplan (cont’d) Consideration Examples Assessment tools Resources Helpful Hint Asset inventory Configuration validation Vulnerability assessment Penetration testing Password auditing Process modeling Documentation tools Internal External 4. Perform the Risk Assessment Activities Characterize System/Area Identify Threats Identify Vulnerabilities Identify Controls Assess Risk Example Worksteps • Interview system owner • Review system documents • Use threat checklist • Review external sources • Review vulnerability sources • Perform security testing • Review security requirements checklist • Review system documents • Prepare likelihood/impact matrix 5. Review Results and Develop Mitigation Plans 5. Review Results and Develop Mitigation Plans (cont’d) Risk Treatments Examples Accept the risk Reduce impact of the risk Avoid the risk Transfer the risk Trust employees to “do right thing” X% downtime Implement controls Add resilience Shut down system or unit Cancel contract Purchase insurance Outsource Next Steps Perform High-Level Risk Assessment Identify High Risk Areas Design and Implement Mitigation Plans Perform Detailed Risk Assessments Integrate Risk Assessment into Other Processes Helpful Hint Questions? Summary Developing a Common Language Why Perform Cyber Security Assessments? When to perform a CyberSecurity Risk Assessment? How to perform a CyberSecurity Risk Assessment Thank you for participating Future webcast sessions will offer a variety of topics Please remain online to participate in an interactive series of survey questions Written Q and A to the presenters is available for the next 15 minutes Thank You! Thank you for attending this virtual learning session