CEO Cyber Security Guide

advertisement
The CEO’s plain English guide to
cyberspace
1984 Neuromancer
William Gibson
cybersecurity
Digital systems risk
management
BUY MARYLAND CYBER! mdcyber.com






Goals
Cyber environment
Risk management
Cyber best practices
Call to action
Q&A
BUY MARYLAND CYBER! mdcyber.com
 Learn: raise your cQ. be an informed
consumer, director, officer and advisor
 Protect: motivate you to create & execute
a cyber risk management plan
 Buy: Maryland Cyber. Create 10,000 jobs
BUY MARYLAND CYBER! mdcyber.com
Business Equipment
82% website, 87%
desktop, 84% laptop, 74%
smartphone (NSBA)
Online activity
87% purchasing, 83%
banking, 72% pay bills,
59% phone/skype
BUY MARYLAND CYBER! mdcyber.com
Threats & weaknesses
BUY MARYLAND CYBER! mdcyber.com
Proliferation of software
… full of holes
Vulnerability Types (SANS)
2,289 enterprise software
products from 539 vendors
in 2013 review (Secunia)



Insecure interaction
between components
Risky resource
management
Porous defenses
Vulnerabilities Detected


2,130 highly critical
13,073 total
BUY MARYLAND CYBER! mdcyber.com
US computer & electronic manufacturing exported to
Asia to lower costs


Complex networks with many components
Diffused, large & complex manufacturing supply
chains
Every component carries potential for security risk
BUY MARYLAND CYBER! mdcyber.com

Lack of situational
awareness

Limited knowledge of
what to do/not do

Low compliance in
online/offline behavior
BUY MARYLAND CYBER! mdcyber.com
Not concerned yet?
Criminals, terrorists,
hacktivists

Readily available tools

Increasingly adept

Strong economic &
political incentives

Cost advantage

Darknets
BUY MARYLAND CYBER! mdcyber.com




Hacking
Malware
Social
Physical
Ranked in order of # 2013 incidents
BUY MARYLAND CYBER! mdcyber.com






Servers
User devices
Persons
Networks
Kiosks
Media
Ranked highest to lowest # 2013 incidents
BUY MARYLAND CYBER! mdcyber.com

78% “low” & “very low” difficulty tactics &
<1% “high” difficulty



92% of all incidents fit 9 patterns
75% of attacks are opportunistic
76% exploited lost/stolen credentials
Verizon 2013 & 2014 Breach Reports
BUY MARYLAND CYBER! mdcyber.com
2013
# incidents
63,437
 Misc. Errors
 Insider Misuse
Insider Causes
 Crimeware
Total
25%
18%
43%
20%
63%
Incident: security event that compromises the integrity, confidentiality or availability
of an information asset (Verizon)
BUY MARYLAND CYBER! mdcyber.com
2% of incidents result in breaches
71% of Breaches caused by 8% of Incidents
2013
3 Years
# breaches
1,367
2,861
 Web Apps
 Cyber espionage
 POS
Total
35%
22%
14%
21%
15%
31%
71%
67%
Breach: incident that results in the disclosure or potential exposure of
data (Verizon)
BUY MARYLAND CYBER! mdcyber.com

2013: 35% of breaches, 6% of incidents

Method: exploit app weaknesses & stolen credentials
 Phishing to get user credentials
 password guessing (brute force)
 exploit the web application (i.e. WordPress)

Defense: stronger authentication (passwords), patching,
lockout policies, limited outbound connections
BUY MARYLAND CYBER! mdcyber.com
Attacker poses as a
trustworthy company to
steal or install malware
 The scam

 Help desk
 Account deactivation
 Bank
 Prepayment offer
 Email attachment
BUY MARYLAND CYBER! mdcyber.com

The approach
 email, IM & phone

Types
 Spear phishing – targeted to specific people
 Voice phishing – call or email asks you to call a
number & reveal account information
BUY MARYLAND CYBER! mdcyber.com
24/7 relentless
global assault on our valuable
assets

We’ve inadvertently enabled a

$250B- $400B+/year in financial damages
 Funds
 Intellectual property

Attack frequency, variety & sophistication are increasing.
And, we are losing ground.
BUY MARYLAND CYBER! mdcyber.com
Here’s what you should do
Internet Users Perception of Security
(Pew Institute)

23% “very secure”
46% “somewhat secure”
69% don’t get it

31% “not too secure” or “not at all secure.”

BUY MARYLAND CYBER! mdcyber.com

MY business is not a
target

The bad guys are too
effective to stop

Others will solve it

No idea what to do

No affordable solution
This is your company’s
problem!
BUY MARYLAND CYBER! mdcyber.com
Cyberpoint’s CyberVaR value-at-risk calculator
Make informed decisions:
 Evaluating security investments
 Creating mitigation strategies
 Purchasing cyber security insurance
BUY MARYLAND CYBER! mdcyber.com

Identify

Protect (Prevent)

Detect

Respond

Recover
NIST cyber framework
BUY MARYLAND CYBER! mdcyber.com

Determine the right balance of risk & investment
for your business
 Pros/cons of possible solutions subject to
 Constraints (capital, people, time)
Get Subject Matter Expert (SME) help
BUY MARYLAND CYBER! mdcyber.com
Maryland’s cyber industry advice







Make it a boardroom conversation
Put a target on your own back
Create a culture of accountability
Collaborate with your peers
Don’t be frozen by the noise
Products = Security
Consult a professional
BUY MARYLAND CYBER! mdcyber.com

Keep improving
 Adopt new methodologies to address new attacks

Support your security team:
 plan for downtime for testing, implementation & planned outages
 Allow time and budget for new tools and processes to implement
analysis and capture events forensically.

Push for awareness
 Training

CISO appointment
 Dedicated team
BUY MARYLAND CYBER! mdcyber.com

Train personnel by implementing a Cybersecurity
Awareness program

Conduct regular 3rd party security assessments
that include a social engineering exercise to
assess:
 How effective is the security awareness training?
 How effective is our Help Desk security?
 What are the risks that confidential information can
be leaked to unauthorized persons?

Install and maintain anti-virus software, firewalls,
and tune email filters to reduce phishing

Take advantage of anti-phishing features offered
by your email client and web browser
BUY MARYLAND CYBER! mdcyber.com
BUY MARYLAND CYBER! mdcyber.com

Your devices have already been compromised—voice.text.data

Your Wireless Carrier and Hardware Vendor will not protect you.

BYOD adds significant risk to your infrastructure and IP

Segregate corporate mobile apps from personal applications.

Do 2-factor authentication with device & application passwords

Acquire a Mobile Device Management Product like Airwatch, Mobile Iron
or Mobile Space

Install a Mobile Malware Free App from Lookout or McAfee

Buy a Throw Away Phone when you travel internationally
BUY MARYLAND CYBER! mdcyber.com





Educate employees about risks
Have documented social media policy
Passwords: complex, 1 per account, change
Access corporate social media account only from
the corporate network or a VPN
Monitor social networks for fraudulent accounts
mirroring your brand or execs
BUY MARYLAND CYBER! mdcyber.com






Establish access controls to company assets
Conduct periodic security training.
Background screen new employees
Institute stringent access controls and
monitoring policies on privileged users.
Monitor user computer behavior using tools
-Develop formalized insider threat program.
BUY MARYLAND CYBER! mdcyber.com
Protect: create & execute a cyber risk
management plan
 Buy: Maryland Cyber. Create 10,000 jobs
www.mdcyber.com
 Help Maryland: share this presentation &
introduce cyber companies to businesses
BUY MARYLAND CYBER! mdcyber.com
Download