1. Introduction - Columbia University

advertisement
National Cyber Defense Financial Services
Workshop
(Draft) Report
“Helping Government Form a Sound Investment
Strategy to Defend Against Strategic Attack on
Financial Services”
October 28-29, 2009
Hosted by: BITS, FSTC and Financial Services Roundtable
1001 Pennsylvania Avenue NW, Suite 500 South, Washington DC
Sponsored by: National Science Foundation and Department of
Homeland Security
Chartered by: National Cyber Defense Initiative
7 Oct 2009 (Annotated Outline)
Executive Summary
<This section will contain a one-page summary of the most important content>
i
Revision History
Date
10/07/09
Description
Outline Created
10/07/09
Changed to outline heading
Author
O. Sami Saydjari,
ssaydjari@CyberDefenseAgency.com
1. Jenny McNeill,
jenny.mcneill@sri.com
ii
Preface
Co-Chairs: Dan Schutzer, FSTC and Sal Stolfo, Columbia, and Brian Peretti, Treasury
Chartering: O. Sami Saydjari, NMCI Executive
Organizing Committee: John Mitchell, Stanford and John Carlson, FSTC
Sponsor Representatives: Doug Maughan, DHS, Karl Levitt, Lenore Zuck, Sylvia
Spengler, DHS
Participants: <list Participants here, as a table [name::org]>
iii
Table of Contents
1. Introduction ......................................................................................................................................... 1
1.1 Background ................................................................................................................................... 1
1.2 Purpose and Goals ...................................................................................................................... 1
1.3 Participation ................................................................................................................................. 2
1.4 Intended Audience ..................................................................................................................... 2
2. Problem .................................................................................................................................................. 2
2.1 Research Challenges .................................................................................................................. 2
2.1.1. Prevention ........................................................................................................................ 3
2.1.2. Detection and Response .............................................................................................. 3
2.1.3. Recovery and Reconstitution .................................................................................... 3
3. Strategies for Addressing Challenges ......................................................................................... 3
3.1.1. Prevention ........................................................................................................................ 3
3.1.2. Detection and Response .............................................................................................. 3
3.1.3. Recovery and Reconstitution .................................................................................... 3
4. Innovative Industry-Government Partnership Models ....................................................... 3
5. Recommendations ............................................................................................................................. 3
6. Conclusions and Findings ............................................................................................................... 3
IV
1. Introduction
This report documents a one and half day public-private information technology
industry workshop on national cyber defense sponsored by NSF and DHS. The
workshop is one in a series organized by the National Cyber Defense Initiative
Steering committee with support from several government organizations and
leaders. The workshop took place October 28 -29 (half day) at the BITS
organization headquarters in Washington DC.
1.1 Background
Large portions of our country’s economic, industrial, social and governmental
functions now depend upon a cyber infrastructure assembled from readily available
commercial information system components. Much of this infrastructure is
organized to tolerate random failures and outages but could fail catastrophically
under malicious attack. Industry leadership is needed to substantially reduce this
serious vulnerability. There are many efforts underway to begin to address these
issues at the national level. We had representatives from the leading commissions
and working groups participating in the workshop. This workshop was intended as
a forum for members of the financial industry to contribute input to multiple
planning and strategic efforts underway and to define actionable plans to take back
to their organizations and to input into government planning.
1.2 Purpose and Goals
The goal of the workshop is to develop a shared view of an attack-resistant and
attack-tolerant cyber infrastructure and specific steps to be taken to reach that
vision. Specifically, we seek to:
1.
Understand the changing threat environment and the increasing possibility
of extraordinary attacks mounted by nation-state adversaries for strategic gain and
the growing sophistication of criminal organizations for financial gain.
2.
Review Financial Services Sector Coordinating Council Research and
Development priorities and National Cyber Leap Year priorities. Discuss research
that support these priorities and specific game-changing technologies and processes
that apply to the banking and finance sector
3.
Discuss ways to incorporate new innovation partnership models. Create
processes whereby the banking and finance sector and the broader research
community and the U.S. Government can produce relevant solutions to current and
long-term challenges and plan for a more efficient transfer of these research
products into industry best practices.
4.
Produce a public report and plan to help inform government of needed R&D
to defend the financial services infrastructure. (Background resource:
http://ncdi.nps.edu/)
1
1.3 Participation
Technical and business leaders of the banking and finance sector, government
(including representatives from White House Office of Science and Technology, DHS,
NSF and Treasury Department), and academic researchers. Participants had deep
understanding of the technologies and operations and of significant failures that
have happened to date. To assure focus and productivity, the meeting was limited to
approximately 35 participants. The workshop was chaired by Sal Stolfo (Columbia
University and representing the National Cyber Defense Initiative steering
committee), John Mitchell (Stanford University), Dan Schutzer (President of the
Financial Service Technology Consortium and representing the FSSCC R&D
Committee) and Brian Peretti (Financial Services Critical Infrastructure Program
Manager and representing the Department of the Treasury and the Financial and
Banking Infrastructure Information Committee or FBIIC).
1.4 Intended Audience
There are two main audiences for this report: (1) government research and
development planners and (2) financial service industry strategic leaders. Our goal
is to provide input into the government planning process to offer up key strategic
problem areas that need to be worked for the nation’s benefit. For the financial
service industry folks, we hope to give some insights on the problem and some
approaches to planning defenses against large-scale attacks that are within their
purview.
2. Problem
Recent events demonstrate the vulnerability of banking from cascaded effects, such
as the sub-prime lending disaster. Banks have done reasonably well in protecting
themselves from sophisticated criminals; losses have been growing, but are
tolerable. We expect that banking will continue to be effective against “ordinary”
cyber attacks as part of the cost of doing business. We are concerned with
extraordinary attacks mounted by nation-state adversaries for strategic gain. On a
very small experimental scale, the attack by Russia on Estonia’s banking system is
an example of the potential situation our nation may face, especially if cyber attacks
are launched in conjunction with kinetic attacks.
2.1 Research Challenges
<Given the top-level statement above, what are the challenges we face? The
material here will come partly from the first plenary talk by Jane, but mostly from
the breakout working groups. We should draw heavily from the brief out materials
and the scribe notes from the works sessions, particular the first working session.
The problems should be in some sort of rank order as prepared by the breakouts. –
oss>
2
2.1.1.
Prevention
2.1.2.
Detection and Response
2.1.3.
Recovery and Reconstitution
3. Strategies for Addressing Challenges
<This section should include strategies for address the key problems identified in
the section above—with focus on the top ranked issues/opportunities. The material
for this section should come directly from the working sessions. –oss>
3.1.1.
Prevention
3.1.2.
Detection and Response
3.1.3.
Recovery and Reconstitution
4. Innovative Industry-Government Partnership Models
<This section is intended to document innovative ways that industry and
government can work together to address challenges and implement the strategies.
The primary content is intended to come from the plenary session on Wednesday. –
oss>
5. Recommendations
<What does the group recommend to government and financial services leadership
be done about the strategic risk to the financial services sector. These are intended
to be clear actionable recommendations, particularly focused on investment toward
addressing the hard problems. Prioritization is important and should be gleaned
from the group. I expect some of this material to come from the working sessions,
particularly the last one, but much of it will come from the plenary session (whole
group) led by Sal at the end of day one, and John M. at the beginning of day 2). –oss>
6. Conclusions and Findings
<What conclusions do we draw about this area regarding the problem and the
proper courses to solutions. I expect this section to be an abstraction of specific
recommendations. I also expect to include any findings regarding the situation or
the nature of solution approaches that transcend any specific idea. I expect these
will be recorded along the way from comments made both in plenary and breakout
sessions. –oss>
3
Appendix: National Cyber Defense Financial Services Workshop Agenda
“Helping Government Form a Sound Investment Strategy to Defend Against Strategic Attack on Financial Services”
Wednesday, October 28
8:00–8:30
Breakfast
8:30–8:45
Welcome Opening Remarks
8:45–9:00
Workshop Context
9:00–9:45
Changing Threat environment and Needs of the Financial
Services Industry– scenarios of likely outcomes if FI
infrastructure is disabled, timing of downtime and
requirements for reconstitution; learn what we need to know
Brainstorming research challenges for nation state and
organized crime threat to FI infrastructure; prevention
strategies, reconstitution strategies.
Breakout into 3 parallel Working Groups
Working Group 1: Detection and Response
- how one would know that a strategic financial service
sector attack was unfolding and perhaps what top-level
actions might mitigate damages,
- What kind of attacks do we need to worry about (service
denial, attack on integrity of services, on financial health)
Working Group 2: Prevention
- how do we increase the adversaries work factor to make
such attacks much harder
Working Group 3: Recover and Reconstitution
- how do we maintain the largest possible core of a system,
where a strategic attack succeeds, and recover the rest as
quickly as possible
Break
Interim Report out of Working Groups to Plenary session
Discussion of R&D and game-changing technologies that
support the needs of the Banking and Finance Sector. Review
relevant recommendations from Cyber Leap Year
Working Lunch
9:45–9:55
9:55–10:55
9:55–10:55
9:55–10:55
10:55–11:10
11:10–11:45
11:45–12:45
12:45–1:30
1:30–1:35
1:35–2:30
2:30–2:45
2:45–4:15
4:15–4:45
4:45–5:30
6:00
Continuation of discussion of R&D and game-changing
technologies that support the needs of the Banking and
Finance Sector. Charge to working groups
Working Group 1, 2 and 3 continues to meet to finish and to
prioritize their lists of needed technologies
Break
Continuation of discussion of R&D and game-changing
technologies; rank key ideas, develop strategies to address
Reports by Three Working Groups on top ideas
Recap of the day discussion
Group Dinner @ Bistro D’Oc, 518 10th St, NW (1 blk north)
Brian Peretti (Treasury), Dan Schutzer
(FSTC) and Sal Stolfo (Columbia
University)
Douglas Maughan (DHS) and Lenore
Zuck (NSF)
Discussion facilitated by Jane Carlin
(Morgan Stanley and chair of the
FSSCC Cybersecurity Committee)
Dan Schutzer (FSTC)
Working Group Chairs
John Mitchell (Stanford University)
Mark Clancy to discuss recent Cyber
Exercise for Financial Services
Sami Saydjari (Cyber Defense Agency)
Working Group Chairs to Workshop
Led by Sal Stolfo and Dan Schutzer
1
Thursday, October 29
8:00–8:30
Breakfast
8:30–9:30
Review and discussion of yesterday’s findings and
recommendations
9:30–9:45
Break
9:45–11:15
Discussion of the Innovation Partnership model and efficient
technology transfer mechanisms
11:15–12:30
12:30
Review Outline of Report, Assign Authors to Draft Portions,
and Establish Target Completion Date
Box Lunches and Adjourn
John Mitchell
Introduced by Aneesh Chopra, Obama
Administration’s Chief Technology
Officer (led by Sal Stolfo and Dan
Schutzer if Aneesh isn’t able to stay)
Sami Saydjari, Jeremy Epstein (SRI)
2
Download