36
Cyber Security: Understanding and Mitigating the Threats Facing Your Organization Mike LeFever, ITC Secure Global Advisors William Kilmer, ITC Secure

Cyber Security: Understanding and Mitigating the Threats

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyber Security: Understanding and Mitigating the Threats

Cyber Security: Understanding

and Mitigating the Threats

Facing Your OrganizationMike LeFever, ITC Secure Global AdvisorsWilliam Kilmer, ITC Secure

Page 2: Cyber Security: Understanding and Mitigating the Threats

Agenda

• Introductions

•Why Cyber Security is So Bad

•A New Model for Cyber Security:

Investment and Leadership

• Top Things You Can Do for Little or No Money

Page 3: Cyber Security: Understanding and Mitigating the Threats

Introductions

Page 4: Cyber Security: Understanding and Mitigating the Threats

William Kilmer

• Executive Chairman and CEO, ITC Secure

• CEO two prior security companies

• Author of two books

[email protected]

• www.william.kilmer.com

Page 5: Cyber Security: Understanding and Mitigating the Threats

VADM Mike LeFever, USN (retired)

• ITC Global Advisors

• Chief Operating Officer for IOMAXIS, a US technology company specializing in cyber

• Member of the network of national security experts for “The Cipher Brief”

• 38 Years of Military Service with Command at every level, to include:

• Former Director for Strategic Operational Planning at

the National Counter Terrorism Center NCTC

• Commander, Office of Defense Representative

in Pakistan and Commander, Joint Task Force in

Pakistan, leading all US Armed Forces in Pakistan

between 2008-2011

Page 6: Cyber Security: Understanding and Mitigating the Threats

We enable clients to react to ever-changing threats, and help to prevent brand damage that could impact their profitability

Established in 1995, ITC has capabilities in on-premise, cloud-based and hybrid security, and provides:

• Cyber advisory services

• Managed security services

• Global advisory services

• Secure network services

• Unique access to National Security-level experts

Page 7: Cyber Security: Understanding and Mitigating the Threats

Survey

What do you think about

when you hear Cyber Security?

What keeps you awake at night

about security?

Page 8: Cyber Security: Understanding and Mitigating the Threats

Why cyber security is so bad

Page 9: Cyber Security: Understanding and Mitigating the Threats

• Cyber is the new battlefield

• Hostile actors are widening

• Financial services and government

most targeted, but not exclusive

• Issues will proliferate with digital

transformation

• Leaders are not prepared to lead in a

digitally transformed environment

How bad is the cyber

security problem?

Page 10: Cyber Security: Understanding and Mitigating the Threats

• Russia, China, North Korea, and

Iran active state sponsors for

attacks on the West

• Similar techniques used by

nation states and criminals.

Nation States and

Criminals

Page 11: Cyber Security: Understanding and Mitigating the Threats

• Intentional or unintentional misuse

of access to information accounts for

a growing number of cyber incidents

• Upwards of 41% of significant cyber

breaches are the result of human

error or non-compliance

Snowden : OPM Breach : Islamic State exploit

of CENTCOM : Walmart data breach

Insider threats are

still a problem

Page 12: Cyber Security: Understanding and Mitigating the Threats

• Phishing costs $5 billion

per year

• Ransomware 40% of

cyber attacks

Basic attacks are

still working

Page 13: Cyber Security: Understanding and Mitigating the Threats

2 million:Global shortage of cyber security

professionals

by 2019

53%Of organisations wait

6 month for qualified candidates

84%Believe half or fewer applicants

are qualified 3.5 million cyber security openings by 2021

The cyber security skills gap is widening

Page 14: Cyber Security: Understanding and Mitigating the Threats

The skills gap

Average Security headcount

Enterprise size

(employees)

IT

FTE

IT security

FTE

500 29 2.0

999 58 3.9

Page 15: Cyber Security: Understanding and Mitigating the Threats

• Weakest links are third-party

vendors with fewer security

controls

• Now represents 65% of

breaches

• BestBuy, Sears, Kmart, Delta,

Applebees, Chili’s—all this year

Third parties:

Your new weakest link

Page 16: Cyber Security: Understanding and Mitigating the Threats

• States are increasingly developing or

buying capabilities against industrial

control systems

• Nation States targeting iconic US

brands as a result of sanctions

• At risk:

• Business operations continuity

• Intellectual property

• Private data

Threat surface

increasing: IOT and OT

Page 17: Cyber Security: Understanding and Mitigating the Threats

• GDPR requires more care to data handing and protection

• Some companies adopting as global requirement

• Breach notifications mandatory

• Significant penalties: up to 4% revenue

• Boards must be aware of the risks and cannot opt not to meet them

• CCPA law in CA first major legislation protecting consumer data privacy

New data protection

requirements

Page 18: Cyber Security: Understanding and Mitigating the Threats

A New Model for Cyber

Security: Investment and

Leadership

Page 19: Cyber Security: Understanding and Mitigating the Threats

Digital business changing perspective

• An exponential increase in the number of things that must be protected

• An increasing number of external systems, users, infrastructure

• Increasing transactional and transient business interactions

• Challenges to conventional centralized security governance models

IDC FutureScape: Worldwide Digital Transformation 2018 Predictions

By 2020, 60% of enterprises worldwide will in process of a fully articulated, organization-wide digital transformation strategy.

Page 20: Cyber Security: Understanding and Mitigating the Threats

Digital business increases risk

Page 21: Cyber Security: Understanding and Mitigating the Threats

• Strategic vision addresses the new

challenges of digital business security

• Annual security strategy planning

process, turns vision into action

• Security risks that impact of digital

business, are being addressed

• Monitoring and adapting needs to

actively happen

The change to

investment perspective

Page 22: Cyber Security: Understanding and Mitigating the Threats

Justifying security

spending to:

• Comply with data

regulations

• Align and enable

business objectives

• Reduce events

• Improve risk profile

• Enable digital

business

Moving from

compliance to protection

Source: IT Security Spending Trends, SANs, 2016

Page 23: Cyber Security: Understanding and Mitigating the Threats

• No longer about building “stronger and

bigger,” such as firewalls and defense

in depth

• Recognizes the criticality of the human

factor and human ingenuity

• Requires a holistic approach to

successfully navigate an ever changing

and ambiguous environment

Leadership in a

digitally transformed

environment

Page 24: Cyber Security: Understanding and Mitigating the Threats

It starts at the top

Leaders need to create the environment

that integrates cyber and cyber security

with culture, people, processes, business,

and mission

Page 25: Cyber Security: Understanding and Mitigating the Threats

Ten things you can do for

little or no money

(Tell your CISO do these before they spend another $ on technology)

Page 26: Cyber Security: Understanding and Mitigating the Threats

• What objectives do you have? Gaps?

• Ensure broad perspective

• Marginal dollar and marginal gain

• Benefits:

• Roadmap-based direction

• No shiny objects

• Uncover larger gains for lessor dollars

Define your security

objectives

Page 27: Cyber Security: Understanding and Mitigating the Threats

• 41% of insider incidents from human error

• People forget

• Attack methods change

• Cyber training essential

• Online training is very affordable

• Benefits:• Lower incidents

• Much lower cost than clean up

Raise security awareness

Page 28: Cyber Security: Understanding and Mitigating the Threats

• Develop a champion role

• Build and align program objectives

directly with company objectives

• Across divisions and geographies

• Integrate into performance plans

• Train the trainers

• Let champions to take creative

liberties with the content

Create security

champions

Page 29: Cyber Security: Understanding and Mitigating the Threats

Leverage free material

Page 30: Cyber Security: Understanding and Mitigating the Threats

• Asset discovery and management

• End device software updates

• Password policies

• BYOD policy enforcement

• Vulnerability detection

• Penetration testing

• Guest WiFi network

• Regular systems patching

• Limiting access

• Backing up data

Practice basic

cyber hygiene

Page 31: Cyber Security: Understanding and Mitigating the Threats

Go phishing

• 75% of organizations

experienced attacks in 2017

• 92.4% of malware delivered

by email

• 16 phishing emails per month

• Simple Program:

• Train

• Notify

• Test

• Report

• Repeat

Page 32: Cyber Security: Understanding and Mitigating the Threats

• Comprehensive, independent assessment

• You don’t know what you don’t know

• Technology, culture, governance,

and people

• Benefits:• Situational awareness

• Immediate threat detection

• Identifies root causes

• Improves integrity

This one costs $ but it’s worth it

Get an independent

security assessment

Page 33: Cyber Security: Understanding and Mitigating the Threats

• Hold a regular shredding day

• Delete old files and back ups

• Seek out old equipment

• Ensure electronics are

centrally recycled

Shred and destroy

what you have

Page 34: Cyber Security: Understanding and Mitigating the Threats

• Evaluation of vendor security necessary

• NIST and ISO-based questionnaires and

auditing

• Evaluate and set third party policies and

amend contracts

• Benefits:

• Identifies issues for remediation

• Highlights ongoing monitoring needs

• Strengthens your leverage

Evaluate third parties

Page 35: Cyber Security: Understanding and Mitigating the Threats

Write your breach response and

communications plan—Now!

• Identify risks

• Accountability, roles,

processes decisions

• Communication

procedures:

• Employee

• Media

• Regulatory

• Run an exercise

Page 36: Cyber Security: Understanding and Mitigating the Threats

Thank you.