18

How the NIST Cybersecurity Framework - MediaPropages.mediapro.com/rs/889-LYM-560/images/NIST_and...If you’re reading this, you probably already know that in 2014 the National Institute

  • Upload
    vokiet

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

How the NIST Cybersecurity Framework Improves Security Awareness

79,790 security incidents were reported in 2014. (source)

90% of all data breaches in 2014 were the result of human error. (source)

That’s a substantial amount of sensitive data put into the wrong hands,

published to public web servers, incorrectly disposed, or otherwise lost

at the hands of the people that you pay to grow your business;

you can’t risk that.

With security breaches making mainstream headlines and the average

breach costing $3.79 million (source), internal errors and a lack of

concern for security are no longer acceptable. In recent high-profile

incidents, investigations proved that the necessary experience and

knowledge to pinpoint the severity of a cyberattack was missing. Now

more than ever, it’s imperative that security awareness programs are

implemented at every tier of an organization, from executive to entry-

level, to help mitigate potential threats.

2

72%72% of companies where the security policy was “poorly understood” had staff-related breaches. (The policies were in place; but the people didn’t understand them). (source: pwc 2015 Information Security Breaches Survey)

If you’re reading this, you probably already know that in 2014 the

National Institute of Standards and Technology (NIST) introduced

a Cybersecurity Framework in response to an executive order calling

for “a set of industry standards and best practices to help

organizations manage cybersecurity risks” (source). Since then,

this Framework has evolved to become one of the most cited guidelines

used by enterprise auditors to standardize cybersecurity expectations.

With this evolution, security awareness and security awareness training

programs are no longer considered “recommendations” but rather

unofficial requirements for businesses of every size. That’s good news!

Research shows that investing in security awareness training not only

decreases the likelihood that your organization will face a breach, but

lowers the cost if you are hit.

To protect your organization, you must do a better job educating

employees on how to identify risk and react appropriately.

Do it by developing a security awareness training program

that aligns with the NIST framework.

3

Elements of a Security Awareness Program

We know that humans continue to be the weakest link in the data security

chain (source). To fix this, we need security awareness programs that

are designed to educate, raise awareness, and change the behavior

of our staff—from entry-level to executive to information security officer.

The NIST Framework has an entire section devoted to awareness

and training of personnel, from understanding their roles and

responsibilities to learning appropriate procedures and policies.

The Center for Internet Security notes that “No cyber defense

approach can begin to address cyber risk without a means to address

this fundamental [human] vulnerability. Conversely, empowering people

with good cyber defense habits can significantly increase readiness.”

(source)

With a more knowledgeable staff, fewer phishing e-mails will be

opened, more care will be taken to save data in secure locations,

and team members won’t be given unauthorized access to protected

information. When an organization is avoiding errors like these, its

cybersecurity training can result in a 76% decrease in the cost

of security incidents. (source)

Developing good security awareness means adopting a program

that is predictive, adaptive, can continuously be improved upon, and

that becomes part of the organizational culture through constant

reinforcement. Historically, developing such a program has been

difficult for security professionals, but today, there’s finally a solution...

4

Meet the Adaptive Awareness Framework

The Adaptive Awareness Framework, designed by MediaPro and tightly

aligned to the NIST Cybersecurity Framework, offers businesses an

actionable and measurable way to introduce better security awareness

into their organizations. It organizes and integrates a variety of well-

known and widely dispersed standards into a single overarching

framework that is easy to implement, manage, and adapt.

Below, we’ve broken out each step of the Adaptive Awareness

Framework to see how it can be leveraged in your own business.

The outlined process (analyze, plan, train, and reinforce) has been

modified from the NIST Framework’s core recommendations to “aid an

organization in expressing its management of cybersecurity risk by

organizing information, enabling risk management decisions, addressing

threats, and improving by learning from previous activities.” (source)

1

5

ANALYZE

Why would you ever deploy an Awareness program without really

understanding the severity of your risks, or without a way of

measuring whether or not it’s successful? You wouldn’t (or, at least

we hope you wouldn’t).

When it comes to both understanding the risks you face and then

measuring the success of your security awareness program in

addressing those risks, you need data. You want to be able to quantify

the baseline knowledge and behavior of your employees at the start

of your program, and you want to know if the education you provide

to them has made an impact. Most importantly, you should prepare

from the start to ask yourself, “Has this program led to behavior change?”

But how you do that? What tools are available to help you understand what your employees know and do, and how it changes over time?

Below are some measurements tools to look at:

Knowledge assessments/surveys

Knowledge assessments are a great way to measure what your

employees know before training and what they retain after training.

Once you’ve identified where staff needs additional training, you can

build your program around these areas. With that baseline recorded,

you can deliver follow-up surveys every six months to measure

how your environment is changing over time, and to help gauge

effectiveness.

6

Phishing/social engineering:

Since phishing is one of the most common social engineering tactics

in use today, it makes sense to run simulated phishing and social

engineering attacks. These simulated attacks can employ a wide

variety of clever techniques to obtain passwords, attain access to

sensitive information, or gain physical access through tactics as

simple as an e-mail or a phone call, tailgating, or dropping a USB

device. Data accumulated from these simulated phishing and social

engineering attacks can be used to make improvements to your

overall security awareness program because these attacks allow

you to understand how users actually respond to various types of

simulated attacks and determine what type of messages carry the

most risk.

Incident reporting:

Another way to measure the success of your security program

is to look at the number of incidents being reported. If people are

more aware of potential threats, it stands to reason that you’ll see

a spike in your incident reporting. Arguably a noisy channel, but one

to watch nonetheless.

Completions of training/reinforcement:

If security awareness training is required at your organization, then

this isn’t a great measure of success. However, if it’s not required,

then it may be a great measure of how well people are engaging

with your message. You could also measure traffic to reinforcement

material to see how many people have viewed them and whether

your message is getting out there.

6 7

2 PLAN

You can’t implement a successful security awareness program without

first understanding the key risks, and specific business and security

goals you’re looking to achieve. To create the right training model:

assess your baseline risk profile and then map out the plan that makes

the most sense for the business. During this process, it’s important

to identify the most important risks facing the organization and the

behaviors you want to change relative to those risks.

Ask yourself:

• What is your overall goal?

• What are your key risks associated with the human

behavior? (If you’ve done a survey, you’ve got valuable data.)

• What behaviors do you want to change?

• What tools will you use to bring about change?

• How will you measure knowledge and behavior change?

When referencing the NIST Cybersecurity Framework, you might

align the Planning process with the core function of identifying risks.

Similarly, the Framework recommends that an organization take

an inventory of the data or programs necessary for business functions,

the company’s overall mission, potential risks against its assets and

staff, and more. Use this inventory to complete a Security Awareness Risk and Intervention matrix where each identified risk is mapped

to desired behaviors, training solutions, and reinforcement solutions.

8

Employees are not consistently following data protection and reporting policies, standards and guidelines.

DESIRED BEHAVIORAll employees will:

• Electronically certify that they have read the policies.

• Validate they understand the key policy points.

• Identify common policy mistakes and missteps.

• Correctly identify how to report a security incident or whom

to contact if they have any questions.

• Describe the possible consequences of inaction.

Result: 50% reduction in policy violations

Increase calls to the help line by 10%

TRAINING SOLUTIONSInteractions within the training will allow students to practice

identifying data security threats, view ways to prevent threats, as well

as show common examples of mistakes, identify contacts, and discuss

consequences.

REINFORCEMENT SOLUTIONS• Make the policy certification (pledge page) part

of the annual training.

• Place posters on all breakroom walls and rotate every 2 months.

• Host an open “round table” lunch each quarter where employees

can share their ideas on preventing data security incidents

(prizes awarded).

• Include 2 brief articles in the company newsletter and the

InfoSec website about recognizing and reporting incidents.

9

RISK: Employees not identifying threats properly,or classifying personally identifiable or companysensitive information correctly.

DESIRED BEHAVIORAll employees will:

• Be able to identify what information needs to be protected and classify information correctly.

• Apply the correct protections and procedures on a consistent basis.

• Be able to identify and respond to phishing and social engineering threats.

Result: 40% reduction in misclassification and misuse of data

Reduce phishing response rates by 50% and reduce social engineering responses by 75%

TRAINING SOLUTIONSInteractions within the training will allow students to: a) practice identifying PII and company sensitive information; b) practice classifying that information into the correct categories; and c) practice identifying phishing e-mails and view

common social engineering threats.

REINFORCEMENT SOLUTIONS• Provide job aids to all employees that handle PII and sensitive company information.

• Host a Security Awareness Day in October (cyber security month).

• E-mail a reminder (with links to a game or animation) to all departments with employees that handle PII and/or sensitive data 3 times during the year.

• Use an outside company to apply social engineering tests to “at risk” employees and senior

• Deliver a simulated phishing test to all employees 2 times a year and to senior management 3 times a year.

By creating a plan that aligns each risk to a specific behavior and to

training and reinforcement deliverables, you ensure the desired level

of protection and diligence for the organization. Such a plan also allows

you to identify cybersecurity roles and responsibilities for your team,

including staff, third-party stakeholders, etc., and ensures the right

levels of education and production for the right people within your

organization.

The NIST Framework notes that with the right plan, organizations

will be capable of making strategic decisions regarding cybersecurity

implementations and will be able to better determine the scope of

systems and assets that support the selected business line or process.

10

3 TRAIN

Training is the single most influential way to deliver your security

awareness message to staff. With training, all eyes are on your

organizational security program and it’s your chance to clearly

communicate to employees the risks that they face, and the policies

and best practices recommended by the company to help avoid them.

So make this time count! Assemble security training that not only

addresses security concerns, but also regulatory needs (like the ability

to prove training was issued). Training should also engage staff, to aid

in it being remembered and acted upon.

Of course, that’s no easy task. There are so many different options

available when it comes to security awareness training, and many

of the choices to be made are outside the realm of the IT professional’s

expertise. While they don’t cover everything, use the following list

of key questions to ask yourself when you’re in the market for a security

training solution.

11

Should I go with web-based or in-person training?This can be a difficult decision for many. The right answer for your

company will depend on both its size, as well as the size of the program

you’re looking to deliver. Smaller companies running smaller security

awareness programs may opt for an in-person training solution that

is more cost-effective. Larger companies (especially where employees

are dispersed throughout locations), or companies investing in larger

training programs, will likely favor web-based training as it’s easier

to deploy, manage, and measure.

Should I build an in-house training solution or buy one?Whether you opt to build something or buy something, each decision

comes with its own pros and cons. Building your own solution may allow

you to customize it directly to the needs of your business, but anyone

who has attempted the task knows it can quickly become painful,

difficult, and time-consuming.

Buying a solution, of course, comes with the built-in cost of paying

for the program, as well as the additional risks that you may not like

what you bought or that it may not be as easy to work with as you

hoped; however, it will likely save you the internal investment

of creating it on your own, and provides a variety of training solutions

to choose from. Ultimately, you’ll have to have to balance your decision

against your budget and your time availability.

Will this be easy to refresh and/or customize?This is a big one, especially for organizations looking to build an

adaptive program (referred to as a “Tier 4” program in the NIST

Cybersecurity Framework). You’ll want to assess whether the training

will be easy to refresh as new risks come to light. Will it be easy

to customize, or are you locked in to what you bought with no ability

to easily swap topics or modify content to fit your organization?

12

Will training be required?If you require training, you’re likely to get a 100% participation rate.

If you’re not going to require training, you’ll have to ask yourself,

“How do you make sure that people take it, or are interested in it?”

Again, you’ll want to look for a solution that is easily customizable

and is designed to engage the end user.

Is it trackable?If you are in an audited environment, or if measurement is something

that is important to you, you probably want to opt for a training solution

that is both trackable and measurable. This may mean going with

a computer-based training solution, as they are the easiest to track

and measure. Thankfully, there are lots of options out there, including

many cloud-based solutions that provide an easy way to deliver and

track your training.

Do I believe this will change behavior?This is really the heart of it, right? When evaluating training solutions,

ask yourself, “Is this going to work? Does it bring about behavior

change?” Let this be your mantra, and consider what it takes to get

people to really engage with content and to commit to what they’ve

learned. Is this training directly relevant to the work people perform?

If yes, does it provide opportunities within the training itself for people

to practice the kinds of behaviors that you want to target? The answer

should be “yes” to both questions.

13

4 REINFORCE

As you’ve probably noticed, we’re big believers in training. However,

we’re also big believers that training alone is not enough to create

new habits. A habit is something you practice, and it must be

constantly reinforced. Security-aware behaviors must be fostered

the very same way. Otherwise it’s too easy for a staff member

to attend training once, only to never use (or think about) that

information again.

Creating a reinforcement program around your security awareness

training increases the effectiveness of that training, which helps you

to not only see a bigger impact but also furthers staff engagement.

When building a reinforcement program,below are some factors to consider:

COST. You don’t have to spend a lot of money to create, or even

to source, really great security reinforcement material. You can

start by downloading some free posters or free worksheets

available online from different government websites. You can

even find free security reinforcement materials from your friends

at MediaPro. It’s not important that you spend a lot of money

on these items, what is important is that you make security

reinforcement part of your awareness program, and keep the

training content accessible and relevant to your organization’s

everyday experience.

14

CULTURAL FIT. When deciding on which reinforcement materials

are right for you, consider how well will these materials fit into

your culture and your business. For example, humor is proven

to be a great way to help people retain information. However,

humor is also tricky. Anyone who has ever tried to build “funny”

approaches to security awareness (or anything else, for that matter)

knows that while you may get some chuckles, you’re also likely to

get some eye rolls—or worse yet, someone who is offended by the

material. The trick is to know your company culture, and what’s

going to work for you and grab your staff’s attention.

LOGISTICS. Something else to consider is the logistics and

hidden costs of creating and delivering reinforcement materials.

Sure, creating 5,000 fortune cookies with security awareness

messages inside sounds like a great idea until you have to ship

those cookies to 40 locations spread across a 5-state region.

It would have been cheaper to hire a chef to cater your training!

We’re not saying don’t be creative, but run the numbers first.

Also, remember that creative online content works just as well.

There’s no need to break the bank.

WE HOPE IT GOES WITHOUT SAYING, BUT LET’S SAY IT ANYWAY:

the four components of Analysis, Planning, Training, and Reinforcement

should work together in a continuous feedback loop. These elements are

not meant to stand alone or proceed in linear fashion. Rather, in a truly

adaptive program, you would gather the data from all of the above

activities and use it to refresh your annual training and reinforcement

materials.

15

Creating Your Security Awareness Program

Okay. You’re ready to go. You’ve been versed on the steps and the

elements necessary to put together an integrated security awareness

program—all that’s left to do is build the program.

GULP!Don’t worry, we wouldn’t send you out there without a plan. Following

the plan laid out below (though not necessarily in the order it is laid out)

will help your organization aspire to Tier 4, NIST’s highest possible risk

tolerance level. While this isn’t a requirement, it is something we believe

businesses should aspire to. Aiming higher will put you in a better

position to comply with future cybersecurity and privacy regulations,

and can only serve you well down the road.

With that said, here’s how to pull it all together into an adaptive program.

1

2

Survey employees to assess their existing knowledge.

A great way to launch your security awareness program is with

a knowledge assessment that helps you understand exactly what

your employees know—and what they don’t. This baseline

assessment can help you build a plan, but if you use follow-up

assessments months later, you can also get a great measure

of whether you are improving over time. It’s a sure way to

demonstrate the ROI on your awareness investment.

Plan your overall effort with an eye to suspected risks.

With your assessment in hand, and your own knowledge of the

risks facing your organization, you’re ready to create an adaptive

program plan. You need to know where you’re going and what

your objectives are, but you also need to be open to the idea that

things will come up. Maybe you have five key risks you want to

tackle so you plot them out over the year… but then something

comes up and changes that plan. That’s okay. Leave gaps in your

plan for surprises you’re sure to discover along the way.

16

3

4

5

6

7

Announce the overall awareness program to all employees.

Announcing your program will help to get internal buy-in, thereby

increasing the number of employees who participate in your

surveys and who are open to the training. This will help employees

to not only understand what you’re doing, but why you’re doing

it, why it’s important, and how it relates to their everyday job

functions. And announcements always work better when they’re

delivered by people with real credibility, like CISOs or CEOs.

Phish your employees and provide minimal correction.

Again, it’s all about collecting the data you need to create and

implement your plan. By running a simulated phishing attack

you’ll be able to identify where your team is weak and how you

can help them improve their phishing prevention skills.

Train all employees.

Whether it’s training you’ve built from scratch or training you’ve

purchased, find the program you believe best meets your needs

and deploy it to your staff.

Reinforce the top risks identified in your initial survey.

Strengthen your training by reinforcing the messages related

to the highest risks. Reinforce with materials like animation

videos, posters, tent cards, games, and other material designed

to gain attention and convert training to memory.

Survey and phish again at appropriate intervals.

Run a follow-up simulation of social engineering and phishing

attacks to see how many employees take the bait, and see

whether the “bites” have decreased (showing a positive sign),

if they remain the same or…worse.

17

8 Analyze and adapt.

With your security awareness program live and running,

you can analyze its success by measuring training completions,

survey results, and phishing scores. You may need to target

frequent phishing victims with more in-depth phishing training,

begin using role-based training in areas that show functional

deficiencies, or use personal follow-up messages to reinforce

pressure points.

Get Started!

Let’s recap.

We know that the number of breaches affecting businesses every

year continues to skyrocket.

We know that the costs associated with those breaches also

continues to rise year-over-year.

We know that implementing an adaptive security awareness

program, one which aligns with NIST’s Cybersecurity Framework,

decreases the likelihood that you’ll be breached, and the costs

you’ll face should it happen.

The only question today is, will you adopt the Adaptive Awareness

Framework now, putting your company at the highest risk tolerance

immediately, or will you wait until you suffer a breach?

If you’d like to discuss how MediaPro’s Adaptive Awareness Framework

can put your business ahead of the curve,

WE’D LOVE TO SPEAK WITH YOU.

18

Sources

2015 Data Breach Investigation ReportVerizon

Verizon Data Breach Investigation Report: What You NEED To Know MediaPro

Cost of Data Breaches Rising Globally, Says ‘2015 Cost of a Data

Breach Study: Global Analysis,’Security Intelligence

2015 Global State of Information Security Studypwc

Framework for Improving Critical Infrastructure CybersecurityNational Institute of Standards and Technology

2015 Attendee SurveyBlack Hat

The Critical Security Controls for Effective Cyber DefenseSANS Institute

US Cybercrime: Rising Risks, Reduced Readinesspwc

Framework for Improving Critical Infrastructure CybersecurityNational Institute of Standards of Technology