38
1 Cybersecurity Health Checks: Safeguarding Your Organisation Dr. Malcolm Shore

Cybersecurity Health Checks: Safeguarding Your Organisation

Embed Size (px)

Citation preview

Page 1: Cybersecurity Health Checks: Safeguarding Your Organisation

1

Cybersecurity Health Checks:Safeguarding Your Organisation

Dr. Malcolm Shore

Page 2: Cybersecurity Health Checks: Safeguarding Your Organisation

2

Quick Facts about Lynda.com

Government• Major government agencies• Branches of military

Corporations• More than half of the Fortune 50

across all key industry sectors

Education• 60% of all US colleges and

universities 40% of Australian universities

4M+Members

…with 350k paying out of pocket

20Years

Lynda.com was founded in 1995

1 2 ,000

+Enterprise Clients

…located across 52 countries

6,000+

Courses…available in

5 languages (German, Spanish, French, Japanese)

The Global Leader in Online Skills Instruction

INTRODUCTION

Page 3: Cybersecurity Health Checks: Safeguarding Your Organisation

3

Dr. Malcolm Shore

Lynda.com authorTechnical Director, BAE Systems Applied Intelligence, Australia

INTRODUCTION

Page 4: Cybersecurity Health Checks: Safeguarding Your Organisation

4

•1983 - US DoD rainbow series•1993 – UK PD0003•1998 – BS 7799……ISO 27000•2005 – NIST Special Publication 800-53•… but too difficult and costly

Information Security Standards

BACKGROUND

Cybersecurity Health Checks

Page 5: Cybersecurity Health Checks: Safeguarding Your Organisation

5

•From Bulletin Boards to the Web•Ubiquitous connectivity across the globe•Clouds aren’t just in the sky…•From email to social media…•From telephone to smartphone•Cyber kill chain … the world has changed

Information Security Standards

BACKGROUND

Cybersecurity Health Checks

Page 6: Cybersecurity Health Checks: Safeguarding Your Organisation

6

•Evolution of information security standards lagging•Information security policies ineffective*

New Approach

BACKGROUND

Cybersecurity Health Checks

*Doherty, NF and Fulford H. Do Information Security Policies Reduce the Incidence of Security Breaches? 2005

Page 7: Cybersecurity Health Checks: Safeguarding Your Organisation

7

•UK Cybersecurity Strategy•Cyber Governance Health Check• top 350 listed companies• only15% of Boards manage cyber risk• only 30% use threat intelligence

•Majority of attacks exploit basic weaknesses

Information Security Policies

BACKGROUND

Cybersecurity Health Checks

Page 8: Cybersecurity Health Checks: Safeguarding Your Organisation

8

•Term used in audit community•Now used in cybersecurity consulting•Various interpretations

… is simply cyber fitness

Cybersecurity Health Check

DEFINITION

Cybersecurity Health Checks

Page 9: Cybersecurity Health Checks: Safeguarding Your Organisation

9

•Check-up – unauthorised users, malware•Health test - check network traffic for infections•Full examination - rules, patches, access and privileges - operational defences•Fitness test - external penetration exercise•Cyber insurance

Cybersecurity Health Check

DEFINITION

Cybersecurity Health Checks

Page 10: Cybersecurity Health Checks: Safeguarding Your Organisation

10

•Baseline security•Operational focus•Affordable, manageable

Cyber Essentials

CYBER ESSENTIALS

Cybersecurity Health Checks

Page 11: Cybersecurity Health Checks: Safeguarding Your Organisation

11

CYBER ESSENTIALS

Cybersecurity Health Checks

Page 12: Cybersecurity Health Checks: Safeguarding Your Organisation

12

•Prevents low grade technical attacks on• desktop PCs, laptops

• tablets, smartphones

• email

• web applications

Cyber Essentials

CYBER ESSENTIALS

Cybersecurity Health Checks

Page 13: Cybersecurity Health Checks: Safeguarding Your Organisation

13

• Boundary devices• Secure configuration• User access control• Malware protection• Patch management

Cyber Essentials

CYBER ESSENTIALS

Cybersecurity Health Checks

Page 14: Cybersecurity Health Checks: Safeguarding Your Organisation

14

Boundary Firewalls and Internet Gateways

CYBER ESSENTIALS

Cybersecurity health Checks

Page 15: Cybersecurity Health Checks: Safeguarding Your Organisation

15

•administrative password must be changed•documented and authorised rules•obsolete rules removed•unnecessary services blocked•administrative interface accessible only internally

Boundary Firewalls and Internet Gateways

CYBER ESSENTIALS

Cybersecurity health Checks

Page 16: Cybersecurity Health Checks: Safeguarding Your Organisation

16

Secure Configuration

CYBER ESSENTIALS

Cybersecurity health Checks

Page 17: Cybersecurity Health Checks: Safeguarding Your Organisation

17

•Issues:• easy to install• no security configured• default administrator accounts and

passwords

Secure Configuration

CYBER ESSENTIALS

Cybersecurity health Checks

Page 18: Cybersecurity Health Checks: Safeguarding Your Organisation

18

Secure Configuration

CYBER ESSENTIALS

Cybersecurity health Checks

• remove unnecessary default accounts• change default passwords• remove or disable unnecessary applications and

services• install personal firewalls on all PCs

Page 19: Cybersecurity Health Checks: Safeguarding Your Organisation

19 Cybersecurity Health Checks

Page 20: Cybersecurity Health Checks: Safeguarding Your Organisation

20 Cybersecurity Health Checks

Page 21: Cybersecurity Health Checks: Safeguarding Your Organisation

21

• Issues:• legacy access• excess privileges

User Access Control

CYBER ESSENTIALS

Cybersecurity health Checks

Page 22: Cybersecurity Health Checks: Safeguarding Your Organisation

22

User Access Control

CYBER ESSENTIALS

Cybersecurity health Checks

• minimum privileges• userid and strong passwords• ensure privileged accounts are not used for internet activity• disable or remove accounts when no longer required

Page 23: Cybersecurity Health Checks: Safeguarding Your Organisation

23

User Access Control

CYBER ESSENTIALS

Cybersecurity health Checks

Page 24: Cybersecurity Health Checks: Safeguarding Your Organisation

24

•Install anti-virus software• up to date signatures

•Use real-time protection•Scan the filebase•Blacklisting known malicious sites

Malware Protection

CYBER ESSENTIALS

Cybersecurity Health Checks

Page 25: Cybersecurity Health Checks: Safeguarding Your Organisation

25

•Flaws found by developers, researchers, hackers

•Often exploited within 24 hours

•Timely patching

•Licenced software

Patching

CYBER ESSENTIALS

Cybersecurity Health Checks

Page 26: Cybersecurity Health Checks: Safeguarding Your Organisation

26

•Good routine check-up and examination

•Does not propose a full cyber fitness test

Cyber Essentials – Health Check?

CYBER ESSENTIALS

Cybersecurity Health Checks

Page 27: Cybersecurity Health Checks: Safeguarding Your Organisation

27

•Published March 2015

•Improve cyber resilience

•Cyber defence posture

•Incident management

ASIC Report 429

ASIC REPORT 429

Cybersecurity Health Checks

Page 28: Cybersecurity Health Checks: Safeguarding Your Organisation

28

•Adopted in ASIC Report 429

•26 prompts• 2 governance

• 24 across the five Framework areas

US Cybersecurity Framework

ASIC REPORT 429

Cybersecurity Health Checks

Page 29: Cybersecurity Health Checks: Safeguarding Your Organisation

29

•Board and Executive awareness of cyber risk

•Assessment against the Cybersecurity Framework

Governance

ASIC REPORT 429

Cybersecurity Health Checks

Page 30: Cybersecurity Health Checks: Safeguarding Your Organisation

30

•What are the essential information and assets?

•What are the cyber risks?

•Are third party risks considered?

•Does enterprise risk management include cyber risks?

•Are staff aware of cyber risks?

Identify

ASIC REPORT 429

Cybersecurity Health Checks

Page 31: Cybersecurity Health Checks: Safeguarding Your Organisation

31

•Are security policies and standards up to date?

•Have IT systems and processes been tested?

•Are there sufficient resources in place?

Protect

ASIC REPORT 429

Cybersecurity Health Checks

Page 32: Cybersecurity Health Checks: Safeguarding Your Organisation

32

•Monitoring for cyber attacks

•External engagement

Detect

ASIC REPORT 429

Cybersecurity Health Checks

Page 33: Cybersecurity Health Checks: Safeguarding Your Organisation

33

•Is response planning adequate?

•Notifying law enforcement of an attack

•Notifying customers of a breach

Respond

ASIC REPORT 429

Cybersecurity Health Checks

Page 34: Cybersecurity Health Checks: Safeguarding Your Organisation

34

•Does the organisation have a recovery plan?Recover

ASIC REPORT 429

Cybersecurity Health Checks

Page 35: Cybersecurity Health Checks: Safeguarding Your Organisation

35

•Full set of controls

•Cyber health checks lost in the noise

•A through life fitness programme

ASIC Report 429 – Cyber Health Check?

ASIC REPORT 429

Cybersecurity Health Checks

Page 36: Cybersecurity Health Checks: Safeguarding Your Organisation

36

•Security standards are evolving

•Traditional approach is having limited success

•Cyber health checks are a more manageable approach

•Cyber Essentials provides a health check

Conclusion

CONCLUSION

Cybersecurity Health Checks

Page 37: Cybersecurity Health Checks: Safeguarding Your Organisation

37

ResourcesCONCLUSION

Cybersecurity Health Checks

Page 38: Cybersecurity Health Checks: Safeguarding Your Organisation

38

Q&A

CONCLUSION

Cybersecurity Health Checks