11
Confidential © 2015 OEQ, Inc. All Rights Reserved OΣQ Cyber Security Management ISSA – DC Chapter April 19, 2016

2016 04 19 Cyber Security Management krithivasan.pdf · &rqilghqwldo 2(4 ,qf $oo 5ljkwv 5hvhuyhg &\ehu 6hfxulw\ 0dqdjhphqw %xloglqj eorfnv« 7kh 8vxdo 6wxii 7rqh dw wkh 7rs 2ujdql]dwlrqdo

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 2016 04 19 Cyber Security Management krithivasan.pdf · &rqilghqwldo 2(4 ,qf $oo 5ljkwv 5hvhuyhg &\ehu 6hfxulw\ 0dqdjhphqw %xloglqj eorfnv« 7kh 8vxdo 6wxii 7rqh dw wkh 7rs 2ujdql]dwlrqdo

Confidential

© 2015 OEQ, Inc. All Rights Reserved

OΣQCyber Security ManagementISSA – DC ChapterApril 19, 2016

Page 2: 2016 04 19 Cyber Security Management krithivasan.pdf · &rqilghqwldo 2(4 ,qf $oo 5ljkwv 5hvhuyhg &\ehu 6hfxulw\ 0dqdjhphqw %xloglqj eorfnv« 7kh 8vxdo 6wxii 7rqh dw wkh 7rs 2ujdql]dwlrqdo

Confidential

© 2015 OEQ, Inc. All Rights ReservedCyber Security Management

• Establishing the context• Cyber Security Management• Getting a ‘Handle’ on things…• Cyber Risk Management• How do you …• Reference Architecture• Q & A

2

The next 55 minutes…

Page 3: 2016 04 19 Cyber Security Management krithivasan.pdf · &rqilghqwldo 2(4 ,qf $oo 5ljkwv 5hvhuyhg &\ehu 6hfxulw\ 0dqdjhphqw %xloglqj eorfnv« 7kh 8vxdo 6wxii 7rqh dw wkh 7rs 2ujdql]dwlrqdo

Confidential

© 2015 OEQ, Inc. All Rights ReservedEstablishing the context…

200% 0 Days in 2016, compare with 125% in 2015 40%+ techniques not attributable 60%+ cyber crime focused, this number is increasing… 125% Increase in 10M + Identity Exposure Hacks 429M Total Identities Exposed in 2015 $500B Impact of Cyber Attacks 88% CEOs worried about Cyber Threats

3

The multi billion dollar WILD GOOSE CHASE?

Its not a question of ‘IF’ only ‘WHEN’ you will be Hacked…- The Cyber Security Community

Page 4: 2016 04 19 Cyber Security Management krithivasan.pdf · &rqilghqwldo 2(4 ,qf $oo 5ljkwv 5hvhuyhg &\ehu 6hfxulw\ 0dqdjhphqw %xloglqj eorfnv« 7kh 8vxdo 6wxii 7rqh dw wkh 7rs 2ujdql]dwlrqdo

Confidential

© 2015 OEQ, Inc. All Rights ReservedCyber Security Management

4

Building blocks…

The Usual Stuff: Tone at the Top Organizational Alignment ‘World Peace’

Technology Hygiene Secure Infrastructure Proactive Compliance Monitoring / SIEMs etc.

The Innovative Stuff Analytics for Cyber Risk Posture Analysis Effective Cyber Security Metrics

Page 5: 2016 04 19 Cyber Security Management krithivasan.pdf · &rqilghqwldo 2(4 ,qf $oo 5ljkwv 5hvhuyhg &\ehu 6hfxulw\ 0dqdjhphqw %xloglqj eorfnv« 7kh 8vxdo 6wxii 7rqh dw wkh 7rs 2ujdql]dwlrqdo

Confidential

© 2015 OEQ, Inc. All Rights ReservedGetting a ‘Handle’ on things…

Inventory Enabling TechnologyCreate a Cyber Management Framework

Identify Asset Classes, Map to Cyber DomainsMap Reliable Data, Data Sources

Calibrate Risk Posture…

5

Where do you start…

The case for change first begins with the acknowledgement of a problem / need…The case for change first begins with the acknowledgement of a problem / need…

Organizations often invest in a plethora of tools and technology. Include all GRC, SIEM, Access Controls, Change & Configuration Management as well as Security Log Management Software

Technology Maturity vs. Organizational Maturity Technology Sophistication vs. Ease of Use Remember if buying a piece of technology could have solved the ‘Cyber

Security’ challenge, we would not have had the challenge to begin with…

Page 6: 2016 04 19 Cyber Security Management krithivasan.pdf · &rqilghqwldo 2(4 ,qf $oo 5ljkwv 5hvhuyhg &\ehu 6hfxulw\ 0dqdjhphqw %xloglqj eorfnv« 7kh 8vxdo 6wxii 7rqh dw wkh 7rs 2ujdql]dwlrqdo

Confidential

© 2015 OEQ, Inc. All Rights ReservedGetting a ‘Handle’ on things…

6

The anatomy of a hack

ReconRecon • Find what lies beyond the curtain• Gather information on weaknesses

Get inGet in • Find a way to get inside• Use technology or people

Find KeysFind Keys • Get keys to the kingdom• Find other doors to open

ExploreExplore

Page 7: 2016 04 19 Cyber Security Management krithivasan.pdf · &rqilghqwldo 2(4 ,qf $oo 5ljkwv 5hvhuyhg &\ehu 6hfxulw\ 0dqdjhphqw %xloglqj eorfnv« 7kh 8vxdo 6wxii 7rqh dw wkh 7rs 2ujdql]dwlrqdo

Confidential

© 2015 OEQ, Inc. All Rights ReservedGetting a ‘Handle’ on things…

7

Case Studies

Image © Unixmen.com used under creative license

Case #1The Strange Case of

Transactional Monitoring

Case #1The Strange Case of

Transactional Monitoring

Case #2I’ve got Access…

Privileged Access!

Case #2I’ve got Access…

Privileged Access!

Case #3We use Advanced

Analytics

Case #3We use Advanced

Analytics

Page 8: 2016 04 19 Cyber Security Management krithivasan.pdf · &rqilghqwldo 2(4 ,qf $oo 5ljkwv 5hvhuyhg &\ehu 6hfxulw\ 0dqdjhphqw %xloglqj eorfnv« 7kh 8vxdo 6wxii 7rqh dw wkh 7rs 2ujdql]dwlrqdo

Confidential

© 2015 OEQ, Inc. All Rights ReservedCyber Risk Management

Cyber Risk Management

Access

Users

Security Assets

Operations

Privileged Access

Business Data

8

Understanding Cyber Risk

Page 9: 2016 04 19 Cyber Security Management krithivasan.pdf · &rqilghqwldo 2(4 ,qf $oo 5ljkwv 5hvhuyhg &\ehu 6hfxulw\ 0dqdjhphqw %xloglqj eorfnv« 7kh 8vxdo 6wxii 7rqh dw wkh 7rs 2ujdql]dwlrqdo

Confidential

© 2015 OEQ, Inc. All Rights ReservedCyber Risk Management

9

Measuring Cyber Risk Establish Objectives, Priorities What are we protecting, and Why? Risk / Cost / Value manifestation Third Parties, Outsourcing Strategy, Revenue, Legal impact Where the power is… Wall Street Journal First Page Items

Identify Impacted Assets Sound asset management Every asset is on the Internet People are assets too Audited vs. Unaudited Assets Ignored Assets End User Computing

Measure Risk Risk Metrics Gathering data, connecting the dots Aggregating Risk Metrics Monitoring Risk Posture Normalizing Risk Posture Operationalizing Risk Posture

Measure Risk Risk Metrics Gathering data, connecting the dots Aggregating Risk Metrics Monitoring Risk Posture Normalizing Risk Posture Operationalizing Risk Posture

Link to Financial Numbers Current spend, alignment to risk Opportunity price of spend Under served areas of risk Areas with excess risk coverage Cost of Mitigating the Risk Time required to Mitigate Risk

Page 10: 2016 04 19 Cyber Security Management krithivasan.pdf · &rqilghqwldo 2(4 ,qf $oo 5ljkwv 5hvhuyhg &\ehu 6hfxulw\ 0dqdjhphqw %xloglqj eorfnv« 7kh 8vxdo 6wxii 7rqh dw wkh 7rs 2ujdql]dwlrqdo

Confidential

© 2015 OEQ, Inc. All Rights ReservedHow do you…

10

Cyber Security Management, Analytics in Action…

Page 11: 2016 04 19 Cyber Security Management krithivasan.pdf · &rqilghqwldo 2(4 ,qf $oo 5ljkwv 5hvhuyhg &\ehu 6hfxulw\ 0dqdjhphqw %xloglqj eorfnv« 7kh 8vxdo 6wxii 7rqh dw wkh 7rs 2ujdql]dwlrqdo

Confidential

© 2015 OEQ, Inc. All Rights Reserved

Questions?

Krish KrithivasanPresident & CEO,OEQ, [email protected]

11