A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk

Similar documents
Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

The Enemy Within: Dealing with Insider Threats

Insider Threats: Actual Attacks by Current and Former Software Engineers

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

The CERT Top 10 List for Winning the Battle Against Insider Threats

Combating Cyber Risk in the Supply Chain

The Insider Threat Center: Thwarting the Evil Insider

What It Takes to be a CISO in 2017

MEETING ISO STANDARDS

Mitigation Controls on. 13-Dec-16 1

Defense in Depth Security in the Enterprise

QuickBooks Online Security White Paper July 2017

2017 Annual Meeting of Members and Board of Directors Meeting

mhealth SECURITY: STATS AND SOLUTIONS

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Cybersecurity Today Avoid Becoming a News Headline

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

The Cyber War on Small Business

Take Risks in Life, Not with Your Security

University of Pittsburgh Security Assessment Questionnaire (v1.7)

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

Cybersecurity Auditing in an Unsecure World

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

FROM TACTIC TO STRATEGY:

Monthly Cyber Threat Briefing

Preventing Insider Sabotage: Lessons Learned From Actual Attacks

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Go mobile. Stay in control.

ISE North America Leadership Summit and Awards

Keys to a more secure data environment

10 Hidden IT Risks That Might Threaten Your Business

NISPOM Change 2: Considerations for Building an Effective Insider Threat Program

Critical Hygiene for Preventing Major Breaches

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Cyber security tips and self-assessment for business

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

10 FOCUS AREAS FOR BREACH PREVENTION

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

The Common Controls Framework BY ADOBE

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

K12 Cybersecurity Roadmap

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

One Hospital s Cybersecurity Journey

Building Resilience in a Digital Enterprise

Shifting focus: Internet of Things (IoT) from the security manufacturer's perspective

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

ISSP Network Security Plan

112 th Annual Conference May 6-9, 2018 St. Louis, Missouri

Cyber Resilience. Think18. Felicity March IBM Corporation

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

Sage Data Security Services Directory

Cybersecurity 2016 Survey Summary Report of Survey Results

To Audit Your IAM Program

Jeff Wilbur VP Marketing Iconix

Cybersecurity Session IIA Conference 2018

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Breaches and Remediation

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

How Breaches Really Happen

Part 1: Anatomy of an Insider Threat Attack

THE POWER OF TECH-SAVVY BOARDS:

Cyber Due Diligence: Understanding the New Normal in Corporate Risk

NEN The Education Network

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Larry Clinton President & CEO Internet Security Alliance

Practical Guide to Securing the SDLC

Securing Digital Transformation

Tackling Cybersecurity with Data Analytics. Identifying and combatting cyber fraud

THE 2017 STATE OF CYBERSECURITY METRICS ANNUAL REPORT

Innovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Tripwire State of Cyber Hygiene Report

Cybersecurity The Evolving Landscape

Teradata and Protegrity High-Value Protection for High-Value Data

Best Practices in ICS Security for System Operators

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

SECURITY & PRIVACY DOCUMENTATION

Cyber Security Program

How to Optimize Cyber Defenses through Risk-Based Governance. Steven Minsky CEO of LogicManager & Author of the RIMS Risk Maturity Model

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

U.S. State of Cybercrime

Secure Access & SWIFT Customer Security Controls Framework

2 The IBM Data Governance Unified Process

EMPLOYEE SKILLS TRAINING PLATFORM. On-access skills training and measurement for all employees

TABLE OF CONTENTS Introduction: IS A TOP THREAT VECTOR... 3 THE PROBLEM: ATTACKS ARE EVOLVING FASTER THAN DEFENSES...

UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

Transcription:

SESSION ID: GRC-T10 A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk R Jason Straight Sr. VP, Chief Privacy Officer UnitedLex Corp.

Has anyone seen this man? 2

3

4

We re getting warmer... 5

Responsible for theft of $40M credit/debit cards? 6

Insider Threats Don t turn your back on this notorious crew! 7

I use my cat s name as my password for EVERYTHING! My secret to job security? I m the only one in the company with full administrative rights on the network. I DARE YOU to fire me! I OPENED A ZIP FILE emailed from my old college roommate today and it crashed my machine. SO ANNOYING! Shhh... I m running a BitTorrent server from UNDER MY DESK. I m addicted to this ONLINE GAMBLING site in MOLDOVA. I m behind on my mortgage but I know I can win it all back during lunch today!! I downloaded the entire contents of our CRM and saved it to Dropbox JUST IN CASE! 8

Introduction

Objectives Suggest that we are focusing our security resources on the wrong things Illustrate the ways insiders create risk Introduce ways to reduce insider risks and create a culture of security 10

Trends and Developments Gap between offense and defense is growing despite huge investments by defenders Percent of breaches with timelines of days or less 100% 75% Time to Compromise 50% 25% Time to Discovery 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 SOURCE: 2014 Verizon Data Breach Investigations Report 11

External attackers get all the press, but it s the insiders you need to worry about Current or former employees responsible for 66% of security incidents 84% of all attacks for financial gain are non-technical Vast majority of attacks involve compromised credentials 90% of data breaches were preventable More than 90% of security spend focused on perimeter protection 12

Insider Risk Illustrated: The Human Layer

Meet the Threats PROFILE: Road Warrior Connecting remotely from all corners of the globe Mixes personal devices with business Circumvents security controls Saves everything (unencrypted) to the C: Drive of Personal MacBook Doesn t report device theft for three weeks 14

Meet the Threats PROFILE: Imperious Boss Wants 360-degree access to everything, 24/7 Wants to use latest tech/devices/services Browbeats help desk into granting exceptions to policies Auto-forwards corporate email to personal Gmail account 15

Meet the Threats PROFILE: Careless Vendor Poor security controls Uses shared credentials to access your network Under-invested in security due to shrinking margins Answered your security questionnaire 5 years ago no action since 16

Meet the Threats PROFILE: Disgruntled IT Manager File and email hoarder (just in case!) Passive saboteur Has keys to the IT kingdom Over-worked under paid Backdoor to boss s email box Backs up everything to DropBox (just in case!) 17

Risk Reduction Measures

How NOT to Address Insider Risks Create a police state that conveys you don t trust your employees Severely punish well-intended employees who make a mistake Impose disproportionate controls that impede effectiveness more than reduce risks BLINDLY BUY MORE TOOLS! 19

Simple Steps to Reduce Risk 1. Educate and engage senior executives in driving cultural change 2. Strictly limit number of privileged users and carefully consider segregation of duties 3. Transform vulnerabilities into fortifications through awareness training 4. Deploy intelligent behavioral monitoring technology to detect risky behavior by insiders (and vendors) 5. Implement and enforce clear, simple and DEFENSIBLE policies and controls 20

Conclusions/Next Steps

Apply What You Have Learned Today Next week you should: Identify the key stakeholders needed to address insider threat risks In the first three months following this presentation you should: Convene a meeting of key stakeholders to define a process to assess insider risks Identify technology that could support your insider risk management program Within six months you should: Have a roadmap for reducing and controlling insider risks Implement an awareness program to introduce new insider risk measures 22

Resources Carnegie Mellon CERT Insider Threat Program: http://www.cert.org/insider-threat/ FBI Insider Threat Detection: http://www.fbi.gov/aboutus/investigate/counterintelligence/the-insider-threat National Cybersecurity and Communications Integration Center: Combating the Insider Threat: https://www.uscert.gov/sites/default/files/publications/combating%20the%20insider%20threat_0.pdf 23

QUESTIONS? R Jason Straight jason.straight@unitedlex.com 917-685-9504

Appendix

CERT Recommendations 1. Consider threats from insiders and business partners in enterprise-wide risk assessments 2. Clearly document and consistently enforce policies and controls (especially password and encryption policies) 3. Incorporate insider threat awareness into periodic security training for all employees. 4. Beginning with the hiring process, monitor and respond to suspicious or disruptive behavior. 5. Anticipate and manage negative issues in the work environment. 6. Know your assets. 7. Implement strict password and account management policies and practices. 8. Enforce separation of duties and least privilege. 9. Define explicit security agreements for any cloud services, especially access restrictions and monitoring capabilities. 10. Institute stringent access controls and monitoring policies on privileged users. 26

CERT Recommendations 11. Institutionalize system change controls. 12. Use a log correlation engine or security information and event management (SIEM) system to log, monitor, and audit employee actions. 13. Monitor and control remote access from end points, including mobile devices. 14. Develop a comprehensive employee termination procedure. 15. Implement secure backup and recovery processes. 16. Develop a formalized insider threat program. 17. Establish a baseline of normal network device behavior. 18. Be especially vigilant regarding social media. 19. Close the doors to unauthorized data exfiltration. 27