SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
TAIEX Workshop on Advancing Cyber
Security Capacity in Critical Infrastructure
Existing situation and proposed solutions to improve cybersecurity
24.01.17
Alexey Yankovski
ISACA Kyiv Chapter
2
• Briefly about ISACA
• Cybersecurity – analysis of existing situation in Ukraine
• Proposed solution
- Standards
- Governance model
- Education
- PPP
- International cooperation
• Proposed next steps
Agenda
3
Briefly about ISACA
• International non-profit professional association
• Develops best practices, knowledge, education and professional certifications in
the area of IT Governance, Information Security Management, Cybersecurity and
IT Audit
• Kyiv chapter exists since 2008
• Run by volonteers
• Helps to drive the reforms in Ukraine
• Translates and publicizes international best practices
• Developed a version of a Draft Law of Ukraine on Cybersecurity Fundamentals –
based on international standards
• When the wave of attacks happened in Ukraine – established and delivered to a
number of state organizations a Cybersecurity training focused on Preparation,
Containment and Eradication of a cyberattack
Exist since 1969
More than 200 chapters world wide
more 115 000 members in 180 countries
“
4
Cybersecurity – analysis of existing situation in Ukraine
• Reforms are on their way
• Cyber strategy adopted last year
• Government Cyber Center has been created
• Technical solutions are being implemented
• Massive successful attacks on critical infrastructure and state bodies
• Limited skills in organizations to combat cyberattacks
• After attacks organizations are typically left on their own as far as
eradication with limited or no guidelines
• No information sharing. State advisories are not published following
the attacks
• Limited understanding of cybersecurity processes by state
authorities and responsible agencies
• Technical solutions such as Monitoring system/SIEM/IPS
implementations are viewed as panacea with limited attention dedicated
to preparation, containment and eradication phases
5
Cybersecurity – analysis of existing situation in Ukraine
Root causes – 1) Ineffective framework
• Information Protecting framework “KSZI” (based on ND TZI 2.5-004-99
analogue of ISO-15408), is intended for evaluation of security properties
of an IT Product rather than an organization
• Not risk-based (uses threats and protection profiles)
• Lack of organizational measures and governance
• Static rather than dynamic – once the system and it’s controls are
documented and attested – changes are not permitted => cannot be
used for cybersecurity where dynamic changes are needed during
containment/eradication
• Not suitable for medium to large-scale architectures
• Ineffective compliance process – requires use of state-accredited
auditors – historically very corrupt process
• Significant resistance in Ukraine against international standards, in favor
of “KSZI” – lobby by business delivering compliance. Employees trained
under old framework are reluctant to changes too
6
Cybersecurity – analysis of existing situation in Ukraine
Root causes – 2) Ineffective governance model
• Lack of law on cybersecurity – multiple versions exists. Strong lobby in
favour of ineffective “KSZI”
• Private business is concerned that “KSZI” and government-accredited
auditors will be misused to put illegal pressure on business
• Responsibility of Ministers, Supervisory Boards/Management for
cybersecurity of their critical infrastructure in respective industries and
organizations is not defined
• No effective mechanisms for coordination at the operational level of
cyber response among different state agencies. No centralized
command for attack response
• No one handles – preparing and educating organizations, helping them
with eradication after attacks
• No industry-based regulators and standards for cyber (except for the
banking sector)
• No reliance on independent risk-based audit to verify security
7
Cybersecurity – analysis of existing situation in Ukraine
Root causes – 3) Ineffective educational system
• Educational system still focused on preparing students knowledgeable of “KSZI”
rather than international standards
• International professional certifications are not recognized in Ukraine
• Lack of instructors with advanced and modern practical experience and
international certifications
• In “Licensing requirements” for government IT security employees (mandated by
DSTSZI):
 there are no requirements of “cybersecurity” education, only for “technical
information protection” and “cryptography”;
 there are no requirements as to the level of quality of the cybersecurity
training courses.
• There are no cybersecurity specializations for higher education (forensic
investigator, network defender, auditor, recovery specialist, risk manager etc.)
8
Cybersecurity – analysis of existing situation in Ukraine
Root causes – 4) Ineffective PPP
• No formal PPP programme
• Lack of dialog between businesses and state
• Limited information sharing
• Lack of guidance and support by the state
• State does not sufficiently involve volunteers, experts, and does not rely on third-
party assurance for cybersecurity
• Business not sufficiently self-organized – no industry self-regulation, industry
CERTs, ISACs
9
Cybersecurity – proposed solution
1) Implement international frameworks instead of KSZI
• ISO-27000 – series and NIST Critical Infrastructure
Protection Framework
• NIST Guide to Industrial Control Systems security
• Industry-based best practices – e.g. NERC CIP for Energy
• Original standards should be used rather than their
translation/adoption to ensure that Ukraine does not fall
behind during the translation and adoption process
10
Use of NIST framework shall be mandatory for cyber
incident preparation and response*
Preparation
1 Detection and
analysis
2
Containment Eradication
4
Recovery
53
* Based on NIST Computer Security Incident Handling Guide
• Identify emergency
organization and
develop
emergency
response plan
• Identify critical
assets
• Perform risk
analysis and
implement
countermeasures
• Set up
communication
with authorities
• Implement incident
monitoring process
• Select and implement
event monitoring tools
and intrusion detection
systems
• Train responsible
individuals to perform
incident investigation
including reverse-
engineering of hostile
code and identify
command and control
centers
• Set up information
sharing with industry
players
• Mobilize emergency
response team
• Develop plan for containment
of intruders and cleansing of
the environment
• Search for samples of
malware
• Improve protection of the
most critical services and
payment systems
• Perform emergency
measures to Improve security
of Active Directory, external
perimeter and internal
network
• This may include completely
disconnecting organization
from Internet, limiting
customer services, removing
systems from domain
• Implement additional
operational non-IT dependent
controls (limits,
reconciliations, additional
approvals, statistical
deviations monitoring, etc.)
• Return to normal
operation
• Remove unnecessary
additional operational
controls
• Identify infected
systems across the
whole network based
on malware samples
analysis and reinstall
them
• Clean-up or install a
new Active Directory
domain, migrate to the
new domain
• Clean-up of the access
rights, change of
passwords and reissue
of crypto keys
• Fine-tuning of the
intrusion detection
systems and
monitoring tools
• Run intrusion
diagnostics software on
a regular basis
• Select and install
additional security tools
that need to be
implemented
11
Cybersecurity – proposed solution
2) Implement effective governance model and compliance process
• Centralized command (rather than coordination) of the responsible state
agencies for cyber response and eradication
• Analysis of malware samples and publishing of advisories and YARA rules
to identify the intruders (information sharing)
• Education and training programme for preparation, identification,
containment and eradication for critical infrastructure for state and privately-
owned CI – must be done immediately!
• Responsibilities of the Ministers, SBs and Management shall be defined
• CI owners shall be tasked to perform risk-assessment, develop remediation
plans and report to the responsible ministries
• Independent risk-based audits, under international standards shall be
mandated for the state-owned CI
• State accreditation of the audit firms shall be replaced with requirements to
have staff certified under international standards for cybersecurity
• Law on cybersecurity fundamentals (based on international standards and
independent audit) shall be passed by the Parliament. Law on Information
Protection – shall be changed
Слайд 12
Critical
Infrastructure
Self-regulating
organization
for energy
Results of the risks
assessment and
remediation plan
5
Ministry of
Energy
Development/approv
al of industry
standards for
cybersecurity
2
Independent
auditorsRisk-based
cybersecurity
assessment
4
State Cyber Center,
Government CERT
Consultations, Advisories
Support during containment
and response, Approval of
industry standards and
priority risks
1
Consultations,
Advisories, malware
samples, Support
during containment
and eradication
1
ICS ISAC
Govt. ISAC
of Ukraine
Industry
ISAC
Foreilgn
ISACs
Sharing of information
about attacks and
malware samples
7
Reporting to the regulator
6
Example - Possible cybersecurity governance model for
Energy sector
Priority risks
3
Priority risks,
Industry-specific
standards and
requirements
3
13
Cybersecurity – proposed solution
3) Education
• Build educational programmes around internationally-accepted frameworks
• Formally recognized international professional certifications for cyber and
information security and mandate that for responsible personnel (e.g. top
managers responsible for cyber, security staff, etc.)
• Recognize international professional certifications for university instructors as
part of the qualification process (in addition to publications and patents)
4) PPP
• Implement information sharing, install information sharing platform
• Establish national dialogue by means of creation of Cybersecurity Counsel
including responsible state staff and industry representatives
• Government shall rely on independent audit firms and certified professionals
to provide assurance for the critical infrastructure
• Industry self-regulation for cybersecurity – industrial regulators, CERTs, ISACs
• Government shall use responses of volunteers and consultants to deliver on
its commitments - in particular to deliver training, incident response
• Ensure independent review by the industry experts of the state decisions,
budgets and solutions in the area of Cybersecurity and information protection
14
Cybersecurity – proposed solution
International cooperation
1) Since Ukraine is used as a playground by international hackers to test
the tools and techniques to be used against the rest of the world, other
countries should be interested to give a hand to Ukraine to improve its
cybersecurity, help with containment and eradication of the existing
incidents, as well as provide expertise and tools necessary to set up
CERTs, ISACs, improve forensic capabilities, etc.
2) Information sharing of the malware samples should be established
with Ukraine, in order for the rest of the world to be prepared for the attacks
that international hacker groups tested on Ukrainian infrastructures
15
Cybersecurity – next steps
• State-wide Cybersecurity transformation programme should be
established and centrally driven by an international team of experts
• Crisis management office shall be established for cybersecurity, until an
effective governance model is implemented
Immediate steps should be:
• Analysis of malware samples and publishing of advisories and YARA
rules to identify intrusions in other government-owned and private
organizations thorough Ukraine
• Education and training programme for preparation, identification,
containment and eradication for critical infrastructure for state and
privately-owned CI

Weitere ähnliche Inhalte

Was ist angesagt?

Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
Adhar kashyap
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
Tonex
 
Metholodogies and Security Standards
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security Standards
Conferencias FIST
 

Was ist angesagt? (20)

ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
 
SFScon17 - Luca Moroni: "Outsourcing Cyber Risks"
SFScon17 - Luca Moroni: "Outsourcing Cyber Risks"SFScon17 - Luca Moroni: "Outsourcing Cyber Risks"
SFScon17 - Luca Moroni: "Outsourcing Cyber Risks"
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
 
Sarwono sutikno forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
Sarwono sutikno   forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...Sarwono sutikno   forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
Sarwono sutikno forum tik utk standardisasi keamanan kartu cerdas - 4 nov 2...
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
 
What is needed to start trusting the security of your applications in the cloud?
What is needed to start trusting the security of your applications in the cloud?What is needed to start trusting the security of your applications in the cloud?
What is needed to start trusting the security of your applications in the cloud?
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - Introduction
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk Assessment
 
Sarwono sutikno its 17 maret 2016 dari public-isaca csx-update-18_apr
Sarwono sutikno   its 17 maret 2016 dari public-isaca csx-update-18_aprSarwono sutikno   its 17 maret 2016 dari public-isaca csx-update-18_apr
Sarwono sutikno its 17 maret 2016 dari public-isaca csx-update-18_apr
 
Collateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsCollateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisations
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Cybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework CimetricsCybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework Cimetrics
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
 
Metholodogies and Security Standards
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security Standards
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 

Andere mochten auch

Настанови з кібербезпеки
Настанови з кібербезпекиНастанови з кібербезпеки
Настанови з кібербезпеки
Alexey Yankovski
 
Як отримати найбільші зиски від участі в Київському відділенні ISACA
Як отримати найбільші зиски від участі в Київському відділенні ISACAЯк отримати найбільші зиски від участі в Київському відділенні ISACA
Як отримати найбільші зиски від участі в Київському відділенні ISACA
IsacaKyiv
 
life at ticketscript
life at ticketscriptlife at ticketscript
life at ticketscript
GradaMarie
 
Psyc 3050 Final Paper
Psyc 3050 Final PaperPsyc 3050 Final Paper
Psyc 3050 Final Paper
Amy Teresa
 
Rahul c.v. no 1..doc with photo.doc origanal
Rahul c.v. no 1..doc with photo.doc origanalRahul c.v. no 1..doc with photo.doc origanal
Rahul c.v. no 1..doc with photo.doc origanal
RAHUL TEKADE
 

Andere mochten auch (19)

Настанови з кібербезпеки
Настанови з кібербезпекиНастанови з кібербезпеки
Настанови з кібербезпеки
 
Як отримати найбільші зиски від участі в Київському відділенні ISACA
Як отримати найбільші зиски від участі в Київському відділенні ISACAЯк отримати найбільші зиски від участі в Київському відділенні ISACA
Як отримати найбільші зиски від участі в Київському відділенні ISACA
 
Altimetria 120228142124-phpapp02
Altimetria 120228142124-phpapp02Altimetria 120228142124-phpapp02
Altimetria 120228142124-phpapp02
 
2014AR
2014AR2014AR
2014AR
 
create
createcreate
create
 
Onyekachi Chewe O Mutumba-CV.DOC
Onyekachi Chewe O Mutumba-CV.DOCOnyekachi Chewe O Mutumba-CV.DOC
Onyekachi Chewe O Mutumba-CV.DOC
 
Palas -HELOS
Palas -HELOSPalas -HELOS
Palas -HELOS
 
life at ticketscript
life at ticketscriptlife at ticketscript
life at ticketscript
 
Dothan invite
Dothan inviteDothan invite
Dothan invite
 
Potensi desa
Potensi desaPotensi desa
Potensi desa
 
a
aa
a
 
Power point
Power pointPower point
Power point
 
Psyc 3050 Final Paper
Psyc 3050 Final PaperPsyc 3050 Final Paper
Psyc 3050 Final Paper
 
I’m maribeth
I’m maribethI’m maribeth
I’m maribeth
 
Huntsville event
Huntsville eventHuntsville event
Huntsville event
 
Rahul c.v. no 1..doc with photo.doc origanal
Rahul c.v. no 1..doc with photo.doc origanalRahul c.v. no 1..doc with photo.doc origanal
Rahul c.v. no 1..doc with photo.doc origanal
 
Kosenconf 100
Kosenconf 100Kosenconf 100
Kosenconf 100
 
Mobile networking
Mobile networkingMobile networking
Mobile networking
 
Rpjm des,
Rpjm des,Rpjm des,
Rpjm des,
 

Ähnlich wie Existing situation and proposed solutions to improve Cybersecurity in Ukraine

EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIP
Scott Baron
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 

Ähnlich wie Existing situation and proposed solutions to improve Cybersecurity in Ukraine (20)

Building Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & MetricsBuilding Your Information Security Program: Frameworks & Metrics
Building Your Information Security Program: Frameworks & Metrics
 
EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIP
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best Practices
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
System of security controls
System of security controlsSystem of security controls
System of security controls
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practices
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M RizviGeneral Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
General Data Protection Regulation and Compliance - GDPR: Sharique M Rizvi
 
Tech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharingTech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharing
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Leveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber SecurityLeveraging Federal Procurement to Improve Cyber Security
Leveraging Federal Procurement to Improve Cyber Security
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Solving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity DilemmaSolving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity Dilemma
 
2023 ITM Short Course - Week 1.pdf
2023 ITM Short Course - Week 1.pdf2023 ITM Short Course - Week 1.pdf
2023 ITM Short Course - Week 1.pdf
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 

Mehr von Alexey Yankovski

Mehr von Alexey Yankovski (8)

Cybersecurity training
Cybersecurity training Cybersecurity training
Cybersecurity training
 
шаблон стримування та відновдення 01 ay
шаблон стримування та відновдення 01 ayшаблон стримування та відновдення 01 ay
шаблон стримування та відновдення 01 ay
 
IT questions on the Supervisory Board Agenda
IT questions on the Supervisory Board AgendaIT questions on the Supervisory Board Agenda
IT questions on the Supervisory Board Agenda
 
Comments to the Draft Law on Cybersecurity Fundamentals of Ukraine
Comments to the Draft Law on Cybersecurity Fundamentals of UkraineComments to the Draft Law on Cybersecurity Fundamentals of Ukraine
Comments to the Draft Law on Cybersecurity Fundamentals of Ukraine
 
Energy security v02_vv
Energy security v02_vvEnergy security v02_vv
Energy security v02_vv
 
Кваліфікаційні характеристики для ІТ-провесій
Кваліфікаційні характеристики  для ІТ-провесійКваліфікаційні характеристики  для ІТ-провесій
Кваліфікаційні характеристики для ІТ-провесій
 
Презентація серії документів ISACA з впровадження Європейської Моделі Кібербе...
Презентація серії документів ISACA з впровадження Європейської Моделі Кібербе...Презентація серії документів ISACA з впровадження Європейської Моделі Кібербе...
Презентація серії документів ISACA з впровадження Європейської Моделі Кібербе...
 
Isaca cybers security_law_v12_vv
Isaca cybers security_law_v12_vvIsaca cybers security_law_v12_vv
Isaca cybers security_law_v12_vv
 

Kürzlich hochgeladen

Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
MadhuKothuru
 
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfUnique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdf
ScottMeyers35
 

Kürzlich hochgeladen (20)

World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterWorld Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - Poster
 
unang digmaang pandaigdig tagalog version
unang digmaang pandaigdig tagalog versionunang digmaang pandaigdig tagalog version
unang digmaang pandaigdig tagalog version
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
 
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
 
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
 
31st World Press Freedom Day Conference in Santiago.
31st World Press Freedom Day Conference in Santiago.31st World Press Freedom Day Conference in Santiago.
31st World Press Freedom Day Conference in Santiago.
 
Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In MumbaiVasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
 
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsPakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
 
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Morena [ 7014168258 ] Call Me For Genuine Models We...
 
Peace-Conflict-and-National-Adaptation-Plan-NAP-Processes-.pdf
Peace-Conflict-and-National-Adaptation-Plan-NAP-Processes-.pdfPeace-Conflict-and-National-Adaptation-Plan-NAP-Processes-.pdf
Peace-Conflict-and-National-Adaptation-Plan-NAP-Processes-.pdf
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
 
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfUnique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdf
 

Existing situation and proposed solutions to improve Cybersecurity in Ukraine

  • 1. TAIEX Workshop on Advancing Cyber Security Capacity in Critical Infrastructure Existing situation and proposed solutions to improve cybersecurity 24.01.17 Alexey Yankovski ISACA Kyiv Chapter
  • 2. 2 • Briefly about ISACA • Cybersecurity – analysis of existing situation in Ukraine • Proposed solution - Standards - Governance model - Education - PPP - International cooperation • Proposed next steps Agenda
  • 3. 3 Briefly about ISACA • International non-profit professional association • Develops best practices, knowledge, education and professional certifications in the area of IT Governance, Information Security Management, Cybersecurity and IT Audit • Kyiv chapter exists since 2008 • Run by volonteers • Helps to drive the reforms in Ukraine • Translates and publicizes international best practices • Developed a version of a Draft Law of Ukraine on Cybersecurity Fundamentals – based on international standards • When the wave of attacks happened in Ukraine – established and delivered to a number of state organizations a Cybersecurity training focused on Preparation, Containment and Eradication of a cyberattack Exist since 1969 More than 200 chapters world wide more 115 000 members in 180 countries “
  • 4. 4 Cybersecurity – analysis of existing situation in Ukraine • Reforms are on their way • Cyber strategy adopted last year • Government Cyber Center has been created • Technical solutions are being implemented • Massive successful attacks on critical infrastructure and state bodies • Limited skills in organizations to combat cyberattacks • After attacks organizations are typically left on their own as far as eradication with limited or no guidelines • No information sharing. State advisories are not published following the attacks • Limited understanding of cybersecurity processes by state authorities and responsible agencies • Technical solutions such as Monitoring system/SIEM/IPS implementations are viewed as panacea with limited attention dedicated to preparation, containment and eradication phases
  • 5. 5 Cybersecurity – analysis of existing situation in Ukraine Root causes – 1) Ineffective framework • Information Protecting framework “KSZI” (based on ND TZI 2.5-004-99 analogue of ISO-15408), is intended for evaluation of security properties of an IT Product rather than an organization • Not risk-based (uses threats and protection profiles) • Lack of organizational measures and governance • Static rather than dynamic – once the system and it’s controls are documented and attested – changes are not permitted => cannot be used for cybersecurity where dynamic changes are needed during containment/eradication • Not suitable for medium to large-scale architectures • Ineffective compliance process – requires use of state-accredited auditors – historically very corrupt process • Significant resistance in Ukraine against international standards, in favor of “KSZI” – lobby by business delivering compliance. Employees trained under old framework are reluctant to changes too
  • 6. 6 Cybersecurity – analysis of existing situation in Ukraine Root causes – 2) Ineffective governance model • Lack of law on cybersecurity – multiple versions exists. Strong lobby in favour of ineffective “KSZI” • Private business is concerned that “KSZI” and government-accredited auditors will be misused to put illegal pressure on business • Responsibility of Ministers, Supervisory Boards/Management for cybersecurity of their critical infrastructure in respective industries and organizations is not defined • No effective mechanisms for coordination at the operational level of cyber response among different state agencies. No centralized command for attack response • No one handles – preparing and educating organizations, helping them with eradication after attacks • No industry-based regulators and standards for cyber (except for the banking sector) • No reliance on independent risk-based audit to verify security
  • 7. 7 Cybersecurity – analysis of existing situation in Ukraine Root causes – 3) Ineffective educational system • Educational system still focused on preparing students knowledgeable of “KSZI” rather than international standards • International professional certifications are not recognized in Ukraine • Lack of instructors with advanced and modern practical experience and international certifications • In “Licensing requirements” for government IT security employees (mandated by DSTSZI):  there are no requirements of “cybersecurity” education, only for “technical information protection” and “cryptography”;  there are no requirements as to the level of quality of the cybersecurity training courses. • There are no cybersecurity specializations for higher education (forensic investigator, network defender, auditor, recovery specialist, risk manager etc.)
  • 8. 8 Cybersecurity – analysis of existing situation in Ukraine Root causes – 4) Ineffective PPP • No formal PPP programme • Lack of dialog between businesses and state • Limited information sharing • Lack of guidance and support by the state • State does not sufficiently involve volunteers, experts, and does not rely on third- party assurance for cybersecurity • Business not sufficiently self-organized – no industry self-regulation, industry CERTs, ISACs
  • 9. 9 Cybersecurity – proposed solution 1) Implement international frameworks instead of KSZI • ISO-27000 – series and NIST Critical Infrastructure Protection Framework • NIST Guide to Industrial Control Systems security • Industry-based best practices – e.g. NERC CIP for Energy • Original standards should be used rather than their translation/adoption to ensure that Ukraine does not fall behind during the translation and adoption process
  • 10. 10 Use of NIST framework shall be mandatory for cyber incident preparation and response* Preparation 1 Detection and analysis 2 Containment Eradication 4 Recovery 53 * Based on NIST Computer Security Incident Handling Guide • Identify emergency organization and develop emergency response plan • Identify critical assets • Perform risk analysis and implement countermeasures • Set up communication with authorities • Implement incident monitoring process • Select and implement event monitoring tools and intrusion detection systems • Train responsible individuals to perform incident investigation including reverse- engineering of hostile code and identify command and control centers • Set up information sharing with industry players • Mobilize emergency response team • Develop plan for containment of intruders and cleansing of the environment • Search for samples of malware • Improve protection of the most critical services and payment systems • Perform emergency measures to Improve security of Active Directory, external perimeter and internal network • This may include completely disconnecting organization from Internet, limiting customer services, removing systems from domain • Implement additional operational non-IT dependent controls (limits, reconciliations, additional approvals, statistical deviations monitoring, etc.) • Return to normal operation • Remove unnecessary additional operational controls • Identify infected systems across the whole network based on malware samples analysis and reinstall them • Clean-up or install a new Active Directory domain, migrate to the new domain • Clean-up of the access rights, change of passwords and reissue of crypto keys • Fine-tuning of the intrusion detection systems and monitoring tools • Run intrusion diagnostics software on a regular basis • Select and install additional security tools that need to be implemented
  • 11. 11 Cybersecurity – proposed solution 2) Implement effective governance model and compliance process • Centralized command (rather than coordination) of the responsible state agencies for cyber response and eradication • Analysis of malware samples and publishing of advisories and YARA rules to identify the intruders (information sharing) • Education and training programme for preparation, identification, containment and eradication for critical infrastructure for state and privately- owned CI – must be done immediately! • Responsibilities of the Ministers, SBs and Management shall be defined • CI owners shall be tasked to perform risk-assessment, develop remediation plans and report to the responsible ministries • Independent risk-based audits, under international standards shall be mandated for the state-owned CI • State accreditation of the audit firms shall be replaced with requirements to have staff certified under international standards for cybersecurity • Law on cybersecurity fundamentals (based on international standards and independent audit) shall be passed by the Parliament. Law on Information Protection – shall be changed
  • 12. Слайд 12 Critical Infrastructure Self-regulating organization for energy Results of the risks assessment and remediation plan 5 Ministry of Energy Development/approv al of industry standards for cybersecurity 2 Independent auditorsRisk-based cybersecurity assessment 4 State Cyber Center, Government CERT Consultations, Advisories Support during containment and response, Approval of industry standards and priority risks 1 Consultations, Advisories, malware samples, Support during containment and eradication 1 ICS ISAC Govt. ISAC of Ukraine Industry ISAC Foreilgn ISACs Sharing of information about attacks and malware samples 7 Reporting to the regulator 6 Example - Possible cybersecurity governance model for Energy sector Priority risks 3 Priority risks, Industry-specific standards and requirements 3
  • 13. 13 Cybersecurity – proposed solution 3) Education • Build educational programmes around internationally-accepted frameworks • Formally recognized international professional certifications for cyber and information security and mandate that for responsible personnel (e.g. top managers responsible for cyber, security staff, etc.) • Recognize international professional certifications for university instructors as part of the qualification process (in addition to publications and patents) 4) PPP • Implement information sharing, install information sharing platform • Establish national dialogue by means of creation of Cybersecurity Counsel including responsible state staff and industry representatives • Government shall rely on independent audit firms and certified professionals to provide assurance for the critical infrastructure • Industry self-regulation for cybersecurity – industrial regulators, CERTs, ISACs • Government shall use responses of volunteers and consultants to deliver on its commitments - in particular to deliver training, incident response • Ensure independent review by the industry experts of the state decisions, budgets and solutions in the area of Cybersecurity and information protection
  • 14. 14 Cybersecurity – proposed solution International cooperation 1) Since Ukraine is used as a playground by international hackers to test the tools and techniques to be used against the rest of the world, other countries should be interested to give a hand to Ukraine to improve its cybersecurity, help with containment and eradication of the existing incidents, as well as provide expertise and tools necessary to set up CERTs, ISACs, improve forensic capabilities, etc. 2) Information sharing of the malware samples should be established with Ukraine, in order for the rest of the world to be prepared for the attacks that international hacker groups tested on Ukrainian infrastructures
  • 15. 15 Cybersecurity – next steps • State-wide Cybersecurity transformation programme should be established and centrally driven by an international team of experts • Crisis management office shall be established for cybersecurity, until an effective governance model is implemented Immediate steps should be: • Analysis of malware samples and publishing of advisories and YARA rules to identify intrusions in other government-owned and private organizations thorough Ukraine • Education and training programme for preparation, identification, containment and eradication for critical infrastructure for state and privately-owned CI