SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
@NTXISSA
Top 10 Trends in TRM
Jon Murphy, CISSP, CBCP, NSA-IAM/IEM, ITILv3, CHS-V, MBA
National Practice Lead, TRM Consulting & Services
Alexander Open Systems (AOS)
April 24, 2015
@NTXISSA
Disclaimer
 All thoughts and opinions expressed in this presentation, or by Jon
Murphy directly, are his own and should NOT be interpreted as those of
Alexander Open Systems (AOS), or any other organization that might be
mentioned. The mention of any organizations should not be interpreted
as endorsement.
 Some material contained herein was obtained and is used with the
express written permission of AOS, and other organizations and MAY NOT
be used or reproduced in any way without each of these parties’ express
written consent in advance.
@NTXISSA
Overview
• What is TRM
• The Top Ten Trends
• Why You Need IT
• Where Are You
• Conceptual Solutions
• What The Future May Hold
• More Resources
• Q & A
@NTXISSA
Why Technology Risk Management (TRM)
• TRM includes:
• IT Sec
• BC/DR
• Governance & Compliance
• Exponential Growth of Threats
• D&D Insiders
• Outside Hackers
(Commercial, Organized Crime, State Sponsored)
• Competitor Espionage
• Continuously Growing Regulations & Requirements
• Increases are a mandatory cost of doing business
• FFIEC, SOx, HIPAA, PCI, GLBA, Dodd-Frank, NERC, OCC, etc…
• Volume reduction, Fines, and jail time for failure to comply
• Cost of data breach up 23% - as much as $20,000 a day
• Ever increasing expectations for “adequate” safeguards by
consumers and courts
@NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 5
What’s Your Biggest Exposure?
# 3 Paper
# 1 Employee
Negligence
# 2 Hacking
@NTXISSA
Top Ten Trends
1. Hacks may become data destruction
attacks
2. Threat actors are becoming more
sophisticated
3. Attacks and resultant legislation will push
industry standards around cyber risks and
improve threat intelligence information
sharing
@NTXISSA
Top Ten Trends -cntd
4. Predictive threat intelligence analytics are
critical
5. Third Party Service Provider Risk Management
is becoming an increasingly important concern
among firms
6. TRM must become a board-level issue
7. Embracing and adapting to the new
“boundless network,” is inevitable and we
must also invest in training its workforce to
properly access and protect corporate data
@NTXISSA
Top Ten Trends - cmpltd
8. Identity and Access Management are ever
increasingly a key security control area
9. Cyber benchmarking is imperative
10.TRM is not MERELY a Technology Issue
@NTXISSA
Why?
• There are at least 5 reasons
@NTXISSA
Why would strangers want your info?
1. Identity theft for resale or immediate profit
2. Damage reputation of competitor
3. Steal intellectual property
4. Blackmail
5. Cyber Crime –
Its An Epidemic;
The Nation’s Top Cop
Says So
@NTXISSA
We Help Clients Progress
Their Maturity Level
Technology Risk Management Maturity Model
Level 1:
Threat Defense
• Security is
“necessary evil”
• Reactive and de-
centralized monitoring
• Tactical point products
Level 2:
Checkboxes and
Defense-in-Depth
• Check-box mentality
• Collect data needed
primarily for
compliance
• Tactical threat
defenses enhanced
with layered security
controls
Level 3:
Risk-Based Security
• Proactive and
assessment based
• Collect data needed to
assess risk and detect
advanced threats
• Security tools
integrated with
common data and
management platform
Level 4:
Business-Oriented
• Security fully
embedded in
enterprise processes
• Data fully integrated
with business context;
drives decision-making
• Security tools
integrated with
business tools
Approach
Scope
Technology
@NTXISSA
Where are we now?
@NTXISSA
What concrete steps can you undertake?
Seven action items to start:
1. Get and stay informed
2. Learn the cultural risk appetite
3. Create a risk register and matrix
4. Perform a self assessment
5. Create an incident response plan
6. Add layers to defense in depth
7. Get help
@NTXISSA
Get & Stay Informed
1. Associations – e.g.; ISSA, InfoSec Community
on LinkedIn
2. Blogs – e.g.; http://www.vogelitlawblog.com/
3. Newsletters – e.g.; Info Risk Today
@NTXISSA
Learn The Cultural Risk Appetite
• The amount and type of risk that an organization is willing
to take in order to meet their strategic objectives.
• Both formally and informally set and driven by leadership,
SO?
1. Has leadership experienced cyber crime personally?
2. Is there an enterprise risk management office?
3. Is security the realm of some lowly network admin in the
bowels of the M.I.S. department?
@NTXISSA
1. List all the realistic bad things that could
happen
2. Rank them by likelihood (1-Least to 5-
most) and
3. Impact (1-Least to 5-most)
4. Plot them in a matrix
5. Concentrate on the 5/5s 5 / 5s
Create a Risk Register & Matrix
@NTXISSA
Perform A RVA Self Assessment
• Have the business do it first
• Then involve an IT Pro
• Better yet, involve a risk
management Pro
• Use a recognized methodology &
tool,
e.g.; Shared Assessments
@NTXISSA
• Create an incident response plan
1. Use the list from action item 3
2. Either create an overarching plan as
guide to every thing on the list or a
plan for each
3. The plan should contain:
1. Who can invoke the plan
2. When to invoke the plan
3. Who does what
4. Alternate roles & responsibilities
5. How to do what
6. What is BAU
4. Don’t forget the post mortem for
lesson learned
You can’t run . . .
or do this !
@NTXISSA
1. Bad guys and insiders are
getting more savvy by the day
2. One – three layers of tech
defense is the norm (NOT
ENOUGH)
3. Technology, process, and
people must interact optimally
4. Prepare for the worst and
hope for better
5. You need professional
expertise
The education you’ve undertaken will quickly tell you:
@NTXISSA
Reasonable Security HW/Systems to Deploy:
Next Generation Firewalls
Encryption
Updated Software Patches
Complex Passwords
Multi-factor Authentication
Device/Appliance Inventory
Intrusion
Prevention/Detection
Anti-malware
@NTXISSA
What The Future Holds
NTX ISSA Cyber Security Conference – April 24-25, 2015 21
@NTXISSA
Additional Resources
 Ponemon Institute
http://www.ponemon.org/
 Shared Assessments™
http://sharedassessments.org/about/
 ISO 31000
http://www.iso.org/iso/catalogue_det
ail?csnumber=43170
 AOS Security Consulting
http://www.aos5.com/security/
@NTXISSA
Questions?
http://www.aos5.com/security/consulting
@NTXISSA@NTXISSA
The Collin College Engineering Department
Collin College Student Chapter of the North Texas ISSA
North Texas ISSA (Information Systems Security Association)
NTX ISSA Cyber Security Conference – April 24-25, 2015 24
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPTRajat Kumar
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Lancope, Inc.
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
 
Outpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface managementOutpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface managementOutpost24
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksJames Cash
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNorth Texas Chapter of the ISSA
 
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...Outpost24
 
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK FrameworkOutpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK FrameworkOutpost24
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceZaiffiEhsan
 

Was ist angesagt? (20)

Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
NormShieldBrochure
NormShieldBrochureNormShieldBrochure
NormShieldBrochure
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Outpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface managementOutpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface management
 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber Attacks
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
 
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
 
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK FrameworkOutpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
 
Cisa ransomware guide
Cisa ransomware guideCisa ransomware guide
Cisa ransomware guide
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 

Ähnlich wie NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy

Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsJayeshGadhave1
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?PECB
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
Intro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseIntro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseRoger Grimes
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence programMark Arena
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxSAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxhforhassan101
 

Ähnlich wie NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy (20)

Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
Threat intelligence minority report
Threat intelligence minority reportThreat intelligence minority report
Threat intelligence minority report
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by steps
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Intro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseIntro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security Defense
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptxSAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
 

Mehr von North Texas Chapter of the ISSA

Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediationNorth Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1North Texas Chapter of the ISSA
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNorth Texas Chapter of the ISSA
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNorth Texas Chapter of the ISSA
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill whiteNorth Texas Chapter of the ISSA
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNorth Texas Chapter of the ISSA
 

Mehr von North Texas Chapter of the ISSA (20)

Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
 

NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy

  • 1. @NTXISSA Top 10 Trends in TRM Jon Murphy, CISSP, CBCP, NSA-IAM/IEM, ITILv3, CHS-V, MBA National Practice Lead, TRM Consulting & Services Alexander Open Systems (AOS) April 24, 2015
  • 2. @NTXISSA Disclaimer  All thoughts and opinions expressed in this presentation, or by Jon Murphy directly, are his own and should NOT be interpreted as those of Alexander Open Systems (AOS), or any other organization that might be mentioned. The mention of any organizations should not be interpreted as endorsement.  Some material contained herein was obtained and is used with the express written permission of AOS, and other organizations and MAY NOT be used or reproduced in any way without each of these parties’ express written consent in advance.
  • 3. @NTXISSA Overview • What is TRM • The Top Ten Trends • Why You Need IT • Where Are You • Conceptual Solutions • What The Future May Hold • More Resources • Q & A
  • 4. @NTXISSA Why Technology Risk Management (TRM) • TRM includes: • IT Sec • BC/DR • Governance & Compliance • Exponential Growth of Threats • D&D Insiders • Outside Hackers (Commercial, Organized Crime, State Sponsored) • Competitor Espionage • Continuously Growing Regulations & Requirements • Increases are a mandatory cost of doing business • FFIEC, SOx, HIPAA, PCI, GLBA, Dodd-Frank, NERC, OCC, etc… • Volume reduction, Fines, and jail time for failure to comply • Cost of data breach up 23% - as much as $20,000 a day • Ever increasing expectations for “adequate” safeguards by consumers and courts
  • 5. @NTXISSANTX ISSA Cyber Security Conference – April 24-25, 2015 5 What’s Your Biggest Exposure? # 3 Paper # 1 Employee Negligence # 2 Hacking
  • 6. @NTXISSA Top Ten Trends 1. Hacks may become data destruction attacks 2. Threat actors are becoming more sophisticated 3. Attacks and resultant legislation will push industry standards around cyber risks and improve threat intelligence information sharing
  • 7. @NTXISSA Top Ten Trends -cntd 4. Predictive threat intelligence analytics are critical 5. Third Party Service Provider Risk Management is becoming an increasingly important concern among firms 6. TRM must become a board-level issue 7. Embracing and adapting to the new “boundless network,” is inevitable and we must also invest in training its workforce to properly access and protect corporate data
  • 8. @NTXISSA Top Ten Trends - cmpltd 8. Identity and Access Management are ever increasingly a key security control area 9. Cyber benchmarking is imperative 10.TRM is not MERELY a Technology Issue
  • 9. @NTXISSA Why? • There are at least 5 reasons
  • 10. @NTXISSA Why would strangers want your info? 1. Identity theft for resale or immediate profit 2. Damage reputation of competitor 3. Steal intellectual property 4. Blackmail 5. Cyber Crime – Its An Epidemic; The Nation’s Top Cop Says So
  • 11. @NTXISSA We Help Clients Progress Their Maturity Level Technology Risk Management Maturity Model Level 1: Threat Defense • Security is “necessary evil” • Reactive and de- centralized monitoring • Tactical point products Level 2: Checkboxes and Defense-in-Depth • Check-box mentality • Collect data needed primarily for compliance • Tactical threat defenses enhanced with layered security controls Level 3: Risk-Based Security • Proactive and assessment based • Collect data needed to assess risk and detect advanced threats • Security tools integrated with common data and management platform Level 4: Business-Oriented • Security fully embedded in enterprise processes • Data fully integrated with business context; drives decision-making • Security tools integrated with business tools Approach Scope Technology
  • 13. @NTXISSA What concrete steps can you undertake? Seven action items to start: 1. Get and stay informed 2. Learn the cultural risk appetite 3. Create a risk register and matrix 4. Perform a self assessment 5. Create an incident response plan 6. Add layers to defense in depth 7. Get help
  • 14. @NTXISSA Get & Stay Informed 1. Associations – e.g.; ISSA, InfoSec Community on LinkedIn 2. Blogs – e.g.; http://www.vogelitlawblog.com/ 3. Newsletters – e.g.; Info Risk Today
  • 15. @NTXISSA Learn The Cultural Risk Appetite • The amount and type of risk that an organization is willing to take in order to meet their strategic objectives. • Both formally and informally set and driven by leadership, SO? 1. Has leadership experienced cyber crime personally? 2. Is there an enterprise risk management office? 3. Is security the realm of some lowly network admin in the bowels of the M.I.S. department?
  • 16. @NTXISSA 1. List all the realistic bad things that could happen 2. Rank them by likelihood (1-Least to 5- most) and 3. Impact (1-Least to 5-most) 4. Plot them in a matrix 5. Concentrate on the 5/5s 5 / 5s Create a Risk Register & Matrix
  • 17. @NTXISSA Perform A RVA Self Assessment • Have the business do it first • Then involve an IT Pro • Better yet, involve a risk management Pro • Use a recognized methodology & tool, e.g.; Shared Assessments
  • 18. @NTXISSA • Create an incident response plan 1. Use the list from action item 3 2. Either create an overarching plan as guide to every thing on the list or a plan for each 3. The plan should contain: 1. Who can invoke the plan 2. When to invoke the plan 3. Who does what 4. Alternate roles & responsibilities 5. How to do what 6. What is BAU 4. Don’t forget the post mortem for lesson learned You can’t run . . . or do this !
  • 19. @NTXISSA 1. Bad guys and insiders are getting more savvy by the day 2. One – three layers of tech defense is the norm (NOT ENOUGH) 3. Technology, process, and people must interact optimally 4. Prepare for the worst and hope for better 5. You need professional expertise The education you’ve undertaken will quickly tell you:
  • 20. @NTXISSA Reasonable Security HW/Systems to Deploy: Next Generation Firewalls Encryption Updated Software Patches Complex Passwords Multi-factor Authentication Device/Appliance Inventory Intrusion Prevention/Detection Anti-malware
  • 21. @NTXISSA What The Future Holds NTX ISSA Cyber Security Conference – April 24-25, 2015 21
  • 22. @NTXISSA Additional Resources  Ponemon Institute http://www.ponemon.org/  Shared Assessments™ http://sharedassessments.org/about/  ISO 31000 http://www.iso.org/iso/catalogue_det ail?csnumber=43170  AOS Security Consulting http://www.aos5.com/security/
  • 24. @NTXISSA@NTXISSA The Collin College Engineering Department Collin College Student Chapter of the North Texas ISSA North Texas ISSA (Information Systems Security Association) NTX ISSA Cyber Security Conference – April 24-25, 2015 24 Thank you

Hinweis der Redaktion

  1. This is the “You can Quote me, But . . . “ slide
  2. Click on Risk for APT Movie TRM defined – Though still to often excluded from the boardroom level, the process seeks to identify technology related risks to a business, assess those risks by determining their potential impact and their likelihood of occurrence, and then to take steps to mitigate the risks to an acceptable level D&D – disgruntled and disenfranchised insiders – one of the biggest hidden threats companies can face Most companies cannot afford to find and keep the expertise level to meet these needs Do you really want to roll these dice?
  3. Let me tell you where the real damage is. Everyone concentrates on hacking…
  4. Used to be just about access but now, the potential of threat actors actually destroying data is a major concern among risk and security professionals in all verticals. Understanding the entire threat landscape and what this means in terms of employing the right people, technology and processes to ensure business continuity and proper risk management. If Congress allows the sharing of important national security information, industry standards could become a benchmark requirement that firms must meet before they are given access to government information.
  5. Employing a more predictive threat intelligence capability to determine who might be trying to specifically attack them and how is more critical than ever Suppliers’ vulnerabilities become the vulnerabilities of the firms they provide products and services. Almost all the major headline breaches you heard of lately have third party & sometimes 4th party) implications The boards of directors must create and embrace a culture that acknowledges the evolving risks and more openly share incident information across the industry, with technology providers and with both law enforcement and the federal government. The new openness has many pitfalls however, Cloud, social and mobile technologies, including “Bring Your Own Device” (BYOD), are simply too cost efficient and effective for institutions to ignore them.
  6. The days of focusing solely on perimeter defense have long since past. Understanding how competitors and suppliers are investing in people processes and technology for cyber risk management is increasingly more important. Subscribing to news feed on cyber security from sources like Forrester, Gartner and Ponemon, SANS, and AOS are good ways to get that intel Said this already, but it is worth repeating – people, process, dat and technology are/should be reviewed. Firms must also invest in people and in fine-tuning processes to ensure, not only the proper use of technology, but that the processes that require interfaces between organizations are well managed and executed flawlessly.
  7. Click on Picture for Norse Map 
  8. Prompt question: What preventative measures should companies take to protect sensitive data from unauthorized access? These are common gaps in security solutions. The first is in the QA and test environments. Many of our customers create multiple copies of their production environment for test and QA purposes. This data is at risk and the fact that are 8-12 copies of the live data only increases the risk. The second gap is in development and support. DBA’s and other super users have access to data in the clear and use tools like SQR reporting and Toad to bypass existing security solutions. These users can unintentionally or maliciously release a lot of sensitive data. The third gap is with organizations that are outsourcing or offshoring development or production support. These outsourced resources don’t need to see sensitive data. So in order to realize the benefits of the outsourcing model, organizations need to be able to protect the sensitive data. Finally, call centers and even physical storefronts have applications that contain sensitive data such as national id/social security number and phone numbers. These employees don’t need this information to do their jobs, but the current applications don’t restrict access to this information. So there are huge gaps and exposed risk areas in production data warehouses, in copies of production systems used in QA, development and support, when systems are provided to outsourced organizations with less security restrictions to data, and more importantly to business users who inadvertently have access to information that is considered private or confidential.
  9. Courtesy ISACA and RSA