SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Decentralised, multi-stakeholder and non-linear
incident response
with the Incident Command System
Jonathan Topham and Pukhraj Singh, Virgin Australia
AusCERT 2023 Conference, Gold Coast
12th May 2023
Introductions
• Jonathan Topham
• Head of Information Security at VA
• Formerly worked with the British Intelligence Community, Europol, and UK Revenues &
Customs
• Background in DFIR, cyber threat intelligence, crisis management and counter-terrorism
• Interdisciplinary degrees from University College Dublin, University of Aberdeen and King’s
College London
• Pukhraj Singh
• Cyber Security Operations Leader at VA
• Formerly worked with the Indian Intelligence Community under the Prime Minister’s Office
• Interdisciplinary background in cyber threat intelligence, detection engineering, security
operations and geostrategy
• Master’s student of geopolitics at UNSW Canberra, at the Australian Defence Force
Academy
• Written for the Australian Defence College, Australian Strategic Policy Institute and US
Military Academy, etc.
The views expressed in this presentation are personal and do
not reflect the opinions and beliefs of Virgin Australia.
Cyber incident response is decentralised
• The dissolution of the perimeter has led to the decentralisation of IR
• The operational tier of IR may still retain the initiative to some degree, but the
tactical and strategic tiers do not
• How is your third-party breach playbook coping with Containment, Eradication and
Recovery?
“The perimeter is not the boundary of your network, but the boundary of your telemetry” - The Grugq
“Control and ownership of [IT] assets necessarily do not overlap” – Halvar Flake AKA Thomas Dullien
Cyber incident response is multistakeholder
A typical large organisation in Australia is running overlapping IR functions
during a cybersecurity incident: IT, Data Breach, Legal, Crisis Management
and Public Affairs
• A rigid command hierarchy has become counterproductive
• At the heart of it, even the strategic elements of IR need guidance from
technical/operational IR
• With the amendments to the SoCI and Privacy Acts, you are looking at
potential escalation from whole-of-org to whole-of-sector or whole-of-
nation IR in a matter of hours
Cyber incident response is non-linear
• The crisis management team operates in binaries: it is either activated or not
• There is a subtle tension between the non-linearity of technical IR and linearity
expected by the crisis management teams
• The adversary is running a counter-information operation against your public
messaging
• Non-alignment between the strategic, tactical and operational tiers can cause
irreparable reputational damage (e.g., the last the big three Aussie data
breaches)
VA’s Incident Command System
Inspired by the federal emergency management framework of the US and UK
• FEMA’s National Incident Management System
• The UK’s Gold-Silver-Bronze Command Structure
VA’s Incident Command System
FEMA’s National Incident Management System
• Principles
1. Flexibility
2. Standardisation
3. Unity of Effort
• Some characteristics
1. Modular Organisation
2. Management by Objectives
3. Integrated Communications
4. Establishment and Transfer of Command
VA’s Incident Command System
The UK’s Gold-Silver-Bronze Command Structure
• Gold, Silver and Bronze Command Tiers
• Role, not rank specific
• Flexible application
• Some procedures
• Function of command
• Command interoperability
• Initial command of spontaneous incidents
• Transfer of command
VA’s Incident Command System
The first few things that we wanted to solve
• Integration with the data breach response plan, critical IT incident
management plan and crisis management plan
• Complying with the regulatory obligations under the Privacy Act and
Security of Critical Infrastructure Act
• Not disrupt the existing IR plans at any cost by introducing new stuff – make
our model invisible to them
VA’s Incident Command System
Gold
What we
intend to do
Silver
How we intend to do it
Bronze
Doing it
CIO - Gold Commander
Head of Infosec – Silver Commander
Cyber Security Operations
Leader – Bronze Commander
Strategic - coordination and communication
• Liaison with the IAT of the Crisis Management Team
• Liaison Data Breach Response Team
• Liaison with external stakeholders (i.e., Law enforcement)
• Liaison with other internal stakeholders (e.g., Legal and
Public Affairs, etc.)
Operational – command and control
•Command and control of the response
•C2 for the execution of IR playbooks
•C2 for the IR process
•Liaison with the Privacy Officer and Head of IT
Tactical – response actions
•Execution of IR playbooks
•Execution of IR process
•Coordination with technical stakeholders (system owners/ IT
operations)
Data Breach, Crisis Management and Critical IT
IR Plans
Cyber IR Plan
Playbooks
VA’s Incident Command System
Lessons learnt – Tabletop exercises
• Do not expose the Gold-Silver-Bronze terminology to other IR plans
• Rigorously test the instantiation of the ICS first – do not aim for the moon
• Do not change the roles and responsibilities of participants within other IR
plans
VA’s Incident Command System
Lessons learnt – Tabletop exercises
• Merge the ICS into other IR structures where appropriate
• Do not be too hung up over who gets Gold-Silver-Bronze
Questions?

Weitere ähnliche Inhalte

Ähnlich wie Decentralised multi-stakeholder cyber incident response

CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2KBIZEAU
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdfNdheh
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)Kathy_67
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)Rohana K Amarakoon
 
Commercial and government cyberwarfare
Commercial and government cyberwarfareCommercial and government cyberwarfare
Commercial and government cyberwarfareNicholas Davis
 
Commercial And Government Cyberwarfare
Commercial And Government CyberwarfareCommercial And Government Cyberwarfare
Commercial And Government CyberwarfareNicholas Davis
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
Security-Invest Where it Matters Most
Security-Invest Where it Matters MostSecurity-Invest Where it Matters Most
Security-Invest Where it Matters MostInnoTech
 
Case Study
Case StudyCase Study
Case Studylneut03
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 

Ähnlich wie Decentralised multi-stakeholder cyber incident response (20)

Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Information Security - I.T Project Management
Information Security - I.T Project ManagementInformation Security - I.T Project Management
Information Security - I.T Project Management
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Unit 1&2.pdf
Unit 1&2.pdfUnit 1&2.pdf
Unit 1&2.pdf
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Topic11
Topic11Topic11
Topic11
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
Commercial and government cyberwarfare
Commercial and government cyberwarfareCommercial and government cyberwarfare
Commercial and government cyberwarfare
 
Commercial And Government Cyberwarfare
Commercial And Government CyberwarfareCommercial And Government Cyberwarfare
Commercial And Government Cyberwarfare
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Security-Invest Where it Matters Most
Security-Invest Where it Matters MostSecurity-Invest Where it Matters Most
Security-Invest Where it Matters Most
 
Case Study
Case StudyCase Study
Case Study
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
)k
)k)k
)k
 

Mehr von Pukhraj Singh

"The empirical paradoxes of cybersecurity" - - Pukhraj Singh - DynamicCISO Su...
"The empirical paradoxes of cybersecurity" - - Pukhraj Singh - DynamicCISO Su..."The empirical paradoxes of cybersecurity" - - Pukhraj Singh - DynamicCISO Su...
"The empirical paradoxes of cybersecurity" - - Pukhraj Singh - DynamicCISO Su...Pukhraj Singh
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh
 
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Pukhraj Singh
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)Pukhraj Singh
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghPukhraj Singh
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018Pukhraj Singh
 

Mehr von Pukhraj Singh (7)

"The empirical paradoxes of cybersecurity" - - Pukhraj Singh - DynamicCISO Su...
"The empirical paradoxes of cybersecurity" - - Pukhraj Singh - DynamicCISO Su..."The empirical paradoxes of cybersecurity" - - Pukhraj Singh - DynamicCISO Su...
"The empirical paradoxes of cybersecurity" - - Pukhraj Singh - DynamicCISO Su...
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
 
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
 

Kürzlich hochgeladen

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Kürzlich hochgeladen (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Decentralised multi-stakeholder cyber incident response

  • 1. Decentralised, multi-stakeholder and non-linear incident response with the Incident Command System Jonathan Topham and Pukhraj Singh, Virgin Australia AusCERT 2023 Conference, Gold Coast 12th May 2023
  • 2. Introductions • Jonathan Topham • Head of Information Security at VA • Formerly worked with the British Intelligence Community, Europol, and UK Revenues & Customs • Background in DFIR, cyber threat intelligence, crisis management and counter-terrorism • Interdisciplinary degrees from University College Dublin, University of Aberdeen and King’s College London • Pukhraj Singh • Cyber Security Operations Leader at VA • Formerly worked with the Indian Intelligence Community under the Prime Minister’s Office • Interdisciplinary background in cyber threat intelligence, detection engineering, security operations and geostrategy • Master’s student of geopolitics at UNSW Canberra, at the Australian Defence Force Academy • Written for the Australian Defence College, Australian Strategic Policy Institute and US Military Academy, etc.
  • 3. The views expressed in this presentation are personal and do not reflect the opinions and beliefs of Virgin Australia.
  • 4. Cyber incident response is decentralised • The dissolution of the perimeter has led to the decentralisation of IR • The operational tier of IR may still retain the initiative to some degree, but the tactical and strategic tiers do not • How is your third-party breach playbook coping with Containment, Eradication and Recovery? “The perimeter is not the boundary of your network, but the boundary of your telemetry” - The Grugq “Control and ownership of [IT] assets necessarily do not overlap” – Halvar Flake AKA Thomas Dullien
  • 5. Cyber incident response is multistakeholder A typical large organisation in Australia is running overlapping IR functions during a cybersecurity incident: IT, Data Breach, Legal, Crisis Management and Public Affairs • A rigid command hierarchy has become counterproductive • At the heart of it, even the strategic elements of IR need guidance from technical/operational IR • With the amendments to the SoCI and Privacy Acts, you are looking at potential escalation from whole-of-org to whole-of-sector or whole-of- nation IR in a matter of hours
  • 6. Cyber incident response is non-linear • The crisis management team operates in binaries: it is either activated or not • There is a subtle tension between the non-linearity of technical IR and linearity expected by the crisis management teams • The adversary is running a counter-information operation against your public messaging • Non-alignment between the strategic, tactical and operational tiers can cause irreparable reputational damage (e.g., the last the big three Aussie data breaches)
  • 7. VA’s Incident Command System Inspired by the federal emergency management framework of the US and UK • FEMA’s National Incident Management System • The UK’s Gold-Silver-Bronze Command Structure
  • 8. VA’s Incident Command System FEMA’s National Incident Management System • Principles 1. Flexibility 2. Standardisation 3. Unity of Effort • Some characteristics 1. Modular Organisation 2. Management by Objectives 3. Integrated Communications 4. Establishment and Transfer of Command
  • 9. VA’s Incident Command System The UK’s Gold-Silver-Bronze Command Structure • Gold, Silver and Bronze Command Tiers • Role, not rank specific • Flexible application • Some procedures • Function of command • Command interoperability • Initial command of spontaneous incidents • Transfer of command
  • 10. VA’s Incident Command System The first few things that we wanted to solve • Integration with the data breach response plan, critical IT incident management plan and crisis management plan • Complying with the regulatory obligations under the Privacy Act and Security of Critical Infrastructure Act • Not disrupt the existing IR plans at any cost by introducing new stuff – make our model invisible to them
  • 11. VA’s Incident Command System Gold What we intend to do Silver How we intend to do it Bronze Doing it CIO - Gold Commander Head of Infosec – Silver Commander Cyber Security Operations Leader – Bronze Commander Strategic - coordination and communication • Liaison with the IAT of the Crisis Management Team • Liaison Data Breach Response Team • Liaison with external stakeholders (i.e., Law enforcement) • Liaison with other internal stakeholders (e.g., Legal and Public Affairs, etc.) Operational – command and control •Command and control of the response •C2 for the execution of IR playbooks •C2 for the IR process •Liaison with the Privacy Officer and Head of IT Tactical – response actions •Execution of IR playbooks •Execution of IR process •Coordination with technical stakeholders (system owners/ IT operations) Data Breach, Crisis Management and Critical IT IR Plans Cyber IR Plan Playbooks
  • 12. VA’s Incident Command System Lessons learnt – Tabletop exercises • Do not expose the Gold-Silver-Bronze terminology to other IR plans • Rigorously test the instantiation of the ICS first – do not aim for the moon • Do not change the roles and responsibilities of participants within other IR plans
  • 13. VA’s Incident Command System Lessons learnt – Tabletop exercises • Merge the ICS into other IR structures where appropriate • Do not be too hung up over who gets Gold-Silver-Bronze