• No results found

Cyber-Security: Proactively managing the cyber threat landscape

N/A
N/A
Protected

Academic year: 2021

Share "Cyber-Security: Proactively managing the cyber threat landscape"

Copied!
30
0
0

Loading.... (view fulltext now)

Full text

(1)

Cyber-Security:

Proactively

managing the cyber threat

(2)

Agenda

• Understanding the cyber threat landscape

• Building a resilient Cyber Risk capability

• An Internal Audit approach

(3)

Understanding the

(4)

The evolving threat landscape…

800 million

$55 million

40 million

3

Lilly scientists stole $55 million in trade secrets

1

Indianapolis Business Journal, October 8, 2013

Last year, over 800 million records were breached globally, up from 250 million in 2012

The Economist, July 2014

Target missed signs of a data breach (40 million credit card numbers compromised)

2

NY Times, March 13, 2014

On a scale of 1 to 10…American preparedness for a large-scale cyber attack is around a 3

3

NY Times, July 2012

Why?

Corporate

change

& innovation

Evolving

threat

environment

Changing

regulatory

environment

Regulatory changes continue

to absorb resources and attention.

Cyber threats are asymmetrical risks. Cyber crime

grows in sophistication, and attacks increase in

speed and number, while time to respond

decreases. Targeted attacks on operations, brand,

and competitive advantage are more impactful

than ever.

Technology innovations that drive

business growth also create cyber risk.

New technology-enabled business

models create new opportunities for

malicious actors to exploit and higher

likelihood of accidental vulnerabilities.

(5)

Cyber risk

High on the agenda

Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent

headlines and increased government and regulatory focus

The Executive Order highlights the focus on an improved cybersecurity framework and the rapid changes of

regulatory

agency expectations and oversight

Recent

U.S. Securities and Exchange Commission (SEC

) guidance regarding

disclosure obligations

relating to

cybersecurity risks and incidents…..

“Registrants should address

cybersecurity risks and cyber incidents

in their

Management’s Discussion and Analysis of Financial Condition and Results of

Operations (MD&A), Risk Factors, Description of Business, Legal Proceedings

and Financial Statement Disclosures.”

SEC Division of Corporate Finance

Disclosure Guidance: Topic No.

2 ‒ Cybersecurity

Ever-growing concerns about cyber-attacks affecting the nation’s critical infrastructure prompted the signing of the

Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity.

One of the foundational drivers behind the update and release of the 2013 COSO Framework was the need to address

how organizations use and rely on evolving technology for internal control purposes

(6)

Cyber risk (cont’d)

Roles and responsibilities

Effective risk management is the product of multiple layers of risk defense. Internal Audit should support the board’s need

to understand the effectiveness of cybersecurity controls.

1

st

Line of defense

business and IT

functions

2

nd

Line of defense

information and technology

risk management

function

3

rd

Line of

defense

internal audit

• Establish governance and oversight

• Set risk baselines, policies, and standards

• Implement tools and processes

• Monitor and call for action, as appropriate

• Provide oversight, consultation, checks and balances, and

enterprise-level policies and standards

• Incorporate risk-informed decision making into day-to-day operations

and fully integrate risk management into operational processes

• Define risk appetite and escalate risks outside of tolerance

• Mitigate risks, as appropriate

• Independently review program effectiveness

• Provide confirmation to the board on risk management effectiveness

• Meet requirements of SEC disclosure obligations focused on

cybersecurity risks

Roles and responsibilities

Given recent high profile cyber attacks and data losses, and the SEC’s and other regulators’ expectations, it is

critical for Internal Audit to understand cyber risks and be prepared to address the questions and concerns

(7)

What are we seeing?

1

Attack vector shifting from technology to people.

2

Attack patterns are increasingly starting to look like normal behavior. Threats are increasingly

hiding in plain sight. Some of the threats are adaptive and have the ability to go into dormant

mode, making them difficult to detect.

3

Criminals, state actors and even Hactivists are building better intelligence, capability and have a

wider network of resources than organizations (i.e., wideningcapability gap).

4

Supply chain and business partner poisoning or lateral entry are on the rise.

(8)

Incident patterns

of incidents can be

described by just

nine basic patterns

of incidents in an

industry can be

described by just

three of the nine

patterns

Card skimmers

Cyber-espionage

Physical theft/loss

Point-of-sale

intrusions

Miscellaneous errors

Web application

attacks

Everything else

Insider misuse

Crimeware

(9)

Cyber criminals

Hactivists (agenda driven)

Nation states

Malicious insiders

Rogue suppliers

Competitors

Skilled individual hacker

Sensitive data

Financial fraud

(e.g., wire transfer,

payments)

Business disruption

(building systems, etc.)

Threats to health & safety

Who might attack?

What are they after

and what key business

risks must we mitigate?

What tactics

might they use?

Spear phishing, drive by

download, etc.

Software or hardware

vulnerabilities

Third party compromise

Stolen credentials

Control systems

compromise

Ultimately cyber is about brand and reputation

with your tenants and investors

It starts by understanding your

organizational risk appetite

(10)

Cyber…

What is the actual threat?

Crime

Who

Did it?

Espionage

What

Did they see & take?

Warfare

When

Do we fight back?

Terrorism

Why

Did they do it?

(11)

Fulfill objective

Steal/damage/disrupt

Encrypt then exfiltrate data being stolen, stay hidden for long periods of time, erase digital footprint

Reconnaissance

Gain intelligence and identify vulnerabilities Research the internet, call call-centers, trawl social media etc.

Attack

Target identified vulnerabilities Targeted email attacks, unsuspecting downloads from malicious or compromised websites, exploit application or

infrastructure software vulnerabilities etc.

Exploit

Gain broad deep access

Escalate privileges, gain increased access, observe/control network or servers, increase sophistication of attacks, hide tracks, etc.

Strategic assets,

financial assets,

data & intelligence

Your

business

What

How

New technologies, new threats

(12)

Speed of attack is accelerating

Initial attack to initial

compromise takes place

within minutes

(almost 3 of 4 cases)

Data leaks occur

within minutes

(nearly half)

Discovery

takes

weeks or longer

Containment

(post-discovery)

requires

weeks or longer

72%

72%

59%

46%

(13)

Case study

JP Morgan Chase & Co.

*http://www.nytimes.com/2014/08/06/business/target-puts-data-breach-costs-at-148-million.html?_r=0

Victim timeline

Mid-June Mid-August Aug 27 Aug 28 Sept 11 Oct 2 Jan 08

Attacker timeline

JP learns of attack, closes all network access path

State attorneys seek information from JP about the breach

JP reports to US-SEC, reveals details of cyber-attack

News agencies report of FBI investigating the bank Attackers gain access to JP servers steals Personal information

JP says it isn't seeing “unusual fraud”

JP maintains the statement ‒ isn’t seeing any “unusual fraud activity”

(14)

Building a resilient

(15)

Build a resilient cyber security

organization

This means having the agility to prevent, detect and respond quickly and effectively, not

just to incidents, but also to the consequences of the incidents

Are controls in place to guard

against known and emerging

threats?

Can we detect malicious or

unauthorized activity, including

the unknown?

Can we act and recover quickly

to minimize impact?

Cyber governance

Cyber threat mitigation

Cyber threat intelligence

Cyber incident response

(16)

Changes in threat landscape versus

capability

C yb e r w ar far e

Behavioral analysis and machine learning model

Risk analytics (including BDSA) Signature based (e.g., correlation)

Conventional

(Conventional warfare, symmetric vectors)

Infrastructure threats

(Retail threats, open toolkits, general Botnet, Distributed denial of service) C onv e nt iona l w ar far e Guerilla

(Hide among civilians (hide in plain sight))

Targeted attacks

(Hide within business traffic))

Espionage

(Seek, analyze and exfiltrate)

Cyber-espionage

(Seek, analyze and exfiltrate)

(17)

Options

Building your defenses

(18)

Benefits and challenges

Operating model

Maintain and enhance existing

use cases

Resourcing required to operate

three shifts

Industry and business alignment

Level one monitoring

and management

Limited threat intelligence

gathering

Hardware, build, run and maintain

costs

Alignment of use cases

to evolving threat landscape

Round the clock monitoring,

management and incident response

Industry and risk profile alignment

Level one, two and three

monitoring and management

Proactive cyber threat intelligence

Cloud based service –

utility based costing

Alignment of use cases

to evolving threat landscape

Round the clock monitoring,

management and incident response

Business

, industry and

risk profile alignment

Level one

, two and three

monitoring and management

Proactive cyber threat intelligence

Hardware, build, run

and maintain costs

(19)

An internal audit

approach

(20)

V

ig

ila

n

t

• Incident response and forensics • Application security testing • Threat modeling and intelligence • Security event monitoring and logging • Penetration testing

• Vulnerability management

Threat and vulnerability management

• Information gathering and analysis around: – User, account, entity

– Events/incidents

– Fraud and anti-money laundering – Operational loss

Risk analytics • Data classification and inventory

• Breach notification and management • Data loss prevention

• Data security strategy

• Data encryption and obfuscation • Records and mobile device management

Data management and protection

R

esi

li

en

t

• Recover strategy, plans & procedures • Testing & exercising

• Business impact analysis • Business continuity planning • Disaster recovery planning

Crisis management and resiliency

• Security training • Security awareness • Third-party responsibilities

Security awareness and training • Change management

• Configuration management • Network defense

• Security operations management • Security architecture Security operations

Se

c

u

re

• Compliance monitoring

• Issue and corrective action planning • Regulatory and exam management

• Risk and compliance assessment and mgmt. • Integrated requirements and control framework

Cybersecurity risk and compliance management

• Evaluation and selection • Contract and service initiation • Ongoing monitoring

• Service termination

Third-party management

• Security direction and strategy

• Security budget and finance management • Policy and standards management • Exception management

• Talent strategy

Security program and talent management

• Account provisioning • Privileged user management • Access certification

• Access management and governance Identity and access management • Secure build and testing

• Secure coding guidelines • Application role design/access • Security design/architecture • Security/risk requirements

Secure development life cycle

• Information and asset classification and inventory • Information records management

• Physical and environment security controls • Physical media handling

Information and asset management

An assessment of the organization’s cybersecurity should evaluate specific

capabilities across multiple domains

(21)

V

ig

ila

n

t

• Incident response and forensics • Application security testing • Threat modeling and intelligence • Security event monitoring and logging • Penetration testing

• Vulnerability management

Threat and vulnerability management

• Information gathering and analysis around: – User, account, entity

– Events/incidents

– Fraud and anti-money laundering – Operational loss

Risk analytics • Data classification and inventory

• Breach notification and management • Data loss prevention

• Data security strategy

• Data encryption and obfuscation • Records and mobile device management

Data management and protection

R

esi

li

en

t

• Recover strategy, plans & procedures • Testing & exercising

• Business impact analysis • Business continuity planning • Disaster recovery planning

Crisis management and resiliency

• Security training • Security awareness • Third-party responsibilities

Security awareness and training • Change management

• Configuration management • Network defense

• Security operations management • Security architecture Security operations

Se

c

u

re

• Compliance monitoring

• Issue and corrective action planning • Regulatory and exam management

• Risk and compliance assessment and mgmt. • Integrated requirements and control framework

Cybersecurity risk and compliance management

• Evaluation and selection • Contract and service initiation • Ongoing monitoring

• Service termination

Third-party management

• Security direction and strategy

• Security budget and finance management • Policy and standards management • Exception management

• Talent strategy

Security program and talent management

• Account provisioning • Privileged user management • Access certification

• Access management and governance Identity and access management • Secure build and testing

• Secure coding guidelines • Application role design/access • Security design/architecture • Security/risk requirements

Secure development life cycle

• Information and asset classification and inventory • Information records management

• Physical and environment security controls • Physical media handling

Information and asset management

* The Deloitte cybersecurity framework is aligned with industry standards and maps to NIST, ISO, COSO, and ITIL.

Certain cybersecurity domains may be partially covered by existing IT audits,

however many capabilities have historically not been reviewed by internal audit

Cyber risk ‒ Deloitte cybersecurity framework* (cont’d)

(22)

Phase IV: Gap

assessment and

recommendations

Assessment approach

Cyber risk

An internal audit assessment of cybersecurity should cover all domains and

relevant capabilities, and involve subject matter specialists when appropriate

Phase III: Risk

assessment

Phase II: Understand

current state

Phase I: Planning and

scoping

P

h

ase

K

e

y

act

iv

it

ies

el

iv

er

ab

les

Activities:

• Identify specific internal and external stakeholders: IT, Compliance, Legal, Risk, etc. • Understand organization mission

and objectives

• Identify industry requirements and regulatory landscape

• Perform industry and sector risk profiling (i.e., review industry reports, news, trends, risk vectors)

• Identify in-scope systems and assets

• Identify vendors and third-party involvement

Activities:

• Conduct interviews and workshops to understand the current profile • Perform walkthroughs of in-scope

systems and processes to understand existing controls • Understand the use of third-parties,

including reviews of applicable reports

• Review relevant policies and procedures, including security environment, strategic plans, and governance for both internal and external stakeholders

• Review self assessments • Review prior audits

Activities:

• Document list of potential risks across all in-scope capabilities • Collaborate with subject matter

specialists and management to stratify emerging risks, and document potential impact • Evaluate likelihood and impact of

risks

• Prioritize risks based upon organization’s objectives, capabilities, and risk appetite • Review and validate the risk

assessment results with

management and identify criticality

Activities:

• Document capability assessment results and develop assessment scorecard

• Review assessment results with specific stakeholders

• Identify gaps and evaluate potential severity

• Map to maturity analysis • Document recommendations • Develop multiyear cybersecurity/IT

audit plan

Deliverable:

• Assessment objectives and scope • Capability assessment scorecard

framework

Deliverable:

• Understanding of environment and current state

Deliverable:

• Prioritized risk ranking • Capability assessment findings

Deliverables:

• Maturity analysis • Assessment scorecard • Remediation recommendations • Cybersecurity audit plan

(23)

Maintaining and enhancing security capabilities can help mitigate cyber threats

and help the organization to arrive at its desired level of maturity

Cyber risk ‒ Assessment maturity analysis

Cybersecurity domain

Cybersecurity risk and compliance mgmt.

Third-party management

Secure development life cycle

Information and asset management

Security program and talent management

Identity and access management

Threat and vulnerability management

Data management and protection

Risk analytics

Crisis management and resiliency

Security operations

Security awareness and training

Initial

Managed

Defined

Predictable

Optimized

Current state CMMI maturity*

Maturity analysis

• Recognized the issue • Ad-hoc/case by case • Partially achieved goals • No training, communication, or

standardization

• Process is managed • Responsibility defined • Defined procedures with

deviations • Process reviews

• Defined process

• Communicated procedures • Performance data collected • Integrated with other

processes

• Compliance oversight

• Defined quantitative performance thresholds and control limits • Constant improvement

• Automation and tools implemented • Managed to business objectives

• Continuously improved • Improvement objectives

defined

• Integrated with IT • Automated workflow • Improvements from new

technology

Stage 1: Initial Stage 2: Managed Stage 3: Defined Stage 4: Predictable Stage 5: Optimized

*The industry recognized Capability Maturity Model Integration (CMMI) can be used as the model for the assessment. Each domain consists of specific capabilities which are assessed and averaged to calculate an overall domain maturity.

S

ecu

re

V

ig

ila

n

t

R

e

s

ilie

n

t

(24)

A scorecard can support the overall maturity assessment, with detailed cyber

risks for people, process, and technology. Findings should be documented and

recommendations identified for all gaps

Cyber risk ‒ Assessment scorecard

Threat and vulnerability management—Penetration testing

Area Findings Ref. Recommendations Ref.

People

• The organization has some resources within the ISOC that can conduct penetration testing, but not on a routine basis due to operational constraints and multiple roles that those resources are fulfilling

2.6.4

• The organization may find it of more value and cost benefit to utilize current resources to conduct internal penetration testing on a routine and dedicated basis since they do have individuals with the necessary skills to perform this duty.

2.6.4

Process

• The organization has limited capability to conduct penetration testing in a staged environment or against new and emerging threats

2.6.5

• The organization should expand its penetration testing capability to include more advance testing, more advanced social engineering, and develop greater control over the frequency of testing

2.6.5

Technology

• The organization lacks standard tools to perform its own ad-hoc and on-the-spot penetration tests to confirm or support potential vulnerability assessment alerts and/or incident investigation findings.

2.6.6

• Either through agreement with a third-party vendor, or through technology acquisition, develop the technology capability to perform out of cycle penetration testing.

2.6.6

Capability assessment findings and recommendations

Cybersecurity domain

Cybersecurity risk and compliance mgmt.

Third-party management

Secure development life cycle

Information and asset management

Security program and talent management

Identity and access management

Threat and vulnerability management

Data management and protection

Risk analytics

Crisis management and resiliency

Security operations

Security awareness and training

Assessment scorecard S ecu re V ig il a n t R esi li en t

People Process Technology

(25)

A cybersecurity assessment can drive a risk-based IT internal audit plan. Audit

frequency should correspond to the level of risk identified, and applicable

regulatory requirements/expectations.

Internal Audit

FY 2015

FY 2016

FY 2017

Notes (representative)

SOX IT General

Computer Controls

X

X

X

Annual requirement but only covers

financially significant systems and

applications

External Penetration and

Vulnerability Testing

X

X

X

Cover a portion of IP addresses each year

Internal Vulnerability Testing

X

Lower risk due to physical access controls

Business Continuity

Plan/Disaster Recovery Plan

X

X

Coordinate with annual 1

st

and 2

nd

line of

defense testing

Data Protection and

Information Security

X

Lower risk due to …

Third-party Management

X

Lower risk due to …

Risk Analytics

X

X

X

Annual testing to cycle through risk areas,

and continuous monitoring

Crisis Management

X

X

Cyber war gaming scenario planned

Social Media

X

Social media policy and awareness program

Data Loss Protection (DLP)

X

Shared drive scan for SSN/Credit Card #

Cyber risk

(26)
(27)

Key considerations

1.

Know your crown jewels – not just what you want to protect,

but what you need to protect

2.

Know your friends – contractors, vendors and suppliers can be security allies or liabilities

3.

Understand the threat landscape and assess incremental threat scenarios that expose your

organization to risk

4.

Assess controls and Identify gaps in policies, standards, processes, metrics and reporting, etc.

5.

Maintain “cyber security” as an organizational priority and standing agenda item in audit

committee updates

6.

Apprise the Audit Committee of key risks, enterprise level risk trends related to cyber security

7.

Make awareness a priority within every internal department

and among external partners

8.

Fortify and monitor – situational awareness, diligently gather intelligence, build, maintain and

proactively monitor

(28)

For more information

If you would like more information on cyber security or how Deloitte can help your organization, please

contact one of the following professionals:

Nick Galletto

Americas Cyber Risk Leader

Deloitte

416-601-6734

ngalletto@deloitte.ca

Michael Juergens

Managing Principal | IT Internal

Audit

Deloitte

213-688-5338

(29)

Deloitte IT internal audit

Cyber risk

Leading cybersecurity risk management services ‒ Specifically suited to collaborate with you

Number 1 provider of cyber risk management solutions

The only organization with the breadth, depth, and insight to help

complex organizations become secure, vigilant, and resilient

1000+ cyber risk management projects in the U.S. alone in 2014

executed cross industry

11,000 risk management and security professionals globally across

the Deloitte Touche Tohmatsu Limited network of member firms

Contributing to the betterment of cyber risk management

practices

Assisted National Institute of Standards and Technology in

developing their cybersecurity framework in response to the 2013

Executive Order for Improving Critical Infrastructure Cybersecurity

Third-party observer of the Quantum Dawn 2 Cyber Attack

Simulation, conducted by the Securities Industry and Financial

Markets Association in July 2013

Working with government agencies on advanced threat solutions

Named as a Kennedy Vanguard Leader in cyber security consulting: “[Deloitte] continually develops, tests, and launches methodologies that

reflect a deep understanding of clients’ cyber security and help the firm… set the bar.”

Source: Kennedy Consulting Research & Advisory; Cyber Security Consulting 2013; Kennedy Consulting Research & Advisory estimates © 2013

Kennedy Information, LLC. Rreproduced under license.

“Deloitte’s ability to execute rated the highest of all the participants”

Forrester Research, “Forrester Wave

TM

: Information Security Consulting Services Q1 2013”, Ed Ferrara and Andrew Rose, February 1, 2013

The right resources at the right time

Deloitte has provided IT audit services for the past 30 years and IT audit

training to the profession for more than 15 years. Our professionals

bring uncommon insights and a differentiated approach to IT auditing,

and we are committed to remaining an industry leader.

We have distinct advantages through:

− Access to a global team of IA professionals, including IT subject

matter specialists in a variety of technologies and risk areas

− A responsive team of cyber risk specialists with wide-ranging

capabilities virtually anywhere in the world, prepared to advise as

circumstances arise or as business needs change

− A differentiated IT IA approach that has been honed over the years in

some of the most demanding environments in the world, with tools

and methodologies that help accelerate IT audit

− Access to leading practices and the latest IT thought leadership on

audit trends and issues

(30)

www.deloitte.ca

Deloitte, one of Canada's leading professional services firms, provides audit, tax, consulting, and financial advisory services. Deloitte LLP, an Ontario limited liability partnership, is the Canadian member firm of Deloitte Touche Tohmatsu Limited.

http://www.ibj.com/lilly-employees-stole-55-million-in-trade-secrets-indictment-alleges/PARAMS/article/43949 http://www.nytimes.com/2014/03/14/business/target-missed-signs-of-a-data-breach.html?_r=0 http://www.nytimes.com/2012/07/27/us/cyberattacks-are-up-national-security-chief-says.html?_r=0 www.deloitte.com/us/about

References

Related documents

A problem which remains in conventional small core DCF is that the nonlinearities such as Self Phase Modulation (SPM), Stimulated Raman Scattering (SRS), Stimulated

In particular, the goal is to construct a data structure that allows to support the following scenario: after every database update, the data structure can be updated in constant

If in Movable signs, you should move the Moon to a sensitive zone (Don’t move the ascendant as said above). If it is a fixed sign depositor, move the Sun and forget about the Moon.

Contingency Planning Configuration Management Incident Management Access Control Threat Management Asset Protection Security Disciplines Threat Management.. Below is a sample

Threat Intelligence Policy Control and Management Security Information and Event Management SDN Services Web App Security Secure Applications Application Use and Content Management

Rewrite the sentences by replacing the underlined word or phrase with the correct form of the appropriate phrasal verb:3. Procedures are in place to handle charges of discrimination

Wife’s evidence included a return of service indicating that the amended show cause order and sworn petition were served on husband’s mother-in-law at the Washington address

Knowing that the cart is initially at rest and can roll freely, determine (a) the final velocity of the cart, (b) the impulse exerted by the cart on the package, and (c)