• No results found

IT Trends and the Cyber Security Agenda

N/A
N/A
Protected

Academic year: 2021

Share "IT Trends and the Cyber Security Agenda"

Copied!
31
0
0

Loading.... (view fulltext now)

Full text

(1)

State of the States:

State of the States:

IT Trends and the Cyber

Security Agenda

Executive Policy Forum on

Cyber and Electronic Crime

Cyber and Electronic Crime

NGA Center for Best Practices September 9, 2008

Doug Robinson Executive Director

NASCIO NASCIO

(2)

About NASCIO

ƒ

NASCIO represents state chief

information officers and information

information officers and information

technology executives from the

states, territories and D.C.

,

ƒ

NASCIO's mission is to foster

t ll

th

h

government excellence through

quality business practices,

information management and

information management, and

technology policy.

(3)

Mission

NASCIO's mission is to foster government excellence

through quality business practices, information

management, and technology policy.

Goals

ƒ

NASCIO is the premier network and resource

for state CIOs

for state CIOs

ƒ

Advance state CIOs as key members of the

leadership team

leadership team

ƒ

NASCIO is a effective advocate for information

technology policy at all levels of government

(4)

State IT Landscape Today

ƒ Continued consolidation – infrastructure, services and

people

ƒ Cyber security: Government At Risk!

ƒ Critical infrastructure protection – uneven investments

ƒ Ramifications of data breach and citizen trusta cat o s o data b eac a d c t e t ust

ƒ Insider threats and employee training

ƒ State IT workforce: retirement wave, IT skills gap,

challenge of recruiting challenge of recruiting

ƒ Data management: quality and sharing

ƒ Impact from federal laws, changing programs and

unfunded mandates: REAL ID, Medicaid, Homeland Security

(5)

Multifaceted Role of the State CIO

C B d Cross Boundary Collaboration Customer Service Manage, Deploy,

and Develop State IT Resources Enterprise Architecture Frontline in Securing State IT Assets

State CIO

State CIO

Strategic Planning Legislation, Policy and Directives

State CIO

State CIO

Procurement State IT Governance Provision of State IT Infrastructure

(6)

Challenges of State CIOs

Challenges of State CIOs

ƒ

Bringing the focus to the “enterprise”

Bringing the focus to the enterprise

ƒ

Collaborating across and beyond government

ƒ

State IT workforce – skills and demands

ƒ

State IT workforce skills and demands

ƒ

Facilitating efficient, safe exchange of data

ƒ

Managing risks cyber security

ƒ

Managing risks – cyber security

ƒ

Building relationships

in the face of change

in the face of change

ƒ

Managing and cultivating

funding

(7)

State CIO Priorities: 2008

1. Consolidation: centralizing, consolidating services, operations,

resources, infrastructure

2. Security: Tightening security safeguards, enterprise policies,

2. Security: Tightening security safeguards, enterprise policies,

3. Disaster Recovery: Improving disaster recovery, business

continuity planning and readiness

4. Electronic Records Management/Digital Preservation/E-discovery: strategies, policies, services

5. Health Information Technology: Assessment, partnering

5. Health Information Technology: Assessment, partnering

6. Shared Services: Sharing resources, services, infrastructure

7. Connectivity: Strengthening statewide connectivity, broadband

8 Governance: Improving IT governance

8. Governance: Improving IT governance

9. Interoperability: infrastructure and data

10. Human Capital/IT Workforce: attracting, developing and retaining

IT l ti l i

IT personnel, retire wave planning

(8)

State CIO: IT and Solution Priorities

:

1. Virtualization – computing and storage

2. Security enhancement tools

3. GIS and spatial analysis

4 L g d i ti d g d

4. Legacy modernization and upgrades

5. Identity Access and Management (IAM)

6 Networking voice and data communications

6. Networking, voice and data communications

7. Document/Content management

8. Wireless: Mobile, remote and fixed wireless,

9. Service Oriented Architecture (SOA) and web services

(9)

States Adopting More Business

Di i li

i IT t M

Ri k

Disciplines in IT to Manage Risk

ƒ

Enterprise architecture: blueprint for better

government

ƒ

Organizational Transformation / Change

Management

ƒ

Enterprise Governance - Series

ƒ

Project and Portfolio Management

ƒ

Service Oriented Enterprise

ƒ

Service level management

(10)

Disaster Recovery & Business Continuity

ƒ

Government at Risk: critical

infrastructure protection

ƒ

Aging state data centers

ƒ

Critical business recovery

ƒ

No state ready for pandemic

y

p

ƒ

IT resiliency and the continuity of

government

g

ƒ

CIO challenge: making the business

case for the investment

(11)

Facing the IT Workforce Challenge

ƒ

Over 27% of state IT

workforce will be

workforce will be

eligible to retire in 5

years

y

ƒ

Who will actually

retire and when?

ƒ

How best to address

the skills gap?

ƒ

Best practices for

recruiting and

kf

(12)

Cyber Security and the States

ƒ

Critical infrastructure protection

ƒ

Spam hacking spyware malware

ƒ

Spam, hacking, spyware, malware,

phishing and probes up!

ƒ

More aggressive threats

ƒ

More aggressive threats –

organized criminal activity

I id h

i REAL!

ƒ

Insider threat is REAL!

ƒ

Growing role of state CISO

(13)

The Insider Threat is REAL!

The Insider Threat is REAL!

ƒ

IT security incidents:

IT security incidents:

61% caused by

insiders

ƒ

Employee awareness

and education is

critical

ƒ

Asset management

d d

i

(14)

Why Worry?

Data breach at Progressive highlights

Why Worry?

insider threat (April 06, 2006)

• An employee at Progressive Casualty Insurance Co • An employee at Progressive Casualty Insurance Co.

wrongfully accessed information on foreclosure

properties she was interested in buying. Progressive officials today confirmed that the company sent out officials today confirmed that the company sent out letters in January to 13 people informing them that confidential information, including names, Social

Security numbers birth dates and property addresses Security numbers, birth dates and property addresses had been wrongfully accessed by an employee who has since been fired.

(15)

Why you should worry…

Gap security breach exposes data on 800,000 Gap security breach exposes data on 800,000 (September 28, 2007)

• A laptop containing the personal information of job applicants was stolen from third-party vendor that

manages job applicant data for Gap. Personal data for approximately 800,000 people who applied online or by approximately 800,000 people who applied online or by phone for store positions at one of Gap Inc.’s brands

between July 2006 and June 2007 was contained on the stolen laptop

(16)

Consequences are real…

Company Says Worker Stole, Sold Data (July 3, 2007)

• Fidelity National Information Services reported a k t f it b idi i t l 2 3 illi worker at one of its subsidiaries stole 2.3 million

consumer records containing credit card, bank account

and other personal information. The database p

administrator sold the information to an unidentified data broker, who sold some of it to direct marketing

i companies.

(17)

Loss of property…

Angry Employee Deletes All of Company's Data Angry Employee Deletes All of Company s Data (January 24, 2008)

When Marie Lupe Cooley, 41, of Jacksonville, Fla., saw a help-wanted ad in the newspaper for a position that

looked suspiciously like her current job she assumed she was about to be fired. So, police say, she went to the was about to be fired. So, police say, she went to the architectural office where she works late Sunday night and erased 7 years' worth of drawings and blueprints, estimated to be worth $2 5 million

(18)

Loss of trust…

Sensitive data loss soars (July 11, 2007)

• The number of Ohio taxpayers whose personal

i f ti t l t t d t d i h

information was on a stolen state data device has more than tripled, climbing to 800,000, Gov. Ted Strickland

announced. The names and Social Security numbers of y

561,126 taxpayers were recently discovered as officials continue to review a copy of the data cartridge stolen from a state intern's car on June 10

(19)

Loss of sensitive data…

Personal information of 30 000 patients

Personal information of 30,000 patients

available online for month (August 11, 2007)

• Patient records were available by web search during a Patient records were available by web search during a four-week period after Sky Lakes Medical Center

(Oregon) shut down its online bill-payment system, and a third party Verus Inc transferred the data from

a third-party, Verus, Inc., transferred the data from one server to another to perform maintenance. The hospital terminated its contract with Verus and shut down the system.

(20)

Corporate liability…

AG Announces Data Breach At New York Bank

AG Announces Data Breach At New York Bank

(May 21, 2008)

• Attorney General Richard Blumenthal today announced • Attorney General Richard Blumenthal today announced

that a storage company for a New York bank lost an unencrypted backup tape containing Social Security

b d b k f b l

numbers and bank account information belonging to as many as hundreds of thousands of Connecticut

consumers and personal information of millions more p

(21)

Government sabotage…

San Francisco officials locked out of computer

San Francisco officials locked out of computer

network (July 15, 2008)

• A disgruntled city computer engineer has virtually • A disgruntled city computer engineer has virtually

commandeered S.F's new multimillion-dollar computer network, altering it to deny access to top administrators

h it i j il $5 illi b il th iti id even as he sits in jail on $5 million bail, authorities said. One official said he had been disciplined on the job in recent months for poor performance and that his p p

(22)

Don’t be a news story…

(23)

The IT Threat Landscape

The IT Threat Landscape

Theft

INTERNAL THREATS EXTERNAL THREATS

Negligent employees Theft Hackers Competitors Business Partners Contractors Fraud Sabotage Lack of compliance Criminals Contractors Ex-employees Terrorists

(24)

Why Insider Threat is Worse

Why Insider Threat is Worse

• Insiders have characteristics that

outsiders don’t: knowledge, access and

trust

• Insider threats are the easiest to

perpetrate, most difficult to prevent,

p p

,

p

,

possibly hardest to detect

• Not just about technology! Effective

Not just about technology! Effective

solution must involve people, process and

technology

(25)
(26)

CERT Insider Threat Analysis

CERT Insider Threat Analysis

ƒ

Studied 250 insider threat cases between

Studied 250 insider threat cases between

1996 - 2007

ƒ

30 percent were IT sabotage cases

ƒ

30 percent were IT sabotage cases

ƒ

Most were premeditated attacks

id tifi bl b d fl b h i

identifiable by red-flag behavior

ƒ

30 percent of the attackers had been

arrested previously

Source: Carnegie Mellon Software Engineering Institute's Computer Emergency Response g g g p g y p Team, 2008.

(27)

Top Five Insider Threats

Top Five Insider Threats

PEOPLE

1 Malicious employees: sabotage theft fraud

1. Malicious employees: sabotage, theft, fraud

2. Inattentive, complacent or untrained

employees

p y

3. Contractors, partners and outsourced services

PROCESS

4 I d

t IT

it

li

i ht

4. Inadequate IT security compliance, oversight,

authority and training

TECHNOLOGY

TECHNOLOGY

5. Pervasive computing – technology is

everywhere and data is on the move

(28)

Reduce Your Risk: Prevention

Reduce Your Risk: Prevention

• #1 – Security Awareness and Training!

• #1 Security Awareness and Training!

• Periodic risk assessment

Ali

i h li

• Align process with policy

• Employee behavior – stress?

• Disgruntled, demoted or fired employees

• Enforce compliance – Trust but Verify

• Enforce compliance Trust, but Verify

• Social engineering – “No Tech Hacking”

(29)

Practical Steps to Reduce Risk

Practical Steps to Reduce Risk

• Strict password & account management

Strict password & account management

• Secure your data on the move – laptops,

PDAs, USB drives

PDAs, USB drives

• Create a data retention plan

• Enforce separation of duties

• Enforce separation of duties

• Wall off data – least access

M it t

l g l id

• Monitor event logs – early evidence

(30)

Cyber Security and State CIOs:

ƒ

Complexity of data protection the

A View Forward

ƒ

Complexity of data protection – the

need for classification policies

Th

l

t f d t b

h

ƒ

The real cost of data breaches

ƒ

Stiff competition for state funding

ƒ

Growing world without wires

ƒ

Millennials as citizens and in

Millennials as citizens and in

the workforce

(31)

Doug Robinson

Doug Robinson

Executive Director

www nascio org

www.nascio.org

References

Related documents

Minulla on kiire.. clause); still (posit. iltapäivällä = in the afternoon, p.m.. sentence); yet (in

To measure performance of Indian police we estimated output distance function using SFA which provides the estimates of technical efficiency and analyse its determinants in

See Z ARATE , supra note 1, at xi (characterizing financial warfare as one “defined by the use of financial tools, pressure, and market forces to lever- age the banking

The subjective state space system (16)-(19) together with the formulas for yields from the term structure model implies a VAR in (i) the real return on the short bond, (ii)

 Like Data Sets, Programs in DHIS2 refers to the groups of data elements used for a particular medical service per individual patient or events and will appear in the Event

The State CIO shall set technical standards for information technology, review and approve major information technology projects, review and approve State agency

The CIO Executive Council’s “Future State of the CIO” report from December 2010 stated: “The Future-State CIO® will not only be accountable for IT function

CFO, CTO,CIO CIO,CTO,CISO CIO,CTO, CISO General Auditor CIO,CTO, CISO Security Strategy Security Governance & Control Business Continuity Management Architecture