SecurityRoundTable.org https://www.securityroundtable.org Security Round Table Wed, 20 Sep 2017 10:57:11 +0000 en-US 1.2 https://www.securityroundtable.org https://www.securityroundtable.org 6 7 10 1 3 31 https://wordpress.org/?v=4.7.6 What Target Is Teaching Shareholders About Breaches https://www.securityroundtable.org/what-target-is-teaching-shareholders-about-breaches/ Thu, 08 Oct 2015 21:52:53 +0000 https://www.securityroundtable.org/?p=571 Shareholders care about breaches Are shareholders apathetic about data breaches? Some reports equate the lack of sharp, downward stock movements in the wake of disclosures of hacks or other data breaches (or quick rebounds from such price drops when they occur) with share- holders apathy over cybersecurity prob- lems. In a recent Harvard Business Review article (Why Data Breaches Don't Hurt Stock Prices, March 31, 2015), cybersecurity strategist Elena Kvochko and New York Times Chief Technology Officer Rajiv Pant dismiss this easy explanation. They argue that muted stock price reactions to data breaches reflect the absence of timely information and quality tools to price cyber risk:"Shareholders still don't have good metrics, tools, and approaches to measure the impact of cyber attacks on businesses and translate that into a dollar value . . . The long and mid-term effects of lost intellectual property, disclosure of sensitive data, and loss of customer confidence may result in loss of market share, but these effects are difficult to quantify." Faced with this information vacuum, Kvochko and Pant noted that "shareholders only react to breach news when it has direct impact on business operations, such as litigation charges (for example, in the case of Target) or results in immediate changes to a company's expected profitability." Indeed, stock prices may not tell the whole story. Contrary to the conventional wisdom, recent survey data show investors understand the long-term risks stemming from hacks and they may actually shy away from investing in companies with multiple breaches. A recent survey- conducted by FTI Consulting on behalf of consulting giant KPMG LLP-of more than 130 global institutional investors with an estimated $3 trillion under management found that cyber events may affect investors' confidence in the board and demand for the affected companies' shares. Investors opined that less than half of boards of the companies that they currently invest in have adequate skills to manage rising cyberthreats. They also believe that 43 percent of board members have "unac- ceptable skills and knowledge to manage innovation and risk in the digital world." More ominously for boards, four of five investor respondents (79 percent) suggested that they may blacklist stocks of hacked firms. As for a remedy, 86 percent of the surveyed investors told KPMG and FTI that they want to see increases in the time boards spend on addressing cyber risk. For more on how boards should plan for stronger cyber governance, download your copy of Navigating the Digital Age. Get the book here.]]> 571 0 0 0 It's Time To Get Serious About Securing the Internet of Things https://www.securityroundtable.org?p=575&preview=true&preview_id=575 Fri, 09 Oct 2015 13:38:32 +0000 https://www.securityroundtable.org/?p=575 In the time it takes you to read this sentence-about eight second-approximately 150 new devices will have been added to the Internet of Things (IoT). That's 61,500 new devices per hour, 1.5 million per day. There are currently about 7.4 billion devices connected to the IoT, more than there are human beings on the planet. By 2020, according to Gartner, there will be 26 billion. Cisco puts the number at 50 billion, and Morgan Stanley says it will be 75 billion. By any estimation, it will be a lot more devices than are in existence today.

People are beginning to notice this phenomenal rate of growth, and some companies are seeing incredible economic opportunities. However, the fact that the field has grown so quickly and so dynamically means that some of the lessons we've learned in the past about security and privacy are not being employed-in the interest of first-to- market opportunities-and the lack of oversight has many wondering about the unknown unknowns. The lack of recognition about the seriousness of this threat to companies and governments leads to a lack of security sufficient to defend against attacks.

The U.S. Congress, since 2012, has proposed more than 100 pieces of legislation related to Internet security and privacy. Only a couple were actually signed into law, but continuing security incidents, such as the breach of Sony's network and subsequent hostage-taking of one of its movies, have created greater awareness of security issues that will surely prompt more attempts at legislation and regulation. In fact, as of this writing, at least 10 pieces of legislation are being considered on Capitol Hill. In its report, the FTC endorsed strong, flexible, and technology-neutral general legislation but added that IoT-specific legislation would be premature, as the field is still in its early stages of development. They would prefer to see industry adopt self-regulatory practices.

At the corporate or company level, though, there is much decision makers can do now to address security and privacy concerns. Much of that involves adopting a forward-thinking attitude about the IoT and its role.

First is to understand that the IoT is not a possibility or a projection of the future-it is a reality. It is here now and will only continue to grow and affect every facet of our world.

The IoT carries with it many risks and challenges; it's the companies and organizations that address those issues head on that will survive. Conventional approaches to network security will likely have to be rethought.

Companies and organizations should stay up to date with evolving vulnerability assessments and advancements in security solutions. This also applies to administrators and executives, who should become fluent in the language that describes IoT capabilities, trends, and risks so that they can make more relevant and responsive decisions for their shareholders and customers. Administrators should attend conferences and industry events when possible as well.

Here is what we should consider now:

  • Standardization of security protocols in the IoT space must be made an industry- wide priority.
  • When breaches to networks do occur, it's important to notify consumers quickly so that they can protect themselves from the misuse of their data.
  • Such breaches should also prompt industry-coordinated action to address the vulnerabilities exposed and propagate industry standards.
  • Companies can give themselves some degree of protection also by entering into legal agreements with IoT vendors to provide adequate, tested, and updated security measures and to guard against the unauthorized access of sensitive information.

Remember that IoT security is not a battle that can be won and left behind. It is a war that will be fought for the foreseeable future-the proverbial marathon versus a sprint.

Keep in mind also that the IoT challenges we face mean a tremendous opportunity for fresh thinking. The future of the Internet, which carries with it the future of our world, is ours for the making. If you've read Isaac Asimov, you know that he was visionary about the future of technology. In his science fiction composed in the 1940s, he wrote, "No sensible decision can be made any longer without taking into account not only the world as it is, but the world as it will be."

That realization is more important now than ever before because someday soon we'll almost certainly ask why things aren't connected to the Internet rather than why they are connected.

Download your copy of Navigating the Digital Age to learn more about IoT, mobile security and the prevention of advanced cyber threats. Get the book here.

]]>
575 0 0 0
5 Strategic Tips for Purchasing Cybersecurity Insurance https://www.securityroundtable.org/5-strategic-tips-for-purchasing-cybersecurity-insurance/ Fri, 09 Oct 2015 13:36:43 +0000 https://www.securityroundtable.org/?p=579 1. Adopt a team approach. Successful placement of cybersecurity insurance coverage is a collaborative undertaking. Because of the nature of the product and the risks that it is intended to cover, successful placement requires the involvement and input not only of a capable risk management department and a knowledgeable insurance broker but also of in-house legal counsel and IT professionals, resources, and compliance personnel-and experienced insurance coverage counsel. 2. Understand risk profile and tolerance. A successful insurance placement is facilitated by having a thorough understanding of an organization's risk profile, including the following:
  • The scope and type of data maintained by the company and the location and manner in which, and by whom, such data are used, transmitted, handled, and stored
  • The organization's network infrastructure
  • The organization's cybersecurity, privacy, and data protection practices
  • The organization's state of compliance with regulatory and industry standards
  • The use of unencrypted mobile and other portable devices.
Many other factors may warrant consideration. When an organization has a grasp on its risk profile, potential exposure, and risk tolerance, it is well positioned to consider the type and amount of insurance coverage that it needs to adequately respond to identified risks and exposure. 3. Ask the right questions. It is important to carefully evaluate the coverage under consideration, from cyberterrorism to excluding the acts of "rogue employees" and excluding the use of unencrypted devices. In all cases, the organization should request a retroactive date of at least 1 year prior to the policy inception, given that advanced attacks go undetected for a median of 229 days. 4. Beware the fine print. Like any other insurance policy, cybersecurity insurance policies contain exclusions that may significantly curtail and undermine the purpose of the coverage. Some insurers, for example, may insert exclusions based on purported shortcomings in the insured's security measures. One case recently filed in the California federal court on May 7, 2015, highlights the problems with these types of exclusions. The case is Columbia Casualty Company v. Cottage Health System, in which Columbia Casualty, CNA's non-admitted insurer, seeks to avoid coverage under a cybersecurity insurance policy for the defense and settlement of a data breach class action lawsuit and related regulatory investigation. CNA relies principally upon an exclusion, entitled "Failure to Follow Minimum Required Practices," which purports to void coverage if the insured fails to "continuously implement" certain aspects of computer security. These types of broadly worded, open-ended exclusions can be acutely problematic and impracticable. If enforced literally, they may vaporize the coverage that the policy is intended to provide. The good news is that, although certain types of exclusions are unrealistic given the nature of the risk an insured is attempting to insure against, cybersecurity insurance policies are highly negotiable. It is possible to cripple inappropriate exclusions by appropriately curtailing them or to entirely eliminate them-and often this does not cost additional premium. 5. Pay attention to the application. CNA in the Columbia Casualty case also seeks to deny coverage based upon alleged misrepresentations contained in the insured's insurance application relating to the risk controls. The important takeaway is that cybersecurity insurance applications can, and usually do, contain a myriad of questions concerning an organization's cybersecurity and data protection practices, seeking detailed information surrounding technical, complex subject matter. These questions are often answered by technical specialists who may not appreciate the nuances and idiosyncrasies of insurance coverage law. For these reasons, it is advisable to have insurance coverage counsel involved in the application process. Learn more about cybersecurity insurance and what to look for by downloading your copy of Navigating the Digital Age. Get the book here.]]>
579 0 0 0
How To Thrive In An Evolving Cyber Threat Environment https://www.securityroundtable.org/how-to-thrive-in-an-evolving-cyber-threat-environment/ Fri, 09 Oct 2015 13:39:33 +0000 https://www.securityroundtable.org/?p=581
  • Enterprise IT: the back-end technology infrastructure that facilitates company- wide communications; processes, stores corporate, and transfers data; and enables workforce mobility
  • Supply chain: the flow of materials and components (hardware and software) through inbound channels to the enterprise, where they are then operationalized or used in the development of products and services
  • Product/service development: the research, design, testing, and manufacturing environments for your products and services
  • Customer experience: the operational realms where customers use and interact with your products or services
  • External influencers: all external entities that affect how you guide your business to include regulators, law enforcement, media, competitors, and customers.
  • A cybersecurity strategy at this scale requires enterprise-wide collaboration. It will take the whole organization to manage cyber risk, so it is imperative to cast a wide net and include representatives from across business units in strategy formulation dis-cussions. It requires a multidisciplinary team effort to develop a security strategy that reflects the scale and complexity of the business challenge. Elements of cyber strategy at scale Building a cybersecurity strategy can seem overwhelming, but it doesn't have to be. Start with a vision, understand the risk, identify controls, and build organizational capacity. Every element builds on each other. Set a vision: It all starts with a creative vision. It's critical to paint a high-level landscape of the future that portrays how cybersecurity is intertwined with the most critical parts of your business. Think about the how value is created within your company. Is it a cutting-edge product? Is it by delivering world-class customer service? Craft a short story on how cyber protects and enables that. Sharpen your priorities: You have limited resources, just like every other company. You can't protect everything, so you better be certain you're focusing on the most critical business assets. The first step is to figure out what your company determines to be its 'crown jewels.' Once you've defined what truly matters, it's time you evaluate how exposed-or at-risk-these assets are. That will give you a basis for right-sizing your security program around these assets. Build the right team: Once you define what matters and how much security makes sense, think about the people. What does your direct and extended workforce have to look like to be uniquely successfully at your company? These days, you can't get by with your security program being filled with technologist majority. Time to weave in an accompanying set of skill sets that will help you propel you to success, to include organizational change management, crisis management, third- party risk management, and strategic communications. Enhance your controls: This is largely about scope. With your company's quickly expanding 'map' you'll need to adopt new methods for treating risk. For example, if you deliver a 'connected' product to consumers, you'll have to ensure strong embedded device security, as well as protections over the airwaves. Without this, your brand could be at stake. Fortunately there's a great deal of momentum in the world today, with new methodologies, technologies, and skill sets continuously being developed to meet the challenge of today's expanding cyberattack surface. Monitor the threat: Unfortunately, cybersecurity isn't only about reducing risk behind your firewalls. It must also include maintaining awareness of the threat landscape-external and internal. Because the threat is always changing and always determined, you have to take on that same adaptive mindset. Whether that's employing strong monitoring and detection capabilities, consuming threat intelligence feeds, or participating in an industry-level information sharing forum, there many avenues that you should strongly consider using. Plan for contingencies: No one can ever be 100% secure, so it's vital to have a strong incident response capability in place to manage the ensuing events when something happens, because something undesirable will most certainly happen. Incident response is more than just having the right technology capabilities in place, such as forensics and malware analysis. In fact, real success in cyber incident response usually comes down to the people aspect. How plugged in are you with your company's legal, privacy, communications, and customer sales units? They are all critical to success; and with this expanded scope of players, you can imagine how a cyber matter can quickly rise to become a top-line business matter. Transform the culture: The best organizations out there today do this well. Because people are the core of your business, it comes down to them 'buying' to cybersecurity as something that they care about. From your dedicated cyber workforce, to business unit leaders, to those that manage your company's supply chain, you'll need all hands on deck, each doing their part in advocating for and implementing cybersecurity measures. A security organization can make this easier by finding ways to make cyber relevant for each part of the business by sharing innovations that excite and enable the business. Go deeper with Booz Allen Hamilton in Navigating the Digital Age and learn more about what it takes to make your organization secure. Get the book here.]]>
    581 0 0 0
    A Real Board-Level Cybersecurity Strategy: What Has To Be There https://www.securityroundtable.org/a-real-board-level-cybersecurity-strategy-what-has-to-be-there/ Fri, 09 Oct 2015 13:43:21 +0000 https://www.securityroundtable.org/?p=584 Over the last two years cybersecurity has leaped to the top of the boardroom agenda. If you're like most board members, though, you haven't had enough time to figure out how to think about cybersecurity as part of your fiduciary responsibility, and you're not quite certain yet what questions to ask of management. You may even harbor a secret hope that, like many technology-related issues, cyberthreats will soon be rendered obsolete by relentless advancement.

    Don't count on it. Cybersecurity is taking its place among the catalog of enterprise risks that demand boardroom attention for the long term. It comes along with the digital transformation that is sweeping through virtually all industries in the global economy. As businesses "digitize" all aspects of their operations, from customer interactions to partner relationships in their supply chains, entire corporations become electronically exposed-and vulnerable to cyberattack.

    Cybersecurity risk is not new. However, in the last two years multiple high-profile attacks have hit brands we all trusted with our personal information, making for big headlines in the media and significant reputational and financial damage for many of the victimized companies. What's more, corporate heads have rolled: CIOs and even CEOs have departed as a direct result of breaches. The ripple effect continues. Cybersecurity legislation is a perennial agenda item for governments and regulators around the world, and shareholder derivative lawsuits have struck the boards of companies hit by high-profile cyberattacks.

    Although directors have added cybersecurity enterprise risk to their agendas, there is no standard way for boards to think about cybersecurity, much less time-tested guidelines to help them navigate the issue. This chapter's goal is to help directors evolve their mindsets for thinking about the enterprise risk associated with cybersecurity and provide a simple blueprint to help directors incorporate cybersecurity into the board's overall enterprise risk strategy.

    Establishing the right blueprint for boardroom cybersecurity review

    For boards, cybersecurity is an issue of enterprise risk. As with all enterprise risks, the key focus is mitigation, not prevention. This universally understood enterprise risk guideline is especially helpful in the context of cybersecurity because no one can prevent all cyber breaches. Every company is a target, and a sufficiently motivated and well-resourced adversary can and will get into a company's network.

    Consequently, terms like "cyber defense" are insufficient descriptors of an effective posture because they evoke the image that corporations can establish an invincible perimeter around their networks to prevent access by bad actors. Today, it's more accurate to think of the board-level cybersecurity review goal as "cyber resilience." The idea behind the cyber resilience mindset is that, because you know network breaches will happen, it is more important to focus on preparing to meet cyberthreats as rapidly as possible and on mitigating the associated risks.

    Also important to a board member's cybersecurity mindset is to be free from fear of the technology. Remember, the issue is enterprise risk-not technical solutions. Just as you need not understand internal combustion engine technology to write rules for safe driving, you need not be excluded from the cybersecurity risk discussion based on lack of technology acumen. Although this is liberating, in a sense, there is also a price: directors cannot deny their fiduciary responsibility to oversee cybersecurity risk based on lack of technology acumen.

    Given a focus on enterprise risk (not technology) and risk mitigation (not attack prevention), the correct blueprint for cyber-security review at the board level can best be expressed through the following three high-level questions:

    • Has your organization appropriately assessed all its cybersecurity-related risks? What reasonable steps have you taken to evaluate those risks?
    • Have you appropriately prioritized your cybersecurity risks, from most critical to noncritical? Are these priorities properly aligned with corporate strategy, other business requirements, and a customized assessment of your organization's cyber vulnerabilities?
    • What actions are you taking to mitigate cybersecurity risks? Do you have a regularly tested, resilience-inspired incident response plan with which to address cyberthreats?

    Naturally, these questions are proxies for the industry-specific and/or situation-specific questions particular to each organization that will result in that organization's most productive cybersecurity review. The key to formulating the relevant questions for your organization is to find the right balance between asking enough to achieve the assurance appropriate to board oversight, but not so much that management ends up spinning wheels unnecessarily.

    How much board oversight is too much when it comes to cybersecurity? Learn more about board-level governance in Navigating the Digital Age. Get the book here.

    ]]>
    584 0 0 0 9 http://www.elationit.com.au/portal/portal-security/5-steps-to-prevent-data-breaches-due-to-insider-and-privilege-misuse 0 0
    An Integrated Approach to Cybersecurity Risk Management https://www.securityroundtable.org/an-integrated-approach-to-cybersecurity-risk-management/ Fri, 09 Oct 2015 19:22:29 +0000 https://www.securityroundtable.org/?p=610 Get your copy of Navigating the Digital Age here.]]> 610 0 0 0 ]]> What Do Cyber Insurance Underwriters Really Care About? https://www.securityroundtable.org/what-do-cyber-insurance-underwriters-really-care-about/ Fri, 09 Oct 2015 19:22:20 +0000 https://www.securityroundtable.org/?p=612 Get your copy of Navigating the Digital Age here.]]> 612 0 0 0 ]]> Tackling Cybersecurity Risks Is A Team Sport - And Not For Dabblers https://www.securityroundtable.org/tackling-cybersecurity-risks-is-a-team-sport-and-not-for-dabblers/ Sun, 11 Oct 2015 04:18:29 +0000 https://www.securityroundtable.org/?p=614 Get your copy of Navigating the Digital Age here.]]> 614 0 0 0 ]]> Understanding Cyber Readiness and M&A https://www.securityroundtable.org/understanding-cyber-readiness-and-ma/ Fri, 09 Oct 2015 19:18:33 +0000 https://www.securityroundtable.org/?p=617 Get your copy of Navigating the Digital Age here.]]> 617 0 0 0 ]]> How We Adapt to Prevent Highly Automated Cyber Attacks https://www.securityroundtable.org/how-we-adapt-to-prevent-highly-automated-cyber-attacks/ Fri, 09 Oct 2015 19:15:05 +0000 https://www.securityroundtable.org/?p=619 Get your copy of Navigating the Digital Age here.]]> 619 0 0 0 ]]> What To Expect and Consider When Hiring A CISO https://www.securityroundtable.org/what-to-expect-and-consider-when-hiring-a-ciso/ Mon, 02 Nov 2015 15:00:22 +0000 https://www.securityroundtable.org/?p=806 The market for top-tier CISOs is now highly competitive. Information security has become a high-profile corporate concern, and the bar has been raised on the pool of qualified candidates. By one estimate there were 2,700 CISO job openings in the United States in June 2015. So even if organizations are able to effectively evaluate candidates against current and future requirements, they must also be prepared from the start to actively sell the opportunity to an audience that is naturally skeptical.

    In our experience, every CISO candidate asks four overarching questions when evaluating an opportunity:

    1. "Who is my sponsor and how much influence does he or she have?"

    This is likely to be the first question on the CISO candidate's mind, and he or she is thinking about this issue in at least two specific ways. First, although the CISO is likely to have some interaction with the board and C-suite, there will still be many conversations that affect the information security function to which the CISO will not be privy. As a result, the CISO will have to rely his or her supervisor to act as an effective intermediary in advocating for resources and policy initiatives and in educating the board and CEO on information security issues as they unfold. Second, when the CISO needs to take an unpopular position to strengthen an organization's information security profile, he or she has to know there will be support in high places.

    2. "How deep is the organization's commitment to information security?"

    This is more than a question of staff and budget allocation, although those elements are certainly important. The CISO wants to know that the C-suite and the board appreciate the complexity and uncertainty at the core of the information security function and the need for making everyone in the organization, top to bottom, responsible for security. For the CISO to be successful, he or she must be empowered to act and be armed with the necessary resources to deploy both in times of normalcy and crisis. Although the CISO expects organizations to have high standards, he or she will avoid enterprises who reflexively cycle through security teams.

    3."What key performance indicators will I be measured against?"

    Given that every large organization must assume that it is continually under cyberattack, it follows that security breaches are a matter of not "if" but "when." Therefore, it is not realistic for a company to hold its CISO to a "one strike and you're out" performance benchmark. The conversation about expectations is just as important as the ones about resources, reporting lines, and compensation.

    4. "Where will I be in five years?"

    Those who lead the information security function are like other functional leaders in their range of career ambitions. For some, the opportunity to lead the function at a quality organization is the goal; others, however, are looking ahead to a CIO role or even a broader role in organizational leadership. It is important to understand each candidate's desires against what the organization can offer. Remember that the CISO's reporting relationship will be one factor that frames this issue in his or her mind.

    For more information on what to expect and consider while hiring a CISO, download your copy of Navigating the Digital Age. Get the book here.

    ]]>
    806 0 0 0 2 http://www.lifehacker.com.au/2015/11/questions-to-expect-when-hiring-a-chief-information-security-officer/ 0 0 3 http://philipcao.com/2015/11/06/new-on-securityroundtable-org-considerations-when-hiring-a-ciso-and-more/ 0 0
    Lessons Learned: Containment and Eradication https://www.securityroundtable.org/lessons-learned-containment-and-eradication/ Wed, 04 Nov 2015 15:00:15 +0000 https://www.securityroundtable.org/?p=808 Get your copy of Navigating the Digital Age here.]]> 808 0 0 0 ]]> The 5 Questions Every CEO Should Ask a Technical Security Team https://www.securityroundtable.org/the-5-questions-every-ceo-should-ask-a-technical-security-team/ Mon, 09 Nov 2015 15:47:00 +0000 https://www.securityroundtable.org/?p=824
  • What is the current level and business impact of cyber risks to our company? What is our plan to address identified risks?
  • How is our executive leadership informed about the current level and business impact of cyber risks to our company?
  • How does our cybersecurity program apply industry standards and best practices?
  • How many and what types of cyber incidents do we detect in a normal week? What is the threshold for notifying our executive leadership?
  • How comprehensive is our cyber incident response plan? How often is the plan tested?
  • The team that coordinated the Cybersecurity Framework also provided key recommendations to leadership, to align their cyber risk policies with these questions. First and foremost, it is critical for CEOs to lead incorporation of their cyber risks into existing risk management efforts. Forget the checklist approach; only you know the specific risk-reward balance for your business, so only you can understand what is most important to your company. It seems simple, but with cybersecurity, the default practice tends to be for organizations to silo considerations about risks into a separate category apart from thinking about their valuable assets. You have to start by identifying what is most critical to protect and work out from there. The process of aligning your core value with your top IT concerns is a journey and is not something that can be solved in one lump investment or board meeting. Just like any risk analysis, it requires serious consideration and thought about what is most important to your core business practices. You can't prepare your organization without a plan for cybersecurity governance. Get your copy of Navigating the Digital Age to learn from some of the top of minds in cyber. ]]>
    824 0 0 0 12 http://ceoworld.biz/2016/10/14/ceos-key-data-breach-prevention-culture 0 0
    Advice For Tackling Cybersecurity Risks https://www.securityroundtable.org/advice-for-tackling-cybersecurity-risks/ Wed, 11 Nov 2015 16:00:14 +0000 https://www.securityroundtable.org/?p=836 Get your copy of Navigating the Digital Age here.]]> 836 0 0 0 ]]> Checklist: Pre-engagement due diligence when assessing third party cybersecurity risk https://www.securityroundtable.org/checklist-pre-engagement-due-diligence-when-assessing-third-party-cybersecurity-risk/ Mon, 16 Nov 2015 16:00:07 +0000 https://www.securityroundtable.org/?p=855 Pre-engagement due diligence A critical element of managing third-party risk is the assessment of the third party's own security practices and posture before any contract is signed. Such diligence is crucial for the identification and evaluation of risks, and, in turn, can ensure that such risks are mitigated before the engagement, including through the use of contractual provisions. The actual evaluation may be more ad hoc (i.e., conversations with key business or technology stakeholders) or formal (i.e., through a questionnaire or even on-site assessment), and the extent of an evaluation may depend on various factors in the prospective relationship, including, for example, whether the service provider will have access to the company's IT systems, the nature of the information that it may access, and whether it will store such information. Depending on the extent of the relationship and information that may be accessed by the vendor, the following areas of inquiry may be necessary to inform a cybersecurity diligence assessment:
    • whether and how often the vendor has experienced cybersecurity incidents in the past, the severity of those incidents, and the quality of the vendor's response
    • whether the vendor maintains cybersecurity policies, such as whether the vendor has a written security policy or plan
    • organizational considerations, such as whether the vendor maintains sufficient and appropriately trained personnel to protect the data and/or service at issue and respond to incidents
    • human resources practices, particularly background screening employees, cybersecurity training, and the handling of terminations
    • access controls, particularly whether controls are in place that restrict access to information and uniquely identify users such that access attempts can be monitored and reviewed
    • encryption practices, including whether information is encrypted at rest, whether information transmitted to or from the vendor is properly encrypted, and whether cryptographic keys are properly managed
    • evaluation of in what country any data will be stored
    • the vendor's policies regarding the secondary use of customer data, and whether IT systems are created in such a way as to respect limitations on secondary use
    • physical security, including resilience and disaster recovery functions and the use of personnel and technology to prevent unauthorized physical access to facilities back-up and recovery practices
    • change control management, including protocols on the installation of and execution of software
    • system acquisition, development, and maintenance to manage risk from software development or the deployment of new software or hardware
    • risk management of the vendor's own third-party vendors
    • incident response plans, including whether evidence of an incident is collected and retained so as to be presentable to a court and whether the vendor periodically tests its response capabilities
    • whether the vendor conducts regular, independent audits of its privacy and information security practices
    This article was co-written by Covington & Burling LLP - David N. Fagan, Partner; Nigel L. Howard, Partner; Kurt Wimmer, Partner; Elizabeth H. Canter, Associate; and Patrick Redmon, Summer Associate]]>
    855 0 0 0
    Cybersecurity is About Risk Management, Not Risk Elimination https://www.securityroundtable.org/cybersecurity-is-about-risk-management-not-risk-elimination/ Wed, 18 Nov 2015 17:26:42 +0000 https://www.securityroundtable.org/?p=861 Get your copy of Navigating the Digital Age here.]]> 861 0 0 0 ]]> 2017 Predictions: Cyber Insurance https://www.securityroundtable.org?p=2243&preview=true&preview_id=2243 Mon, 05 Dec 2016 20:49:47 +0000 https://www.securityroundtable.org/?p=2243
    • Sure Thing:

      Cyber insurance products that have traditionally focused on enterprise data security and privacy liability will continue to evolve to also address additional consequences including property damage, business interruption and bodily injury.
    • Sure Thing:

      CISOs (Chief Information Security Officers) will continue to have a bigger say, and in some cases become the key enterprise decision maker, in deciding whether to invest in cyber insurance of not.
    • Long Shot:

      The risk relationship between CISOs and Insurers will become more aligned - Insurers will start to understand better how investment in specific enterprise controls moves the risk needle, and in return will offer incentives such as lower premium for making that investment.  
    ]]>
    2243 0 0 0
    The Cybersecurity Canon: Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers https://www.securityroundtable.org?p=4284&preview=true&preview_id=4284 Mon, 30 Nov -0001 00:00:00 +0000 https://www.securityroundtable.org/?p=4284 We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the process. Please do so! Book Review by Canon Committee Member, Rick Howard: Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers (2015) by Palo Alto Networks and the New York Stock Exchange

    Executive Summary

    Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers is a collaboration among Palo Alto Networks, the New York Stock Exchange and a number of authors. Its first edition was published in October 2015, and is available to download at SecurityRoundtable.org. It is the first comprehensive book designed to enlighten and educate corporate directors and officers in terms of cybersecurity. The book includes more than 30 contributors, so it is meaty, and while there is some overlap in the material covered, it contains a dense collection of information around fundamental principles for the board members to do their jobs, board standards to consult, the executive whom they should rely on – the CISO, which committees they should create to support their efforts, what they should worry about in terms of fiduciary responsibility and the potential for litigation, the perceived cybersecurity disconnect between shareholders and board members, and finally, how they should think about disclosing breach information to the public. This book is essential reading for every corporate leader in the world. It is Cybersecurity Canon-worthy, and if you haven’t read it already, it should be on your short list of must-reads.

    Introduction and Full Disclosure

    Palo Alto Networks is one of the publishing partners on Navigating the Digital Age. Since I work for Palo Alto Networks, you may suspect a book review written by an employee of the publisher to be a bit biased, and you would be right to note that as a concern. But let me make the case as to why this review is not biased in the way that you may think. First, if you are reading this review, you already know that Palo Alto Networks sponsors the Cybersecurity Canon. As mentioned above, Palo Alto Networks created a “Rock & Roll Hall of Fame” for Cybersecurity Books in 2013. The project’s goal is to identify a list of must-read books for all cybersecurity practitioners – be they from industry, government or academia – where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete. In 2015, the Palo Alto Networks leadership team noticed that there were not a lot of cybersecurity books on the market that target the C-Suite or the people who sit on company boards. There are gazillions of books out there for the day-to-day network defenders of the world, but there is really not that much available to help senior leaders, who are usually not security geeks, think about cybersecurity. Second, Palo Alto Networks published this book as a free giveaway in conjunction with the New York Stock Exchange. The goal is to enlighten the community, and as cybersecurity becomes more and more important to the business world, it makes sense that business leaders have a reference to turn to in order to think about the issues. Truth be told, we were hoping that such a book or resource already existed. Since it didn’t, we decided to make it ourselves, for them, and found a willing partner in the New York Stock Exchange and a number of other collaborators, including:
    • 5 CEOs (including ours)
    • 4 CISOs/CIOs
    • 6 Company executives (including one of ours)
    • 1 Academic
    • 14 Legal firms
    • 1 Government official
    • 3 Economics experts
    (Note: A full list by name can be found at the end of this review.) All of these contributors, despite their different backgrounds, have a similar goal: discuss the main issues that every C-level executive and board member should be thinking about in terms of cybersecurity and the companies they are responsible for, and offer actionable advice on what to do. That is why you should not be concerned about my bias. And the book is good, too, albeit a little long. Since a committee wrote it, there is some overlap in the subject matter. But I have to say, I have never seen a book with this much material concentrated specifically for the C-Suite and board of directors, including:
    • 5 essays on preventing material impact
    • 2 essays on fundamental principles
    • 1 essay on information sharing
    • 1 essay on threat prevention
    • 12 essays on what board members should be thinking about
    • 22 essays on what the C-Suite should be thinking about
    (Worth noting is that the discussion continues on SecurityRoundtable.org, a community that launched when the book published. Many of the book’s authors – along with other contributors recognized for their contributions to the cybersecurity discourse – are active there with essays, videos and other forms of content.)

    The Fundamental Principle – Prevent Material Impact

    The consensus of the authors is that the fundamental task of all board members in terms of cybersecurity is to ensure that the corporation is taking the appropriate steps to prevent material impact. If they are doing anything else, then they are wasting resources that could be used for it. In other words, the corporation’s risk assessment should consider all risks through this material impact lens and adjust accordingly.

    The Standards

    The authors make it pretty clear that C-Suite executives and board members should be familiar with three reference documents regarding standards: the U.S. Government’s Framework for Improving Critical Infrastructure Cybersecurity, commonly referred to as the NIST Framework, the International Organization for Standardization’s ISO/IEC 27014: Information technology — Security techniques — Governance of information security, and the National Association of Corporate Directors’ (NACD) Cyber-Risk Oversight. The NIST Framework provides a tool to assess and measure the corporation’s current cybersecurity posture and was created in collaboration between the public sector and private industry. Many in the legal community believe that when the U.S. Government published it, they created a standard of care that might be used by plaintiff attorneys to allege negligence or worse. If board members are ever sued for cybersecurity negligence, this is the document that will make or break the case. The ISO 27014 document establishes six principles as the foundation for information security governance. In other words, this is what the board should be driving the company to accomplish:
    1. Establish organization-wide information security (not just cyber but physical and logical as well).
    2. Adopt a risk-based approach (just like every other company decision).
    3. Set the direction of investment decisions (in terms of preventing material impact from cyber risk).
    4. Ensure conformance with internal and external requirements (external regulations, internal policy, audit to make sure it gets done).
    5. Foster a security-positive environment (from the top down).
    6. Review performance in relation to business outcomes (evaluate security programs in terms of risk mitigation to the business – not for the sake of security alone).
    ISO/IEC 27014 also sets forth separate roles and responsibilities for the board and executive management within five processes:
    1. Evaluate
    2. Direct
    3. Monitor
    4. Communicate
    5. Assure
    The Cyber-Risk Oversight document lists five steps that its members should take to ensure their enterprises properly address cyber risk:
    1. Treat cyber risk as an enterprise risk.
    2. Understand the legal implications of cyber risk.
    3. Discuss cyber risk at board meetings, giving it equal footing with other risks.
    4. Require management to have a measurable cybersecurity plan.
    5. Develop a board-level plan for how to address cyber risk, including which risks should be avoided, accepted, mitigated or transferred via insurance.

    Where Should the CISO Work?

    This has been a pet peeve of mine for the past five years. I even presented my thoughts about it at the RSA Security Conference in 2015 last year. I am glad to see that I am in-line with the combined authors when they say that the CISO should not report to the CIO. (This is also the opinion of Cybersecurity Canon author Rich Baich, who too appears in this book.) The CIO and the CISO should be peers and there should be a natural tension between the two organizations that they manage. The CIO is trying to innovate in order to keep the company competitive. The CISO is trying to mitigate any risk introduced by the new innovation. The two C-level executives should work together to improve the organization. If the CISO works for the CIO, then it would be easy for the CIO to override the CISO’s recommendations.

    Which Committees?

    There is not one right answer for all boards – each is unique. One thing that the combined authors did point out is that many companies overload the audit committee with the responsibility to monitor the company’s InfoSec programs. The audit committee is already one of the busiest committees for any board. Saddling it with monitoring the InfoSec program will increase the workload. The authors suggest that the board create a separate committee to relieve the burden. Jody R. Westby recommends that, “A Risk Committee is the best choice for governance of cybersecurity because IT risks must be managed as enterprise risks and integrated into enterprise risk management and planning.”

    Litigation and Legal Challenges

    The authors discussed at length the probabilities of directors and officers (D&Os) getting sued for negligence for not properly overseeing their fiduciary duty to protect the organization’s assets and the value of the corporation in terms of cyber. It turns out that there is good data about what is theoretically possible and what is really going on in the corporate world today. The authors rolled out case studies about five corporations that were the subject of very public data breach attacks: Home Depot, Target, Wyndham, TJX, and Heartland Payments. Although there is some variation, most lawsuits focused on two allegations:
    1. That the directors breached their fiduciary duties by making a decision that was ill-advised or negligent.
    2. By failing to act in the face of a reasonably known cybersecurity threat.
    According to Antony Kim, “The risk that directors will face personal liability is especially high where the board has not engaged in any oversight of their corporations’ cybersecurity risk.” But he also mentions that, “Generally, directors will be protected by the business judgment rule and will not be liable for a failure of oversight unless there is a ‘sustained or systemic failure of the board to exercise oversight’…” He says that plaintiffs must overcome a powerful court presumption that company officers have acted in good faith. Direct litigation is not the only threat either. Activist shareholders may seek replacement of board members citing lack of confidence. In the Target example, shareholders demonstrated their lack of faith. Target’s top 10 largest investors cast votes against one or more of the company’s directors.

    Disconnect Between Stock Holders and Board Members

    Patrick McGurn and Martha Carter, whom at the time were writing from roles with Institutional Shareholder Services, pointed out an apparent disparity between what the directors and officers think they are doing in terms of cybersecurity and what shareholders think they are doing. They say that the good news is that directors and officers are increasingly talking about cybersecurity issues in the boardroom. The bad news is that it appears that shareholder concerns are not in alignment with those of board members. Their observations came from looking at the results of two surveys conducted by PwC in 2014: one from the survey of 863 directors in PwC’s 2014 Annual Corporate Directors Survey; the other from the survey of institutional investors with more than $11 trillion in aggregate assets under management in PwC’s 2014 Investor Survey. Crisis Response Plan:
    • 74 percent of investors believe it is important for directors to discuss their company’s crisis response plan in the event of a major security breach.
    • 52 percent reported having such discussions.
    Disclosures:
    • 74 percent of investors urged boards to boost cyber risk disclosures in response to the SEC’s guidance.
    • 38 percent of directors reported discussing the topic.
    Outside Security Consultants:
    • 68 percent of investors believe it is important for directors to discuss engaging an outside cybersecurity expert.
    • 42 percent of directors had done so.
    Hire a CISO:
    • 55 percent of investors said it was important for boards to consider designating a chief information security officer.
    • 26 percent reported that such a personnel move had been discussed in the boardroom.
    Use the NIST Framework:
    • 45 percent of investors believe this is important.
    • 21 percent use it.

    Disclosure

    In 2010, Commissioner Luis Aguilar of the Securities and Exchange Commission (SEC) warned public companies that the SEC will be expecting much more disclosure in public statements from companies that have been breached. On the other hand, Gus Coldebella says that there is no duty for companies to disclose material information for cyber incidents because there are currently no existing laws or rules explicitly demanding it. Clearly though, the SEC is interested in much more disclosure, and Mr. Aguilar has hinted in the past that the SEC expects to see it. Their guidance is that companies should disclose when:
    • One or more cyber incidents materially affected the company’s products, services, customer or supplier relationships, or competitive conditions.
    • If any litigation emerges as a result of a cyber incident.
    • If significant costs are associated with cyber preparedness or remediation.
    If there is no regulation or law that requires disclosure, why would a company do it? The authors suggest that you might disclose, as a way to fend off shareholder litigation, if your program is robust enough to withstand public scrutiny or as a way to mitigate damage to brand reputation with your customers. Responsibly responding to a cyber incident in the public may actually improve your brand reputation, if done correctly, but this is not something you do on the fly. You have to plan and practice how you respond. There are not too many examples of companies doing this correctly. Then there is the question of when to disclose. “Target took two months after the world knew of its massive data breach to issue an 8-K; Morningstar, which releases an 8-K regularly on the first Friday of every month, disclosed its 2012 breach a little more than one month after becoming aware. Anthem, [chose] instead to wait until the next periodic report.” The question is: do you immediately disclose with the information you have or wait until you have a better understanding of the big picture? If you go early, you can demonstrate to the world that you are on top of the situation, although you may look foolish later when the things you thought you knew change. If you wait though, and the public finds out that you waited, you run the risk of appearing to hide things. According to the authors, it is generally better to wait to disclose.

    Conclusion

    Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers is the first book that I have encountered which has such a rich collection of cybersecurity advice and education meant for C-level executives and board members. This is not a book that is meant for cybersecurity professionals, although they would benefit from it because they would learn how their senior managers should think about their problem domain. This is a book meant for all corporate leaders that tells them which issues they should be concerned about for their InfoSec programs. The authors represent a host of cybersecurity experience: CEOs, CISOs/CIOs, company executives, security consultants, economists, lawyers, and even a government official. They discuss fundamental principles for the board members to do their jobs, board standards to consult, the executive whom they should rely on – the CISO, which committees they should create to support their efforts, what they should worry about in terms of fiduciary responsibility and the potential for litigation, the perceived cybersecurity disconnect between shareholders and board members, and finally, how they should think about disclosing breach information to the public. This book is essential reading for every corporate leader in the world, it is Cybersecurity Canon-worthy, and you should have read it by now. (Get it at SecurityRoundtable.org)

    References

    Combined Authors

    CEOs Axio Global: Scott Kannry, CEO Axio Global: David White: Chief Knowledge Officer Coalfire: Larry Jones: CEO Coalfire: Rick Dakin: CEO Dell: SecureWorks: Mike Cote: CEO Internet Security Alliance: Larry Clinton: CEO Palo Alto Networks: Mark McLaughlin: CEO Palo Alto Networks: Davis Hake: Director of Cybersecurity Strategy Visa: Charles W. Scharf: CEO CSOs/CISOs/CIOs Department of Energy: Robert F. Brese: Former CIO of the United States Intercontinental Exchange and New York Stock Exchange: Jerry Perullo: CISO Rackspace: Brian Kelly: Chief Security Officer Wells Fargo & Company: Rich Baich: CISO C-Level Delta Risk LLC: Thomas Fuhrman: President Governance Services: Adam Sodowick: President The Chertoff Group: Michael Chertoff: Executive Chairman The Chertoff Group: Jim Pflaging: Principal The Chertoff Group: Mark Weatherford: former Principal Consultants Booz Allen Hamilton: Bill Stewart: Executive Vice President Booz Allen Hamilton: Dean Forbes: Senior Associate, Booz Allen Hamilton: Agatha O’Malley: Senior Associate, Booz Allen Hamilton: Jaqueline Cooney: Lead Associate and Booz Allen Hamilton: Waiching Wong: Associate Booz Allen Hamilton: Sedar LaBarre: Vice President Booz Allen Hamilton: Matt Doan: Senior Associate Booz Allen Hamilton: Denis Cosgrove: Senior Associate Booz Allen Hamilton: Jason Escaravage: Vice President Booz Allen Hamilton: Christian Paredes: Associate Booz Allen Hamilton: Tony Gaidhane: Senior Associate Booz Allen Hamilton: Laura Eise: Lead Associate Booz Allen Hamilton: Jason Escaravage: Vice President Booz Allen Hamilton: Anthony Harris: Senior Associate Booz Allen Hamilton: James Perry: Senior Associate Booz Allen Hamilton: Katie Stefanich: Lead Associate Booz Allen Hamilton: Lori Zukin: Principal Booz Allen Hamilton: Jamie Lopez: Senior Associate Booz Allen Hamilton: Erin Weiss Kaya: Lead Associate Booz Allen Hamilton: Andrew Smallwood: Lead Associate Egon Zehnder: Kal Bittianda Egon Zehnder: Selena Loh LaCroix Egon Zehnder: Chris Patrick Fidelis Cybersecurity: Jim Jaeger: Chief Cyber Strategist Fidelis Cybersecurity: Ryan Vela, Regional Director Korn Ferry: Jamey Cummings: Senior Client Partner Korn Ferry: Joe Griesedieck: Vice Chairman and Co-Leader, Board and CEO Services Korn Ferry: Aileen Alexander: Senior Client Lockton Companies: Ben Beeson: Senior Vice President: Cybersecurity Practice Stroz Friedberg LLC: Erin Nealy Cox: Executive Managing Director Academia Georgia Institute of Technology: Jody R. Westby, Esq., Adjunct Professor” Legal BakerHostetler: Theodore J. Kobus: Partner BakerHostetler: Craig A. Hoffman: Partner Baker & McKenzie: David Lashway: Partner Baker & McKenzie: John Woods: Partner Baker & McKenzie: Nadia Banno: Counsel, Dispute Resolution Baker & McKenzie: Brandon H. Graves: Associate BuckleySandler & Treliant Risk Advisors LLC: Elizabeth McGinn: Partner BuckleySandler & Treliant Risk Advisors LLC: Rena Mears: Managing Director BuckleySandler & Treliant Risk Advisors LLC: Stephen Ruckman: Senior Associate BuckleySandler & Treliant Risk Advisors LLC: Tihomir Yankov: Associate BuckleySandler & Treliant Risk Advisors LLC: Daniel Goldstein: Senior Director Covington & Burling LLP: David N. Fagan: Partner Covington & Burling LLP: Nigel L. Howard: Partner Covington & Burling LLP: Kurt Wimmer: Partner Covington & Burling LLP: Elizabeth H. Canter: Associate Covington & Burling LLP: Patrick Redmon: Summer Associate Fish & Richardson P.C.: Gus P. Coldebella: Principal Fish & Richardson P.C.: Caroline K. Simons: Associate Kaye Scholer LLP: Adam Golodner: Partner Institutional Shareholder Services: Patrick McGurn: ISS Special Counsel Institutional Shareholder Services: Martha Carter: ISS Global Head of Research K&L Gates LLP: Roberta D. Anderson: Partner Latham & Watkins LLP: Jennifer Archie: Partner Littler Mendelson P.C.: Philip L. Gordon, Esq., Co-Chair, Privacy and Background Checks Practice Group Orrick, Herrington & Sutcliffe LLP: Antony Kim: Partner Orrick, Herrington & Sutcliffe LLP: Aravind Swaminathan: Partner Orrick, Herrington & Sutcliffe LLP: Daniel Dunne: Partner Pillsbury Winthrop Shaw Pittman LLP: Brian Finch: Partner Sard Verbinnen & Co: Scott Lindlaw: Principal Wilson Elser Moskowitz Edelman & Dicker: Melissa Ventrone: Partner Wilson Elser Moskowitz Edelman & Dicker: Lindsay Nickle: Partner Government Department of Justice: CCIPS Cybersecurity Unit Economics World Economic Forum: Elena Kvochko: Head of Global Cyber Security Strategy and Implementation at Barclays World Economic Forum: Danil Kerimi: Director, Center for Global Industries  
    ]]>
    4284 0 0 0
    Test Post https://www.securityroundtable.org?p=5239&preview=true&preview_id=5239 Mon, 30 Nov -0001 00:00:00 +0000 https://www.securityroundtable.org/?p=5239 The Real Reason. Now that....]]> 5239 0 0 0 Title https://www.securityroundtable.org?p=5467&preview=true&preview_id=5467 Mon, 30 Nov -0001 00:00:00 +0000 https://www.securityroundtable.org/?p=5467 5467 0 0 0 Build Champions by Communicating Effectively Among Your Cybersecurity Stakeholders https://www.securityroundtable.org/build-champions-by-communicating-effectively-among-your-cybersecurity-stakeholders/ Mon, 23 Nov 2015 15:45:41 +0000 https://www.securityroundtable.org/?p=864 864 0 0 0 Building A Comprehensive Approach to Insider Threats https://www.securityroundtable.org/building-a-comprehensive-approach-to-insider-threats/ Mon, 30 Nov 2015 16:00:05 +0000 https://www.securityroundtable.org/?p=866 Establishing a threat-aware culture of institutional integrity and personal reliability Company culture is a product of many factors, but one of the most decisive is the behavior of senior leadership and the values they model. A culture of institutional integrity and personal reliability is conducive to success in almost any enterprise. Factors for achieving this include the following:
    • Create an environment in which self- directed employee actions reflect a high degree of institutional integrity and personal reliability.
    • Articulate clear expectations in an enterprise Acceptable Use Policy governing IT resources. This should be a formal signed agreement between the company and each employee and external party who has access to the enterprise IT resources or facilities.
    • Create a safe environment in which to self-report accidental actions that jeopardize security. Removing the stigma of having inadvertently committed a security violation can help minimize impact and help everyone learn.
    • Provide regular insider threat awareness training as well as realistic phishing training exercises. An organized phishing awareness exercise program can raise the company's standard of performance in this critical area.
    • Establish a set of institutional values reflecting the desired culture, select leaders based on their adherence to these values, and include demonstration of these values as an item on employee performance assessments.
    Building a multi-disciplinary program Establish an executive committee to manage an integrated multidisciplinary program designed to deter, prevent, detect, and respond to insider threats and to limit their impact. The program should have the active participation of the functional organizations across the business such as Risk, IT, Cybersecurity, Physical Security, Human Resources, Fraud, and General Counsel, as well as company-specific verticals (manufacturing, operations, etc.). The program should include the following:
    • Creation and oversight of policies related to the management of insider risk
    • Regularized workflow, processes, and meetings to actively and collectively review threat intelligence, the internal threat landscape, internal indicators of risk, insider events, sponsored activities, and trends from each sub-discipline
    • Implementation and oversight of personnel reliability processes from pre-employment background checks to off-boarding procedures to assess and act upon personnel security risks, behavioral risk indicators, and individual vulnerability to compromise
    • Decision-making authority pertaining to the integration of programs within each vertical, the aggregation of insider risk data across the verticals, and the corporate response to insider events
    • Definition of requirements for employee training and awareness of insider threats and prevention measures.
    Building and operating security controls Many of the security controls that already exist (or should exist) within the enterprise can be effective in detecting, preventing, or mitigating the results of insider threat activity. Key technical controls include the following:
    • Access controls, particularly for privileged users (those with administrative authority)
    • Data protection, including encryption, data loss prevention technology, data backups, and exfiltration monitoring
    • Configuration management and secure configurations
    • Vulnerability and patch management
    • Internal network segmentation
    Monitoring and detecting insider behavior The program should seek to prevent insider attacks by capturing observable indicators of potential activity before insiders act. Intelligence on the insider threat generally comes from within the enterprise through either technical data or behavioral indicators: Technical: The most significant sources of cyber-related technical intelligence are the real-time alerts and outputs of security appliances, network- and host-based sensors, and data loss prevention tools, as well as the network - and system-level logs that are generated automatically (if so configured) throughout the enterprise. In most enterprises these sources provide so much data that managing and effectively integrating it with operations become serious challenges. In addition, the volume of data drives a need for storage that can become acute depending on policy decisions regarding what logs are maintained and for how long. Insider threat-tracking tools in use today, such as data loss prevention, threat intelligence, and security information and event management (SIEM) systems, pinpoint potentially illicit activities by identifying anomalies in a person's IT resource and data access patterns. Non-technical: Unique to the insider threat is the availability of a large amount of relevant non-technical behavioral observables. Integrating operational intelligence information at the intersection of cybersecurity, fraud detection, and physical security can yield critical insights about potential insider threats. Examples of non-technical cyber data include the following:
    • email behavior: volume, content, and addressees; presence and type of attachments
    • workday activities: patterns of on/off duty time, including weekdays, weekends, and holidays; location
    • job performance: performance reviews, productivity, and time accountability
    • indicators of affiliation: degree of participation in company- sponsored activities; indications of discontent through online behavior and social media usage
    Analysis of this type of data through automated and manual processes can identify patterns of behavior that indicate at-risk employees or imminent insider attacks. There may also be value in integrating external threat intelligence for factors that could influence at-risk insiders. It is important that the company's legal counsel advise the executive committee on informing employees of ongoing monitoring and how the data will be used. Oversight by the executive committee is essential to ensure it is operated within the bounds of policy.  ]]>
    866 0 0 0
    Businesses Should Focus on Private-Private Partnerships https://www.securityroundtable.org/businesses-should-focus-on-private-private-partnerships/ Mon, 07 Dec 2015 16:00:05 +0000 https://www.securityroundtable.org/?p=877 report on critical infrastructure protection, the idea that government and the private sector must work together to protect our nation in cyberspace has been firmly ingrained in U.S. policy. In Presidential Decision Directive 63, President Clinton established many of the public-private mechanisms that still exist today, such as Information Sharing Analysis Centers (ISAC) and sector coordination bodies. President George W. Bush doubled down on this approach in HSPD-7, and President Obama let his policy ride on the idea in PPD-21. The only 2016 presidential candidate to put out a cybersecurity policy as of this writing, Jeb Bush, would also stay at the partnership table, declaring a need to "Create Public-Private Partnerships to Improve Cybersecurity in the Public and Private Sectors." The approach has stayed remarkably consistent across Democratic and Republican Administrations and as technology and threats have evolved. The consistency is all the more remarkable given the widely held view in the cybersecurity community that it has not worked. The partnership model is often viewed as an alternative to a regulatory model - an approach that emphasizes "working together" vs. the kind of adversarial relationship between government and the private sector that can be the product of regulation. Yet many companies believe that voluntary engagement under a partnership model may lead to mandatory requirements. This fear has led to the current state of the public-private partnership. Lots of meetings. Lots of talk. Lots of rhetorical support but very little action. There may be a better approach. Private-Private Companies that have a legitimate interest in improving cybersecurity should look to partner with other companies to solve cybersecurity problems without the government's help. In a domain in which almost everything that needs to be protected is not in a commons (like air, space, or water) but is owned by private companies, there is only a limited number of things that private companies should look to government to do. Law enforcement agencies have a monopoly on investigating crime, making arrests, and prosecuting. Only the U.S. Department of Defense can go on the offensive in cyberspace. Only the U.S. Treasury can level sanctions. In some areas, like diplomacy, government and the private sector must work together. The joint application of pressure by the U.S. government and private companies in Seattle and Silicon Valley was what got China to the negotiating table on intellectual property theft. For other areas, where the private companies can come together without government involvement or support, coalitions of the willing have proved remarkably successful, particularly on information sharing. The Cyber Threat Alliance, for example, shares thousands of malware samples and other indicators of cyber threats between its members each day without any help from the government. Taking the model beyond information sharing to improve problems in the cyber ecosystem that affect many companies should be the focus of a new round of private-private initiatives. Here are a few ideas: Use private acquisition pressure on secure protocol adoption: Whatever the policy problem, someone will propose that the Federal government use the money it spends to buy goods and services to pressure change within the market. The only problem is that for information technology, the government market is not big enough to have a widespread impact. The government is responsible for 1 in every 10 dollars spent on IT. The companies that account for the other 9 in every 10 dollars can have a much greater impact. There is a long litany of more secure protocols where widespread adoption has not taken off (see DNSSec, BGPsec, IPsec, BCP 38, STARTTLS, SPF, DKIM). Large companies that collectively required the use of these protocols by their suppliers and partners should be able to move the needle on adoption rates further and faster than government. Train the Next Generation of Cybersecurity Workers: For nuclear power and aviation, the U.S. military has trained generations of practitioners, who, when they complete their service commitments, take on similar roles in the private sector. In cybersecurity, the 6,000 personnel Cyber Command is attempting to recruit and train are barely a drop in the bucket when, by some estimates, there are 200,000 job openings in cybersecurity in the United States. For its part, academia is little help. Interest in computer science overall has been dropping for a decade. Private companies should work together to develop the workforce they need through a combination of post-collegiate (or no-collegiate) training and hands-on apprenticeship. Vulnerability Reduction: Insecure and unpatched systems don't just make the owners or operators of those systems insecure, they make us all insecure. Vulnerabilities in consumer devices can be exploited by criminal groups to build botnets used in denial of service attacks, to send SPAM, and to break passwords. Vulnerabilities in critical infrastructure in one sector can lead to impacts that cascade across other sectors. Private companies should work together to identify and remediate vulnerabilities in the cyber ecosystem, encourage the development of more secure systems, and evaluate the security of new technologies as they emerge. Each of these initiatives could be taken on by existing organizations like the Cyber Threat Alliance, industry groups, or by new non-profit organizations. Doubtless, there are many worthwhile similar initiatives I haven't listed here. All would meaningfully impact the cybersecurity of the nation and create a safer cyberspace in which business can thrive. And none requires partnering with the government.]]> 877 0 0 0 Cybersecurity Requires a New Risk Equation https://www.securityroundtable.org/cybersecurity-requires-a-new-risk-equation/ Wed, 09 Dec 2015 17:37:57 +0000 https://www.securityroundtable.org/?p=882 Get your copy of Navigating the Digital Age here.]]> 882 0 0 0 ]]> Cybersecurity: The Board's Role https://www.securityroundtable.org/cybersecurity-the-boards-role/ Mon, 14 Dec 2015 16:00:16 +0000 https://www.securityroundtable.org/?p=885 This article originally appeared on spencerstuart.com. Read the full article. Boards increasingly understand that cybercrime is a risk management issue that affects the entire organization and requires board oversight. However, although directors know that they need to stay informed about cybersecurity, keeping up with it in the complex, rapidly evolving world of IT is often a challenge. In response to boards' growing concern about how to approach cybersecurity, Spencer Stuart and Morrison & Foerster convened a panel to frame the board's role in overseeing cybersecurity risk and to help identify key questions directors should be asking - both of themselves and management. Our panelists identified five key aspects to the board's role in managing cybersecurity risk. 1. Accept Responsibility for Cybersecurity How a company and its board approach cyber risk depends on the industry and the company's tolerance for risk. Some boards deal with cybersecurity issues as a whole board, while others choose to delegate these matters to a standing board committee, such as the audit committee, to help facilitate achievement of those goals. However, while the audit committee may be well-equipped to address issues of risk, audit committees are not traditionally oriented towards matters of innovation, competitiveness and strategy - all of which are essential to effective technology oversight. A separate committee does not relieve the full board of its core oversight responsibilities. Boards must ensure that cybersecurity is viewed as an enterprise risk issue, not just an IT topic, and that discussion of cybersecurity gets adequate time on the board agenda and with management. 2. Set Expectations for Management Regardless of how boards structure themselves around this matter, directors should set the expectation that management will establish an enterprise-wide risk management framework with adequate staffing and budget to oversee cybersecurity risks. Boards need to ensure that they are adequately briefed about the company's security model and vulnerabilities. Briefings should occur on at least a quarterly basis, and if the management of cyber risk is allocated to a committee, the full board should also be briefed at least semiannually. Boards may also want to consider hiring outside experts to explain the latest technologies and best practices to help directors become more educated on cyber risk and preparedness. Existing third-party advisers, including law firms, audit firms and communications firms, may have skilled experts in this area. 3. Understand Your Company's Cyber Risk Assess legal risk. Boards must ensure that they understand the legal implications of cyber risk and have plans in place to deal with it. Federal and state laws often require that customers be notified in the event of a breach, and international laws, including privacy practices, may apply to some companies. There may also be industry-specific legal concerns, such as healthcare and defense, requiring special consideration. Prioritize assets. Boards should undertake a thorough analysis of the company's most valuable assets and determine the risk that each might present in the event of a cyberbreach or loss. For some companies, assets might include a patented manufacturing process, customers' private financial data, or competitive research that has been years in the making. A discussion around which risks to prioritize, avoid and mitigate should take place among directors. Consider cyber insurance. Does the company's insurance policy cover breaches? Is the coverage equal to the value of the company's assets? Some companies may consider buying dedicated cyber insurance as an additional method to transfer or mitigate risk. Identify risk from third parties. Third parties - including outsourced IT - may have vulnerabilities of their own. It is important to factor in the risk associated with partnering with third parties as companies coordinate their cybersecurity strategy. Anticipate change. Companies are especially susceptible to risks during times of change. When they move into new markets overseas, adopt new technologies with unknown vulnerabilities or bring third-party vendors into the fold; boards need to be sure that they understand new vulnerabilities that emerge as the organization evolves. 4. Assess Current Cybersecurity Practices Boards should consider the following questions when assessing their preparedness:
    • Does executive leadership have a clear and consistent understanding of cybersecurity relative to the business?
    • Does management understand its responsibility for cybersecurity and have an adequate system of controls in place?
    • Is the cybersecurity budget appropriately funded?
    • Is the organization's enterprise risk management program appropriately staffed and resourced given the types of risk assessed?
    • Are there clear policies and procedures in place in the event of a breach?
    • Is the company's disclosure response in line with SEC guidelines and shareholders expectations?
    In addition to internal audits and briefings, our panelists recommended hiring an outside auditor to evaluate the company's level of preparedness for a breach. Resistance to bringing in outside consultants is a red flag that the current cybersecurity practices and technologies may need updating. Additionally, having brought in an outside expert can pay off later, in the event of a breach: if you can show on record that you've had experts in, then you have a paper trail documenting your preparedness efforts. Many companies lack the internal security expertise to manage through a cyber-security program. The board plays an important role in mandating the use of outside experts. 5. Plan & Rehearse When a breach occurs, there will be pressure to move quickly. You will have to make a series of decisions in a matter of hours. Therefore, it is vital to have policies and procedures in place before a breach occurs. To prepare for a breach, our panelists recommended boards: Review management's response plan. Boards should ask to see management's response plan to potential cybersecurity breaches. The plan should identify who will be responsible for making decisions when a breach occurs and what actions the company will take in the event of a breach. Some questions to consider:
    • Under what circumstances will there be a public announcement? If so, when?
    • Do you need to send notice to your customers?
    • Under what circumstances will you call law enforcement?
    • In the event of a breach, will you bring in a forensic group? If so, will the forensic team report to the board or management?
    Do a tabletop exercise. It may be helpful to do a "dry run" of a breach. The time you invest will help you deal more effectively with an actual breach. Analyze what works and what doesn't, and modify your plan as necessary. Create a rapid response team. A dedicated team ready to act in the event of a breach helps ensure that your response goes smoothly. Establish a relationship with law enforcement. If you already have a relationship with law enforcement, you're ahead of the game in the event of a breach. Conclusion When it comes to cybersecurity, vigilance is key. Boards must ensure there is executive ownership - ideally at the top with the CEO and that the management team and IT are keeping security top of mind as they make decisions about new programs and products. Even with the best plans in place, it's important to recognize that cyber risk cannot be completely eliminated. Breaches are inevitable, but boards can mitigate risk and damages by staying informed and ensuring that, in the event of a breach, their company is prepared to respond.]]>
    885 0 0 0
    A Proactive Approach to Cyber Risk Management https://www.securityroundtable.org/a-proactive-approach-to-risk-management/ Wed, 16 Dec 2015 16:00:58 +0000 https://www.securityroundtable.org/?p=891 Get your copy of Navigating the Digital Age here.]]> 891 0 0 0 ]]> Key Considerations for a Security Operations Center https://www.securityroundtable.org/key-considerations-for-a-security-operations-center/ Mon, 21 Dec 2015 16:00:46 +0000 https://www.securityroundtable.org/?p=900 A tiered SOC structure The SOC can be designed around a simple detect, identify, and mitigate model. Analysts at various tiers investigate malicious activity (aka alerts or events) with these three stages in mind: Tier 1 analysts are charged with classifying the severity of the event and correlating the event with any historical activity. If necessary, Tier 1 analysts will escalate incidents to Tier 2 and 3 analysts, who will conduct in-depth investigations and perform root-cause analysis to determine what happened. Threat Defense Operations (TDO) Additionally, specialized analysts within the SOC-Threat Defense Operations (TDO) analysts-are responsible for creating detection logic in the form of signatures, rules, and custom queries based on CTI-provided threat intelligence. TDO engineers deploy the detection logic to a range of devices, appliances, tools, and sensors that make up an organization's security stack. The rules, signatures, and queries create a threat-based preventative sensor network that generates network and host-based alerts that Tier 1-3 analysts in the SOC respond to. TDO analysts will then fine-tune their detection logic based on SOC feedback, creating an efficient CFC that won't waste time investigating false alarms. The TDO team is also responsible for providing in-depth malware analysis that yields valuable technical intelligence (TECHINT) that can be used in detection logic and further enriched by CTI. Managing all the security alerts (aka "alert fatigue") This process-building detection solutions and then identifying and mitigating threats-is where many organizations struggle. Oftentimes, implementation of efficient and effective SOC processes are stifled by an overwhelming number of consoles, alerts, threat feeds, and tools that prohibit seamless workflows for analysts. While security managers should continually identify potential feeds and technologies to invest in, their impact on the SOC analyst should always be a primary consideration:
    • How many new alerts will this technology or new data feed produce?
    • Who will tune the technology to limit the number of false positives it produces?
    • Is the technology filling a gap in detection capabilities or adding on to existing capabilities?
    • How does the introduction of this new technology affect the SOC workflow?
    The main point to remember is that more technology, tools, and threat feeds do not necessarily enable your SOC to operate more efficiently. Designs that emphasize smooth workflows and "painless" methods of data collection (e.g., analysts do not need to contact other teams to access certain data) are more likely to succeed than those that prioritize technology. Organizations should focus on technology that enables SOC investigators to spend less time collecting data and more time investigating the root cause of the activity they've been alerted to. Implementing 24/7 operations and managing investigations Design and implementation should focus on standardizing daily operations, case management, and methods of "measuring success." Modern-day threats necessitate that SOCs operate 24/7, 365 days a year, requiring well-thought-out shift schedules and defined roles. Leaders with managerial and technical experience can aid in workflow management and provide analyst training. Having a well-integrated, easy-to-use case-management system that doesn't get in the way of investigations and seamlessly interacts with other SOC tools is key. This tool ideally provides metrics on how effectively your SOC monitors, detects, and contains cases and will allow an organization to identify gaps in people, processes, and technologies. Standardizing your standard operating procedures Successful implementation also demands accurate and up-to-date documentation. This includes documentation on network architecture, standardized operating procedures (SOPs), and point-of-contact lists. If the SOC is considered the "heart" of the CFC, then SOPs act as its beat, guiding analysts in situations ranging from collecting forensic evidence to stopping data exfiltration. These procedures change as new technology and organizational structures are implemented. Many organizations fail to update, train, and test their staff and leaders on SOPs, hurting their response times and containment metrics. The bottom line The SOC provides core security functions within the CFC and can achieve efficiencies through close integration with other teams such as CTI and TDO. Instead of looking to new technology first, successful organizations will constantly evaluate their security posture and frequently train their analysts on how to react to new threats. Organizations must carefully consider how new technology and tools will impact the analysts' workflow and their ability to detect and respond to threats while focusing on processes and procedures.]]>
    900 0 0 0
    3 Strategic Imperatives for Preventing Breaches https://www.securityroundtable.org/3-strategic-imperatives-for-preventing-breaches/ Mon, 28 Dec 2015 16:00:56 +0000 https://www.securityroundtable.org/?p=913 1. Process: organize to reduce your attack surface. Modern networks can be a rat's nest of systems and users cobbled together from mergers, legacy architectures, and prior acquisitions. This confusion leaves many points of entry for attackers to slip in unnoticed and reside on your network for months or even years. A critical step to preventing advanced cyberattacks is to know your network better than the attacker does. To do this you must work at simplifying your architecture down to manageable pieces that can be controlled, watched, and defended. A key step in reducing your attack surface is to only allow network traffic and communications that are required to operate your business by utilizing technology that understands the applications, users, and content transiting your network. This seems to be common sense that any unknown traffic could also be hiding malicious activity, but often when organizations take a deep look at their traffic, they find high-risk applications that they had no idea were running on their network. Legacy approaches often only search to block what is bad, rather than allowing only what is good. This approach is also known as 'white listing' and will immediately reduce the scope of your security challenge by eliminating opportunities for malware to get into your network. Another step to reducing your attack surface is to segment important components of your networks, such as data centers. As described earlier, advanced actors often seek to break into a less secure part of the network and then move laterally into more sensitive areas. By segmenting the most vital parts of a network from email or customer-facing systems, you will be building in firebreaks that can prevent the spread of a breach. You also can't neglect to secure the endpoint or individual user. This is the final battlefield. Originally, antivirus software contained signatures for malicious software and could, thus, catch most major infections from common threats because it knew what to look for. However, today's attacks can include unknown malware or exploits that are essentially invisible to antivirus software. This has led to a massive decline in the effectiveness of traditional antivirus products and a rise in a new way of thinking about endpoint protection. Rather than looking for something that can't be seen, you can reduce the endpoint attack surface by preventing the type of actions taken by exploits and malware. Stopping the type of malicious activity associated with an attack is much more effective than hunting for an attack that, by nature, is stealthy and hidden. Finally, it seems simplistic, but as you make investments to re-architect your network and reduce your attack surface, you have to use all those investments to their fullest. Purchasing next-generation technology is useless if you don't turn it on and configure it properly. Establishing a process for staying up to date on your security investments is one of the most critical habits to form. 2. Technology: integrate and automate controls to disrupt the cyberattack life cycle. Don't use yesterday's technology to address today's and tomorrow's security challenges. Legacy security approaches offer individual products to be bolted on for single-feature solutions. This leaves gaps that can be broken by new methods of attack, leaving your organization at risk. However, by using an integrated cybersecurity platform that protects across your entire enterprise, your defenses can work together to identify and close gaps that would be exploited by an attacker. Communication is key to any strong defense. If your products can't share information on what they are seeing, there is no chance to pick up clues that might aid in preventing an advanced attack. The next step is automating prevention measures. Humans have proven time and again that we are the weakest link in security. Advanced actors are faster, more persistent, and stealthier than manual response efforts. It just takes one overlooked log file or one missed security alert to bring down an entire organization. However, if you have an integrated platform that communicates visibility across your defenses, it can also automatically act on new threats, preventing what is malicious and interrogating what is unknown. Integration should also enable your organization's agility and innovation. Business doesn't stop at the elevator, as employees take laptops to work from home or use their personal mobile devices to access your corporate cloud on the road. As your data moves to enable your workforce, security should go with it. Choose a platform compatible with newer technologies such as mobile, cloud, and network virtualization. 3. People: participate in a community that shares cyberthreat information. End users cannot be relied upon to identify every malicious URL or phishing attack. Organizations must educate their constituents about what they can do on their part to stop cyberattacks. However, beyond education, to protect against today's truly advanced cyberthreats, we must utilize the global community to combine threat intelligence from a variety of sources to help 'connect the dots.' Real-time, global intelligence feeds help security teams keep pace with threat actors and easily identify new security events. As attackers move from target to target, they leave digital fingerprints in the form of their tactics, techniques, and procedures. By analyzing this evidence and then sharing it, threat intelligence from other organizations can quickly inoculate you from new attacks as bad guys seek to move between organizations and even industries. Combined with an integrated platform that can act automatically on this intelligence, you can rapidly distribute warnings and make it impossible for attackers to strike twice. The network effect from vendors with large customer bases is extremely powerful as it builds a security ecosystem, which can organically respond to new threats. Many organizations are even coming together to share threats as an entire sector. Recent policy from the U.S. Government has made it easier to collaborate and share cyberthreat information between companies and work together to identify and stop advanced cyber actors. The most significant way to fill in all the gaps and truly protect an organization from advanced and targeted threats is to implement an integrated and extensible security platform that can prevent even the most challenging unknown threats across the entire attack life cycle. An IT architecture must remain secure while also providing business flexibility and enabling applications needed to run day-to-day operations. Stopping even the most advanced attacks is possible, but we have to begin with a prevention mindset.]]> 913 0 0 0 Preparing for New EU Data Protection Regulations https://www.securityroundtable.org/preparing-for-new-eu-data-protection-regulations/ Wed, 30 Dec 2015 15:00:47 +0000 https://www.securityroundtable.org/?p=924 Get your copy of Navigating the Digital Age here.]]> 924 0 0 0 ]]> Cybersecurity: No Longer Just a Boardroom or Server Room Issue https://www.securityroundtable.org/cybersecurity-no-longer-just-a-boardroom-or-server-room-issue/ Wed, 06 Jan 2016 16:00:14 +0000 https://www.securityroundtable.org/?p=927 Get your copy of Navigating the Digital Age here.]]> 927 0 0 0 ]]> Cybersecurity Disputes in Contract Negotiation and Data Processing https://www.securityroundtable.org/cybersecurity-disputes-in-contract-negotiation-and-data-processing/ Tue, 12 Jan 2016 16:00:03 +0000 https://www.securityroundtable.org/?p=943 Contract Negotiation Contractual parties, especially government agencies, are becoming more sophisticated about requesting provisions related to cybersecurity during contract negotiations. Frequently, these provisions will place additional burdens on the counterparty, leading to disputes during negotiation. Many businesses are also attempting to apply existing contract provisions to cybersecurity matters. When this reinterpretation is put forward in the wake of a security breach, the reinterpretation can lead to costly litigation. a) Flow-down provisions Federal agencies, especially the U.S. Department of Defense, are including more flow-down provisions related to cybersecurity in their contracts with suppliers. Often, the agency requires its contractors to include these provisions in their contracts with subcontractors and other contractual counterparties. As these flow-down provisions expand through the supply chain, businesses with no direct connection with the federal agency will see requests-or demands-that they comply with provisions drafted without their input. These provisions can include security standards and breach disclosure requirements. For instance, Defense Federal Acquisition Regulation Supplement (DFARS) 204.7300 requires "adequate security" for all contractors and subcontractors with systems on which controlled technical information is resident on or transits. As with many of these provisions, "adequate security" is not defined with a checklist but as "protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to, or modification of information." These same provisions include reporting requirements for both actual and potentially adverse effects on an information system, which is a more stringent requirement than many state data breach requirements. Compliance with these provisions will be difficult, and the set language created by such provisions prevents businesses from negotiating more concrete terms, forcing businesses to accept uncertainty as a cost of entering into such a contract. b) Liability/indemnity Cybersecurity creates risk, and more businesses are looking to affirmatively allocate that risk through contractual terms. Actuaries are still developing tables related to cybersecurity risk (Congress is discussing legislating on this issue), so the allocation of risk in a contract may not be based on methods as rigorous as those in other risk allocations. This will create tension between parties who value the risk differently. Cybersecurity incidents and the attendant response can be very expensive, with some sources placing the average financial cost of a data breach in the millions of dollars. The allocation of such cost, combined with an increasing chance of an incident triggering these clauses, is an area likely to be subject to dispute both during contract negotiation and in the wake of a breach. Many contracts already contain liability allocation provisions, but those provisions do not explicitly address cybersecurity matters. In the wake of a cybersecurity incident, interpreting the liability allocation provisions will be a matter of some dispute. c) Data security and notificationLaws, regulations, and political and consumer pressure have increased businesses' focus on the security of consumer data. At the same time, consumer data have become a more valuable commodity. For instance, AT&T and Apple both contested Radio Shack's ability to sell consumer data during Radio Shack's bankruptcy. Recognizing these trends, businesses are placing more provisions in contracts that dictate security requirements. Because the underlying consumer data are valuable, these provisions may be subject to significant disputes during negotiations. Other businesses are attempting to read existing provisions as covering security requirements and privacy responsibility. Many businesses that entrust sensitive data to counterparties are including breach notification provisions in contracts. These provisions vary greatly, even within a single industry, and create various thresholds for notification. For instance, some provisions require notification in the event of a breach. Others require notification if there is an indication of a breach. Many victims of a security breach seek to keep the existence of a breach out of the press, which can create tension with notification provisions. Data ownership and data processing Most state breach notification laws differentiate between data owners and data processors, but existing contracts do not always explicitly define these roles. Some businesses have attempted to understand these issues and have asserted ownership (or, in some cases, denied ownership) of data in the absence of a specific ownership allocation. This can lead to disputes in long-standing business relationships. One business may seek to sell information it is collecting while a contractual counterparty is attempting to safeguard the same data. Not all businesses seek to clarify this relationship prior to selling data, which can lead to significant disputes when such sales come to light. Download your copy of Navigating the Digital Age, available from SecurityRoundtable.org, to learn more about the risks of disputes and regulatory investigations related to cybersecurity matters. ]]> 943 0 0 0 Hiring and Retaining Top Talent to Lead Your Cyber Risk Management Program https://www.securityroundtable.org/hiring-and-retaining-top-talent-to-lead-your-cyber-risk-management-program/ Wed, 13 Jan 2016 16:00:52 +0000 https://www.securityroundtable.org/?p=996 Get your copy of Navigating the Digital Age here.]]> 996 0 0 0 ]]> How to Respond in the Aftermath of a Cyber Breach https://www.securityroundtable.org/how-to-respond-in-the-aftermath-of-a-cyber-breach/ Wed, 20 Jan 2016 16:00:19 +0000 https://www.securityroundtable.org/?p=1005 Get your copy of Navigating the Digital Age here.]]> 1005 0 0 0 ]]> Achieve Cyber Readiness Through Workforce Development https://www.securityroundtable.org/achieve-cyber-readiness-through-workforce-development/ Mon, 25 Jan 2016 16:38:23 +0000 https://www.securityroundtable.org/?p=1012 Recommendations for Growing and Managing Talent The talent management challenges for cyber operations are much more complex because there is a major crisis to backfill cyber talent. Even once your organization recruits top cyber professionals, there is no guarantee you will retain them. As such, it is not enough for cybersecurity to be relegated to a subset of people, as with the IT function. Every employee in your organization faces cyberthreats, and talent management for IT and cyber operations should not be combined. By shifting this mindset and developing strategies that reflect these realities, your ability to develop an effective workforce will immediately improve. Here are some recommendations to get you started: Develop alternative talent management strategies Most cybersecurity professionals are personified by their love for cutting-edge technology, casual work environments, and creative mindsets. These unique tendencies help them excel under the constantly changing cyber environment but differentiate them from the rest of your company in a number of ways-fundamentally, their atypical characteristics of (1) work environment, (2) work preferences, and (3) nontraditional career paths. Recruiting, developing, and retaining this unique workforce requires alternative talent management strategies-strategies that are often connected to but distinct from those applied across the rest of your company. Understand work preferences Like the work environment, your cybersecurity professionals also have unique work traits. These traits, or work preferences, make them the perfect candidates to tackle the daily challenges from threat actors around the globe but also can separate them from the rest of your organization. Recognizing these work preferences, for your capability as a whole as well as on an individual level, is critical to developing your cyber talent management strategies. If your cybersecurity professional has a social media profile, it may look something like this: Lover and early adopter of new technologies, as a cybersecurity professional my passion for technology fuels my curiosity to solve complex problems. I am a systems thinker with confidence in my ability to put things together and learn new techniques while using my competitive nature to fuel my work as well as engage in office competitions. As a natural problem solver and abstract thinker, I tend to look 'outside the box' and evaluate challenges from many different angles and perspectives before acting. As one method, try offering applicants an on-the-spot challenge while testing their ability to solve problems using scenario-based challenges. Capitalize on your employees' problem solving skills by allowing them to be a part of strategy, offense, and defense and by fostering a culture that encourages every level of employee to suggest solutions. Reward your employees for forward thinking, provide them with constantly changing tasks with different levels of difficulty, and present opportunities to work with emerging technologies. Download your copy of Navigating the Digital Age to about learn more recommendations for improving your cybersecurity workforce. ]]> 1012 0 0 0 Two Key Tenets of EU Regulations https://www.securityroundtable.org/two-key-tenants-of-eu-regulations/ Wed, 27 Jan 2016 16:00:00 +0000 https://www.securityroundtable.org/?p=1015 Get your copy of Navigating the Digital Age here.]]> 1015 0 0 0 ]]> ]]> Allocating Authority and Responsibility When Building a Cybersecurity Program https://www.securityroundtable.org/allocating-authority-and-responsibility-when-building-a-cybersecurity-program/ Mon, 01 Feb 2016 16:00:54 +0000 https://www.securityroundtable.org/?p=1018 CYBER RISK CORPORATE STRUCTURE The nature of the threat landscape is evolving, while the underlying technology platforms that hold sensitive data are also changing. In this fluid environment, management must create a nimble program of active cyber defenses informed by an iterative risk management process. For the foreseeable future, cybersecurity program oversight will not be one that can be reduced to an annual review process. When cyberattacks go undetected for months and then bring a company to its knees overnight, the level of vigilance and communication is heightened. To be effective, the structure has to be distributed throughout the organization, and risk thresholds have to be set that cause unplanned alerts to drive management action on a regularly scheduled review and ad hoc incident-response basis. Often the primary risk to cyber assets is a cyberattack. The sophistication and determination of known threat actors drives the executive team to put on war paint and respond in kind. Unlike other enterprise risks that can be managed with traditional controls, cybersecurity requires the mindset of a warrior. Think in terms of Sun Tzu's guiding principles published in 473 BC, The Art of War: "We must know ourselves and our enemies and select a strategy to positively influence the outcome of battle. There is no reason to fear the attack but there is reason to be concerned about our readiness to defend ourselves from the attack and respond appropriately" The most common approach for creating and maintaining an enterprise cybersecurity program follows a five-step risk management process. The process is iterative and constantly informed by new information. We are often asked, "When will the cybersecurity program be completed" Unfortunately, the answer is never. Cybersecurity has to be viewed as a process and not an end point, the proverbial marathon versus sprint. Each of the steps in the process requires participation at multiple levels across an organization, outlined as follows: 1. Plan
    • Cyber asset inventory and environment characterization
    • Risk assessment and risk management strategy
    • Governance and organization structure
    2. Protect
    • Program control design, control selection, and implementation
    • Training
    • Maintenance
    3. Detect
    • Threat and program effectiveness monitoring and reporting
    • Incident alerting and response planning
    4. Respond
    • Event analysis and escalation
    • Containment, eradication, and recovery
    5. Adjust
    • Lessons learned and program adjustment
    • Communications
    Levels of Authority and Responsibility Below is a summary of how risk assessment management duties and responsibilities are typically allocated: Executive-level
    • Prioritize critical assets
    • Establish risk appetite
    • Approve risk management strategy
      • Mitigate the risk
      • Transfer the risk
      • Accept the risk
    • Approve the program and policies
    • Assign responsibilities
    • Provide oversight
    Business Unit-level
    • Define boundaries
    • Design use case scenarios to understand impact from system attack and compromise
    • Identify constraints for mitigating all risk
    • Develop a justified risk management strategy
    • Identify all required users of systems or delegates to receive data on a "need to know" basis
    Systems management-level
    • Recommend technical and physical controls
    • Identify threats and systems vulnerabilities
    • Evaluate the likelihood and probability of impact for each threat and vulnerability
    • Estimate the impact on systems and operations from a financial, legal and regulatory perspective
    For detailed discussion of the governance process and roles and responsibilities, download your copy of Navigating the Digital Age from right here on Security Roundtable. ]]>
    1018 0 0 0
    Defining Your Cyber Risk Exposure https://www.securityroundtable.org/defining-your-cyber-risk-exposure/ Wed, 03 Feb 2016 16:22:46 +0000 https://www.securityroundtable.org/?p=1025 Get your copy of Navigating the Digital Age here.]]> 1025 0 0 0 ]]> Cyber Insurance: Does It Make Sense for Your Organization? https://www.securityroundtable.org/cyber-insurance-does-it-make-sense-for-your-organization/ Mon, 08 Feb 2016 16:00:13 +0000 https://www.securityroundtable.org/?p=1028
  • It can incentivize enterprises to build resilience against attacks and the resulting losses.
    • Insurers can reward a strong cyber security posture through lower premium and self-insured retentions or broader coverage.
    • It transfers residual risk from the balance sheet as part of a broader enterprise risk management strategy.
    The following is a preview of blog posts that appeared recently on the Lockton Market Update. Each installment explores a different aspect of cyber insurance and why it makes sense for most organizations. The Demand for Cyber Insurance has Skyrocketed. But Is It Worth the Investment? In a relatively short space of time, the attitude of Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) toward cyber insurance has flipped 180 degrees. It used to be a major challenge for insurance brokers to engage IT department stakeholders who saw little value in insurance with the money better invested in mitigation tools. Many would agree that a red line was clearly crossed following the Target breach. Cybersecurity professionals no longer view defense as a "prevention" exercise and have adapted their strategy to build "resilience" within the enterprise, thereby minimizing the financial impact. For industries that hold large volumes of payment card data and personally identifiable information, such as Retail, Healthcare and Financial, the demand for cyber insurance will only continue to grow. Find out why cyber insurance demand is skyrocketing and why it will continue to do so. To Legislate or Not to Legislate; That is the Question A risk transfer strategy as part of an overall enterprise approach to cyber security has rapidly become indisputable. However, the insurance industry is beginning to understand that it has an important and wider role to play. Sharing cyber security threat information between companies in the private sector - and with the government - is an important means of creating an early warning system against incoming attacks. Companies will also be able to learn about specific attack vectors, the vulnerabilities that they exploit and patch or prepare before it is too late. Read more about the role of cyber insurance and why it's becoming more than a financial instrument to transfer risk. Why the Cyber Insurance Market will be Sustainable in 2016 and Beyond Quantifying cyber risk remains a major challenge to the industry but AM Best's research estimated that the probable maximum loss from a single cyber related event was $31 billion, well in excess of $4.6 billion for a nuclear loss. As such, demand for cyber insurance in the US is booming following the increasing frequency and severity of attacks over the last couple of years. Total premium spend today is estimated to be close to $3 billion and by 2020 could reach $7.5 billion according to PricewaterhouseCoopers. Though the outlook for the cyber insurance market is positive, the interconnectivity of the digital world means that the wider insurance industry must quickly begin to understand aggregation of risk. Learn more about how prepared the industry is for cyber related events and if it presents an existential threat. Want to learn more? These concepts, and others, are outlined in more detail in the "Investment in Cyber Insurance" chapter I authored in the new book, Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers (published by Palo Alto Networks and the New York Stock Exchange).]]>
    1028 0 0 0
    Setting the Cybersecurity Tone From the Top https://www.securityroundtable.org/setting-the-cybersecurity-tone-from-the-top/ Wed, 10 Feb 2016 17:58:42 +0000 https://www.securityroundtable.org/?p=1031 Get your copy of Navigating the Digital Age here.]]> 1031 0 0 0 ]]> Ten Steps For U.S. Multinational Employers Towards Compliance With Europe’s New Data Protection Framework – The General Data Protection Regulation https://www.securityroundtable.org/ten-steps-for-u-s-multinational-employers-towards-compliance-with-europes-new-data-protection-framework-the-general-data-protection-regulation/ Wed, 17 Feb 2016 16:00:10 +0000 https://www.securityroundtable.org/?p=1035 This article was first published in the International Association of Privacy Professionals' Privacy Tracker blog and also appeared on Littler's Insight publication.

    The European Union's (EU) new data protection framework, known as the General Data Protection Regulation (the "Regulation"), is, at bottom, a response to the astonishing evolution in online commerce.1 As a result, only one of the Regulation's 91 articles specifically addresses the personal data of employees. This gap means U.S. multinational employers - especially those engaged in business-to-business ("B-to-B") commerce - must carefully parse the Regulation to figure out how it applies to their management of a global workforce. To assist in that effort, this Insight describes 10 practical steps that U.S. multinationals can take towards satisfying those provisions of the Regulation with the greatest impact on managing a global workforce.

    Overall, the Regulation will not demand dramatic changes in the policies and procedures previously implemented to comply with the European Union Data Protection Directive (the "Directive"), the EU's pre-existing framework document for data protection that the Regulation expressly repeals and replaces. However, in order to comply with the Regulation, virtually all U.S. multinational employers likely will need to update at least some of their existing policies and procedures, and re-align some of their practices, for handling the personal data of employees of their EU subsidiaries.

    While the compliance requirements have not changed significantly, the enforcement risk has increased dramatically. The Regulation empowers data protection regulators to impose administrative fines of 20 million Euro, or up to 4% of a corporate group's worldwide gross annual revenue, for most violations and up to 2% of that amount, or 10 million Euro, for less serious violations. Regulators also can ban data processing at the EU subsidiary and suspend data transfers to the parent corporation. Consequently, U.S. multinationals should take advantage of the two-year grace period to come into compliance. The grace period will commence at some point in early 2016 when the Regulation is published in the Official Journal of the European Union.

    Ten Practical Steps For Compliance

    1. Watch For New Member State Employment Laws To Implement The Regulation

    As noted above, only one of the Regulation's 91 articles specifically addresses the personal data of prospective, current or former employees (collectively, "employee data"). Article 81 of the version published by EU authorities in December 2015 provides that EU Member States may enact laws specific to the processing of employee data to implement the Regulation. For multinational employers, this provision could defeat one of the principal putative benefits of the Regulation-to establish a single set of data protection rules applicable in all 28 EU Member States to eliminate complexity, ensure consistency and reduce administrative costs. In respect of employee data, the Regulation should therefore be read in conjunction with any applicable laws of relevant EU Member States that regulate the handling of employee data.

    Even though the Regulation specifically addresses employee data in only one article, the Regulation applies broadly to the processing of all "personal data," which is defined to mean "any information related to an identified or identifiable natural person." Consequently, U.S. multinationals need to determine how to apply, in the employment context (together with the applicable local employee data protection laws), regulatory requirements designed to protect online consumers and numerous other categories of data subjects.

    The Regulation's scope is broad in another way that impacts U.S. multinationals. The Regulation applies to all EU residents, regardless of citizenship. For U.S. multinationals, this means that expatriates working at an EU subsidiary are entitled to all of the Regulation's protections when their data is collected while they reside in the EU.

    2. Identify Permissible Purposes For Processing Employee Data

    In contrast to U.S. law, which allows employers to collect, use and disclose employee data for almost any purpose unless specifically prohibited by law, the Regulation-following prior law-establishes the exact opposite rule, i.e.,employers can lawfully "process" employee data only if the Regulation specifically permits the processing. The Regulation defines "processing" to cover any operation during the course of the information life cycle, from initial collection to final destruction, and includes cross-border data transfers.

    Only a few of the permissible purposes for processing personal data identified in the Regulation may apply in the employment context. Identifying the permissible purpose for processing each category of employee data is a critical exercise. The Regulation authorizes the maximum administrative fines-as noted above, up to 4% of gross annual worldwide revenue for the corporate group-for the processing of personal data without a permissible purpose.

    a. Consent Generally Will Not Be A Valid Ground For Processing In The Employment Context

    While the Regulation permits processing of personal data with the consent of the data subject, the Regulation also provides that consent is not valid unless it is "freely given, specific, informed and unambiguous." Neither the preamble to the Regulation nor the Regulation itself specifically addresses whether an employee can freely give consent in the context of the employment relationship. However, EU regulators construed similar language in the Directive to mean that employees generally could not freely give consent to their employer's processing of their personal data due to the significant imbalance in power between employers and employees. Consequently, employers who consider relying on employee consent as a lawful ground for processing personal data should carefully assess whether consent would be freely given or voluntary. Any threat of discipline, termination, or other significant detriment for refusing to consent likely would invalidate the employee's consent. In addition, employers should watch for new Member State laws and administrative guidance addressing this issue.

    Employers who do identify circumstances where consent could be a lawful basis for processing must fulfill the Regulation's other requirements for valid consent. To be specific and informed, employees' consent should be preceded by a robust notice of data processing that meets the requirements described in Step 3, below. To be unambiguous, the consent must be manifested by an affirmative statement or action, i.e., "opt-in" consent; failure to object to a request for consent, also known as "opt-out" consent, will not suffice.

    The Regulation imposes on the "data controller" the burden of proving the validity of consent, and any request for consent in a written document must be "clearly distinguishable" from the document's other text. The Regulation defines "data controller" as the natural person or legal entity that decides the "purposes and means of processing" personal data. This definition would include an employer. Consequently, employers who intend to rely on consent as a ground for processing should consider satisfying these requirements by having employees execute a clearly separate consent statement at the end of the notice of data processing described in Step 3, below, or if that notice does not address the specific processing that is the subject of the request for consent, by executing a standalone consent statement in some other form.

    Employers should beware that employees have the right to withdraw consent at any time, and they must be informed of that right.  This can be accomplished through the notice of data processing or other form used to obtain consent.

    b. Processing Necessary To Perform An Employment Contact Is A Viable Ground But Likely Will Be Narrowly Construed

    The Regulation permits processing if "necessary for the performance of a contract" with the data subject, i.e., an employee. Given administrative interpretations of prior EU law, this ground likely will be construed to cover only processing with a close nexus to the employment contract, such as the payment of compensation and benefits or processing requests for sick leave or vacation. By contrast, this ground likely will not be broad enough to cover processing that is more ancillary to the employment relationship, such as for purposes of making travel arrangements or offering diversity awareness training. It is still uncertain whether and to what extent this ground would support any data processing by the parent corporation for the parent corporation"s own (or joint) purposes, such as global succession planning, because the parent corporation does not have an employment contract with the employees of its EU subsidiaries. However, processing by the parent corporation to facilitate the subsidiary's administration of its employment contract with the employee, such as to make a human resources information system (HRIS) database available to the subsidiary-employer, likely would fall within the scope of this ground.

    c. Processing To Comply With Legal Obligations Is Limited To Obligations Established By EU And Member State Law

    The Regulation permits the processing of employee data to comply with legal obligations "to which the data controller is subject." Importantly for U.S. multinationals, this ground applies only to legal obligations imposed by EU or Member State law on the controller, i.e., the subsidiary-employer. Consequently, U.S. legal requirements, such as the requirement to implement a litigation hold in civil litigation or to produce information in response to a subpoena issued by a U.S. court, would not provide a valid basis for processing the personal data of EU employees.

    d. Processing For The "Legitimate Interests" Of The Employer Is Subject To An Employee’s Right To Object

    The Regulation permits processing that is necessary to achieve the "legitimate interests" of the employer. However, an employer cannot rely on this ground unless it (a) balances its legitimate interest against the employee's rights and determines that those rights are not overriding; and (b) notifies the employee, in writing, of the legitimate interest pursued and of the employee's right to object to the processing. If the employee objects, the employer must cease its processing in reliance on this ground unless the employer can demonstrate (a) "compelling legitimate grounds" for the processing that override the employee's interests, or (b) that the processing is necessary to establish, pursue or defend legal claims.

    Applying the balancing test in the absence of further guidance will prove difficult. That said, an employer likely will be able to justify processing of employee data that is not particularly sensitive on the legitimate interest ground where there is a tight nexus to the employment relationship, such as processing an employe's contact details to arrange business travel or for diversity awareness training. By contrast, processing employee data with little or no tie to the employment relationship, such as to market the employer's own products or services to the employee, almost surely would not be justified on this ground.

    3. Update Notices Of Data Processing

    As with prior law, the Regulation requires that data controllers distribute a notice of data processing to each individual when personal data is first collected. As applied in the employment context, this means that employers will be required to provide a notice to job applicants concerning the processing of their data during the application process as well as a notice to new hires, typically during the onboarding process, explaining how their personal data will be processed during the employment relationship.

    While this basic notification requirement is unchanged, the Regulation requires a far more robust notice. The notice must include the following information: (a) the identity and contact details of the employer; (b) the purposes for the processing and when the processing is based on legitimate interests, a description of those interests; (c) the categories of recipients of disclosures of personal data; (d) that the controller intends to transfer personal data to a third country and the legal basis for the transfer (described in Step 5, below); (e) the period for which the personal data will be stored or the criteria for determining the period; (f) how employees can exercise the rights of access, correction, erasure, and objection; (g) where processing is based on consent, the right to withdraw consent; (h) the right to file a complaint with a data protection authority ("DPA"); (i) whether the employee is obliged to provide the data by statute, contract, or for another reason, and the possible consequences of failing to provide the data; and (j) whether the personal data will be subject to automated processing and, if so, the logic and the consequences of the processing for the data subject.

    It is not yet clear whether employers will be required to issue updated notices to employees who received a notice that was valid under prior law or whether a notice that meets all of the Regulations' requirements will need to be distributed only to employees who are hired after the Regulation goes into effect.

    4. Ensure That Employees Can Exercise Their Rights Of Access, Correction, Erasure, And Objection

    The Regulation places substantial emphasis on individuals' rights of access, correction, erasure, and objection as a means of achieving the new law's broader objective of protecting individuals' fundamental right of privacy. To that end, the Regulation requires that employers provide employees with a mechanism to exercise these rights and to respond, in writing, to any request without undue delay and, at the latest, within one month. The response period may be extended for up to two additional months in light of the complexity and number of requests. Any denial of a request must include the reasons for the denial and the right to file a complaint with the DPA or to seek judicial relief. All responses to requests must be free of charge unless the request is manifestly excessive (generally because it is repetitious). If the employer has doubts regarding the identity of a person making a request, it may ask for verification of the person's identity.

    While prior law provided a right of access and correction, the right of erasure (also known as the "right to be forgotten") is new. Employees generally have the right to require the employer to delete their personal data when, for example, (a) the data no longer is necessary for the purposes of which it was collected; (b) the employee has withdrawn consent to processing, and no other ground for processing is available; and (c) the employee objects to processing, and there is no compelling ground that overrides the employee's interests. However, employers are not required to erase any employee data that they are required to retain under EU or Member State law that is necessary to establish, pursue, or defend legal claims.

    Employers should note that, subject to further administrative guidance, executing an employee's request "to be forgotten" could be technically challenging and administratively burdensome. In today's online environment, employee data rarely is confined to a personnel file maintained by the human resources (HR) department. Rather, to fully comply with an erasure request, employers could be required to search numerous internal systems - including the corporate intranet, internal social media platforms, document management systems, and corporate e-mail - and to communicate with the many service providers with which HR departments routinely contract.

    5. Implement A Mechanism For Lawful Cross-Border Transfers Of Employee Data

    The Regulation's overall scheme for cross-border data transfers is materially the same as that under the Directive. This scheme generally prohibits transfers of employee data outside the EU unless the EU subsidiary-employer ensures that the recipient, typically the parent corporation, but sometimes also other non-EU members of the corporate group, will ensure an adequate level of protection for the transferred data.

    The employer-subsidiary satisfies this adequacy requirement if the European Commission (the "Commission") has determined that the receiving country ensures an adequate level of protection for the transferred data. The Commission's prior adequacy determinations under the Directive remain in effect. Hundreds of U.S. multinational employers relied on the Commission's determination that the U.S.-EU Safe Harbor Framework provided an adequate level of protection until the European Court of Justice invalidated that determination on October 6, 2015. If current negotiations between the U.S. Commerce Department and the Commission result in an adequacy determination for a replacement framework, the Regulation would permit EU subsidiaries to rely on that mechanism to transfer employee data to a U.S. parent corporation provided that (a) the parent corporation complies with the replacement framework; and (b) one of the lawful grounds for processing employee data described in Step 2, above, applies to the cross-border data transfer.

    Until the Commission issues an adequacy determination regarding data transfers to the United States, U.S. multinationals generally will need to rely on one of the other mechanisms identified in the Regulation. These mechanisms include the standard contractual clauses ("SCCs") approved by the Commission under the Directive as well as binding corporate rules ("BCRs"). The SCCs are a form agreement between the data exporter (the EU subsidiary-employer) and the data importer (the U.S. parent corporation and any non-EU affiliate that receives EU personal data). BCRs are legally binding policies applicable to all members of a corporate group, whether located within or outside the EU, and are enforceable by employees as third-party beneficiaries. To date, fewer than 75 U.S. companies have implemented BCRs as compared to more than 4,000 that certified to the Safe Harbor Framework.

    The Regulation potentially makes BCRs more attractive by codifying a "one-stop shop" approach to regulatory oversight that provides a more streamlined and timelier approval process for BCRs. Under this process, the DPA for the employer's "main establishment" would be the employer's "sole interlocutor" or "lead" DPA with respect to the approval process, meaning that the employer would not be required to deal directly with any other DPA for purposes of obtaining approval of the BCRs. The employer's "main establishment" would be "the place of central administration in the [EU]" unless another establishment in the EU determines how data will be processed. The Regulation also establishes specific deadlines for review and approval of BCRs by other concerned DPAs and by the European Data Protection Board. The Board is composed of the head of the DPA for each of the 28 EU Member States and replaces the Article 29 Working Party, which was responsible for overseeing implementation of the Directive.

    U.S. multinationals should note that the one-stop shop approach is just one way in which the Regulation streamlines the DPA's supervision of data processing. The Regulation also abolishes virtually all requirements to submit notifications to, and otherwise to consult with, DPAs regarding data processing.

    6. Develop A Written Information Security Program And A Security Incident Response Plan In Light Of The Regulation's New Breach Notification Requirement

    The Regulation requires employers to implement administrative and technical safeguards for employee data to reduce identified risks and to prevent a "personal data breach."  The Regulation defines a breach to mean a "breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data."  The Regulation does not specify safeguards that must be implemented, but it does identify the following steps and objectives as potentially appropriate: (a) pseudonymization and encryption; (b) the ability to ensure the confidentiality, integrity and availability of personal data; (c) disaster recovery capabilities; and (d) a process for regularly testing, assessing and evaluating the safeguards. Having a subsidiary-employer implement safeguards similar to those required by the HIPAA Security Rule or by Massachusett" information security regulations likely will meet this standard.In addition, regulators most likely will publish detailed security guidelines during the two-year grace period before the Regulation goes into effect.

    When a personal data breach does occur, the Regulation requires prompt action. The employer must notify the DPA within 72 hours, and if that notification is delayed, explain the reason for the delay. Notification is not required if the breach "is unlikely to result in a risk for the rights and freedoms of individuals."  The employer must document its breach response sufficiently to permit the DPA to verify compliance with the Regulation.

    Employers must notify affected employees of a personal data breach "without undue delay," if the breach is "likely to result in a high risk to the rights and freedoms of individuals," or if ordered to do so by the DPA. As with U.S. breach notification laws, the Regulation establishes an "encryption safe harbor," meaning that the employer is not required to notify affected individuals if their personal data is subject to encryption that renders the information unreadable. Notification to individuals also is not required if (a) the employer took steps to ensure that the high risk to employees does not materialize, or (b) notification would involve disproportionate effort, but in this case, the employer must provide notice by public communication, such as by posting notice on a web site or by publication in the media.

    7. Vet Vendors That Will Receive Employee Data And Negotiate Vendor Agreements That Meet The Regulation's Requirements

    The U.S. parent corporation typically will select certain vendors to provide employment-related services to the entire corporate group, such as stock option administrators, online performance evaluation platforms, and providers of HRIS data bases. Because the parent corporation effectively is contracting on behalf of its EU subsidiaries, it should comply with the Regulation's requirements when entering these arrangements if the service provider will process EU employee data.

    To begin with, the parent corporation should vet the service provider's ability to comply with the Regulation. In particular, the parent corporation should take steps to assess whether the service provider has adequate technical and administrative safeguards in place and has the capability to fully satisfy employees' requests to exercise their rights with respect to their personal data stored at the service provider.

    The Regulation also specifies a long list of matters that must be addressed in the service agreement. The service agreement must address, for example, (a) the subject matter and duration of the processing; (b) the nature and purpose of the processing; and (c) the types of personal data and categories of data subjects. The service agreement also must impose numerous obligations on the service provider, including, for example, that the service provider: (a) process personal data only subject to the employer's instructions, (b) require its employees to execute a confidentiality agreement; (c) implement required security measures;

    (d) assist the employer fulfill its obligations to respond to requests by employees to exercise their rights; and (e) cooperate with the employer in fulfilling its breach notification obligations.

    8. Beware Of High-Risk Processing That Can Trigger Additional Compliance Requirements

    The Regulation provides that the processing of "special categories of personal data," also known as "sensitive personal data," is prohibited unless an exception applies. Sensitive personal data includes race or ethnic origin, data concerning health or sex life and sexual orientation, trade-union membership, genetic data, biometric data, political opinions, and religious or philosophical beliefs. An employer can process sensitive personal data only in the following limited circumstances: (a) the employee gives explicit consent (except where the law does not permit the employee to consent); (b) processing is necessary for the employer to fulfill obligations and exercise specific rights established by EU or Member State law; or (c) processing is necessary to establish, pursue or defend against legal claims. In addition, a health care professional can process personal data concerning an employee's health when necessary for preventive or occupational medicine, to assess the working capacity of the employee, or to provide care.

    Given the Regulation's emphasis on protecting sensitive personal data, regulators likely will narrowly construe these exceptions. Consequently, EU subsidiary-employers should scrutinize and restrict their collection of sensitive personal data. Likewise, U.S. parent corporations should carefully assess whether any of the exceptions would justify transferring any categories of sensitive personal data to the United States, and if so, whether the cross-border data transfer really is necessary.

    The Regulation also establishes a special rule for the processing of criminal history information, albeit that category is not specifically identified as sensitive personal data. Under that special rule, an employer can process criminal history information - even with an applicant's or employee's consent - only if specifically authorized by EU or Member State law to perform a criminal history check. Consequently, the U.S. parent corporation likely will not be able to lawfully apply policies broadly requiring criminal history checks of U.S. applicants and employees to applicants and employees located in the EU.

    9. Maintain Required Records Of Data Processing

    The Regulation requires that employers maintain detailed records concerning their data processing. These records must be provided to the DPA upon request.

    The information to be recorded includes the following: (a) contact information for the employer; (b) the purposes of the processing ; (c) the categories of data subjects and of personal data processed; (d) the categories of recipients, including those in third countries; (e) the third countries to which personal data will be transferred and the instrument, e.g., SCCs or BCRs, used to provide an adequate level of protection; (f) where possible, the envisaged retention periods for different categories of employee data; and (g) a general description of the security measures for employee data.

    10. Watch For Additional Guidance

    Although the Regulation contains more detailed compliance requirements than the Directive, the Regulation's requirements are much less detailed than what U.S. multinationals are used to seeing in U.S. regulations. However, the Regulation confers on the European Data Protection Board the authority to issue guidance on topics such as breach notification and binding corporate rules. Further guidance on these and other topics almost surely will be forthcoming during the two-year grace period before compliance with the Regulation becomes mandatory.


    This article was first published in the International Association of Privacy Professionals' Privacy Tracker blog.

    The HIPAA Security Rule establishes standards for safeguarding protected health information. See generally 45 C.F.R. pt. 164.302-164.318. Massachusetts' information security regulations establish standards for safeguarding sensitive personal information of Massachusetts residents, such as Social Security numbers, driver's license numbers and credit card numbers. See generally 20 CMR 17.00.

    ]]>
    1035 0 0 0
    Cybersecurity: A CFO’s Perspective https://www.securityroundtable.org/cybersecurity-a-cfos-perspective/ Thu, 25 Feb 2016 15:27:19 +0000 https://www.securityroundtable.org/?p=1039 Get your copy of Navigating the Digital Age here.]]> 1039 0 0 0 ]]> The Value of Curiosity and Other Lessons Learned from The New York Stock Exchange’s Cyber Risk Board Forum https://www.securityroundtable.org/the-value-of-curiosity-and-other-lessons-learned-from-the-new-york-stock-exchanges-cyber-risk-board-forum/ Thu, 10 Mar 2016 21:00:21 +0000 https://www.securityroundtable.org/?p=1055 New York Stock Exchange's Cyber Risk Board Forum, held during the recent RSA 2016 conference in San Francisco. Starting the day with NSA Director Admiral Michael Rogers, a select group of board members and CEOs were walked through an executive level cyber attack scenario, developed by Stroz Friedberg and Palo Alto Networks, and had a marquee lineup of panelists discussing topics ranging from developing a security action plan to assessing insider risk. During NYSE's traditional "peer to peer" session, audience members had a chance to break off into small groups and share their views on the discussions throughout the day. For this event participants ran through an "After Action Review" to discuss lessons learned from the earlier cyber attack scenario and share any personal advice or experiences they had. Below are some of the top takeaways from board members who have faced down cyber incidents and come away smarter and stronger:
    • Education is a long process, but avoids a single point of failure. While many boards will have members who specialize in different areas of expertise, total responsibility for cyber risks cannot be pushed onto only one person. As our world become increasingly reliant on digitization, cyber risks and areas for IT innovation are woven into the business fabric of an organization. Learning about new technology can be difficult or even scary for many board members who don't believe they have the expertise to ask smart questions. However, having an "intellectual curiosity" to drive education about new technology trends is a basic requirement to be a modern board member.
    • When judging your cyber risk, get a second opinion.From Palo Alto Networks survey with Georgia Tech of board members from around the world, we found that 53% of boards sought outside experts to assist in evaluating their corporate risk. This outside perspective can be especially beneficial in cybersecurity, where internal company dynamics can hamper strong oversight. Here’s the problem: it’s tough to prove that your security investments and personnel are working well without a negative scenario that illustrates as much. If you have been hit by a successful attack, you believe you have made poor investments or your personnel are falling down on the job. But if you don’t see any damaging attacks, how do you know if you are preventing anything or just not looking for problems? Often, not looking for problems can be a much safer career move for security personnel facing a board with little understanding of how to evaluate this highly technical issue. Bringing in an outside expert can help ensure there is honest and accurate reporting that places security personnel in a position to participate in conversations on investment and risk, rather than simply cherry picking technical metrics to prove they are doing their jobs.
    • "Just the facts" is not enough. As efforts to monitor, detect, and analyze cyber threats get better every day, reporting on risk grows more convoluted. At the security operations level, this means more manual work tracking all of this data. At the board level, this means heat-maps and dashboards full of highly technical jargon, with little meaning for non-security experts. Occasionally, companies will be blessed with the CISO who picked up an MBA along her career and can translate technical data into business risk language, but this is neither reliable for oversight, nor scalable for all businesses. Instead, management must play an active role in looking at the economic risks associated with specific threats. This requires security personnel to be tied into the enterprise risk management process so that they can understand what is relevant and what is just noise. Done ahead of time, this can help management present the board with more digestible reporting on how their investments match up against cyber threats to the company's bottom line.
    Moving forward, Palo Alto Networks will be joining NYSE as a part of their groundbreaking "Future of Responsibility, Governance and Ethics" (FORGE) initiative to enable leaders to drive integrity and innovation around mitigating cyber risk within their organizations. To support the initiative, NYSE is assembling a hand-selected group of C-level executives and leading board directors to explore solutions to pressing business challenges. Look for more events and insights coming soon from NYSE and Palo Alto Networks here.]]>
    1055 0 0 0
    RSA 2016 Executive Recap: The Role of Analytics and Other Recent Trends https://www.securityroundtable.org/rsa-2016-executive-recap-the-role-of-analytics-and-other-recent-trends/ Wed, 16 Mar 2016 19:36:59 +0000 https://www.securityroundtable.org/?p=1073 Get your copy of Navigating the Digital Age here.]]> 1073 0 0 0 ]]> The Ground Truth About Encryption and the Consequences of Extraordinary Access https://www.securityroundtable.org/the-ground-truth-about-encryption-and-the-consequences-of-extraordinary-access/ Mon, 21 Mar 2016 16:00:46 +0000 https://www.securityroundtable.org/?p=1080 The following is excerpted from The Ground Truth About Encryption and the Consequences of Extraordinary Access, a recent whitepaper by The Chertoff Group, examining the current legal, technical and policy debate in America relating to the question of whether governments may lawfully access digital communications and digitally stored data. Jim Pflaging, The Chertoff Group's global lead for its technology sector and business strategy practice and a contributor to SecurityRoundtable.org, will discuss the topic as part of a panel at this week's Fraud & Breach Prevention Summit in San Francisco. Join Jim and other industry experts for The Apple vs. FBI Crypto Debate at 4:05 p.m. PT at the Hilton San Francisco Financial District, Wednesday, March 23. We are in the midst of a significant legal, technical, and policy debate in America (and around the globe). The question is whether governments may lawfully access digital communications and digitally stored data. The question manifests itself in many ways, ranging from the extraterritoriality of legal process to requirements for data localization. One of the most prominent aspects of the debate pertains to the changing nature of how users and service providers encrypt data. For this white paper, the word "encryption" is defined as the encoding of data or information in a way that is intended to prevent access to that data or information by persons or parties whose access is not authorized by the creator of the data. The outlines of the issue are clear. For years, most users kept their data on their own local devices (smart phone, tablet, laptop, etc.) in an unencrypted form. Others backed up their data using cloud storage service providers - providing the user with easy access but also allowing the cloud storage provider to access the data, both purposefully (for business reasons) and, as more relevant to our discussion, under compulsion of law. Most users sent messages to friends and colleagues in unencrypted or readily decryptable formats. As a result, under the status quo of five years ago, a government could readily achieve lawful access (that is, purposeful requests to access data as part of an investigation, made by law enforcement and subject to a judicial or administrative authorization process, according to an established rule of law) to unencrypted data related to its inquiry - by accessing the data on the user's local device, by accessing it in cloud storage, or by intercepting the unencrypted communication while in transit. Two developments in the last year or two are rapidly changing that reality:
    • First, device manufacturers are adopting operational systems that have changed the default local encryption setting from "off" to "on." In other words, data on local devices was previously stored in an unencrypted form unless the user manually chose to enable the encryption option, but now the converse will be true - affirmative action by the user is necessary to store data in an unencrypted form.
    • Second, service providers are taking steps to offer users products that automatically encrypt data stored in cloud storage systems and messages transmitted to other people in a manner that cannot be decrypted by the service providers. Put another way, service providers are offering products that prevent them from being technically capable of responding to lawful government demands as they cannot turn over data they do not possess.
    To some degree, these changes are a natural technological evolution. They are also a response to pervasive concerns about the insecurity of cyber systems and to the business necessity of distinguishing commercial products from governmental activity. Whatever the reason, the upshot of these two trends is of growing concern for law enforcement and other government agencies that are systematically losing access to data and information relevant to criminal, national security, and counter-terrorism efforts. As a consequence, some in the community, most notably the Director of the Federal Bureau of Investigations (FBI), have called for new laws or policies that restrain, limit, or even reverse the underlying technological trends. This white paper finds the following as anticipated consequences that might arise from mandating lawful access to encrypted data for American encryption products:
    • We should not overstate the practical significance of any decision the U.S. might make. It is uncertain that authoritarian nations (e.g. China or Russia) will forgo implementing an encryption access requirement simply because the U.S. chooses not to (or vice versa)
    • It is possible (and perhaps even highly likely) that mandating exceptional encryption access would hinder or damage innovation in the U.S. encryption technology market. It may also restrain innovation in related U.S. security technology markets
    • Adoption of an American encryption access requirement may result in adverse collateral effects, decreasing law enforcement's investigative access to metadata and hampering the competitiveness of American businesses and U.S. national security; and
    • Efforts to constrain encryption through forms of extraordinary access will inevitably introduce vulnerabilities into the security of consumer products in ways that are likely to have adverse long-term effects on the security, privacy, and civil liberties of citizens.
    Read the full whitepaper from The Chertoff Group here. Subscribe to SecurityRoundtable.org to receive the latest from our contributors. ]]>
    1080 0 0 0
    What Directors Think: Top Concerns and Challenges in 2016 https://www.securityroundtable.org/what-directors-think-top-concerns-and-challenges-in-2016/ Mon, 28 Mar 2016 20:30:32 +0000 https://www.securityroundtable.org/?p=1093 NYSE Governance Services, along with Spencer Stuart, a global senior executive search and leading consulting firm, released the results of the 13th Annual What Directors Think Survey, which reflects the responses of nearly 400 board members on issues facing their businesses in 2016. Below are some top takeaways from this year's survey:
    • Nearly half (48%) of the directors surveyed agree that economic uncertainty is one of the biggest challenges facing corporate boards in 2016, followed by market risk (37%) and cyber risk (35%).
    • More than a third of those responding (38%) believe that although they are doing all they can to protect the company's data, most cybersecurity risk is really out of their hands.
    • Over half (57%) of those surveyed say they have not thoroughly vetted a crisis communications plan within the past 12 months. Yet, 52% are confident their current plan would run successfully.
    • Two-thirds (65%) of respondents agree that direct engagement with shareholders can serve to open dialogue in a meaningful way before critical issues come to a head.
    • Close to half (42%) of directors surveyed believe their board needs to focus more on long-term strategic planning.
    • Almost half (45%) of respondents lack confidence in the idea that their employees are thoroughly trained, understand, and assume appropriate responsibility for compliance related to the use of corporate social media, followed by data security (33%) and third-party risk (28%).
    For a complete overview of the results from the survey, read here. For tips and advice on managing cyber risk for your organization, subscribe to our monthly newsletter.]]>
    1093 0 0 0
    Adopting a Cyber Resilience Mindset https://www.securityroundtable.org/adopting-a-cyber-resilience-mindset/ Mon, 04 Apr 2016 15:00:11 +0000 https://www.securityroundtable.org/?p=1100 Get your copy of Navigating the Digital Age here.]]> 1100 0 0 0 ]]> Medidata War Story: Surviving a Cyber Breach https://www.securityroundtable.org/medidata-war-story-surviving-a-cyber-breach/ Mon, 11 Apr 2016 17:30:55 +0000 https://www.securityroundtable.org/?p=1109 Convened by NYSE Governance Services, FORGE (the Future of Responsibility, Governance and Ethics) is a quarterly  forum of executives, directors and industry influencers that produces actionable insights and meaningful data on the most pressing boardroom topics. In this video, Tarek Sherif shares the story of Medidata Solutions cyber breach that resulted in a $4.8 million wire transfer to a fraudulent account.]]> 1109 0 0 0 ]]> Advice for CEOs Tackling Cybersecurity https://www.securityroundtable.org/advice-for-ceos-tackling-cybersecurity/ Wed, 13 Apr 2016 15:00:12 +0000 https://www.securityroundtable.org/?p=1118 Get your copy of Navigating the Digital Age here.]]> 1118 0 0 0 ]]> Five Questions You Should Be Asking Your Team about Identity Security https://www.securityroundtable.org/five-questions-you-should-be-asking-your-team-about-identity-security/ Wed, 27 Apr 2016 15:00:36 +0000 https://www.securityroundtable.org/?p=1131 Authentication: Do we know that users are who they claim to be and how easily, if at all, can authentication technologies be compromised? Authorization: Are we ensuring that users, once authenticated, are tightly governed in what they can access and do? Administration: Have we adopted a governance-based approach to identity that manages the processes and policies of our IAM system and automates integrations with other enterprise functions? Analysis: Are we able to detect instances of improper or suspicious credential usage and use those detections to trigger additional controls? Audit: Can we look back across the identity lifecycle to review events and confirm that our IAM system is being used properly? Securing and managing identity is not only about technology; it's about people and processes. Done right, identity moves from being a security risk to a strategic opportunity, allowing organizations to streamline processes and enable more user-friendly online experiences for employees, partners and customers. By viewing identity and access management holistically, you'll be in a good position to drive change in your organization. As an executive, you should consider the following points when implementing identity and data security strategies: 1) Make identity a priority. It has been the "red-headed" stepchild of security for far too long. As a result, it has become the vector of attack in most breaches, with compromised passwords being the most commonly exploited tool. Today, you can no longer afford to ignore identity. 2) Prioritize strong authentication. Even so-called "strong" passwords offer mediocre security in the face of modern threats. When passwords alone are used as the "key" to access sensitive networks and data, the results are rarely positive. The augmentation or replacement of passwords with stronger authentication technologies offering multiple factors must be a top priority. 3) Understand that user experience is as important as security. The good news is that today's newest and most innovative identity products do not require tradeoffs between either. There are options that work for consumers and customers alike. 4) Recognize that identity is intrinsically linked to data security. As mobile devices and cloud services become more prevalent across enterprises, the role of identity in securing important information readily accessible outside of your corporate network will only continue to grow in importance. Identity is the one control you can put in place to secure data both within and outside of your network security. 5) Don't treat your customers like your employees. Securing identity should be easy for your customers - if it's not, you will have trouble retaining their business. Firms that ask customers to reset their password every 90 days or request that they add "4 more characters" to a password are only creating friction points that diminish relationships with customers. To read The Chertoff Group's full whitepaper "Securing Identity Does Not Stop with Strong Authentication," please click here. Learn more about IAM and other risk management strategies at The Chertoff Group Security Series event The Three T's of the Digital Economy: Technology, Threat and Trust, "where Jeremy Grant will lead a panel discussion with industry executives on the role identity-centric solutions play in delivering enhanced efficiency and protection across enterprises. To register to attend, click here.]]> 1131 0 0 0 How Employee Training Can Help Prevent Social Engineering Attacks https://www.securityroundtable.org/how-employee-training-can-help-prevent-social-engineering-attacks/ Wed, 04 May 2016 15:00:39 +0000 https://www.securityroundtable.org/?p=1140 1140 0 0 0 ]]> Striking a Balance between Privacy and Security: Tips for Executives Implementing a BYOD Policy https://www.securityroundtable.org/striking-a-balance-between-privacy-and-security-tips-for-executives-implementing-a-byod-policy/ Mon, 09 May 2016 15:00:41 +0000 https://www.securityroundtable.org/?p=1143 80% of enterprises now allow employees to use personal devices to connect to corporate networks. Ubiquitous use of BYOD at work is a natural progression of how popular mobile devices have become. BYOD improves employee satisfaction and productivity, as employees feel more comfortable with the devices they've chosen both for professional and personal use. Employees increasingly seek flexible work options and the ability to work remotely. Using the same mobile device at home or at the office can allow for an easier transition, and enhanced efficiency and output. Surveys show that employees who use their own devices feel more ownership over their work. But despite wide-reaching benefits, companies are struggling to integrate security measures, so that sensitive data and infrastructure are secured properly. Fortunately, executive teams have an opportunity to set the tone on BYOD; secure access and business productivity are not mutually exclusive. Getting Consent from Your Employees More and more often, BYOD policies are seen as infringing on user privacy. Employees have a sense of ownership over their mobile devices and are more reticent to have employers impose security measures and secure their operating systems. However, employees need to be made aware of their responsibilities regarding sensitive data they are accessing, and ways to achieve a balance between ownership of mobile devices and responsibility to implement adequate security measures. With that being said, it is important that consent is required for companies to access personal devices to monitor the use of apps and install security software. Managers can earn employees' trust and collaboration by ensuring that their personal information such as contacts, personal messages and applications are not monitored. They can encourage their teams to register new devices and declare stolen or unused devices, so that data can be erased. Some suggest that concluding agreements with employees seeking to use their personal mobile device at work may clear the expectation and prevent violations. In summary, here are three ways the executive team can set the right example for BYOD policy:
    1. Implement policy management tools and do not access personal applications and information without consent
    2. Inform employees about your policies with regard to the use of personal devices on the corporate network
    3. Encourage employees to declare stolen, unused or lost devices and regularly update security settings and applications
    Achieving a compromise between privacy and security is key in developing a strong mobile security strategy. With the proper security and consent measures in place, companies can drive their operating costs down, and achieve reduced costs through supporting mobile devices. A version of this article was originally published on Forbes.com. The article is a personal view of the author, and not of the employers.]]>
    1143 0 0 0
    What the C-Suite Needs to Know about the Rise of Ransomware https://www.securityroundtable.org/what-the-c-suite-needs-to-know-about-the-rise-of-ransomware/ Wed, 11 May 2016 15:03:55 +0000 https://www.securityroundtable.org/?p=1154 Get your copy of Navigating the Digital Age here.]]> 1154 0 0 0 ]]> 6 http://www.elationit.com.au/portal/portal-security/now-on-security-roundtable-what-the-c-suite-should-know-about-the-rise-of-ransomware 0 0 Casting the Cybersecurity Net in Your Business Ecosystem https://www.securityroundtable.org/casting-the-cybersecurity-net-in-your-business-ecosystem/ Mon, 16 May 2016 15:00:16 +0000 https://www.securityroundtable.org/?p=1157 Get your copy of Navigating the Digital Age here.  ]]> 1157 0 0 0 ]]> Insider Threats: What Executives Need to Understand https://www.securityroundtable.org/what-executives-need-to-understand-about-insider-threats/ Wed, 18 May 2016 15:00:34 +0000 https://www.securityroundtable.org/?p=1164 Get your copy of Navigating the Digital Age here.    ]]> 1164 0 0 0 ]]> Starting the Conversation about Crown Jewel Security https://www.securityroundtable.org/starting-the-conversation-about-crown-jewel-security/ Mon, 06 Jun 2016 15:00:34 +0000 https://www.securityroundtable.org/?p=1179 Get your copy of Navigating the Digital Age here.    ]]> 1179 0 0 0 ]]> FORGE Cyber Governance Playbook https://www.securityroundtable.org/forge-cyber-governance-playbook/ Thu, 09 Jun 2016 16:00:58 +0000 https://www.securityroundtable.org/?p=1263 here.      ]]> 1263 0 0 0 Three Important Considerations for CEOs Navigating Cyber Risk https://www.securityroundtable.org/three-important-considerations-for-ceos-navigating-cyber-risk/ Mon, 13 Jun 2016 15:00:51 +0000 https://www.securityroundtable.org/?p=1290 Get your copy of Navigating the Digital Age here.    ]]> 1290 0 0 0 ]]> Managing Different International Attitudes Towards Cyber https://www.securityroundtable.org/managing-different-international-attitudes-towards-cyber/ Mon, 27 Jun 2016 15:00:09 +0000 https://www.securityroundtable.org/?p=1318 Get your copy of Navigating the Digital Age here.]]> 1318 0 0 0 ]]> What Can Be Done about Cybersecurity Whistleblowers? https://www.securityroundtable.org/what-can-be-done-about-cybersecurity-whistleblowers/ Tue, 05 Jul 2016 15:04:24 +0000 https://www.securityroundtable.org/?p=1357 A Recent Case Study In early March, the DOJ and FBI raided the corporate headquarters of Tiversa, a Pittsburgh-based security firm under investigation for providing the Federal Trade Commission (FTC) with false information about data breaches at companies that declined to purchase Tiversa's data protection services. As background, former Tiversa employee, Richard Wallace, testified in a 2015 Federal Trade Commission hearing that Tiversa provided the FTC with doctored evidence purporting to prove that selected organizations had suffered a data breach. According to a report by the House of Representatives Committee on Oversight and Government Reform, information provided by Tiversa "formed the basis for multiple enforcement actions and dozens of warning letters" including the high-profile LabMD enforcement action. Although Tiversa's alleged conduct may be an egregious outlier, a company's conduct need not be maliciou - or even culpable - to be subject to a cyber-whistleblower complaint outing the company and creating public relations and regulatory problems. Even companies that diligently seek to detect and prevent cyberattacks can become subject to regulatory scrutiny by virtue of a whistleblower's tip. And there are significant incentives for whistleblowers. Motivation for whistleblowers can come in many forms, including earning immunity from government prosecution (in an egregious case, perhaps) and capitalizing on the monetary bounty program incentives promulgated by various regulatory agencies. The bounty programs can provide financial incentive to the tune of millions of dollars, depending on the outcome/information provided. What Can Be Done? Companies need not live in fear of the unknown cyber whistleblowers in their midst, and should instead take steps to mitigate the risks that a whistleblower will go straight to the SEC or similar agency by encouraging employees to report issues internally without fear of retaliation for doing so. Implementing robust internal reporting and investigation processes can encourage internal reporting of concerns. For example:
    • Ensure there are numerous avenues available to make complaints (including anonymous complaints) and that employees are aware of those avenues. Employees should be able to lodge a complaint via managers, Human Resources, Compliance, Legal, a telephone/e-mail hotline, or a website.
    • Be sensitive to the potential for real or perceived retaliation against whistleblowers. Involve Legal or Human Resources in any employment decisions involving a potential whistleblower, including performance reviews, before finalizing, to ensure there is no retaliation.
    • Resist the urge to identify an anonymous whistleblower; it is very difficult to retaliate against someone whose identity is unknown. Implement a system by which you can follow up with an anonymous whistleblower that safeguards his or her identity (i.e., Ethics Point or Hushmail).
    • Train IT managers and other employees on the front lines about what could form the basis for cybersecurity whistleblower complaints and how to properly receive and escalate them.
    • Review third-party vendor practices (contractors, consultants, auditors, hotline administrators) to ensure they too provide optimal whistleblower procedures. Make clear in company policies that reports from third parties are also accepted by the company.
    • Whistleblowers may have a heightened sensitivity to whether the investigation is biased, so consider extra precautions to ensure the neutrality of the investigation.
      • If the complaint involves a manager, HR and legal personnel who support the manager should not be involved in the investigation.
      • If the internal audit department is participating in the investigation, make sure that the audit personnel who work for the area of the business under investigation are not participating in the investigation.
      • If the complaint involves a C-level employee, independent outside counsel should be retained by the audit committee of the board of directors, as opposed to company's inside counsel or regular outside counsel conducting the investigation.
    Conclusion With regulators hungry to identify and investigate potential cybersecurity issues, whistleblowers provide a fertile opportunity to get the inside perspective with little to no resource investment. By creating a trusting environment for employees and third parties to report internally, companies can go a long way toward uncovering and remedying violations of law quickly and effectively and without regulatory intervention. Additionally, where an employee develops a concern due to a misunderstanding of events, internal reporting provides a critical opportunity to resolve issues internally in a constructive fashion and hopefully retain a valued employee rather than that employee going first to a government agency with incorrect information. In sum, by creating an environment that in policy and practice encourages internal reporting of concerns, companies can avoid potentially costly and burdensome employee-initiated regulatory investigations and exposure to litigation and can improve their recruitment and retention of their best talent.]]>
    1357 0 0 0
    Key Questions to Ask When Assessing Third Party Outsourcing https://www.securityroundtable.org/key-questions-to-ask-when-assessing-third-party-outsourcing/ Mon, 11 Jul 2016 23:48:04 +0000 https://www.securityroundtable.org/?p=1390 Get your copy of Navigating the Digital Age here.]]> 1390 0 0 0 ]]> Is Communications Planning Part of Your Incident Response Plan? https://www.securityroundtable.org/is-communications-planning-part-of-your-incident-response-plan/ Mon, 18 Jul 2016 13:00:16 +0000 https://www.securityroundtable.org/?p=1411
  • How did this happen?
  • Did the attacker access sensitive data, like personally identifiable information (PII)?
  • If so, how many records were raided?
  • Who are the attackers, and what are they doing with the exfiltrated data?
  • When did the organization find out?
  • Who is at fault internally?
  • The pressure to quickly answer challenging questions like these is so intense, it cannot be overestimated. But the way an organization responds can be the difference between exacerbating the reputational and financial damages from a breach, and mitigating them. The wrong response can even go so far as to aid the attackers. Planning Ahead With stakes this high, smart companies can't wait until a breach occurs to develop a PR plan for this type of crisis. Rather, they include "communications planning" in their incident response plan. The precise details of what the company should communicate, and when, are kept flexible, but organizations should determine the basics in advance like who they'll need to communicate with and what they'll be asked. The first step to creating an effective data breach PR plan is a stakeholder analysis. A stakeholder analysis begins with research to achieve a clear and complete understanding of who the organization needs to communicate with and what each audience's unique interests and needs are. While there will be overlap, an audience of investors (for example) will not have the same focus or requirements as supply chain partners, customers, or governmental authorities. Empowered with this intelligence, the PR team can then tailor its talking points to convey what is most important and top-of-mind to each party - an advantage which will maximize the impact and effectiveness of their message. This also allows the PR team to carefully plan how to reach each audience and who will speak to each one. The individuals selected to be on call for communications during an incident should then receive specialized training for these matters and should be given the opportunity to 'rehearse' their roles during periodic preparedness exercises that test the company's overall incident response plan, including what not to say. Filling in the Blanks During a cyber incident, the PR team will be racing to fill in the blanks of exactly what should be said and when. These decisions shouldn't be made in a silo. In an actual incident, most companies seek help from three sources: legal counsel, PR experts, and 'cyber responders', who are experts in identifying, containing, and remediating cyber breaches and the supporting evidence - and any PR effort must seek input from all three of these sources. This prevents talking points from, for example, violating legal privilege, and seeding misinformation about the investigation. There is a substantial risk of doing harm by saying something that does not have credibility. For example, a company can state that it has firewalls and an incident response policy in place, but external validation of the effectiveness of these elements is expected by a smart audience - otherwise a statement like this generates doubt in the audience. In another scenario, if a public statement is made that lets the attackers know they've been spotted before they've been forced out, the attackers can do more to erase their tracks and will be inspired to steal more data more rapidly. One of the most common errors in cyber-attack PR response is inaccurately proclaiming how many records were accessed. Fact-finding in complex breach investigations takes time. Communications should move quickly, but PR professionals need to have a strategy to deal with inquiries from stakeholders during the period needed to establish a factual foundation. Responding to Your Stakeholders In the event of a cyber incident, basic crisis communications guidelines should be followed:
    • Don't retreat into denial. Acknowledge there is a problem and control your message;
    • Carefully assemble the facts and convey them in a straightforward, conversational manner;
    • Designate one trusted professional as the spokesperson and have that individual speak on a regularly scheduled basis to stabilize contact with the press;
    • Use dignified, jargon-free language and a serious tone that says, "We get it, and we're dealing with the situation";
    • Don't react in a defensive way. Go on the offensive when appropriate by introducing new initiatives that mitigate the damage and prevent recurrence.
    This guidance is specifically relevant to PR efforts during an incident. However, organizations also need a proactive cybersecurity communications plan prior to any event, and much of the same preparation applies. Proactive and reactive PR efforts each requires its own PR plan and unique stakeholder analysis. In the best case scenarios, both plans should be developed in tandem. This ensures consistency and prevents the company from backtracking on proactive claims when reacting to a cyber incident. To build resilience against cyber threats, preparation for the worst always trumps simply hoping for the best.]]>
    1411 0 0 0
    Three Brexit Considerations for Business and Technology Executives https://www.securityroundtable.org/three-brexit-considerations-for-business-and-technology-executives/ Mon, 25 Jul 2016 13:00:33 +0000 https://www.securityroundtable.org/?p=1429
  • Will the UK remain in the free-trading bloc?
  • What actions will tech companies in the UK need to take to meet the needs of EU customers?
  • Will other EU member states leave?
  • Here are considerations all business and technology executives should be aware of, whether as businesses based in the UK or businesses doing business in the UK and EU: 1. Exacerbating a cybersecurity skills shortage in the UK and on the continent The International Business Times (IBT) reported on the possible cyber-impacts to the workforce talent crunch, the rising cost of business operations, data sharing and privacy laws, and the threat of a cyberattack growing. The UK has the most cybersecurity companies in Europe, and their ability to support other EU countries may be impacted. ABI Research's Michela Menting wrote this summary on the subject of Brexit and cybersecurity centering primarily on the skills shortages in cybersecurity being impacted: "The tech industry, and cybersecurity notably, is experiencing a painful shortage of professionals. By opting out of the single market, and free movement of people, the UK's labor pool will shrink considerably. Again, the outcome of negotiations with the EU as to the single market will largely determine the availability of an EU-wide labor pool. However, current uncertainty may drive cybersecurity firms to relocate in other EU countries in the meantime." 2. Determining which EU regulations will still apply in the UK This has been a watershed year for data protection and cybersecurity legislation in the EU, with the General Data Protection Regulation (GDPR) and Network and Information Security (NIS) Directive expected to force some hard questions on businesses looking at compliance. GDPR regulations, for example, are expected to become enforceable in 2018, but UK-based businesses are already examining whether they will be legally compelled to comply, and if so, to what degree.The GDPR lays out requirements specific to "EU residents' data and applies to businesses that process that data, or that market to EU residents, regardless of whether or not the businesses are based in the EU. Thus, regardless of how Brexit plays out over the next two years, UK businesses selling into the EU will still be subject to GDPR requirements once it is effective. 3. An increase in threat activity looking to capitalize on Brexit new cycles For more immediate computer impacts, companies should be on the lookout for scams, phishing attempts and websites that take advantage of the Brexit confusion to trick people into taking foolish actions related to Brexit and surrounding issues. The bad guys always show up in force with an assortment of phishing schemes in times of confusion like we are seeing today as a result of the Brexit referendum, especially when people break out of normal patterns and click on new content. Therefore, it is important to know whom to trust online and remember that these scams can come from anywhere, at any time, including via mobile phone, email, text or social media message. In May, I wrote a post for Government Technology which highlighted the seven reasons you should care about Brexit, describing why this topic is important to Americans, including potential technology and security repercussions.]]>
    1429 0 0 0
    How Cyber Risk Differs from Other Risks https://www.securityroundtable.org/how-cyber-risk-differs-from-other-risks-facing-boards-today/ Wed, 27 Jul 2016 15:00:45 +0000 https://www.securityroundtable.org/?p=1444 Get your copy of Navigating the Digital Age here.    ]]> 1444 0 0 0 ]]> Are You at Risk? Understanding Your Cyber Risk Appetite https://www.securityroundtable.org/are-you-at-risk-understanding-your-cyber-risk-appetite/ Wed, 03 Aug 2016 23:20:22 +0000 https://www.securityroundtable.org/?p=1459 five questions to holistically capture your landscape to build a cyber risk appetite. CRA_Picture1 Figure 1. Cyber Risk Appetite Engagement Methodology 1. What matters? Engage with your executives and business unit leaders to evaluate corporate values, objectives, and other business drivers as related to cybersecurity. 2. How do I protect what matters? Collect insights to understand current operations, networks and systems. 3. What is at risk? Conduct interviews and review historical issues to gain wisdom on risks and perspective as to why certain risks are considered. 4. How do I know? Connect your operational systems to ground risk management in a timely, data-driven reality. Normalizing your data against emotional responses is necessary to objectively evaluate cyber risk. 5. How much is enough? Working together, discover your appetite for cyber risk, and derive your risk tolerance and thresholds through a data-driven analysis. Developing a cyber risk appetite statement requires both qualitative and quantitative components. The qualitative component is your gut check; this is the organization's position on cyber risks. It should be concise and specific, reflecting your risk position and justification of value as to why this matters. Here is where you tightly integrate corporate values and objectives. The qualitative portion should also take into consideration your capacity for risk. The quantitative side is where you use your existing tools and infrastructure to create a set of forward-looking cyber risk metrics. These metrics help to articulate your risk tolerance. Metrics should reflect your attitudes toward growth, risk, innovation, culture, and ultimately the actions you will take to reduce risk if you exceed your tolerance threshold. Screen Shot 2016-08-03 at 3.47.07 PM Table 1. Components of a Cyber Risk Appetite Once you have drafted the qualitative and quantitative components of a cyber risk appetite, you can develop specific key risk indicators (KRIs). These are forward-looking composite metrics that signal when core components of your appetite are in jeopardy - when your gut-check should have a stomach ache. Creating your cyber risk appetite statement is not just an exercise, but a holistic program that encompasses multiple stakeholders beyond cybersecurity. Ideally this should not be led by the CISO, but by the Chief Risk Officer or an executive risk team with input from the CIO, CFO, and CISO. This team starts at the top and builds indicators looking downward, performing a gap analysis along the way. Frequently an organization finds they have all the data they need, but need to reframe or reconsider how to measure it. Finally, once you have defined your cyber risk appetite and KRIs, you communicate it throughout the organization. You have a clear picture of what matters, objective indicators of risk, and timely data, and are prepared you to make informed risk-based decisions. Often more importantly, you should be able to answer the dreaded questions from regulators and the board: what is our risk appetite and how are we doing? The core challenge of defining a risk appetite for cybersecurity is to get buy-in at the executive level. Increasingly, executives are required by regulation to sign off on a risk appetite statement - what matter - transferring responsibility for business-generated risks to the business units. By following the collaborative process defined above, your organization can ensure that buy-in is baked-in, because stakeholders have:
    • Helped you articulate the business value of information;
    • Adopted this as a tool for establishing priorities on protecting information;
    • Set performance expectations within the lines of business; and
    • Communicated their expectations of the framework through their engagement.
    This can only happen when you start with a cyber risk appetite that is developed by, approved by, and regularly reported to executive leadership.  ]]>
    1459 0 0 0
    Treat Cyber Criminals Like You Would a Challenger Brand https://www.securityroundtable.org/treat-cyber-criminals-like-you-would-a-challenger-brand/ Mon, 29 Aug 2016 13:00:21 +0000 https://www.securityroundtable.org/?p=1546 In this article, Mark Hughes, President of BT Security, discusses why the industry is now in an arms race with cyber criminals and what approaches businesses can adopt to ensure a holistic approach to security is front and centre. As the threat of cyber attacks grows, businesses are struggling to keep pace with the constantly evolving tactics of cyber criminals, hacktivists, state sponsored attacks and even cyber terrorists. Too often, boards have become aware of the importance of robust cyber defences after a breach or hack. In a joint BT and KPMG report "Taking The Offensive", nearly one third of CEOs listed cyber security as the issue that has the biggest impact on their business. Despite this, only half felt prepared for a cyber attack. At a time when attackers are moving quickly with an increasing arsenal of tools and techniques, the traditional approach to security isn't fit for purpose. Rethinking the threat The pace of those that are targeting valuable corporate data information has reached the speed that requires a complete rethink of the security strategy. The threat is so considerable that last year the Chancellor of the United Kingdom announced a £1.9 billion 5 year investment to develop a national cyber plan. At an organisational level, forward thinking CISOs should approach the role with the mind-set of the potential hackers, whereby cyber security is a customer experience and revenue opportunity, not just a risk that needs to be managed. Gathering intelligence and building out strategies should be an organisation's first instinct. Both employees and clients provide attackers with access to internal systems and often the best way of detecting attacks is to understand how those stakeholders might be targeted. This approach puts organisations on the front foot by turning cyber preparedness into a competitive advantage rather than a cost. Ruthless and rational entrepreneurs The industry is now in an arms race with professional criminal gangs and state entities with sophisticated tradecraft. Ninety-six per cent of businesses surveyed in the recent joint BT and KPMG report admitted that criminal entrepreneurs could be bribing employees, while only 44 per cent confirmed they had prevention measures in place to tackle the issue. A further 95 per cent said staff could be vulnerable to blackmail, again with less than half (47 per cent) with a defence strategy. The twenty-first century cyber criminal is a ruthless and efficient entrepreneur, supported by highly developed and rapidly evolving black market. It's no exaggeration to describe them as 'criminal entrepreneurs'. Like any entrepreneur, the cyber attacker's intention is to make money fast. A distributed denial of service (DDoS) attack for example can cost just $5 per hour to mount, yet more than $40,000 an hour to defend against. Attackers buy malware online, rent botnets by the hour, and compete for the best talent so they can inflict maximum damage. Their motivations have also changed: fame, notoriety, financial gain or political recognition are all common 'trophies', alongside the widespread media attention which often accompany major hacks. Unlike conventional competitors, cyber crime entrepreneurs do not play by the rules. They are also undeterred by laws and regulations, perfectly content to damage the organisations they attack and exploit the customers who are often the ultimate victims. With such high financial and reputational stakes, CEOs and businesses can no longer afford to sleep walk into a disaster. A report by the Department for Business, Innovation and Skills found that 90 per cent of large companies had suffered a security breach. If a company hasn't yet been attacked, it is either extraordinarily lucky or living in the dark. When BT provided the communications network for the London Olympic Games in 2012, we repelled 11,000 malicious attempts every second and we had to fight off 200 million attacks in four weeks and that was over four years ago. In the last 18 months alone we have seen a 1000 per cent increase in cyber-attacks on BT. The need for speed and agility Organisations need to treat cyber criminals the way they treat challenger brands - by understanding and disrupting their business model. It is clear there is a challenge to develop a digital business model resilient enough for a cyber-attack and requires a strategy looking at the digital risks facing the business as a whole, not simply the information systems, but the customers and supply chains. With 49 per cent of businesses surveyed in our report saying they were constrained by regulation it is clear that traditional compliance processes seem out of step with the new digital age - and adding more and more controls at the cost of flexibility and agility only increases not reduces risk. Businesses understand the importance of rapid action, but, as our research indicates, obstacles stand in the way of a quick response. Across the UK, organisations, Government and academia must collaborate to outrun cybercriminals innovation. To do so, our own cyber security organisations need to be as creative and agile as their opponents, we need to commit to threat and vulnerability management, coupled with defence upgrades as new threats emerge. Threat intelligence capabilities are vital for companies to stay ahead of the game, to spot new trends and threats with a view to making sure they can respond. Given the pace of R&D in the shadow economy, businesses that don't harness innovative technologies and approaches risk becoming obsolete. Here are some action points to help prevent this from happening:
    • Demand evidence that your cybersecurity team is able to respond quickly and flexibly to changing threats and give them the license and the support they need to do so.
    • Work with your major clients and third parties to exercise a major incident. You will need their cooperation if you are attacked and working closely in this way builds trust and transparency.
    • Prepare for the worst case. Exercise your response to a cyber-attack and make sure you develop muscle memory. This will help you to respond quickly by understanding how an incident might unfold and how you might respond.
    • Consider the role of cyber insurance in helping you mitigate the financial impact and access specialist expertise when needed. You won't have all the skills you need in-house.
    To find out more about some of the themes that Mark Hughes talks about, download this recently published report: Taking the Offensive.]]>
    1546 0 0 0
    A Five Point Plan for Boards Addressing Cyber Risk https://www.securityroundtable.org/a-five-point-plan-for-boards-addressing-cyber-risk/ Wed, 21 Sep 2016 12:19:37 +0000 https://www.securityroundtable.org/?p=1604 1604 0 0 0 ]]> 15 http://beta.whiteboardits.com/a-five-point-plan-for-boards-addressing-cyber-risk/ 0 0 A Ten Point Cyber Resilience Checklist for Boards https://www.securityroundtable.org/a-ten-point-cyber-resilience-checklist-for-boards/ Thu, 22 Sep 2016 03:15:40 +0000 https://www.securityroundtable.org/?p=1643 holistic cyber resilience, which improves their chances of resisting threats from both internal and external sources and managing those risks effectively. My own checklist for holistic cyber resilience has 10 elements: 1. Understand risk Cyber resilience must be a primary focus of boards and senior management. It is not something that can be left solely to the chief information officer. As strategic risk managers, board members need to take personal legal, ethical, and fiduciary respon­sibility for the company's exposure to cyber compromise, regularly addressing the risk of cyber failure, and ensuring that cyber resilience is built into all aspects of their business and operating models. 2. Understand consequences We can all comprehend how a prolonged breakdown of cybersecurity in the telecommunication sector, the banking industry, or an airline could be catastrophic on a national scale. At the small and medium-size business level, cyber disruption could be equally disastrous both for the business and for the cus­tomers who had placed their trust in it. For any enterprise, the failure or disruption of operating systems or the compromise of intellectual property, commercially sensitive information, or data held in trust for customers (such as personal and credit card details) will be reflected in the company's reputation, credibility, and, ultimately, its profitability. 3. Understand systems and data Accurate assessment of risk and the consequences of failure is facilitated by a clear understanding of a company's IT systems and the data it holds. If boards and senior management understand the value of their data to those of malicious intent, if they know where that data is, how it is protected, and who has access to it (including external sub-contractors), then they are in a stronger position to implement a cyber resilient business model. 4. Regular cyber hygiene For example, the Australian Cyber Security Centre has drawn up a list of 35 strategies to enhance cyber resilience. While some are complicated and need the support of technical specialists, just four strategies (regular proprietary patching of software, as well as of operating systems; minimising the number of systems administrators with privileged access; and application white-listing) will help mitigate about 85% of the current panoply of mali­cious intrusions. 5. Redundancy, backup systems and response plans There have been enough publicised instances of malicious destruction of data, or denial of access to data (as with ransomware), not to mention human errors causing system failure or data loss, to make it axiomatic that companies build in system redundancy and regular real-time backing up of data and records. Redundancy and backup systems will be essential to recovery after a successful attack. Boards also need to ensure that their enterprise war-games and regularly exercised response plans can be implemented immediately if an attempted attack is detected. Boards need to be proactive in ensuring these elementary measures are implemented assiduously. 6. Proprietary malware protection systems There is a growing range of off-the-shelf proprietary anti-malware systems available to the ordinary cyber consumer. Cybersecurity technology companies are developing solutions that have moved beyond the concept of ever-higher digital firewalls, necessary as those are, into exciting new realms of predictive and intuitive digital analysis, providing deeper layers of security. Major consulting companies now promote one-stop-shop cybersecurity management packages tailored to the needs of a particular enterprise. 7. Access professional expertise Cybersecurity technology is now so complex that few companies can afford the expertise and resources to achieve cyber resilience on a solely in-house basis. Access to regular, independent, professional advice on cybersecurity is essential, as attack methodologies proliferate in depth and breadth. Increasingly niche cybersecurity providers, in addition to the larger business consulting firms, have the expertise and access to sophisticated protective cyber security systems that will assist boards to support their CIOs with professional advice and customised software solutions. What can never be outsourced, however, is ultimate responsibility for cybersecurity within an enterprise. 8. Continuous investment The tools of cyber offence are developing so rapidly that the tools of defence are constantly struggling to keep up. For this reason, investment in cybersecurity can never be a one-off activity. Effective cyber resilience requires continuous investment in the upgrading and refining of protective systems as a normal cost of business. 9. The human factor While the vast majority of cyber attacks emanate from outside the enterprise, human error within the organization, including through a lack of security awareness, is an important contributor to security breaches. Cyber resilience requires the active participation not simply of the company's systems administrators, but of all staff who access the system and who, as normal human beings, are tempted to click on spam or open unverified email attachments. Without regular staff training and security skills upgrading, company expenditures on the most sophisticated protection systems will be less effective. A strong culture of cybersecurity resilience, including an informed and committed staff, creates an environment where peer behaviour reinforces positive security practices. In my experience, staff react positively to examples-based cybersecurity training. They lap up the narrative of cybersecurity incidents. They are intrigued by the technology of cyber offence and defence, and they respond well to being included as partners within the enterprise's cybersecurity effort. Cybersecurity can be professionally rewarding  and fun. For some, however, it is more than fun. Another source of cyber attack is the trusted insider a person who uses access to the company IT system either to steal proprietary information or to vent a grievance by disrupting or disabling the system. A combination of strong security controls, including access and usage monitoring, together with sound staff management practices, can help mitigate this threat. 10. Report breaches While it is up to stock exchanges and governments to set rules for company reporting of significant cybersecurity breaches, it is important that anti-malware service providers and government cybersecurity agencies be informed of the nature and extent of cyber attacks. Timely reporting assists the anti-hackers to develop and deliver new solutions to manage and neutralise malicious intrusions. In this sense, breach reporting is both an act of self-help and an important element of cyber resilience. Read David Irvine's full chapter "Cyber Resilience  A Whole-of-Enterprise Approach by downloading your copy of the Navigating the Digital Age - The Definitive Cybersecurity for Directors and Officers Australia here.]]> 1643 0 0 0 Zoom Inside: The Case for Cybersecurity Clinics and What They Can Teach Your Firm https://www.securityroundtable.org/zoom-inside-the-case-for-cybersecurity-clinics-and-what-they-can-teach-your-firm/ Mon, 26 Sep 2016 18:59:53 +0000 https://www.securityroundtable.org/?p=1670 cybersecurity certificate programs, and a new MS in Cybersecurity Risk Management, which features required coursework from Secure Computing, Enterprise Risk Management, and Law, as well as an applied capstone consulting project (or cybersecurity clinic) for a real world client. How a Cybersecurity Clinic Works There are many varieties of cybersecurity clinics being tried around the world - Malaysia, for example, is already experimenting with this notion at the national level—but here a cybersecurity clinic may be defined as an interprofessional team of computer science, law, and business students that conduct a supervised cybersecurity consulting project for a client focused on instilling technical, legal, and managerial cybersecurity best practices. These clinics are principally concerned with enhancing the cybersecurity preparedness of underserved clients, including local governments, small businesses, K-12 school corporations, and critical infrastructure providers. This approach stands in contrast to existing stand-alone legal clinics focused on particular issues such as privacy or cyber law. Instead, the type of interdisciplinary cybersecurity clinic on which IU is focusing recognizes that effective cybersecurity risk management requires considering cybersecurity from a more holistic perspective. In 2015, IU, in partnership with the Indiana Office of Technology, launched a pilot program with the town of Speedway, Indiana (home of the Indy 500). In Speedway, an interdisciplinary team of IU graduate Law, Business, and Informatics students assessed our client’s supervisory control and data acquisition (SCADA) vulnerabilities, generated a more comprehensive incident response plan, analyzed Speedway’s potential liability exposure in the event of a data breach, and revised their employee handbook’s privacy policies. In particular, the students:
    • Assessed the privacy and cyber risk to Speedway, including general cybercrime and terrorism risks, couched within cyber attack data for Indiana organizations using a risk assessment built on top of Microsoft’s Damage, Reproducibility, Exploitability, Affected Users, Discoverability (DREAD) system.
    • Analyzed Speedway’s SCADA systems, role-based password security, password policy, work station policy, disaster recovery protocols, single points of failure, remote access, “Bring Your Own Device,” and general privacy policies.
    • Investigated the state and federal privacy and cybersecurity laws and policies related to SCADA and employee technical use applicable to Speedway; and
    • Suggested a host of technical and managerial best practices ranging from the specific (e.g., codifying all procedures related to Speedway’s SCADA systems and improving employee cybersecurity training) to the general (g., creating a mobile device management policy for lost or stolen phones, and including an email privacy trailer in official correspondence) using the NIST Cybersecurity Framework as a baseline. Further suggestions and tactics are listed below:
    Suggestions 1. Protect Your Administrative Accounts
    • Lock down your wireless network with a strong password and encryption
    • Connect to your router to see which devices are connected to your network
    • Ensure all updates and patches are applied to the devices connected to the network
    • Your SSID (Service Set Identifier) is the name of your network. Change this default name to a unique, robust name, preferably a longer one with both letters and numbers
    • Minimize targets of opportunity by making it more difficult to login as an administrator
    2. Restrict Remote Access
    • Disable default file and print sharing
    • Disable Remote Desktop (RDP) and Remote Assistance, unless you require these features. If you do, enable the remote connections when needed, and then disable them again when the job is done.
    3. Use Security Software
    • Install and run Identity Finder or another a tool to help you search for, protect, and dispose of personal information stored on your computer, file shares, or external media
    4. Remove Unnecessary Programs or Services from Your Computer
    • Uninstall any software and services you do not need
    • Remove files or data you no longer need to prevent unauthorized access to them
    As one real world example of an organization that has put these practices to the test, the Australian government has reportedly been succcessful in preventing 85 percent of cyber attacks through following three common sense techniques: (1) application whitelisting (only permitting pre-approved programs to operate on networks), (2) regularly patching applications and operating systems, and (3) “minimizing the number of people on a network who have ‘administrator’ privileges.” The Speedway pilot validated the diverse skill set required for cybersecurity risk management, which includes:
    • Computer science
    • Network security
    • Cryptography
    • Enterprise Risk Management
    • Ethics
    • Law
    • Policy
    Such an interdisciplinary approach is vital given the overwhelming evidence that cybersecurity students need not only a bedrock technological grounding, but also a wider skill set incorporating related areas to succeed in addressing the technical, managerial, and legal questions posed by clients. Professionals with such a broad cybersecurity skill set are also able to communicate more effectively across groups to effectuate change and produce positive security outcomes. Practical Relevance for Your Business Any interested research university or community college with relevant cybersecurity expertise can help boost the preparedness of diverse local and regional stakeholders. Such efforts should be supported by both the public and private sectors, given the dual benefits of fostering immersive, interdisciplinary learning that will help address the shortage of trained cybersecurity professionals, while also providing help to those who need it most. In particular, managers interested in developing a cybersecurity clinic should:
    1. Identify local educational institutions with technical, managerial, and/or legal cybersecurity expertise;
    2. Contact your firm’s government affairs and public relations specialists to reach out to local and state government entities that may be interested in partnering to establish a cybersecurity clinic; and
    3. Provide internships and seed funding to create the new courses and program architecture at community colleges and research institutions necessary to launch a cybersecurity clinic.
    Firms should take note of the success that these interdisciplinary teams of students have had across a diverse array of contexts. Given the diverse needs of stakeholders at every level of government, and the limited federal and state funding available to achieve cybersecurity improvements, interdisciplinary cybersecurity clinics can help fill a vital need helping local governments, school corporations, small businesses, and critical infrastructure providers enhance their cybersecurity preparedness. Firms of all sizes should support, and even help create, clinics of their own, while also learning the lesson that—just as in academia—it is important for the private sector to break down artificial barriers between specialties to better meet the multi-faceted cyber threat. This could help jumpstart a bottom-up approach to societal cybersecurity risk management across the nation. You never know, the road to cyber peace might just begin at the crossroads of America. Scott Shackelford is an associate professor at Indiana University, a Research Fellow at the Harvard Kennedy School’s Belfer Center for Science and International Affairs, and a Senior Fellow at the Center for Applied Cybersecurity Research. His research is available here.          ]]>
    1670 0 0 0
    From Cyber Czar to Risk Officer: The CISO’s Next Evolution https://www.securityroundtable.org/from-cyber-czar-to-risk-officer-the-cisos-next-evolution/ Mon, 17 Oct 2016 13:00:51 +0000 https://www.securityroundtable.org/?p=1794 This more information-centric environment, which is still taking shape, calls for a different way of thinking about and managing risks within the organization (see Figure 1). This change in thinking includes:
    • A move away from the traditional cybersecurity focus on tactical elements like email hygiene and firewalls to a more strategic view centered on the data itself.
    • Less emphasis on responding to threats and more on instilling appropriate behaviors and managing perceptions of risk.
    • A shift from building higher walls and deeper moats that prevent intrusion to ensuring customized value-based risk management that protects each information asset.
    A new profile for a more strategic role The CISO thus will evolve from the unsustainable "cyber czar" position to become responsible for managing the organization’s information risks, supporting and sustaining the appropriate risk management culture and engaging with the C-suite regarding the use of new technologies and the information-risk implications of entering new businesses. Indeed, we can see the beginning of this shift as some sophisticated organizations (especially in financial services) adopt titles such as "Chief Information Risk Management Officer." This is a welcome development, given that making cybersecurity everyone's responsibility has been a longstanding goal of the information security community. In the years ahead, the new breed of information security leaders will need to focus on:
    • Establishing uniform perspectives and behaviors that can crystalize into social norms regarding the use and handling of information at work - even when those norms are different than those governing how people handle personal information at home.
    • Managing the uncertainty and ambiguity that comes from the shift to a front-line, decentralized approach to information security
    • Having exceptional strategic orientation and the ability to communicate and influence outside of one's chain of command.
    • Technical savviness and broader business understanding, as the role expands from just addressing cybersecurity threats to the broader mandate of managing information risk.
    These changes will only take place, however, after the necessary perception and behavior regarding information risk and security becomes broadly ingrained throughout the organization. Until then, information security leaders will have their hands full creating that consensus and nudging us to a more secure future.]]>
    1794 0 0 0
    Cyber Hygiene Series: Creating a Culture of Cybersecurity Awareness https://www.securityroundtable.org/cyber-hygiene-series-creating-a-culture-of-cybersecurity-awareness/ Wed, 19 Oct 2016 13:00:47 +0000 https://www.securityroundtable.org/?p=1896 1896 0 0 0 ]]> An Empowered Customer is Your Educated Ally https://www.securityroundtable.org/an-empowered-customer-is-your-educated-ally/ Mon, 31 Oct 2016 13:00:57 +0000 https://www.securityroundtable.org/?p=2004 2004 0 0 0 ]]> Thoughtful Regulation for an Unregulable Concern; The Balanced Approach of the New York Cybersecurity Framework https://www.securityroundtable.org/thoughtful-regulation-for-an-unregulable-concern-the-balanced-approach-of-the-new-york-cybersecurity-framework/ Tue, 22 Nov 2016 19:26:26 +0000 https://www.securityroundtable.org/?p=2183
  • Clear Ownership of Risk
  • Akin to having a General Council for legal oversight or having a risk committee for global risk management, the proposed regulation requires the appointment of a qualified CISO whose responsibilities surround the management of the organization's cybersecurity program and policy, reporting directly to the Board. This requirement codifies cyber as a risk and domain of responsibility that requires somebody being in charge and who, in addition to managing the tactical actions of a firm, serves as the primary interlocutor to the rest of senior management and the Board. In our experience the presence of a CISO is a tell-tale sign that a firm takes cyber risk management seriously, especially relative to firms who task duties to the "IT folks."
    • Appropriate Balance
    Standards and regulations are by nature, static. That simply does not work relative to cybersecurity; technology evolves quickly, attackers are continually increasing their capabilities, and it is impossible to create a standard or regulation that creates impenetrability. Organizations that do put in the effort to meet compliance often cease efforts thereafter, believing that compliance equals security, not realizing that the requirements act as the baseline for security implementations. Similarly, many regulations are by nature prescriptive and that also can't work for cyber given all of the unique characteristics that a firm may contend with - the nature of its operations; its existing technology infrastructure, sophistication of its employees and the attractiveness to the bad guys. It's not unfair that any seasoned CISO or senior security leader would react with skepticism to any prescriptive regulation. Equally as important as the codification of responsibility via the appointment of a CISO, the new proposed framework got the structure right: it is open-ended and provides flexibility that is much more appropriate for the nature of cyber risk - not limiting industry innovation but encouraging of keeping pace with technological advances. This approach encourages additional preventative measures, requiring firms to apply security measures beyond the bare minimum, in a less prescriptive manner that cannot be easily learned and outmaneuvered by adversaries. Yes, it sets baseline requirements, but our view is that these "table stakes" requirements consist of tried and true cyber hygiene practices that any firm should be doing anyways. Thus the flexible regulation sets a floor but gives firms an appropriate, reasonable and scalable way to continually manage cyber risk.
    • Increased Confidence and Brand Reputation
    One of the most damaging effects of a cyber event is the loss of consumer confidence and brand reputation. Consumers must be confident that the organizations are making appropriate security efforts to protect their private information. Cyber risk needs to be understood and dealt with appropriately. Firms that don't are not only risking the safety of their data, but are risking their reputation. Should a cybersecurity event happen, certification of compliance for the proposed regulation allows board members, CISO's, and senior executives to prove that they took their cyber risk management responsibility seriously. In effect, it allows those in positions of responsibility to prove that the risk was managed appropriately, a critical measure especially in an era where post cyber event litigation and directors and officers litigation is surely to increase. This proposed regulation is proof that the cyber risk community and marketplace is taking a progressive approach towards a duty of care for cyber risk management. To learn more about the new cybersecurity framework, visit the official website of New York state.]]>
    2183 0 0 0
    The Next Board Opportunity: Automatic Enterprise Security Orchestration; A Radical Change in Direction https://www.securityroundtable.org/the-next-board-opportunity-automatic-enterprise-security-orchestration-a-radical-change-in-direction/ Wed, 30 Nov 2016 14:59:14 +0000 https://www.securityroundtable.org/?p=2219 infographic-2 Orchestration Challenges with the Legacy Approach The Cyber Kill Chain, described by Lockheed Martin in a 2010 paper, revolutionized the way network defenders think about securing the enterprise. The model is sound, but many struggle with the management of the system. These challenges include: Too Many Tools to Manage Network defenders have to buy the point product. Then they have to buy a person who can maintain the point product. Then they have to buy a person who understands the data coming out of the point product. Finally, they need to buy somebody who can stitch the data from all of their point products into something coherent. Too Much Complexity for Security The more complex a security architecture is, the easier it is for network defenders to make a mistake in the deployment. Leveraging those mistakes is what hackers do. Too Much Wasted Time Followers of the Cyber Kill Chain model have found themselves within an infinite loop of security vendor assessment. Many believe that they not only need to deploy security controls at every link in the Cyber Kill Chain, they also need the best-of-breed for that class of controls. To accomplish this, they arrange head-to-head competitions for every point product class that they own or plan to add to their Cyber Kill Chain model. These can take months to orchestrate. Too Inefficient Crossing the Last Mile As cyber adversaries crawl through victim's networks, they leave clues in their wake. The industry calls these clues indicators of compromise. Security vendors and white hat researchers are in a continuous state of seeking new indicators of compromise. Once found, security vendors convert them into prevention and detection controls that they deploy to their customers in the field. The trick then for network defenders is to get these new controls installed in their deployed toolset down the Cyber Kill Chain as quickly as possible. This is called crossing the last mile. In other words, crossing the last mile is the process of finding new indicators of compromise, converting them to prevention and detection controls, and then deploying those controls to an already installed system in the environment. Security vendors do this for their products fairly well but when a new indicator of compromise indicates that controls should be deployed across multiple products not owned by a single vendor or when independent white hat researchers discover new indicators of compromise on their own, that is when things slow down. And if the network defender has more than a handful of tools deployed across the enterprise, keeping track of the status of each tool and whether or not that tool has the most updated controls deployed for the latest intelligence is a nightmare. Benefits of Automatic Orchestration through a Security Platform A true platform approach is what's going to help all network defenders realize the value of the kill chain model. Here's why: Complexity Reduction Adopting a platform approach is the solution to a simple math problem. It reduces the number of deployed products that network defenders have to manage from 10-15 down to a handful, including the platform itself and the partners associated with the platform. That handful of products is so tightly integrated that they are much more easily managed compared to the old way of managing them separately as deployed best-of-breed solutions. The simplicity that the security platform offers also has another benefit: more efficient utilization. Because the independently deployed point products are so hard to manage, it is likely that network defenders rarely get them fully configured to their maximum potential. Think fewer products to manage, and more time to manage them. Completing the Last Mile is More Efficient Simplifying the orchestration of the previously mentioned last mile problem is no minor accomplishment. Converting indicators of compromise into prevention controls is important, but deploying those new controls to existing systems is the gas that fuels the entire operation. Without an efficient way to do that, cyber adversaries will continue to run circles around their victim networks because the responsible network defender's will be unable to move fast enough to counter them. Automatic orchestration is the key to crossing the last mile with any speed. Potential Buying Leverage for a Single Vendor Solution This is a difficult conversation for any organization, because choosing a single vendor with strong partner ties is counter to everything the network defender has been doing for the past 20 years. But once that decision is made, organizations can leverage that decision to simplify the buying process. Organizations can now get their security staff off of the security vendor assessment treadmill. They no longer have to assess a class of security products every two or three years. Since they have decided on a one-vendor approach, they have by default chosen that vendor as a trusted partner. Instead of buying new point products every three years, network defenders can look for longer contract times and get better deals. For example, if an organization commits to a specific platform vendor for five years instead of three, sales people are willing to give substantive discounts for a guarantee of a long term relationship. Further, since the relationship is now trusted, partners and resellers are willing to bend over backwards to accommodate specific asks. For example, a CISO of a very large American Insurance company was able to negotiate a lease for the security platform's hardware. He did not want to own any of it because in his company, CAPEX was a drain on the financial statement. By leveraging his trusted partner status to get a lease of the equipment, his entire purchase became OPEX which was much more acceptable. Start the Conversation Change is hard. Even when almost everybody in the room agrees that a change is required, people resist it. It is tough for the network defender to go against best practices that have been defining your career for over 20 years; things like Defense-in-Depth or deploying best of breed point products down the Cyber Kill Chain. But a change in thinking is required here. The Cyber Kill Chain model provide absolutely the right theory for how organizations could regularly defeat cyber adversaries attacking their networks. But our first attempts at orchestrating those concepts in the real world have not really worked that well for most network defenders. In order to reduce the number of security tools deployed in your organization's networks, to reduce the architectural complexity that makes it easier for hackers to leverage your organization's security weaknesses, and to re-direct company resources away from an endless cycle of security vendor assessments, board members should have a serious conversation with their CIO/CSO/CTO about the benefits of adopting a security vendor platform in order to accomplish efficient orchestration. The network defenders in the organization may eventually come around to the idea, but if the board would like to expedite the process, they may want to influence the decision from the top down. Conclusion The security platform automates enterprise security orchestration from a single vendor with some key and essential trusted vendor partners. It effectively reduces complexity in extremely entangled environments, reduces vendor assessments that are consuming your network defender staff, and changes a tedious and manual process of converting indicators of compromise into prevention and detection controls into an efficient and automatic process. Because of these things, the single vendor model significantly reduces the Total Cost of Ownership in your material risk mitigation efforts.]]> 2219 0 0 0 Addressing the Cybersecurity Skills Gap https://www.securityroundtable.org/addressing-the-cybersecurity-skills-gap/ Tue, 29 Nov 2016 23:34:27 +0000 https://www.securityroundtable.org/?p=2225 2225 0 0 0 ]]> Embracing Holistic Cyber Resilience https://www.securityroundtable.org/embracing-holistic-cyber-resilience/ Tue, 29 Nov 2016 23:36:50 +0000 https://www.securityroundtable.org/?p=2227 here.]]> 2227 0 0 0 ]]> Cyber Hygiene Series: Setting the Tone for Responsible Identity Management https://www.securityroundtable.org/cyber-hygiene-series-setting-the-tone-for-responsible-identity-management/ Tue, 29 Nov 2016 23:44:08 +0000 https://www.securityroundtable.org/?p=2230 2230 0 0 0 ]]> Cyber Insurance is a Misnomer: View Cyber as Peril When Evaluating Insurance https://www.securityroundtable.org/cyber-insurance-is-a-misnomer-view-cyber-as-peril-when-evaluating-insurance/ Mon, 05 Dec 2016 20:50:03 +0000 https://www.securityroundtable.org/?p=2253
  • Start by determining the range of potential exposures that could result from a cyber event
  • Then:
    • Overlay those exposures with the firm's existing commercial insurance portfolio.
    Our expectation is that many of those exposures will indeed support the consideration of an actual "cyber insurance" policy, some might already be covered in existing policies, and others might bring to light some of the coverage pitfalls described above (which by the way, can be fixed or supplanted by new "difference in conditions" cyber policies). The good news is that the insurance industry is receptive to covering the majority of the cyber risk spectrum, but doing so requires more attention to detail than simply buying what the industry commonly refers to as "cyber insurance." [poll id="3"]]]>
    2253 0 0 0
    2017 Predictions: Cyber Insurance https://www.securityroundtable.org/2017-predictions-cyber-insurance-2/ Wed, 07 Dec 2016 19:31:54 +0000 https://www.securityroundtable.org/?p=2274 2274 0 0 0 How to Account for Geopolitics in Your Cyber Risk Analysis https://www.securityroundtable.org/how-to-account-for-geopolitics-in-your-cyber-risk-analysis/ Mon, 19 Dec 2016 19:55:40 +0000 https://www.securityroundtable.org/?p=2292
  • Encourage academic research and public-private dialogue in order to develop this expertise. Study attack campaigns (share sensitive data, work jointly on attribution). Share knowledge and methodologies in order to integrate the cyber component into spatial context analysis and measure exposure to politically motivated cyber risk. This includes cartography of infrastructures, access and control over data flows, strategies of influence, power relationships between actors (Internet and service providers, governments, non-state actors, intermediation platforms, contractors, etc.)
  • Operationalize this expertise and develop information sharing with peers. Create incentives to overcome obstacles, work on scenarios, develop cyber crises exercises with a geopolitical component involving participation of state actors (defense, diplomacy, agencies for the security of information systems). Information sharing could be institutionalized through a Threat Intelligence Platform supported by a public-private partnership.
  • For companies, this collective effort would lead to an improved cybersecurity posture and allow for optimized spending and risk transfer strategy. It would lead to a better share of responsibility and liability between companies and states. Companies would be better equipped to foster and influence the elaboration of adapted norms of responsible behavior for states and possibly sanctions to raise the transaction costs for the attackers and deter such behavior. A better knowledge of the geopolitical underpinning of the cyber threat landscape, including potential attacker identity, motives and skills would deny them some advantages of cyber attacks (i.e. impunity and relative facility). In the long run, impacts of cyber threats would be likely to decrease globally.]]>
    2292 0 0 0
    2017 Predictions: Cyber Regulations https://www.securityroundtable.org/2017-predictions-cyber-regulations/ Mon, 19 Dec 2016 20:01:28 +0000 https://www.securityroundtable.org/?p=2300 2300 0 0 0 Back to the Basics: A Necessary Grind for Online Retailers https://www.securityroundtable.org/back-to-the-basics-a-necessary-grind-for-online-retailers/ Mon, 30 Jan 2017 14:00:24 +0000 https://www.securityroundtable.org/?p=2441 1.  Create a mandate for basic cyber hygiene in your business’ environment. Support this effort with ongoing education for employees and partners. When it comes to cybersecurity, ignorance is not bliss. 2.  Develop a basic threat profile. It’s important to understand that not all companies are created equal in terms of their security profile and posture. Developing and understanding your basic threat profile allows a clear understanding of where your most valuable assets reside, and what measures you can and should take to protect those assets specifically. 3.  Establish a formal process to secure emerging technologies. New, innovative technologies, such as digital and “omni-channel” marketing, create new revenue opportunities for online retailers. But these technologies also pose new security risks, and must be considered under the same security microscope as the rest of your business functions. Having a formal process in place will make for smoother, justifiable adoption and more secure technology implementation. The traditional approach has been to rely on compliance measures as a way to mitigate risk and maintain an overall secure posture. However, compliance has not been an effective model for a very long time. While businesses must check the compliance box, it cannot be defined as a security gold standard and more often than not offer a false sense of security that put businesses at greater risk. Getting back to the basics of cyber hygiene is where the real day-to-day security grind should focus. If retailers and others would emphasize and uphold solid, basic blocking and tackling security measures, they would be far less susceptible to cyberattacks across the different high-profile areas of concern. In the end, online retailers and other businesses must work to achieve a basic security foundation and only then seek to deploy more novel security precautions.  This approach, although not glamorous, will allow companies to review cybersecurity with a strategic mindset and will provide a solid foundation for preventing successful breaches and protecting the firm’s valuable data.]]> 2441 0 0 0 Why Cybersecurity Today is Like Traffic Safety in the 1970s https://www.securityroundtable.org/why-cybersecurity-today-is-like-traffic-safety-in-the-1970s/ Thu, 09 Feb 2017 14:00:45 +0000 https://www.securityroundtable.org/?p=2507

    Figure 1 illustrates the risk management cycle we can generalize from this string of events: Network effects accelerate the use of a new technology, bringing numerous benefits but risks as well. As those risks gain more attention, the government responds with regulation focusing on implementation of tactical, low-level solutions. Public acceptance is slow, so enforcement becomes more aggressive, raising awareness. At the same time, product design begins to tackle safety as integral to improved usability. A safer product emerges for a more conscious consumer, who despite all the engineering improvements, remains a critical element of the risk equation. The cycle is then free to start again, further refining both user behavior and the product itself. (The advent of the self-driving car and the range of policy, risk management, engineering and usability questions it raises is merely the latest and most disruptive iteration of this process in the automotive industry.) Ingraining Safety into Your Business I would argue that cybersecurity is today where traffic safety was in the early 1970s. Instead of looking at security holistically and as an integral part of the digital experience, we still focus on top-down organizational control and on compartmentalized solutions like email safety and privacy regulations - the seat belts of information security. But for information-intensive organizations, this reactive and siloed approach will prove increasingly insufficient. Like traffic safety, information risk management will improve not through incremental responses and brute force, but through iterations of regulation, enforcement, design and awareness that result in safer tools and users that take responsibility into their own hands. While we can’t know exactly how the risk management cycle will unfold for information risk management, we can speculate on some possibilities:
    • Functional platforms like CRM systems will have more “smart” features that identify and flag potential information security risks, requiring action from the user (think of Gmail’s prompt if you use the word “attached” in an email but don’t attach a file).
    • Information risk management will become part of professional training across functions, from university curricula on through company development programs.
    • Slogans, mnemonics, and other aids will be developed to help guide non-professionals in their information risk management decision making.
    • Information risk management will become part of an executive’s career narrative, one more factor in hiring, promotions and incentives.
    As information/data continues to become untethered from the technology that moves it and instead is seen as simply a corporate asset (albeit a significant one), responsibility for the safe handling of that asset will no longer be assigned to a particular person on the organizational chart. Instead, the duty of care becomes part and parcel of the data asset itself and falls to whomever handles it. Executives across an organization should ask themselves questions like these as we move to cybersecurity’s more holistic, ingrained approach:
    • When the chief marketing officer designs a new social media campaign, are information security considerations and best practices part of the plan?
    • Is the head of human resources ensuring that the vast stores of confidential information in employee management systems are being handled with appropriate care?
    • Does the CFO have verification processes in place to thwart unauthorized requests for capital transfers?
    • Has the head of sales ensured that personally identifiable information is siloed in a facility with a certification such as SSAE 16?
    By making themselves an integral part of the solution, executives outside the cybersecurity realm will thus move the risk management cycle forward into another iteration.]]>
    2507 0 0 0
    Let's Make 2017 the Year of IoT Security https://www.securityroundtable.org/lets-make-2017-the-year-of-iot-security/ Wed, 08 Feb 2017 19:13:24 +0000 https://www.securityroundtable.org/?p=2546 The following is excerpted from How to Make 2017 the Year of IoT Security, a recent article by William H. Saito published on Forbes.com. Late last year, popular internet services such as Netflix and Twitter were temporarily taken down amid a massive distributed denial-of-service (DDoS) attack that involved hackers deploying malware to simple webcams that many of us use without thinking. Authorities in the U.S. and U.K. were investigating the Mirai malware used in the attack to create a botnet, an army of zombie devices commanded by hackers. In fact, the Mirai code is still available online, allowing those with only modest technical skills to continue disrupting internet services on a major scale. IoT threats aren’t limited to things around us – they’re also inside us. The U.S. Food and Drug Administration (FDA) recently confirmed the existence of flaws in implants and transmitters made by a major U.S. medical device company. These transmitters are connected to the internet and designed to automatically monitor patients with implanted cardiac devices while they’re sleeping. The FDA disclosed that the transmitters have security vulnerabilities that allow them to be hacked in dangerous fashion. Matthew Green, who teaches cryptography at Johns Hopkins University, pointed out that the devices don’t use strong authentication. He also speculated on the nightmare scenario of hackers accessing thousands of these devices and simultaneously sending commands to shock the hearts of unsuspecting patients. He suggested the only remedy would be a costly firmware fix. I really believe that if we don’t focus on security, IoT will mean the “internet of threats,” or worse, the “insecurity of things.” That would be a disaster for the burgeoning IoT industry, which is expected to be worth some $1.7 trillion by 2020, according to IDC. We have to make 2017 the year of IoT security. Read the full article on Forbes here.]]> 2546 0 0 0 The Emerging Role of the Chief Information Security Officer in the C-Suite https://www.securityroundtable.org/the-emerging-role-of-the-chief-information-security-officer-in-the-c-suite/ Wed, 15 Feb 2017 14:00:59 +0000 https://www.securityroundtable.org/?p=3020
  • A Chief Financial Officer needs to ensure secure transactions between financial institutions or business partners.
  • A Chief Marketing Officer needs to master how to ensure cybersecurity in marketing activities via digital and social media, and
  • A Chief Human Resources Officer needs to ensure that digital recruiting processes are secure in a competitive market.
  •   A New Opportunity for the CISO How cybersecurity is addressed with regard to each managing function needs to be harmonized under company-wide priorities and principles.  This presents a new opportunity for Chief Information Security Officers (CISOs).  Traditionally, a CISO has been a supporting role for the Chief Information Officer or the Chief Risk Officer.   However, a CISO now needs to interact directly with all C-suite members.  The C-Suite needs to agree on what the company wants to protect from a holistic perspective and the CISO needs to facilitate these discussions. To facilitate these discussions, a CISO should ask below questions to C-suite.
    • “What are our crown jewels that we want to protect with top priority?”
    • “What are business consequences if those crown jewels were damaged?”
    • “How much investment are we willing to make to mitigate those risks?”
    Across an organization, there are many solutions to ensure cyber resilience.  As a technology solution there are Managed Security Services.   As a financial solution there is cyber insurance.   An operational solution may be a Computer Security Incident Response Team (CSIRT) or employee training.   A legal solution may be fiduciary actions based on a lawyer’s advice.  The key is to integrate these solutions into a cybersecurity strategy that supports the business priorities of the company.  Who leads this effort is not defined in many companies.  This is a new space in corporate business management and a new opportunity for the CISO.   By taking on such a role, a CISO can provide company-wide impact and contribution because if CISO plays such as role, cybersecurity strategy becomes a comprehensive and integrated package rather than an aggregation of independent tactics.  It is owned by entire C-suite and woven into company-wide business strategy.]]>
    3020 0 0 0
    Improve Performance by Weaving Safety into the Fabric of Your Business https://www.securityroundtable.org/improve-performance-by-weaving-safety-into-the-fabric-of-your-business/ Fri, 17 Feb 2017 20:34:55 +0000 https://www.securityroundtable.org/?p=3033 3033 0 0 0 ]]> 5 Emotional Stages of Preparing for GDPR https://www.securityroundtable.org/5-emotional-stages-of-preparing-for-gdpr/ Mon, 27 Feb 2017 12:00:17 +0000 https://www.securityroundtable.org/?p=3048 denial. I’m struck by how many still either don’t believe it will impact them, or don’t believe penalties will be applied; therefore, they don’t need to take it seriously (at which I’m struck by why they don’t see the societal value). The reality is that, no matter how much we chose to ignore GDPR, it is happening; and we must make the positive decision on whether we choose to embrace it or not. Typically getting through this emotional state is a challenge of education. This leads into the next stage of anger, which I would exemplify through the statement of “Just tell me what I need to do!”. Unlike standards like PCI, which is an industry-lead requirement that is very prescriptive (you must have X & Y), GDPR contains very few clear technical definitions. For example, what is “state of the art” or “security by design and default,” and when does a breach really start? Security practitioners like things black and white; the regulation is shades of grey. It requires each of us to work across our business teams to interpret and define exactly what it does mean to our business, and how we quantify and qualify this both to our business and third parties. All too often I’m seeing this lead to bargaining. To quote one instance, “We have been working with our legal team and will argue the definition of a breach does not apply effectively”.  Whilst I’m sure a few will gain some early successes with this, to me, it feels like swimming against the tide. I can only expect definitions to be tightened where needed, but the underlying intent of the regulation is clear: protect citizens’ personal information and drive confidence in the use of technology in today’s society. Essentially, at some stage, most go through depression (the cup half empty, which is, “This is real and happening, and you can’t ignore it or wriggle around it”). This leads to the reality that we need to understand just what the gap is between where we are and where we need to be, gathering the budget and support to achieve this within the business. This is the point to switch to the half-full cup, if you haven’t already. How often do you get the opportunity to step back from the daily cyber grind and review and re-architect with an eye to the future? Most of us are stuck with a lot of legacy that this is a perfect opportunity to phase out. The reality is that, whether we like it or not, we end up at acceptance: It is happening; GDPR goes live in 2018, and any one of our businesses could be held to account either as a result of an incident or, I suspect for many the most likely cause will be, a third party in your supply chain requesting evidence of your compliance as they look to achieve their own. I can share with you that I'm aware of companies already getting such requests. So, what are the takeaways here? All too often cybersecurity is treated as a technical challenge. Yes, we are improving in the social attack aspects (social engineering/the insider attack). But in this instance, there is a human aspect we must factor in. As you map your business strategy to adhering to the new GDPR legislative requirements, you need to build in time for your own emotional journey, as well as realize that others in the business also need to go on their own emotional journey. Consider what you can do to help short circuit this; get educated and discuss with your peers both inside and outside your own business.  Don’t assume that all your stakeholders are at the same point of the emotional journey you are, but take the time validate where they are and how you can nurture them through to maturity. GDPR is coming; it’s a positive opportunity to improve our own cybersecurity capabilities and a pivotal change to ensure confidence as we become an increasingly digital society.  ]]> 3048 0 0 0 18 http://gdpr-info.com/2017/03/01/view-gdpr-usa/ 0 0 20 http://mdb-dev.es/2017/05/22/gdprnis-countdown-how-ready-are-organisations-to-get-their-cybersecurity-in-order-for-the-next-decade/ 0 0 23 http://datacoresystems.ro/index.php/2017/05/23/gdprnis-countdown-how-ready-are-organisations-to-get-their-cybersecurity-in-order-for-the-next-decade/ 0 0 Understanding EU Cybersecurity Legislation: Key Considerations for Executives https://www.securityroundtable.org/understanding-eu-cybersecurity-legislation/ Tue, 28 Feb 2017 08:31:54 +0000 https://www.securityroundtable.org/?p=3072 Navigating the Digital Age (UK Edition) describe EU cybersecurity legislation and key considerations for executives, including the processes businesses must go through to deal with the changing requirements their IT staff will be asking for (and why):  ]]> 3072 0 0 0 Understanding EU Cybersecurity Legislation: Key Considerations for Executives https://www.securityroundtable.org/understanding-eu-cybersecurity-legislation-key-considerations-for-executives/ Wed, 15 Mar 2017 05:00:11 +0000 https://www.securityroundtable.org/?p=3135 Navigating the Digital Age (UK Edition) describe EU cybersecurity legislation and key considerations for executives, including  the processes businesses must go through to deal with the changing requirements their IT staff will be asking for (and why):  ]]> 3135 0 0 0 The New Branch Office IT Has to Be Cloud-Savvy and Secure https://www.securityroundtable.org/the-new-branch-office-it-has-to-be-cloud-savvy-and-secure/ Mon, 27 Mar 2017 13:00:44 +0000 https://www.securityroundtable.org/?p=3183
  • Public cloud
    • Cloud security is now one of the most pressing areas for IT investment; not only are most enterprises using the cloud, but branch offices may vary widely in how they are using the public cloud, and which cloud/s they use.
    • Many SaaS companies now host in the cloud; that means the data in those applications is in the public cloud, so the security extended to those applications is a pressing matter for C-suite attention.
    • Shadow IT: Branches are a likely place for “do it yourself” IT and now, with the public cloud so easy to access, IT must ensure security is extensible to and from public clouds—and across them. That means IT policies should govern centrally, yet universally, and automation that ensures branches get the speed, scale and policy enforcement they need.
  • Internet of Things
    • IT is still learning how to fully incorporate mobile devices and BYOD into the enterprise; now that IoT devices are coming online and creating new threat vectors, it’s critical that endpoint security be mainstreamed as a top business initiative.
    • Consistent policies and governance are key to ensuring that user profiles, permissions and access properly secure users as they move across devices. With IoT, this expanding device universe enlarges our definition of “end user” to include “things” acting in our ecosystem.
  • IT Cost Containment
    • The age-old mandate for IT—to manage and even reduce costs yet meet accelerating needs for speed, scale and application diversity—hasn’t gone away. Today’s next-generation security platforms make it possible to secure the enterprise and make IT more efficient and cost-effective. Those two actions are not mutually exclusive if the right priorities drive your initiatives.
  • All executives and boards should be having the following conversations with their technical teams about branch office security:
    • Have we estimated the cost of a breach before it happens?
      • Prevention costs far less than mitigation. Understand that even a fairly aggressive estimate of mediation cannot account for the true, long-term impact to your brand and on customer relationships.
    • Have we insisted on a security solution that is actionable for all stakeholder teams?
      • Make sure your security solution not only notifies you of threats, but also reports back when the threat has been eliminated.
    • Are we the most efficient we can be when it comes to IT?
      • Cybersecurity can improve efficiencies, resulting in greater network bandwidth; security and reducing overhead are not mutually exclusive. Network bandwidth is a key issue for branch offices.
    • How is our security solution delivering ROI and how can we measure it?
      • With a centralized platform, you can efficiently distribute the same security to all branches with one interface; a singular point of access reduces costs by avoiding the overhead of different security devices.
    • Are we secure on a per-file basis?
      • Aim for security per file for all users independent of branch or country. Secure and deliver “one desktop” so user’s permissions, access, profile and desktop all move with them across devices throughout the day.
    Central policies are critical to ensure effective security in an “any cloud” world. Central policies and a unified view of a multi-cloud enterprise drive cost containment as well as security. A centralized, flexible platform ensures consistent security levels to branches and endpoints. Finally, you can stay more secure by delivering a great user experience. The IT organization that prioritizes the user experience for remote offices helps eliminate “shadow IT” before it happens. A comprehensive solution that provides access to the user’s desktop from any device can turn these branch citizens into your best champions.]]>
    3183 0 0 0
    CSO Roundtable: RSA 2017 Takeaways https://www.securityroundtable.org/cso-roundtable-rsa-2017-takeaways/ Wed, 15 Mar 2017 17:54:47 +0000 https://www.securityroundtable.org/?p=3219 3219 0 0 0 ]]> Why Women in Cybersecurity Are Important, In Japan and Everywhere https://www.securityroundtable.org/why-women-in-cybersecurity-are-important-in-japan-and-everywhere/ Mon, 20 Mar 2017 13:00:44 +0000 https://www.securityroundtable.org/?p=3252 Over 209,000 cybersecurity jobs in the U.S. were unfilled as of March 2015. In Japan, where I am from, there was a shortage of about 80,000 cybersecurity professionals, and 160,000 professionals needed additional training to perform their mission fully in 2014. To overcome this shortage, we need to bring in more women and diversified skill sets. Half of IT users are women. Gender imbalance in tech has been an issue since at least 2005, according to Deloitte Global. Yet, Deloitte expected that fewer than 25 percent of the employees working in the IT sector of developed countries by end of 2016 were women. Only 11 percent of the information security workforce are women in the United States, whereas female engineers account for 20 percent of information and communication technology (ICT) workforce in Japan. This trend is especially alarming to Japan, where the Summer Olympic Games will be held in Tokyo in 2020, and security professionals are crucial to ensure the success of the event, build national cybersecurity capabilities, and leave a positive cybersecurity legacy beyond 2020. In 2016, the Japanese government estimated that the country is short 132,060 cybersecurity professionals, and the number is expected to increase to 193,010 in 2020. To fill in the gap, new talents need to be educated, recruited, hired and retained. Although the United States has been struggling with diversity in IT and cybersecurity, the country launched several initiatives to further diversify. In 1994, the Anita Borg Institute created an annual conference for women in IT, Grace Hopper Celebration of Women in Computing, named after U.S. Navy Rear Admiral Grace Hopper, who was one of the first cybersecurity career professionals and coined the term “computer bug.” The Japanese gradually started trying to reach out to women in IT or ICT. Japanese industry people launched Capture-the-Flag for Girls (CTF for Girls) a few years ago to invite young women who are interested in cybersecurity to create a community to ask tech questions. The National center of Incident readiness and Strategy for Cybersecurity, responsible for national strategies and policies, and American Chamber of Commerce Japan (ACCJ) annually hold the Cyber Halloween career talk on October 30 to bring in young talent to the field. The 2015 Cyber Halloween held the first panel consisting of female speakers from the government and industry sharing their advice about and journey on the cybersecurity career path. In February 2017, the Tsuda College, a prestigious college for women in Tokyo, hosted an epic event, Organizational Support for Leadership Development of Women in ICT, to discuss what kind of organizational support is available for female ICT researchers. Dozens participated locally and internationally – both men and women. These are all promising signs, and we need to go further. Outlined below are recommended actions Japanese academics, government officials and business leaders should take:
    1. Ensure the next Cybersecurity Program for Human Resources Development in 2017 and future governmental initiatives to raise the importance of diversity and encourage both men and women to be part of the cybersecurity human resources development ecosystem: education, recruiting, hiring and retention.
    2. Japanese academia, government and businesses should help young women who are interested in cybersecurity get connected with their peers overseas via Girls Who Code and conferences for mentorship and networking.
    The Japanese have a clear deadline to enhance their national cybersecurity capability and make Tokyo 2020 successful. Since this is a national project and part of a global effort, it is a golden opportunity for Japan to create new teams with various skill sets and perspectives. Since joining the Japanese Ministry of Defense, a U.S. graduate school to earn an international relations (security) and economics degree, a U.S. think tank, a Japanese tech company, and various U.S. tech companies, I have always been a minority. I enjoy security and like learning about people and the challenges surrounding security. Being a minority is a strength because you can offer different insights. You can pave the way and bridge the gap for other people from your community, country or culture. There is no single way to get into this important and exciting field. Even if you do not have “cybersecurity” in your job title, degree, or certificate, it does not mean you cannot get a cybersecurity job. I only got the word in my job title five years ago. Cybersecurity is about everything and for everybody. All of my professional and academic experiences and all of the people I have worked with have helped me obtain cybersecurity insights and jobs. I am truly grateful. Remember, especially as we celebrate International Women’s Day this month, you are not alone. I will do my part and look forward to seeing you at future conferences or perhaps even working with you as a colleague. Watch Miho in this compilation, presented by Australia’s Ambassador for Cyber Affairs, Dr. Tobias Feakin, that showcases some of the extraordinary work being done by women in cyber worldwide.  ]]>
    3252 0 0 0
    The Year of Mainstream Cybersecurity https://www.securityroundtable.org/the-year-of-mainstream-cybersecurity/ Thu, 23 Mar 2017 18:02:00 +0000 https://www.securityroundtable.org/?p=3267 The following is excerpted from 2017: The Year Cybersecurity Went Mainstream, a recent article by William H. Saito published on World Economic Forum. Last year saw a huge increase in cyber-related incidents, including big data breaches, physical infrastructure tampering, Internet of Things (IoT) devices turning on their owners, ransomware, and even allegations of election hacking that captured the public’s attention. Sometimes it seems there’s no way that enterprises and governments can effectively stop the rising tide of cyberattacks. The good news is, along with the launch of a global cybersecurity watchdog, stakeholders are now discussing these issues in major international forums that until recently were neither digitally focused nor multistakeholder in nature. The inaugural meeting of the Global Commission on the Stability of Cyberspace (GCSC) was held last month, an event that was long in the making. The GCSC isn’t just another acronym. It’s the first organization of its kind dedicated to bringing together stakeholders and proposing norms for the security of cyberspace. It comes after the successful 2014 launch of the Global Commission on Internet Governance (GCIG), which has issued recommendations on various issues including cybersecurity, online privacy and access to the internet. GCIG chair Carl Bildt, former prime minister of Sweden and a veteran international diplomat, is also serving as senior advisor to the new GCSC, adding to its weight and momentum. I was honoured to be selected as a GCSC commissioner and want to highlight the creation of the commission, because, as I’ve said many times, actionable dialogue among stakeholders is key to improving cybersecurity. Read the full article on weforum.org here.
     
    ]]>
    3267 0 0 0
    How Businesses Should Prepare for Australia’s New Mandatory Data Breach Notification Laws https://www.securityroundtable.org/how-businesses-should-prepare-for-australias-new-mandatory-data-breach-notification-laws/ Tue, 18 Apr 2017 23:00:47 +0000 https://www.securityroundtable.org/?p=3312
  • Private sector health service providers. Organisations providing a health service1 include:
    • Traditional health service providers, such as private hospitals, day surgeries, medical practitioners, pharmacists and allied health professionals.
    • Complementary therapists, such as naturopaths and chiropractors.
    • Gyms and weight-loss clinics.
    • Child care centres, private schools and private tertiary educational institutions.
    • Businesses that sell or purchase personal information; consumer credit reporting information, including credit reporting bodies, credit providers (which includes energy and water utilities and telecommunication providers) and tax file numbers; and certain other third parties.
    Once the mandatory data breach notification scheme comes into force, organisations will need to report any 'eligible' data breaches to the Australian Privacy and Information Commissioner,2 and notify customers that may have been affected as soon as possible. The government classifies a data breach as an instance where there has been "unauthorised access to, or unauthorised disclosure of, personal information about one or more individuals (the affected individuals), or where such information is lost in circumstances that are likely to give rise to unauthorised access or unauthorised disclosure".3 It qualifies as an "eligible data breach" when there is a likelihood that the individuals who are affected by the incident are at "risk of serious harm" because their information have been exposed. When contacting the Australian Privacy and Information Commissioner about affected customers, businesses must include a description of the data breach, what kind of information has been compromised, and the steps that individuals can take to respond and protect themselves due to the incident. What if I don’t comply? Failure to comply with the new notification scheme will be "deemed to be an interference with the privacy of an individual" and there will be consequences. A civil penalty for serious or repeated interferences with the privacy of an individual will only be issued by the Federal Court or Federal Circuit Court of Australia following an application by the Commissioner. Serious or repeated interferences with the privacy of an individual attract a maximum penalty of $360,000 for individuals and $1,800,000 for bodies corporate.4 What actions should I take now? If your organisation has been lax with data security policies, this is a wake-up call that the government is taking data breaches more seriously. Every organisation should begin to:
    • Review your data collection practices and policies, internal data-handling, and data-breach policies to reflect the new requirements and ensure personal information is collected and stored only when needed.
    • Audit how you are holding data and whether any sits with third parties (for example, in the cloud) on your organisation’s behalf.
    • Strengthen your cybersecurity defences. Visibility is key. This means reviewing your cybersecurity strategies and practices to ensure that steps are in place to avoid data breaches or you have outlined ways to reduce administrative errors, which could lead to a breach. For example:
      • Who has access to the data and do they need access to the data? Reducing or limiting access reduces the possibility of anyone inadvertently leaking the data or a cyber criminal getting access to data.
      • For sensitive data, think of how it could be shared. Is there the right governance in place to prevent someone from sharing or breaking a business process? Many times a process needs to be updated to ensure there is a balance between the risk and productivity.
    Now is the time to sit down, have these conversations, and look at how you're protecting customer data and whether your security practices are adequate. For organisations that have been reluctant to invest in information security practices, this legislation alone should not be the primary driver to protect your organisation and, ultimately, your customers’ data. As a priority, every organisation should continually review its data security to ensure that no customer data is unwittingly compromised. You should look at using a risk-based methodology for managing privacy and not wait for the law to come into effect, as the time to act is now.   1 https://www.oaic.gov.au/privacy-law/privacy-act/health-and-medical-research 2 https://www.oaic.gov.au/ 3 https://www.oaic.gov.au/agencies-and-organisations/guides/data-breach-notification-a-guide-to-handling-personal-information-security-breaches 4 http://www.austlii.edu.au/au/legis/cth/bill_em/padbb2016356/memo_0.html]]>
    3312 0 0 0
    Les cyber-attaques, un danger croissant pour le secteur de l'énergie https://www.securityroundtable.org/les-cyber-attaques-un-danger-croissant-pour-le-secteur-de-lenergie/ Wed, 22 Mar 2017 09:17:59 +0000 https://www.securityroundtable.org/?p=3331 En 2015, le nombre d'attaques informatiques réussies a augmenté dans plus de 80% des sociétés pétrolières. Ce qui rend ce secteur si attirant pour les pirates, c'est sa digitalisation -et sa vulnérabilité- accrue mais, surtout, l'effet domino potentiel d'un blocage des infrastructures énergétiques, souligne un rapport publié jeudi.
    Ce n'est pas parce qu'il est stratégique que ce secteur est plus à l'abri des hackers que les autres. Au contraire, son rôle essentiel dans les économies modernes en fait désormais une cible de choix. Le secteur énergétique est de plus en plus visé par les cyber-attaques, et prend conscience du danger, constate un rapport publié jeudi 29 septembre par le Conseil mondial de l'énergie en partenariat avec le réassureur Swiss Re et l'entreprise de gestion des risques Marsh & McLennan Companies, en vue du Congrès mondial de l'énergie qui se tiendra à Istanbul du 9 au 13 octobre. En 2015, le nombre d'attaques informatiques réussies a augmenté dans plus de 80% des sociétés pétrolières. Ce qui rend ce secteur si attirant pour les pirates, c'est d'une part sa digitalisation accrue, qui en augmente la vulnérabilité: désormais, la menace informatique est comparable à celle d'"une inondation ou un incendie". D'autre part, la dépendance de l'énergie d'un monde de plus en plus numérisé, qui amplifie l'effet domino potentiel d'un blocage des infrastructures énergétiques: "dérèglements économiques et financiers", mais aussi "pertes humaines" et "dommages environnementaux massifs" figurent parmi les conséquences possibles évoquées par le rapport. D'autant plus que ces attaques "peuvent passer inaperçues jusqu'à ce qu'un réel dommage soit apparent", observe le secrétaire général du Conseil mondial de l'Energie, Christoph Frei, qui  en conclut:
    "Dans les années à venir, nous nous attendons à ce que les cyber-menaces continuent d'augmenter et changent notre façon de penser les infrastructures intégrées et la gestion de la chaîne d'approvisionnement."

    Une approche inter-sectorielle s'impose

    La sensibilité au problème croît avec le phénomène. Au cours des trois dernières années, une bonne trentaine de pays ont ainsi "mis en place des programmes ambitieux" pour le contrer, observe le secrétaire général. L'Europe a pour sa part adopté une directive dédiée à la cybersécurité (Network and Information Security Directive, NISD) qui entrera en vigueur en 2018. Et d'ici à cette date, quelque 1,87 milliard de dollars pourraient être dépensés chaque année par les industries du gaz et du pétrole pour se protéger contre les cyber-attaques, calcule le rapport.
    ]]>
    3331 0 0 0 ]]>
    FedRAMP Certification and Third Party Evaluation Is Not Enough https://www.securityroundtable.org/fed-state-and-city-cloud-deployments-fedramp-certification-and-third-party-evaluation-is-not-enough/ Mon, 24 Apr 2017 18:36:58 +0000 https://www.securityroundtable.org/?p=3354 The following is excerpted from "Securing the Government Cloud" a recent article by Rick Howard published on FCW.com. Cloud service deployments at the federal, state and city levels that benefit from the cloud's operational and cost efficiencies have been unprecedented. The federal government launched its Federal Risk and Authorization Management Program, or FedRAMP, to certify a consistent way for cloud service providers to offer security assessment, authorizations and continuous monitoring to government organizations. State and city governments rely on third-party contractors to assess cloud providers for them. What many government network defenders have forgotten is that security in a cloud environment is a shared responsibility. The cloud provider secures the internet and physical infrastructure, but the cloud customer is responsible for protecting its own data. FedRAMP and third-party certifications assure that the cloud provider is doing its part. But it is ultimately up to customers to ensure they're taking steps to prevent, detect and respond to cyber adversaries during the attack lifecycle. Technology exists today that will allow network defenders to install the same kinds of prevention controls in cloud environments that they are used to deploying in their own perimeter networks. As commercial and government organizations race to deploy services in the cloud, network defenders will do best to remember that securing cloud environments is a shared responsibility. This means that the cloud provider protects its environment, but the customer protects its own data and systems. Let's pause for a moment and appreciate how fast government organizations have grown to accept the cloud computing model as a viable way to do business. This is not typical. Federal, state and city organizations around the world are normally at least 10 years behind the commercial sector when it comes to adopting any new kind of technology. Read the full article "Securing the Government Cloud" on FCW.com]]> 3354 0 0 0 Une entreprise française sur deux vulnérable aux cyberattaques https://www.securityroundtable.org/une-entreprise-francaise-sur-deux-vulnerable-aux-cyberattaques/ Wed, 22 Mar 2017 14:23:50 +0000 https://www.securityroundtable.org/?p=3361 Hausse des attaques Les résultats de ce deuxième baromètre (141 répondants) ne sont guère rassurants. Car - et ce n'est pas une surprise - les attaques ont augmenté en 2016 par rapport à 2015 pour 46% des RSSI tandis que 53% d'entre eux estiment qu'elles sont stables. Près de 80% des entreprises ont constaté au moins une cyberattaque avérée, qui a réussi à entrer dans un ou des serveurs de l'entreprise. En moyenne, elles mettent entre une et six heures pour s'apercevoir des attaques et entre trois jours et trois semaines pour nettoyer le système. Parmi les entreprises interrogées, 21% ont été touchées par 15 attaques ou plus, 9% entre 10 et 14 attaques, 15% entre quatre et neuf, et, enfin, 34% entre une et trois. "Les attaques touchent toutes les entreprises, explique le président du CESIN, Alain Bouillé, RSSI à la Caisse des Dépôts. Plus personne ne peut se réfugier sur l'argument 'cela n'arrive qu'aux autres'. Ce temps est terminé". La demande de rançon (ransomware) reste l'attaque la plus subie par les entreprises (80%, en hausse de 19 points). Suivent les attaques par déni de service (40%), les attaques virales générale (36%), la fraude externe (29%)... tandis que le cyber-espionnage économique et industriel est relativement peu fréquent (9%), tout comme la fraude au président (4%). En moyenne, les entreprises subissent trois types d'attaque, explique le CESIN.]]> 3361 0 0 0 Deterrence in Cyberspace: A Greater Role for Industry (Part One of a Three Part Essay Series) https://www.securityroundtable.org/deterrence-in-cyberspace-a-greater-role-for-industry-part-one-of-a-three-part-essay-series/ Tue, 02 May 2017 13:00:16 +0000 https://www.securityroundtable.org/?p=3378 Component Elements of an Effective Cyber Deterrence Policy Based on my previous experience in the U.S. military and government while working on the issue of deterrence in cyberspace, the basic components of an effective cyber deterrence policy include the following elements:
    • A description of what types of activities the policy seeks to deter (not a detailed, exhaustive list which might encourage actions short of declared thresholds, but rather a description of the scale, scope and consequences of malicious cyber activities that could impact national/international security, national/international economic stability, serious public safety concerns or national/international level privacy and freedoms)
    • Deterrence by denial (denying the adversary’s anticipated gain by making the effort too difficult - primarily through defense, resilience and reconstitution capabilities and processes)
    • Deterrence by cost imposition (making the anticipated cost or punishment associated with an adversary’s efforts more painful than it is willing to accept in relation to the expected gain - primarily through economic, law enforcement and even military instruments of national power when other preferred measures are insufficient)
    • Activities that support deterrence (these include diplomatic, informational, and intelligence instruments of national power, as well as research and development to shape the future of cybersecurity by planning for and investing in tools, techniques, and a workforce necessary to improve the resilience of the digital environment and provide new technological options for deterring malicious cyber activities)
    It’s within the last component, activities that support deterrence, that I’ll focus my effort in describing where I believe that industry can become a much more effective partner to governments in contributing to deterrence in cyberspace. Specifically, this is where the private sector’s growing role in cyber threat intelligence and information sharing, in establishing norms of responsible behavior in the cyberspace environment, and in conducting research and development to implement technical solutions that more effectively defend against modern cyber threats can help.  So, let’s tackle industry’s role in cyber threat intelligence and information sharing in this first essay of the series. Activities that Support Deterrence: Private Sector Cyber Threat Intelligence and Information Sharing While there is no shortage of intelligence sharing agreements between governments that can be improved upon to address the growing challenge posed by cyber threats, governments should facilitate and encourage the role that industry can play in cyber threat information and intelligence sharing.  Exposure of the identity of malicious cyber actors and organizations, their capabilities, their techniques and indicators of compromise, and their playbooks has been a key factor in changing their behaviors, to include a deterrent effect. For example, the U.S. implemented law enforcement actions to impose direct costs on both malicious cyber threat actors and organizations, as well as the states that protect or provide support to them.  The U.S. indictment of five uniformed members of China’s People’s Liberation Army in 2014 for hacking six U.S. industry victim entities is an example of the use of public exposure coupled with the investigation and prosecution authorities of law enforcement. This type of law enforcement action demonstrates that there are consequences for conducting malicious cyber activities, and can contribute to deterrence through the imposition of costs. Additionally, several of my former U.S. government colleagues have privately expressed to me their belief that the indictments and public exposure of these Chinese military members played a significant role in the ultimate outcome of the Obama – Xi agreement in the fall of 2015.  This demonstrates deterrence by influencing foreign policy decision making and restricting certain types of malicious cyber activity. In this case, the agreement was to limit the cyber theft of intellectual property and trade secrets for profit. Perhaps surprising to some, private sector cybersecurity companies played a prominent role in  the public exposure of every major headline-grabbing breach over the past five years.  Based on my experience in the private sector cybersecurity industry over the past year and a half, this trend is only going to increase.  I think this is a positive development, because I believe that government intelligence capabilities simply cannot keep up with everything that is required to combat the explosion of cyber threats.  Industry involvement is a must, but the partnership between governments and industry must be done carefully and correctly. Governments can encourage and strengthen what is already happening with industry cyber threat intelligence gathering and sharing efforts by integrating this into policy and implementation planning.  To improve the effectiveness of the partnership with industry, governments should leverage some important lessons the U.S. has learned as a result of its experience over the past several years.  These lessons include clarifying exactly what information is shared, developing standardized methods and formats for information sharing, and employing automated platform capabilities to share this information quickly and distribute security controls to the network enterprise that stop cyber threats before they successfully accomplish their intended purpose.  This contributes to deterrence because the cost of doing business successfully for cyber threat actors and organization has just gone up. Keys to Success Deciding exactly what information to share is the first key to success.  This is important because some misinformed parties tend to conflate cyber threat information with surveillance and encryption issues, which are currently very heated and divisive.  In my view, these are very different issues.  In cybersecurity, security doesn’t compete with or detract from privacy or civil liberties.  Security is the necessary ingredient in ensuring both privacy and civil liberties in a digital age. We must be very clear that cyber threat information sharing is not about exposing personally identifiable information (PII), protected health information (PHI), intellectual property (IP), or personal/corporate content of communications.  It is about sharing cyber threat indicators of compromise and contextual information that relates directly to a cybersecurity purpose.  This includes cyber threat actors and organizations, malicious code and techniques, information infrastructure transmission and collection points, communication control channels employed by cyber threats and where these elements are located, the general categories of targets that cyber threats are attempting to penetrate, and the techniques that cyber threats execute on endpoint devices to hijack their intended function.  This is the type of information that should be acceptable within privacy parameters because it is solely focused on sharing indicators of compromise and the contextual information necessary for the cybersecurity community to successfully defend against these threats. Finally, we must evolve from legacy manual methods of information sharing, such as spreadsheets and pdf files.  We must also evolve from confusing ad hoc methods, consisting of more than three hundred varying formats with inconsistent fields of information.  Effective sharing requires a streamlined procedure that is standardized.  This means that there is a single recognized and accepted standard for information fields about the threat, consistent with the specific threat indicators of compromise and contextual information previously outlined.  It also means that the sharing must be automated through the employment of a platform that can translate the standardized threat information into the security controls that can automatically be deployed to the network and stop the threat before it successfully accomplished its intended purpose.  This is the only way to level the current playing field between offense and defense and give the cybersecurity community a fighting chance to outmaneuver the adversary.  It is also like taking a page from the attacker playbook because they employ automation and effectively use information sharing procedures of their own. How This Can Work Industry has an increasingly important role to play in the deterrence of modern cyber threats.  By contributing to governmental efforts in exposing appropriate cyber threat intelligence, private sector information sharing programs and organizations can raise the cost of doing business for cyber threats.  This can be done responsibly, without posing risk to privacy or civil liberty concerns. A magnificent example of the private sector’s contribution is the Cyber Threat Alliance (CTA).  The CTA is a non-profit organization headed by President Obama’s former Cyber Czar, Michael Daniel.  The CTA consists of more than a dozen cybersecurity companies.  While all of these companies are competitors, each CEO from the participating companies has decided to treat cyber threat intelligence as a public good instead of a commercial commodity. The founding members of the CTA are Palo Alto Networks, Symantec, McAfee, Fortinet, Checkpoint and Cisco.  The CTA has two rules:  You must share cyber threat intelligence daily, and you must consume the shared intelligence to protect your customer base.  The CTA has created a platform to share information in a standardized and automated format, protect privacy and civil liberties, consume the shared intelligence, and automatically push the resulting security controls into the information environment to protect their clients. The CTA provides a practical example of how industry can play a vital role in deterring cyber threats in the digital age.  If your cybersecurity vendor isn’t a member of the CTA, perhaps you should ask them to join…because a cyber threat seen by any one of the CTA members means that the clients of all the CTA members are then protected against that threat. In my next essay of this series I’ll discuss the need for a greater industry role in the development and implementation of norms of responsible behavior in cyberspace.  ]]>
    3378 0 0 0
    Les cyber-menaces ont atteint un niveau record pour les entreprises en 2016 https://www.securityroundtable.org/new-french-post/ Wed, 05 Apr 2017 09:18:11 +0000 https://www.securityroundtable.org/?p=3691 Les récentes attaques informatiques contre le service de messagerie de Yahoo! et le piratage massif de plusieurs centaines de comptes Twitter ce mercredi 15 mars illustrent les menaces potentielles qui peuvent peser sur les entreprises. Dans son rapport annuel sur la sécurité intitulé "2016 Security Roundup : a record year for entreprise threats", la société Trend Micro a dressé un bilan des menaces informatiques subies par les entreprises et il apparaît que selon ce document, "2016 a été une année sans précédent pour la cybersecurité, particulièrement pour les entreprises". Ces attaques auraient entraîné ainsi plusieurs centaines de millions de dollars en pertes cumulées pour les entreprises qui sont de plus en plus visées. Ed Cabrera, Chief Cybersecurity Officer chez Trend Micro a ainsi déclaré :
    "Alors que les menaces ne cessent de se diversifier et de gagner en sophistication, les cybercriminels, qui ciblaient essentiellement les individus, reportent désormais leur attention sur la source de revenus la plus lucrative, à savoir les entreprises." ajoutant que "tout au long de l'année 2016, nous avons constaté que les cybercriminels extorquent de l'argent aux organisations pour plus de rentabilité ; or cette tendance n'est pas près de ralentir. "
    >> Lire aussi : Une entreprise française sur deux vulnérable aux cyberattaques Dans un récent rapport de la délégation ministérielle aux industries de sécurité et à la lutte contre les cyber-menaces rattachée au ministère de l'Intérieur français, les auteurs ont également pointé les menaces qui pesaient sur l'économie. "Les secteurs les plus touchés par les cyber-menaces touchent à l'économie et aux flux financiers, tandis que plus généralement les données personnelles ou confidentielles sont de plus en plus souvent détournées pour être monnayées." >> Regarder aussi  le diaporama : Les pires piratages de comptes de l'Histoire

    Des attaques très lucratives

    Les attaques de type BEC (Business Email Compromise *) ont été très lucratives pour leurs auteurs. En moyenne, les pertes ont été évaluées à 144.000 dollars par entreprise touchée dans le monde entier. L'entreprise allemande Leoni AG, spécialisée et leader dans le domaine des câbles, a par exemple été victime de ce type d'attaque lorsque son directeur financier a transféré près de 44,6 millions de dollars sur un compte étranger. Ce type d'attaques a été mené dans 92 pays selon Trend Micro. Les pays les plus affectés sont les Etats-Unis et le Royaume-Uni comme l'illustre la carte ci-dessous.]]>
    3691 0 0 0
    Executive Advisory Report: Cryptowall https://www.securityroundtable.org/executive-advisory-report-cryptowall/ Thu, 27 Apr 2017 19:09:29 +0000 https://www.securityroundtable.org/?p=3904 here.]]> 3904 0 0 0 Executive Advisory Report: KeRanger https://www.securityroundtable.org/executive-advisory-report-keranger/ Thu, 27 Apr 2017 19:56:25 +0000 https://www.securityroundtable.org/?p=3925 here.]]> 3925 0 0 0 How Japan Is Aiming to Close the Cybersecurity Skills Gap Before Tokyo 2020 https://www.securityroundtable.org/how-japan-is-aiming-to-close-the-cybersecurity-skills-gap-before-tokyo-2020/ Mon, 15 May 2017 20:00:50 +0000 https://www.securityroundtable.org/?p=3449 Ministry of Economy, Trade and Industry (METI), the current shortfall of IT professionals to available opportunities is 132,060, which will further increase to 193,010 in 2020. About half of end-user companies believe they are deficient in IT security employees, and only 26 percent think they have enough talent in these roles. The Japanese government plans to issue a new national cybersecurity strategy for human resources development, the Program to Develop Cybersecurity Human Resources, in 2017. The draft released in March 2017 emphasizes that cybersecurity is not a cost center, but it provides opportunity to invest to create new business values and increase companies’ international competitiveness. Reflecting the Cybersecurity Guidelines for Business Leadership in December 2015, the draft encourages business executives to take cybersecurity measures as part of their social responsibility and raise cybersecurity awareness. This is crucial now, because the government learned 34 percent of Japanese business executives do not consider cybersecurity part of their business challenges. In Japan, end-user companies tend to believe IT is a tool to increase efficiency and cut costs (not something to invest in), and outsource IT-related work to vendors and system integrators. Only 24.8 percent of IT engineers work in-house in Japan, compared to 71.5 percent in the United States. The current business environment, however, demands end-user companies find a balance between outsourcing and insourcing IT or cybersecurity-related work. Business operations heavily rely on computers, hardware, software, cloud computing, cell phones, tablets and SaaS, and more adopt general purpose technologies for cost-saving and efficiency. Each technology requires specific security expertise. Moreover, business risk management, critical infrastructure operations, finance, legal, human resources and even national security touch upon cybersecurity. Business executives must take the lead to craft a business strategy to deal with a wide variety of risks – including cyber risks – and take advantage of innovative technologies for security and convenience. METI and the Japanese Ministry of Internal Affairs and Communications (MIC) are tackling the aforementioned challenges to cultivate cybersecurity-driven C-level executives and next-generation professionals for end-user companies and critical infrastructure companies. Both ministries are launching separate cybersecurity training centers in 2017. While MIC focuses on IT research and development, METI covers both the operational and information technology sides of critical infrastructure protection, including industrial control system/supervisory control and data acquisition (ICS/SCADA). As cyber risks against ICS/SCADA are growing, METI established the Industrial Cybersecurity Center of Excellence (COE) under the Information-Technology Promotion Agency (IPA) in April 2017. COE has three pillars for their mission: the development of human resources; the evaluation of the security and reliability of ICS/SCADA; and the research and analysis of cyberthreat intelligence. COE will serve a total of up to 100 students per year, and provide two courses: one for mid-career people and one for C-level executives. Both courses will be a golden opportunity for professionals from different sectors to get connected, create a trusted community, and help each other later. While the course for C-suites will consist of several classes over a short term, the course for mid-career people will run from July to June. It will aim to cultivate professionals able to propose cybersecurity strategy drafts and brief business executives about cyber risks, using business management and financial terms; who understand the current cyberthreat landscape and best practices overseas and in other sectors to apply to such cyberattacks, and can use the information to craft cybersecurity tactics and strategy; and who can evaluate the safety and reliability of cybersecurity solutions, technologies, and costs to employ and deploy the best one. The course starts at Primary level (July to September), and moves onto Basic (October to January), Advanced (February to April), and Graduation Project (May to June), though more advanced students do not need to participate in Primary classes. It covers IT/OT basics, such as corporate governance, business continuity, forensics, ICS/SCADA risks and cyber exercises; business management and ethics, such as leadership, accounting/finance, presentation skill, budgeting and relevant legislations; and global case studies. COE began accepting applications for the mid-career course in late February, after more than 30 companies from the automobile, utility, railway and real estate industries had expressed interest in enrolling their employees. IPA already runs the Cyber Rescue and Advice Team against targeted attack of Japan (J-CRAT) and supports and supports a cyberthreat information-sharing framework, the Initiative for Cyber Security Information sharing Partnership of Japan (J-CSIP), to protect critical infrastructure companies. IPA also monitoring the next-generation Government Security Operation Coordination Team for the central government and nine government-affiliated agencies in April 2017. The COE project for cyberthreat intelligence will be an additional means for IPA to bring in the intelligence and expertise of white hat hackers to eventually help with human resources development and the system evaluation project. MIC released the IoT Cybersecurity Action Program 2017 in January 2017 to enhance IoT security and prepare for Tokyo 2020. One of the main pillars of the program is to accelerate the national effort to cultivate cybersecurity workforce by hosting cyber exercises and establishing a training center. The National Cyber Training Center was created under the National Institute of Information and Communications Technology (NICT) in Tokyo this April. NICT was chosen for its assets: NICTER (Network Incident analysis Center for Tactical Emergency Response) to watch cyberattacks and visualize them; and a cloud-based StarBED platform for cyber exercises. The National Cyber Training Center offers the SecHack365 program to train 40 students under 25 years old each year; implement 100 Cyber Defense Exercise with Recurrence (CYDER) exercises for 3,000 central and local municipal government officials and critical infrastructure personnel all over Japan; and host the Cyber Colosseo exercises for the Tokyo Organising Committee of the Olympic and Paralympic Games. The center accepted 359 applications from young industry people and college and university students including teenagers in April. SecHack365 students can take classes remotely to develop computer programs and participate in cyber exercises and hackathons. Competent students will be sent overseas for additional education. The center also aims to build a community for next-generation engineers to lead IT-driven innovation in Japan and develop computer programs to resolve unsolved challenges, rather than relying only on existing technologies. CYDER used to target only Tokyo. In Japanese Fiscal Year 2015 (April 2015 to March 2016), 200 people from the central government and critical infrastructure people participated in CYDER. In JFY 2016, however, CYDER was also provided in eleven places outside Tokyo, and 1,500 people attended. CYDER expanded to cover local municipal governments because they have residents’ My Number information (a new personal identification system for Social Security and taxation information), and more cybersecurity is required as cyberattacks and breaches are growing. Cyber Colosseo exercises allow Tokyo 2020 cybersecurity personnel to simulate potential cyberattacks on Tokyo 2020 and review and enhance defensive capabilities with Blue and Red Teams. The exercises are expected to help team-building between security personnel and relevant organizations. These METI- and MIC-led initiatives will allow IT and OT personnel to learn from each other, power mid-career professionals by business operation mindset to bridge between technical engineers and business executives, make C-level executives more mindful about the current cyberthreat landscape and cybersecurity, and cultivate next generation R&D engineers. They will also form tight bonds between professionals from different sectors and cultures. Of course, it will take at least one year for students to bring back what they learn to their organizations and make reforms for better IT/OT balance. Still, this is a positive step forward for Japan and the world’s cybersecurity. Unfortunately, almost all information about these projects is only available in Japanese, but this is definitely worthy of a global audience.]]> 3449 0 0 0 Threat Intelligence: It Isn't a Competition https://www.securityroundtable.org/threat-intelligence-isnt-competition/ Tue, 09 May 2017 17:24:56 +0000 https://www.securityroundtable.org/?p=4263 announce the revamped, bigger and now-independent Cyber Threat Alliance. Normally, we are competitors. However, the Cyber Threat Alliance brings us all together in good faith to share threat information for the purpose of improving defenses against advanced cyber adversaries across member organizations and our respective customers. Our company mission is to maintain trust in today’s digital world, and the collective intelligence from the Cyber Threat Alliance ecosystem – the output of which will be delivered through our Next-Generation Security Platform – furthers our ability to enable our customers to successfully prevent cyber breaches. We six founding members now also agree that this expanded and independent Cyber Threat Alliance is key to advancing that mission. To make the Cyber Threat Alliance a more effective and powerful force, we announced the:
    • Establishment of the Cyber Threat Alliance as its own, truly independent organization with a president, board of directors, and governance structure.
    • Appointment of Michael Daniel as the first president of the Cyber Threat Alliance. Michael was formerly special assistant to the president and cybersecurity coordinator for the White House and brings unique and valuable expertise to this position.
    • Addition of Check Point and Cisco to this powerful group of founding members, and additional affiliate and contributing members (e.g., InSights, RSA and Rapid7).
    • Unveiling of the Cyber Threat Alliance Platform for Threat Intelligence Sharing, which is now fully operational and actively sharing tens of thousands of samples and pieces of active threat intelligence each week.
    Ultimately, the vision of the Cyber Threat Alliance and its members is threefold:
    1. To share threat information in order to improve defenses against advanced cyber adversaries across member organizations and their customers.
    2. To advance the cybersecurity of critical information technology infrastructures.
    3. To increase the security, availability, integrity and efficiency of information systems.
    With yesterday’s announcement, we made a bold step forward on our first vision item. As a founding Cyber Threat Alliance member and consistent driver of automated threat intelligence sharing, Palo Alto Networks is pleased with the continued forward momentum toward collectively improving the industry’s defenses against advanced cyber adversaries. Next comes our work on the second and third vision items while we continue to improve the Cyber Threat Alliance Platform and add new members. We believe that by expanding the Cyber Threat Alliance, we are stronger together and can overcome some of the inherent challenges in isolated approaches to cybersecurity. For us here at Palo Alto Networks, the Cyber Threat Alliance is another way that we show our longstanding and fundamental commitment to the importance of threat information sharing. We have said for years that the industry and the public sector must operationalize threat information sharing; that’s the best way to shift the balance of power against cyber adversaries. The Cyber Threat Alliance and its new operational platform is a realization of that belief. As a founding member, we have been involved in the Cyber Threat Alliance since it started in 2014, and yesterday’s announcements are a realization of the goals and vision we had when this all began. We are committed to strong, continued support and participation in the Cyber Threat Alliance. I look forward to updating you in the future on the Cyber Threat Alliance’s progress in our shared vision.]]>
    4263 0 0 0
    Navigating the Digital Age in Australia https://www.securityroundtable.org/navigating-digital-age-australia/ Tue, 09 May 2017 17:25:03 +0000 https://www.securityroundtable.org/?p=4266 Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers (Australian Edition). This guide is intended as both a how-to guide and an anthology. It includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials, all of whom are recognised in Australia thought leaders. While the launch of this guide marks the beginning of the dialogue, it by no means can end there. The conversation must be a continuous and interactive one that all business-minded leaders, regardless of industry or background, can have the proper tools and guidance they need to effectively navigate cyber risk in the digital age. For this reason, SecurityRoundtable.org was created, setting the stage for real-time, peer-to-peer, executive exchange around cyber risk best practices. This guide, together with SecurityRoundtable.org, comes as the starting point in the revolution for every organisation to step up and change the narrative around cybersecurity. I encourage you all to read this important guide and share it amongst your peers to empower other leaders across the globe and arm them with the knowledge needed to safely navigate today’s digital age.]]> 4266 0 0 0 From Davos: Keeping up with Fintech Innovation https://www.securityroundtable.org/davos-keeping-fintech-innovation/ Tue, 09 May 2017 17:27:25 +0000 https://www.securityroundtable.org/?p=4275 4275 0 0 0 Heading to Davos: Responsible Leadership Preserves Trust in the Digital Age https://www.securityroundtable.org/heading-davos-responsible-leadership-preserves-trust-digital-age/ Tue, 09 May 2017 17:30:54 +0000 https://www.securityroundtable.org/?p=4287 annual meeting of the World Economic Forum (WEF) in Davos, Switzerland, organized this year around the theme of “Responsive and Responsible Leadership.” As WEF notes, 2016 demonstrated that existing systems and institutions at national, regional, and global levels have strained to keep pace with an increasingly complex and interconnected world. Yet, the growth of this complexity and interconnectedness shows no sign of slowing, as the Fourth Industrial Revolution (last year’s theme) drives “the convergence of technologies that blur the lines between physical, digital, and biological systems.” As I noted last year in the run-up to Davos, the future prosperity promised by the Fourth Industrial Revolution relies upon the trust that we all place in technology to function properly – and securely. Our embrace of connected devices, smart homes, self-driving cars, and other innovations underpins the digital economy, but it also leaves us vulnerable to new forms of attack. Cybersecurity, therefore, is an absolute necessity for future economic prosperity. For this reason, I can think of few topics that more urgently require responsible leadership than cybersecurity – and not just cooperation but also collaboration among public and private sector interests. Responsible leadership in the digital age requires questioning established practices and leading the implementation of changes when warranted. To this end, I will encourage my fellow attendees to adapt to the emerging threat environment by choosing a prevention-based approach that proactively identifies and manages cybersecurity risks to their organizations. For many, this involves scrutinizing legacy approaches to cybersecurity that have failed to keep pace with the Fourth Industrial Revolution, and ensuring that operational teams apply the proper combinations of people, process and technology to prevent successful attacks. The decreasing cost of computing power makes it easier and cheaper than ever for cyber criminals to launch attacks in greater volume and with greater sophistication. Attackers enjoy decreasing start-up and marginal costs, using automated, specialized, and scalable tools to achieve their objectives. Legacy defenses are inadequate to deal sufficiently with this rise in volume and sophistication, dependent as they are on decades-old core technology, patchwork systems and manual intervention by security teams. To effectively address this risk, responsible leaders must instead focus their organizations’ cybersecurity efforts on automated prevention of attacks, decreasing the likelihood of, and raising the cost required for, a successful attack. By focusing on prevention, we make attacks cost-prohibitive for attackers, diminish their success, and securely enable the technologies underlying our digital age. The Fourth Industrial Revolution holds great promise, but it will also challenge us in unprecedented ways. Few challenges, in my view, are as serious as that of cybersecurity, which is why it is the perfect topic for responsible leadership. I look forward to bringing this message to Davos, and hope we can all work toward a fresh approach to cybersecurity focused on the prevention of successful cyberattacks.]]> 4287 0 0 0 Reflecting on Davos: Responsible Leadership and Automation https://www.securityroundtable.org/reflecting-davos-responsible-leadership-automation/ Tue, 09 May 2017 17:32:58 +0000 https://www.securityroundtable.org/?p=4293 4293 0 0 0 Raising the Global Bar: Japan’s Cybersecurity Guidelines https://www.securityroundtable.org/raising-global-bar-japans-cybersecurity-guidelines/ Tue, 09 May 2017 17:38:04 +0000 https://www.securityroundtable.org/?p=4299

    (Posted in Japanese)

    In May 2015, 1.25 million pieces of personal information were stolen by cyber thieves from the Japan Pension Service (JPS). The news of the event reverberated throughout Japan similar to the headlines created after the Office of Personnel Management hacking a month later in the United States. The JPS event, on top of a recent series of information leaks, was shocking enough to raise cybersecurity awareness among corporate executives in Japan and shape Japan’s cybersecurity posture.

    Seven months later, the Japanese Ministry of Economy, Trade and Industry (METI) and its Information-Technology Promotion Agency (IPA) released an impactful document: Cybersecurity Guidelines for Business Leadership Version 1.0 (this is a Japanese link; English press release is here). The 36-page document is aimed squarely at business executives, written in plain Japanese and eschewing technical terminology. The two organizations were alarmed by PwC statistics showing that only 27 percent of Japanese companies have business executives proactively instituting cybersecurity measures, compared to 59 percent globally.

    Since their release, the guidelines have struck a chord with the business community, with executives in Japan becoming increasingly keen to learn which cybersecurity measures their companies should take. Seminars about the guidelines have proliferated around Tokyo and other major cities, attracting audiences from management and the executive level—quite different from the typically technical audiences that, until now, have attended most cybersecurity events. And some key Japanese players have reacted with major initiatives. Keidanren, the Japanese Business Federation (akin to the U.S. Chamber of Commerce), responded immediately in January 2016 in its second set of cybersecurity recommendations to the government, noting that industry is committed to reforming business leadership awareness and ensuring that cybersecurity is an important pillar of business risk management.

    Keidanren blazed a trail. This April, Fujitsu Ltd., the Japanese multinational IT and services company, published a company-wide cybersecurity policy based on the guidelines: Fujitsu Group Information Security Policy, which applies to the company’s operations globally. We expect other major Japanese companies will follow suit with similar efforts, as Japanese companies culturally prefer to act in a uniform manner.

    For the non-Japanese reading audience, what does the document say? The Japanese government gets to the point in the Cybersecurity Guidelines introduction: cybersecurity is an integral part of business operations and a priority for leadership, thus businesses must make decisions on their IT and cybersecurity investments to ensure business continuity and protect the company’s intellectual property and other assets. The document then provides three principles about which business executives should be aware, and 10 action items they should require their CISO and security teams to complete.

    The three principles are that executive leadership should:

    -Take the leadership to invest in cybersecurity, based on the level of risk they deem acceptable to their business operations;

    -Enact cybersecurity measures for their own company, and promote measures in affiliated companies and business partners to mitigate potential information breaches; and

    -Communicate their cybersecurity measures to stakeholders, take accountability, and build confidence.

    The 10 action items elucidate more specific measures to take and demand teamwork among executives, technical professionals, and non-technical people. Leadership should instruct CISOs to:

    1. Craft a cybersecurity policy;

    2. Establish an appropriate team and clarify the division of responsibilities;

    3. Identify assets to protect, and potential risks to those assets, and craft a mitigation plan;

    4. Implement the Plan-Do-Check-Act (PDCA) cycle;

    5. Have subsidiaries and business partners also do a PDCA;

    6. Ensure an appropriate budget and human resource allocation;

    7. Categorize assets as those the company should protect on its own, versus those outsourced contractors should protect, given capacity and efficiency;

    8. Actively participate in and contribute to cyber threat information sharing frameworks;

    9. Establish an emergency response system and conduct cyber exercises; and

    10. Identify in advance whom to notify about potential incidents.

    Although not legally binding, the Cybersecurity Guidelines have presented a baseline expectation from the Japanese government to industry. And, in Japan, government expectations carry significant weight, as do the actions of one’s contemporaries. Couple these cultural norms with a growing realization among Japanese companies (similar to their global peers) of the need to improve cybersecurity, and there is strong foundation for change.

    The timing of the release of the METI/IPA Cybersecurity Guidelines also was essential to the rapid comprehension among Japanese companies of their value. After the JPS case, Japan’s revised Personal Information Protection Act came into effect in September 2015, requiring all companies to take security measures to protect and prevent breaches of personal information. Finally, in January 2016 “My Number,” a new personal identification system for Social Security and taxation information, was launched.

    This all was on top of new legal risks following the 2014 “Benesse Corporation” case in which a leading Japanese correspondence education services provider and publisher paid ¥20 billion (approximately $187 million) in a class-action customer lawsuit after a systems engineer working for its subsidiary sold 35 million pieces of customer information to name-list brokers. The case ran afoul of the Japanese Companies Act, which requires C-level people, such as Chief Information Officers and Chief Financial Officers, to ensure internal controls, including information security.

    The guidelines have been a potent force over the last five months in encouraging Japanese companies to release or prepare new cybersecurity policies, many of which will impact both Japanese and non-Japanese business partners. Given the potential global influence, it would be beneficial for the METI/IPA Cybersecurity Guidelines to be translated into English. This also will enable a global audience to better understand the direction in which Japan’s cybersecurity is heading, share best practices and potentially comment on the guidelines, and maximize the chances that government efforts are aligned internationally.

    We have seen this approach to send messages globally bear fruit very recently. When the Japanese National Center of Incident Readiness and Strategy for Cybersecurity (NISC), a governmental organization responsible for cybersecurity strategy and policy-crafting and international coordination, published Japan’s National Cybersecurity Strategy in 2015, it released Japanese and English versions at around the same time. This was a trial for the Japanese government, which traditionally has taken several months to release English translations of documents, if at all. This important move reflected Japan’s strong determination to make a globally impactful strategy rather than potentially limiting its influence to just within Japan.

    No single country, sector or company can improve cybersecurity on its own. Teamwork and communication are essential. The METI/IPA Cybersecurity Guidelines are a very welcome addition to the mix. Many global companies including Palo Alto Networks have been strong advocates of government efforts to promote sound cybersecurity policies that enable entities to assess and manage their cyber risks, and that are based on public-private partnerships. Japan is the third largest economy in the world, and its efforts to improve cybersecurity are globally impactful. Japan’s new Cybersecurity Guidelines deserve a global audience.

    This is the first in a series of posts aimed at introducing Japan’s cybersecurity efforts and their significance to a global audience, including governments, global industry, and other thought leaders. Subsequent blogs are expected to cover additional thoughts on the METI/IPA Cybersecurity Guidelines, the G7 Summit hosted by Japan in late May 2016, Japan’s role in global cybersecurity capacity-building, cyberthreat information-sharing and prospects for Japan, the cybersecurity ramifications of planning for the Tokyo Olympic Games 2020, and other topics.

    ]]>
    4299 0 0 0
    Navigating the Digital Age Guide in Japan – Why Now, Why Japan? https://www.securityroundtable.org/navigating-digital-age-guide-japan-now-japan/ Tue, 09 May 2017 20:50:41 +0000 https://www.securityroundtable.org/?p=4317 SecurityRoundtable as an online community platform for thought leaders to share cybersecurity best practices from planning and prevention to response. As of December 2016, the website has over 60 contributors and is always looking for new voices. Since the initial launch, Palo Alto Networks has published localized versions of “Navigating the Digital Age” in Australia and France to incorporate local perspectives and address challenges by culture, legislation and policy. We’re now launching the latest version of the guide for Japan, which has a golden opportunity to enhance cyber defense to prepare for the Tokyo 2020 Olympic Games and leave a positive legacy for future generations. The Japan guide is an anthology of both global and local thought leaders. Palo Alto Networks appreciates those who contributed to the original 2015 edition and graciously allowed us to translate their pieces into Japanese to share best practices within Japan. The Japanese local version is fortunate enough to have additional chapters written by the cybersecurity experts from governments, industry and law enforcement listed below. These experts discuss cybersecurity as part of business risk management for the leadership; internet of things (IoT) security; legal obligations and cybersecurity measures to take; the current cyberthreat landscape; the need for cyberthreat information sharing and public-private partnerships; and the protection of critical infrastructure.
    • Richard A. Clarke, former Special Advisor to the U.S. President on Cybersecurity
    • Toshinori Kajiura, Chair, Cyber Security Working Group, KEIDANREN
    • Jean-Paul Laborde and Mr. Danil Kerimi, World Economic Forum
    • Ikuo Misumi, Deputy Director-General, National Center for Incident Readiness and Strategy for Cybersecurity (NISC)
    • Hiroaki Nakanishi, Executive Chairman, Hitachi, Ltd.
    • Noboru Nakatani, Executive Director, INTERPOL Global Complex for Innovation
    • Toshio Nawa, Executive Director and Senior Security Analyst, Cyber Defense Institute, Inc.
    • Itsuro Nishimoto, Senior Managing Executive Officer, CTO/CISO, LAC Co., Ltd.
    • Tetsuya Oi, Partner, TMI Associates
    • John Scimone, Senior Vice President, Global Chief Information Security Officer, Sony Group
    • Hiroshi Taniguchi, General Manager, Security Management Corporate Systems Office, Tokyo Electric Power Company Holdings, Inc.
    • Shinichi Yokohama, Head, Cyber Security Integration, NTT Corporation
    On December 20, 2016, Palo Alto Networks K.K. hosted the press conference and guide launch party in Tokyo, inviting some of the local authors and dozens of cybersecurity thought leaders to network and learn from each other. Mr. Nawa explained about different types of threat actors and their motivations, and noted that cyber defense requires good teamwork, cyberthreat intelligence, and open source intelligence to counter cyber attackers. Mr. Yokohama pointed out that a self-help approach is first and foremost essential for companies as part of their business process and cross-sectoral, public-private, or global collaboration cannot be done without self-help-driven expertise. Mr. Kajiura quoted Winston Churchill’s “their finest hour” and emphasized the contribution by a small number of cybersecurity professionals to defend the country just like the one by a small group of British fighters during World War II, as well as the importance of creating a good ecosystem and career paths to educate, recruit, train and retain cybersecurity professionals. The guide is here for you as a cybersecurity compass and ready to take you on a journey in the digital age and start, or restart, dialogues about how to prevent successful cyberattacks in a collaborative manner. In the 21st century, cybersecurity thought leadership is essential to empower ourselves resourcefully. This is the book to learn from local and global thought leaders about cybersecurity, IoT security and information sharing.]]>
    4317 0 0 0
    日本のサイバーセキュリティ経営ガイドライン https://www.securityroundtable.org/%e6%97%a5%e6%9c%ac%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e7%b5%8c%e5%96%b6%e3%82%ac%e3%82%a4%e3%83%89%e3%83%a9%e3%82%a4%e3%83%b3/ Tue, 09 May 2017 17:52:35 +0000 https://www.securityroundtable.org/?p=4347 4347 0 0 0 Poland Expands Leadership Role on Cybersecurity https://www.securityroundtable.org/poland-expands-leadership-role-cybersecurity/ Tue, 09 May 2017 18:03:26 +0000 https://www.securityroundtable.org/?p=4380 CYBERSEC EU conference in Krakow, Poland. Organized by the Kosciuszko Institute (a prominent think tank), with support from Poland’s Ministry of Foreign Affairs and NATO, the conference drew more than 700 attendees, including more than 100 speakers spanning government officials, industry experts and practitioners.  While many speakers and participants were Polish, many also came from other central and eastern European countries—such as Hungary, Slovakia and the Czech Republic—as well as France, Germany, Belgium, the United Kingdom and the United States, among others. The focus of CYBERSEC EU was first and foremost on policy. Organizers emphasized the desire to develop and shape cybersecurity policy proposals for Poland and beyond. The conference’s topics and themes represented multiple dimensions of Poland’s efforts on cybersecurity policy, including domestic policies and its roles as a member of the European Union (EU) and a member of NATO. On a domestic level, the Polish government emphasized support for the “fourth industrial revolution” in the country, securing the ever-expanding government and private-sector services offered online, protecting citizens from data breaches, and driving an innovative Polish economy underpinned by leading-edge technical skills. Opening remarks delivered by State Secretary Krzysztof Szczreski on behalf of President Andrzej Duda made clear that Poland desires to be a leader in cybersecurity, both in terms of driving domestic and regional policy and of building up and leveraging its technical capacity. Various speakers described recent and planned activities under President Duda, who took office in 2015. The Ministry of Justice highlighted a more active and effective prosecutor’s office to tackle cybercrimes. In July 2016, the Ministry of Digitalization launched a new National Cybersecurity Center (NCC), part of the Research and Academic Computer Network (NASK), Poland’s leading data networks operator. The NCC will be active in four areas: research, operational tasks, training and analytics. Its mandates include coordinating cybersecurity efforts with various sectors such as banking, transportation, energy, and telecommunications. Poland also has strengthened its longstanding CERT, which has existed as part of NASK, expanding its availability from business hours to 24/7. A multi-government agency “State Administration Cluster” also has been formed, aiming to de-silo and centralize IT operations and services, including those related to cybersecurity. More recently, the Ministry of Digitalization released on September 29 a new high-level cybersecurity strategy (content is in Polish) that aims to achieve numerous goals within four years. The strategy still needs internal approval following discussions involving a range of stakeholders, but the topics covered in this version include: A new national CERT that will collect cyberthreat information from the government and publicly owned companies, redistributing this threat information to sub-CERTs;
    • Securing critical infrastructure with an emphasis on energy, finance, transportation and healthcare;
    • Creation of security clusters for selected verticals: energy, telecommunications, finance and local administration; and
    • Education and training.
    • In terms of government systems, the strategy emphasizes the need to invest in the security of the L7 (application) layer, which needs improvements. It also states that the Polish government will cooperate with public and private institutions, including vendors and telecom operators.
    If the strategy is accepted, further steps will commence: a final version, to be released later this year, will serve as a blueprint for a new law that Parliament will begin to craft in early 2017. The Polish government also will need to estimate expenditures and allocate additional financing for some efforts, such as the planned establishment of security operations centers (SOCs) and cybersecurity training and awareness. The forthcoming law also is meant to help Poland implement the EU’s Network and Information Security (NIS) Directive (described in my July 2016 blog post), although with the items listed above, as well as expected provisions related to public-private partnerships mentioned by some speakers, the law will likely go beyond the framework outlined in the NIS (a scenario envisaged under the Directive).  Some private-sector speakers stressed that Polish critical infrastructure sectors want to increase their cyber resilience (a goal of the NIS Directive) but that more efforts were needed to help inform Polish industry of how important cybersecurity is to their operations. The NIS Directive was the primary focus of the discussions around EU-wide efforts.  As a milestone law (the EU’s first cybersecurity-specific legislation) that all EU member states must implement by May 2018, this was not a surprise per sé.  It was interesting, however, that much of the focus on NIS at this conference was on its provisions calling for a pan-EU strategic Cooperation Group comprised of representatives from the member states, the European Commission, and the European Union Agency for Network and Information Security (ENISA). Per the Directive, the Cooperation Group is to support and facilitate strategic cooperation and share information and best practices on risks, incidents, awareness-raising, training, and research and development (R&D) among member states and to develop trust and confidence. Multiple speakers stressed the imperative of correctly launching and empowering this Cooperation Group to ensure it effectively facilitates the pan-EU coordination envisioned in the Directive. Some speakers voiced that EU member states more advanced in cybersecurity efforts should commit to share threat information with those member states at earlier stages of cybersecurity readiness. Speakers also urged the Cooperation Group to help to ensure the NIS Directive is implemented consistently across member states, noting the strong interconnectedness and interdependencies of so much critical infrastructure (CI) within the EU, whether in transportation, energy, banking, or other industry sectors.  Finally, some Polish and other central and eastern European country speakers voiced support for the Directive’s role in raising awareness of cybersecurity within their countries and driving changes in domestic policy and operational efforts they wanted to make. Finally, Poland’s central role in NATO, and NATO’s evolving role in cybersecurity, particularly following the NATO Warsaw Summit in July, was another primary discussion topic. The NATO Warsaw Summit had two main cyber-related outcomes.  First, NATO Allied ministers formally agreed to recognize cyberspace as a war domain along with air, land, and sea operation.  They also reaffirmed the applicability of international law and NATO’s defensive mandate for cyberspace; pledged to further develop NATO-EU cyber defense cooperation; and pledged to commit more resources to cyber defense capabilities.  A question raised at CYBERSEC EU was how NATO countries would implement these commitments. One speaker opined that, despite a robust technical platform to support cyberthreat sharing, larger NATO member nations needed to increase actual threat sharing with smaller ones. Private sector entities can also play an important role here in expanding the cyber threat information sharing environment across NATO. As one such example, Palo Alto Networks has partnered with NATO’s Malware Information Sharing Platform (MISP) to share cyber threat information and enhance the collective malware knowledge base among participating NATO country members. A strong theme running throughout CYBERSEC EU, voiced often by Polish officials, was the importance and value of partnerships in cybersecurity—both among EU governments and NATO members as described above, as well as between the public and private sectors. Conference speakers emphasized that the private sector develops most of the technologies to combat cyberattacks, and also owns and operates most critical infrastructures on which economies depend.  During the conference wrap-up, organizers played a video stating, “the role of business in delivering answers to some of the most pressing cybersecurity questions is absolutely crucial.” One Polish industry speaker noted that partnerships are starting to emerge in Poland, albeit slowly. Poland’s steps to date and plans for leadership as well as partnership in cybersecurity—domestically, regionally, and globally—are commendable. Palo Alto Networks believes strongly in the value of such partnerships, working with governments and others worldwide to develop and implement effective cybersecurity policies that protect our way of life in the digital age.  We look forward to contributing to Poland’s efforts to raise the level of cybersecurity and cyber resilience in Poland and beyond.]]>
    4380 0 0 0
    A Global Model: UK’s “National Cyber Security Strategy” https://www.securityroundtable.org/global-model-uks-national-cyber-security-strategy/ Tue, 09 May 2017 18:07:21 +0000 https://www.securityroundtable.org/?p=4392 National Cyber Security Strategy 2016-2021. Recognizing that cyberattacks on the UK are a top threat to the UK’s economic and national security, the strategy outlines a vision and goals to create a UK that is secure and resilient to cyberthreats, as well as prosperous and confident in the digital world. The UK has always been at the forefront of cybersecurity activities, and its new strategy is an important contribution to and model for global efforts. The strategy lays out a substantive set of goals, actions and metrics mapped to three important pillars:
    • Defend: The government will strengthen its own IT defenses and work with industry to ensure UK networks, data and systems are protected against evolving cyberthreats.
    • Deter: The UK will strengthen law enforcement’s capabilities to increase the cost of cybercrime.
    • Develop: The government will help to develop the UK’s critical capabilities, including cyber skills, as well as the country’s growing cybersecurity industry, to keep pace with cyberthreats.
    The strategy includes an impressive set of plans, based extensively on working with the private sector.  While all parts of the strategy are laudable, highlighted below are a number of its forward-looking approaches that will surely contribute to greater cybersecurity in the UK. First, the strategy immediately puts into action its stated goal of partnering with industry. For example, as part of this strategy, the UK has created a new National Cyber Security Center (NCSC), which is a single, central government body bringing together many of the government’s cybersecurity functions, including CERT-UK. The NCSC will be the UK’s authoritative voice on cybersecurity and aims to build effective cybersecurity partnerships between government, industry and the public. The NCSC’s commitment to direct industry engagement will help to deliver many elements of the strategy. The NCSC will manage national cyber incidents, provide expertise and deliver tailored support and advice to government and industry. Second, the strategy aims to prevent and reduce the impact of cyberattacks on the UK, reflected in a new “Active Cyber Defence” program. Described in a blog by Ian Levy, technical director of the NCSC, this effort aims to make a significant proportion of UK networks more robust through automated prevention, ensuring UK citizens are protected by default from the majority of large-scale commodity cyberattacks. For example, the government plans to provide automated protections to citizens accessing online government services and states that, where possible, “similar technologies should be offered to the private sector and the citizen.” Using automation to prevent successful cyberattacks is wise, given that attackers themselves deploy sophisticated, automated attacks. Responding with manual defenses just won’t scale: we won’t keep up and, in fact, will continue to fall behind. The UK’s prevention-focused calculus will change the dynamic that currently favors attackers, tilting the balance to help the UK government, businesses and individuals better protect their networks. The strategy envisions the development and deployment of automated cyber defense in partnership with industry. Third, the strategy strongly endorses cyberthreat information sharing. In fact, one of the NCSC’s initial emphases will be on facilitating such sharing, including ensuring UK government organizations have easy access to cyberthreat information and improving government-industry sharing. The goal is to “ensure that citizens, businesses, public and private sector organizations and institutions have access to the right information to defend themselves.” Sharing threat intelligence on advanced cyberattacks, cybercriminal motivations, and the tactics of malicious actors is essential to defend networks and prevent successful attacks. The UK also plans to move toward automated cyberthreat information sharing to allow organizations to act swiftly on relevant information, an important measure that will support the aforementioned automated prevention goal. Fourth, the strategy focuses heavily on helping industry to raise its cyber resilience. The government plans to work with critical national infrastructure (CNI) but also will expand outreach to many more firms: the “UK’s most successful” companies, companies that hold a large amount of data, high threat targets, digital service providers, insurers, and others. While the exact risks to these companies may differ, they all require cybersecurity for competitiveness and efficiency. Although the government plans to continue its practice of helping via investing in innovation and encouraging industry’s voluntary action, the strategy acknowledges a role for regulation, noting that the UK plans to use the forthcoming General Data Protection Regulation (GDPR) to drive standards of cybersecurity across the economy. Fifth, augmenting the cyber resilience goals above, the strategy stresses that whether in industry or government, cybersecurity now needs to be viewed as a C-level or board-level concern, not simply an IT issue. The strategy notes responsibility for cybersecurity in the private sector lies with boards, owners and operators, while security of UK public sector organizations lies with Ministers, Permanent Secretaries and Management Boards. Palo Alto Networks agrees on the need for senior leadership involvement, and we are helping educate corporate directors and board members worldwide on these responsibilities through our recent book, Navigating the Digital Age. The UK version, including chapters by almost a dozen UK thought leaders, is slated for launch in early 2017. It is critical for modern corporations to have the capacity not just to understand the opportunities but also to understand and mitigate the risks inherent in our digital age, and we are pleased to contribute to that discussion in the UK. Finally, the strategy stresses that the UK will work internationally. We wholeheartedly support this approach by all governments. Neither the global digital infrastructure nor the threats attacking it know national boundaries. We are only as strong as the weakest link. We appreciate that the UK will continue to play a strong role in global cybersecurity capacity building and use its influence in multilateral organizations, such as the European Union (EU), NATO and the G20. These are only some of the many important activities in the UK’s new strategy, which also details plans to tackle cybercrime, develop cybersecurity skills across the population, and support a thriving UK cybersecurity sector. The UK’s National Cyber Security Strategy 2016-2021 sets out how the UK will become one of the most secure places in the world to do business in cyberspace. This framing is important. Cybersecurity must be viewed as an enabler, and the UK’s strategy, while acknowledging the growing threats, focuses on the benefits to the UK of better cyber resilience. As the sixth largest economy in the world, strong cybersecurity in the UK has multiplier effects around the globe. Palo Alto Networks looks forward to working with the UK government and private sector to realize the goals of its 2016-2021 Cyber Security Strategy and improve the UK’s – and hence the world’s – cybersecurity.]]>
    4392 0 0 0
    Three Questions to Ask Your CIO About Public Cloud Security https://www.securityroundtable.org/three-questions-to-ask-your-cio-about-public-cloud-security/ Wed, 10 May 2017 19:56:11 +0000 https://www.securityroundtable.org/?p=4500
  • Can we secure our public cloud assets?
    • Remember: Attackers don't care where their target is located; their intent is to execute their end goal, be it in the public cloud or elsewhere. Also, remember that the shared security model states you are responsible for protecting your apps and data. So, just as you may have secured your network and data center from attacks, the answer should be, "Yes."
  • Can we extend our on-premise security policy to the public cloud?
    • It’s important to start with an acknowledgement of the value of having an overarching security policy to handle infrastructure, applications and data. If you have this in place for your on-premise environment, you need to extend it to your public cloud connections. If you don’t have a common security platform, you should get one in place – quickly.
  • Can we enable DevOps teams and application owners to move at "cloud speed" with security?
    • Chances are your organization’s first foray into the public cloud was made to support DevOps and other tactical business requirements. If so, what these teams care deeply about – as should you – is agility and speed. It’s about being able to turn on a dime and use the public cloud to test new functionality or build an inexpensive sandbox to demo new services. But if the cloud isn’t secure, those business groups won’t risk endangering their assets, thus negating the potential benefits of migrating workloads to the public cloud.
  • Read the full paper "Public Cloud Security: Three Questions to Ask Your CIO" here. Additional resources: Securely Enabling Cloud Adoption Cloud Adoption: Security and Risk Considerations for Executive Management FedRAMP Certification and Third Party Evaluation Is Not Enough]]>
    4500 0 0 0
    CSO Roundtable: RSA 2017 Takeaways https://www.securityroundtable.org/cso-roundtable-rsa-2017-takeaways/ Tue, 16 May 2017 17:31:27 +0000 https://www.securityroundtable.org/?p=4668 4668 0 0 0 ]]> Why Women in Cybersecurity Are Important, In Japan and Everywhere https://www.securityroundtable.org/women-cybersecurity-important-japan-everywhere/ Tue, 16 May 2017 17:34:38 +0000 https://www.securityroundtable.org/?p=4680 Over 209,000 cybersecurity jobs in the U.S. were unfilled as of March 2015. In Japan, where I am from, there was a shortage of about 80,000 cybersecurity professionals, and 160,000 professionals needed additional training to perform their mission fully in 2014. To overcome this shortage, we need to bring in more women and diversified skill sets. Half of IT users are women. Gender imbalance in tech has been an issue since at least 2005, according to Deloitte Global. Yet, Deloitte expected that fewer than 25 percent of the employees working in the IT sector of developed countries by end of 2016 were women. Only 11 percent of the information security workforce are women in the United States, whereas female engineers account for 20 percent of information and communication technology (ICT) workforce in Japan. This trend is especially alarming to Japan, where the Summer Olympic Games will be held in Tokyo in 2020, and security professionals are crucial to ensure the success of the event, build national cybersecurity capabilities, and leave a positive cybersecurity legacy beyond 2020. In 2016, the Japanese government estimated that the country is short 132,060 cybersecurity professionals, and the number is expected to increase to 193,010 in 2020. To fill in the gap, new talents need to be educated, recruited, hired and retained. Although the United States has been struggling with diversity in IT and cybersecurity, the country launched several initiatives to further diversify. In 1994, the Anita Borg Institute created an annual conference for women in IT, Grace Hopper Celebration of Women in Computing, named after U.S. Navy Rear Admiral Grace Hopper, who was one of the first cybersecurity career professionals and coined the term “computer bug.” The Japanese gradually started trying to reach out to women in IT or ICT. Japanese industry people launched Capture-the-Flag for Girls (CTF for Girls) a few years ago to invite young women who are interested in cybersecurity to create a community to ask tech questions. The National center of Incident readiness and Strategy for Cybersecurity, responsible for national strategies and policies, and American Chamber of Commerce Japan (ACCJ) annually hold the Cyber Halloween career talk on October 30 to bring in young talent to the field. The 2015 Cyber Halloween held the first panel consisting of female speakers from the government and industry sharing their advice about and journey on the cybersecurity career path. In February 2017, the Tsuda College, a prestigious college for women in Tokyo, hosted an epic event, Organizational Support for Leadership Development of Women in ICT, to discuss what kind of organizational support is available for female ICT researchers. Dozens participated locally and internationally – both men and women. These are all promising signs, and we need to go further. Outlined below are recommended actions Japanese academics, government officials and business leaders should take:
    1. Ensure the next Cybersecurity Program for Human Resources Development in 2017 and future governmental initiatives to raise the importance of diversity and encourage both men and women to be part of the cybersecurity human resources development ecosystem: education, recruiting, hiring and retention.
    2. Japanese academia, government and businesses should help young women who are interested in cybersecurity get connected with their peers overseas via Girls Who Code and conferences for mentorship and networking.
    The Japanese have a clear deadline to enhance their national cybersecurity capability and make Tokyo 2020 successful. Since this is a national project and part of a global effort, it is a golden opportunity for Japan to create new teams with various skill sets and perspectives. Since joining the Japanese Ministry of Defense, a U.S. graduate school to earn an international relations (security) and economics degree, a U.S. think tank, a Japanese tech company, and various U.S. tech companies, I have always been a minority. I enjoy security and like learning about people and the challenges surrounding security. Being a minority is a strength because you can offer different insights. You can pave the way and bridge the gap for other people from your community, country or culture. There is no single way to get into this important and exciting field. Even if you do not have “cybersecurity” in your job title, degree, or certificate, it does not mean you cannot get a cybersecurity job. I only got the word in my job title five years ago. Cybersecurity is about everything and for everybody. All of my professional and academic experiences and all of the people I have worked with have helped me obtain cybersecurity insights and jobs. I am truly grateful. Remember, especially as we celebrate International Women’s Day this month, you are not alone. I will do my part and look forward to seeing you at future conferences or perhaps even working with you as a colleague. Watch Miho in this compilation, presented by Australia’s Ambassador for Cyber Affairs, Dr. Tobias Feakin, that showcases some of the extraordinary work being done by women in cyber worldwide.  ]]>
    4680 0 0 0
    The Year of Mainstream Cybersecurity https://www.securityroundtable.org/year-mainstream-cybersecurity/ Tue, 16 May 2017 17:37:14 +0000 https://www.securityroundtable.org/?p=4689 The following is excerpted from "2017: The Year Cybersecurity Went Mainstream", a recent article by William H. Saito published on World Economic Forum. Last year saw a huge increase in cyber-related incidents, including big data breaches, physical infrastructure tampering, Internet of Things (IoT) devices turning on their owners, ransomware, and even allegations of election hacking that captured the public’s attention. Sometimes it seems there’s no way that enterprises and governments can effectively stop the rising tide of cyberattacks. The good news is, along with the launch of a global cybersecurity watchdog, stakeholders are now discussing these issues in major international forums that until recently were neither digitally focused nor multistakeholder in nature. The inaugural meeting of the Global Commission on the Stability of Cyberspace (GCSC) was held last month, an event that was long in the making. The GCSC isn’t just another acronym. It’s the first organization of its kind dedicated to bringing together stakeholders and proposing norms for the security of cyberspace. It comes after the successful 2014 launch of the Global Commission on Internet Governance (GCIG), which has issued recommendations on various issues including cybersecurity, online privacy and access to the internet. GCIG chair Carl Bildt, former prime minister of Sweden and a veteran international diplomat, is also serving as senior advisor to the new GCSC, adding to its weight and momentum. I was honoured to be selected as a GCSC commissioner and want to highlight the creation of the commission, because, as I’ve said many times, actionable dialogue among stakeholders is key to improving cybersecurity. Read the full article here.
    ]]>
    4689 0 0 0
    How Businesses Should Prepare for Australia’s New Mandatory Data Breach Notification Laws https://www.securityroundtable.org/businesses-prepare-australias-new-mandatory-data-breach-notification-laws/ Tue, 16 May 2017 17:47:02 +0000 https://www.securityroundtable.org/?p=4713
  • Private sector health service providers. Organisations providing a health service1 include:
    • Traditional health service providers, such as private hospitals, day surgeries, medical practitioners, pharmacists and allied health professionals.
    • Complementary therapists, such as naturopaths and chiropractors.
    • Gyms and weight-loss clinics.
    • Child care centres, private schools and private tertiary educational institutions.
    • Businesses that sell or purchase personal information; consumer credit reporting information, including credit reporting bodies, credit providers (which includes energy and water utilities and telecommunication providers) and tax file numbers; and certain other third parties.
    Once the mandatory data breach notification scheme comes into force, organisations will need to report any 'eligible' data breaches to the Australian Privacy and Information Commissioner,2 and notify customers that may have been affected as soon as possible. The government classifies a data breach as an instance where there has been "unauthorised access to, or unauthorised disclosure of, personal information about one or more individuals (the affected individuals), or where such information is lost in circumstances that are likely to give rise to unauthorised access or unauthorised disclosure".3 It qualifies as an "eligible data breach" when there is a likelihood that the individuals who are affected by the incident are at "risk of serious harm" because their information have been exposed. When contacting the Australian Privacy and Information Commissioner about affected customers, businesses must include a description of the data breach, what kind of information has been compromised, and the steps that individuals can take to respond and protect themselves due to the incident. What if I don’t comply? Failure to comply with the new notification scheme will be "deemed to be an interference with the privacy of an individual" and there will be consequences. A civil penalty for serious or repeated interferences with the privacy of an individual will only be issued by the Federal Court or Federal Circuit Court of Australia following an application by the Commissioner. Serious or repeated interferences with the privacy of an individual attract a maximum penalty of $360,000 for individuals and $1,800,000 for bodies corporate.4 What actions should I take now? If your organisation has been lax with data security policies, this is a wake-up call that the government is taking data breaches more seriously. Every organisation should begin to:
    • Review your data collection practices and policies, internal data-handling, and data-breach policies to reflect the new requirements and ensure personal information is collected and stored only when needed.
    • Audit how you are holding data and whether any sits with third parties (for example, in the cloud) on your organisation’s behalf.
    • Strengthen your cybersecurity defences. Visibility is key. This means reviewing your cybersecurity strategies and practices to ensure that steps are in place to avoid data breaches or you have outlined ways to reduce administrative errors, which could lead to a breach. For example:
      • Who has access to the data and do they need access to the data? Reducing or limiting access reduces the possibility of anyone inadvertently leaking the data or a cyber criminal getting access to data.
      • For sensitive data, think of how it could be shared. Is there the right governance in place to prevent someone from sharing or breaking a business process? Many times a process needs to be updated to ensure there is a balance between the risk and productivity.
    Now is the time to sit down, have these conversations, and look at how you're protecting customer data and whether your security practices are adequate. For organisations that have been reluctant to invest in information security practices, this legislation alone should not be the primary driver to protect your organisation and, ultimately, your customers’ data. As a priority, every organisation should continually review its data security to ensure that no customer data is unwittingly compromised. You should look at using a risk-based methodology for managing privacy and not wait for the law to come into effect, as the time to act is now.   1 https://www.oaic.gov.au/privacy-law/privacy-act/health-and-medical-research 2 https://www.oaic.gov.au/ 3 https://www.oaic.gov.au/agencies-and-organisations/guides/data-breach-notification-a-guide-to-handling-personal-information-security-breaches 4 http://www.austlii.edu.au/au/legis/cth/bill_em/padbb2016356/memo_0.html]]>
    4713 0 0 0
    FedRAMP Certification and Third Party Evaluation Is Not Enough https://www.securityroundtable.org/fedramp-certification-third-party-evaluation-not-enough/ Tue, 16 May 2017 17:51:26 +0000 https://www.securityroundtable.org/?p=4725 The following is excerpted from "Securing the Government Cloud" a recent article by Rick Howard published on FCW.com. Cloud service deployments at the federal, state and city levels that benefit from the cloud's operational and cost efficiencies have been unprecedented. The federal government launched its Federal Risk and Authorization Management Program, or FedRAMP, to certify a consistent way for cloud service providers to offer security assessment, authorizations and continuous monitoring to government organizations. State and city governments rely on third-party contractors to assess cloud providers for them. What many government network defenders have forgotten is that security in a cloud environment is a shared responsibility. The cloud provider secures the internet and physical infrastructure, but the cloud customer is responsible for protecting its own data. FedRAMP and third-party certifications assure that the cloud provider is doing its part. But it is ultimately up to customers to ensure they're taking steps to prevent, detect and respond to cyber adversaries during the attack lifecycle. Technology exists today that will allow network defenders to install the same kinds of prevention controls in cloud environments that they are used to deploying in their own perimeter networks. As commercial and government organizations race to deploy services in the cloud, network defenders will do best to remember that securing cloud environments is a shared responsibility. This means that the cloud provider protects its environment, but the customer protects its own data and systems. Let's pause for a moment and appreciate how fast government organizations have grown to accept the cloud computing model as a viable way to do business. This is not typical. Federal, state and city organizations around the world are normally at least 10 years behind the commercial sector when it comes to adopting any new kind of technology. Read the full article here.]]> 4725 0 0 0 Deterrence in Cyberspace: A Greater Role for Industry https://www.securityroundtable.org/deterrence-cyberspace-greater-role-industry-part-one-three-part-essay-series/ Tue, 16 May 2017 17:52:50 +0000 https://www.securityroundtable.org/?p=4731 Component Elements of an Effective Cyber Deterrence Policy Based on my previous experience in the U.S. military and government while working on the issue of deterrence in cyberspace, the basic components of an effective cyber deterrence policy include the following elements:
    • A description of what types of activities the policy seeks to deter (not a detailed, exhaustive list which might encourage actions short of declared thresholds, but rather a description of the scale, scope and consequences of malicious cyber activities that could impact national/international security, national/international economic stability, serious public safety concerns or national/international level privacy and freedoms)
    • Deterrence by denial (denying the adversary’s anticipated gain by making the effort too difficult - primarily through defense, resilience and reconstitution capabilities and processes)
    • Deterrence by cost imposition (making the anticipated cost or punishment associated with an adversary’s efforts more painful than it is willing to accept in relation to the expected gain - primarily through economic, law enforcement and even military instruments of national power when other preferred measures are insufficient)
    • Activities that support deterrence (these include diplomatic, informational, and intelligence instruments of national power, as well as research and development to shape the future of cybersecurity by planning for and investing in tools, techniques, and a workforce necessary to improve the resilience of the digital environment and provide new technological options for deterring malicious cyber activities)
    It’s within the last component, activities that support deterrence, that I’ll focus my effort in describing where I believe that industry can become a much more effective partner to governments in contributing to deterrence in cyberspace. Specifically, this is where the private sector’s growing role in cyber threat intelligence and information sharing, in establishing norms of responsible behavior in the cyberspace environment, and in conducting research and development to implement technical solutions that more effectively defend against modern cyber threats can help. So, let’s tackle industry’s role in cyber threat intelligence and information sharing in this first essay of the series. Activities that Support Deterrence: Private Sector Cyber Threat Intelligence and Information Sharing While there is no shortage of intelligence sharing agreements between governments that can be improved upon to address the growing challenge posed by cyber threats, governments should facilitate and encourage the role that industry can play in cyber threat information and intelligence sharing. Exposure of the identity of malicious cyber actors and organizations, their capabilities, their techniques and indicators of compromise, and their playbooks has been a key factor in changing their behaviors, to include a deterrent effect. For example, the U.S. implemented law enforcement actions to impose direct costs on both malicious cyber threat actors and organizations, as well as the states that protect or provide support to them. The U.S. indictment of five uniformed members of China’s People’s Liberation Army in 2014 for hacking six U.S. industry victim entities is an example of the use of public exposure coupled with the investigation and prosecution authorities of law enforcement. This type of law enforcement action demonstrates that there are consequences for conducting malicious cyber activities, and can contribute to deterrence through the imposition of costs. Additionally, several of my former U.S. government colleagues have privately expressed to me their belief that the indictments and public exposure of these Chinese military members played a significant role in the ultimate outcome of the Obama – Xi agreement in the fall of 2015. This demonstrates deterrence by influencing foreign policy decision making and restricting certain types of malicious cyber activity. In this case, the agreement was to limit the cyber theft of intellectual property and trade secrets for profit. Perhaps surprising to some, private sector cybersecurity companies played a prominent role in the public exposure of every major headline-grabbing breach over the past five years. Based on my experience in the private sector cybersecurity industry over the past year and a half, this trend is only going to increase. I think this is a positive development, because I believe that government intelligence capabilities simply cannot keep up with everything that is required to combat the explosion of cyber threats. Industry involvement is a must, but the partnership between governments and industry must be done carefully and correctly. Governments can encourage and strengthen what is already happening with industry cyber threat intelligence gathering and sharing efforts by integrating this into policy and implementation planning. To improve the effectiveness of the partnership with industry, governments should leverage some important lessons the U.S. has learned as a result of its experience over the past several years. These lessons include clarifying exactly what information is shared, developing standardized methods and formats for information sharing, and employing automated platform capabilities to share this information quickly and distribute security controls to the network enterprise that stop cyber threats before they successfully accomplish their intended purpose. This contributes to deterrence because the cost of doing business successfully for cyber threat actors and organization has just gone up. Keys to Success Deciding exactly what information to share is the first key to success. This is important because some misinformed parties tend to conflate cyber threat information with surveillance and encryption issues, which are currently very heated and divisive. In my view, these are very different issues. In cybersecurity, security doesn’t compete with or detract from privacy or civil liberties. Security is the necessary ingredient in ensuring both privacy and civil liberties in a digital age. We must be very clear that cyber threat information sharing is not about exposing personally identifiable information (PII), protected health information (PHI), intellectual property (IP), or personal/corporate content of communications. It is about sharing cyber threat indicators of compromise and contextual information that relates directly to a cybersecurity purpose. This includes cyber threat actors and organizations, malicious code and techniques, information infrastructure transmission and collection points, communication control channels employed by cyber threats and where these elements are located, the general categories of targets that cyber threats are attempting to penetrate, and the techniques that cyber threats execute on endpoint devices to hijack their intended function. This is the type of information that should be acceptable within privacy parameters because it is solely focused on sharing indicators of compromise and the contextual information necessary for the cybersecurity community to successfully defend against these threats. Finally, we must evolve from legacy manual methods of information sharing, such as spreadsheets and pdf files. We must also evolve from confusing ad hoc methods, consisting of more than three hundred varying formats with inconsistent fields of information. Effective sharing requires a streamlined procedure that is standardized. This means that there is a single recognized and accepted standard for information fields about the threat, consistent with the specific threat indicators of compromise and contextual information previously outlined. It also means that the sharing must be automated through the employment of a platform that can translate the standardized threat information into the security controls that can automatically be deployed to the network and stop the threat before it successfully accomplished its intended purpose. This is the only way to level the current playing field between offense and defense and give the cybersecurity community a fighting chance to outmaneuver the adversary. It is also like taking a page from the attacker playbook because they employ automation and effectively use information sharing procedures of their own. How This Can Work Industry has an increasingly important role to play in the deterrence of modern cyber threats. By contributing to governmental efforts in exposing appropriate cyber threat intelligence, private sector information sharing programs and organizations can raise the cost of doing business for cyber threats. This can be done responsibly, without posing risk to privacy or civil liberty concerns. A magnificent example of the private sector’s contribution is the Cyber Threat Alliance (CTA). The CTA is a non-profit organization headed by President Obama’s former Cyber Czar, Michael Daniel. The CTA consists of more than a dozen cybersecurity companies. While all of these companies are competitors, each CEO from the participating companies has decided to treat cyber threat intelligence as a public good instead of a commercial commodity. The founding members of the CTA are Palo Alto Networks, Symantec, McAfee, Fortinet, Checkpoint and Cisco. The CTA has two rules: You must share cyber threat intelligence daily, and you must consume the shared intelligence to protect your customer base. The CTA has created a platform to share information in a standardized and automated format, protect privacy and civil liberties, consume the shared intelligence, and automatically push the resulting security controls into the information environment to protect their clients. The CTA provides a practical example of how industry can play a vital role in deterring cyber threats in the digital age. If your cybersecurity vendor isn’t a member of the CTA, perhaps you should ask them to join…because a cyber threat seen by any one of the CTA members means that the clients of all the CTA members are then protected against that threat. In my next essay of this series I’ll discuss the need for a greater industry role in the development and implementation of norms of responsible behavior in cyberspace.  ]]>
    4731 0 0 0
    How Japan Is Aiming to Close the Cybersecurity Skills Gap https://www.securityroundtable.org/japan-aiming-close-cybersecurity-skills-gap-tokyo-2020/ Tue, 16 May 2017 17:57:38 +0000 https://www.securityroundtable.org/?p=4746 Ministry of Economy, Trade and Industry (METI), the current shortfall of IT professionals to available opportunities is 132,060, which will further increase to 193,010 in 2020. About half of end-user companies believe they are deficient in IT security employees, and only 26 percent think they have enough talent in these roles. The Japanese government plans to issue a new national cybersecurity strategy for human resources development, the Program to Develop Cybersecurity Human Resources, in 2017. The draft released in March 2017 emphasizes that cybersecurity is not a cost center, but it provides opportunity to invest to create new business values and increase companies’ international competitiveness. Reflecting the Cybersecurity Guidelines for Business Leadership in December 2015, the draft encourages business executives to take cybersecurity measures as part of their social responsibility and raise cybersecurity awareness. This is crucial now, because the government learned 34 percent of Japanese business executives do not consider cybersecurity part of their business challenges. In Japan, end-user companies tend to believe IT is a tool to increase efficiency and cut costs (not something to invest in), and outsource IT-related work to vendors and system integrators. Only 24.8 percent of IT engineers work in-house in Japan, compared to 71.5 percent in the United States. The current business environment, however, demands end-user companies find a balance between outsourcing and insourcing IT or cybersecurity-related work. Business operations heavily rely on computers, hardware, software, cloud computing, cell phones, tablets and SaaS, and more adopt general purpose technologies for cost-saving and efficiency. Each technology requires specific security expertise. Moreover, business risk management, critical infrastructure operations, finance, legal, human resources and even national security touch upon cybersecurity. Business executives must take the lead to craft a business strategy to deal with a wide variety of risks – including cyber risks – and take advantage of innovative technologies for security and convenience. METI and the Japanese Ministry of Internal Affairs and Communications (MIC) are tackling the aforementioned challenges to cultivate cybersecurity-driven C-level executives and next-generation professionals for end-user companies and critical infrastructure companies. Both ministries are launching separate cybersecurity training centers in 2017. While MIC focuses on IT research and development, METI covers both the operational and information technology sides of critical infrastructure protection, including industrial control system/supervisory control and data acquisition (ICS/SCADA). As cyber risks against ICS/SCADA are growing, METI established the Industrial Cybersecurity Center of Excellence (COE) under the Information-Technology Promotion Agency (IPA) in April 2017. COE has three pillars for their mission: the development of human resources; the evaluation of the security and reliability of ICS/SCADA; and the research and analysis of cyberthreat intelligence. COE will serve a total of up to 100 students per year, and provide two courses: one for mid-career people and one for C-level executives. Both courses will be a golden opportunity for professionals from different sectors to get connected, create a trusted community, and help each other later. While the course for C-suites will consist of several classes over a short term, the course for mid-career people will run from July to June. It will aim to cultivate professionals able to propose cybersecurity strategy drafts and brief business executives about cyber risks, using business management and financial terms; who understand the current cyberthreat landscape and best practices overseas and in other sectors to apply to such cyberattacks, and can use the information to craft cybersecurity tactics and strategy; and who can evaluate the safety and reliability of cybersecurity solutions, technologies, and costs to employ and deploy the best one. The course starts at Primary level (July to September), and moves onto Basic (October to January), Advanced (February to April), and Graduation Project (May to June), though more advanced students do not need to participate in Primary classes. It covers IT/OT basics, such as corporate governance, business continuity, forensics, ICS/SCADA risks and cyber exercises; business management and ethics, such as leadership, accounting/finance, presentation skill, budgeting and relevant legislations; and global case studies. COE began accepting applications for the mid-career course in late February, after more than 30 companies from the automobile, utility, railway and real estate industries had expressed interest in enrolling their employees. IPA already runs the Cyber Rescue and Advice Team against targeted attack of Japan (J-CRAT) and supports and supports a cyberthreat information-sharing framework, the Initiative for Cyber Security Information sharing Partnership of Japan (J-CSIP), to protect critical infrastructure companies. IPA also monitoring the next-generation Government Security Operation Coordination Team for the central government and nine government-affiliated agencies in April 2017. The COE project for cyberthreat intelligence will be an additional means for IPA to bring in the intelligence and expertise of white hat hackers to eventually help with human resources development and the system evaluation project. MIC released the IoT Cybersecurity Action Program 2017 in January 2017 to enhance IoT security and prepare for Tokyo 2020. One of the main pillars of the program is to accelerate the national effort to cultivate cybersecurity workforce by hosting cyber exercises and establishing a training center. The National Cyber Training Center was created under the National Institute of Information and Communications Technology (NICT) in Tokyo this April. NICT was chosen for its assets: NICTER (Network Incident analysis Center for Tactical Emergency Response) to watch cyberattacks and visualize them; and a cloud-based StarBED platform for cyber exercises. The National Cyber Training Center offers the SecHack365 program to train 40 students under 25 years old each year; implement 100 Cyber Defense Exercise with Recurrence (CYDER) exercises for 3,000 central and local municipal government officials and critical infrastructure personnel all over Japan; and host the Cyber Colosseo exercises for the Tokyo Organising Committee of the Olympic and Paralympic Games. The center accepted 359 applications from young industry people and college and university students including teenagers in April. SecHack365 students can take classes remotely to develop computer programs and participate in cyber exercises and hackathons. Competent students will be sent overseas for additional education. The center also aims to build a community for next-generation engineers to lead IT-driven innovation in Japan and develop computer programs to resolve unsolved challenges, rather than relying only on existing technologies. CYDER used to target only Tokyo. In Japanese Fiscal Year 2015 (April 2015 to March 2016), 200 people from the central government and critical infrastructure people participated in CYDER. In JFY 2016, however, CYDER was also provided in eleven places outside Tokyo, and 1,500 people attended. CYDER expanded to cover local municipal governments because they have residents’ My Number information (a new personal identification system for Social Security and taxation information), and more cybersecurity is required as cyberattacks and breaches are growing. Cyber Colosseo exercises allow Tokyo 2020 cybersecurity personnel to simulate potential cyberattacks on Tokyo 2020 and review and enhance defensive capabilities with Blue and Red Teams. The exercises are expected to help team-building between security personnel and relevant organizations. These METI- and MIC-led initiatives will allow IT and OT personnel to learn from each other, power mid-career professionals by business operation mindset to bridge between technical engineers and business executives, make C-level executives more mindful about the current cyberthreat landscape and cybersecurity, and cultivate next generation R&D engineers. They will also form tight bonds between professionals from different sectors and cultures. Of course, it will take at least one year for students to bring back what they learn to their organizations and make reforms for better IT/OT balance. Still, this is a positive step forward for Japan and the world’s cybersecurity. Unfortunately, almost all information about these projects is only available in Japanese, but this is definitely worthy of a global audience.]]> 4746 0 0 0 Executive Advisory Report: The Rise of Ransomware https://www.securityroundtable.org/executive-advisory-report-rise-ransomware/ Tue, 16 May 2017 22:06:00 +0000 https://www.securityroundtable.org/?p=4839 4839 0 0 0 Why Directors Feel Inadequate in Terms of Cybersecurity and What They Can Do About It https://www.securityroundtable.org/why-directors-feel-inadequate-in-terms-of-cybersecurity-and-what-they-can-do-about-it/ Thu, 18 May 2017 12:00:54 +0000 https://www.securityroundtable.org/?p=3467 1 Those are shocking numbers since most every business today has some sort of cyber component. As the world sprints into the digital age, you would be hard-pressed to find a business that has no digital component helping to drive the efficiency and innovation of the company. How Did We Get Here? This situation is largely the fault of the network defender community: your CIOs, CSOs and CISOs. From the first CISO who was hired back in the mid-1990s 2 until the present day, the network defender community has insisted that the risks associated with cybersecurity were somehow unique compared to the myriad of other risks that directors deal with every day. They said that, because this kind of risk is mostly associated with computers, the internet and hackers, it belongs in some sort of risk category that requires special handling. This is wrong. Cyber Risk Is Not a Special Kind of Risk Risk is risk, whether it manifests from employee injury, property loss, business interruption, liability or a cybersecurity breach. Directors deal with this cyber risk the same way they deal with all other risks: they find ways to alleviate or eliminate potential material risk to the business. They use basic risk management strategies like acceptance, avoidance, mitigation or transfer.3  From these strategies, all that is new to the director in dealing with cybersecurity risks are the potential technical mitigation strategies you might choose. But that is why you have the technical C-staff working for you. The CIO, CSO and CISO will understand the technical details. What you should be asking them to portray is the potential risk to the business. This is hard for most technical C-levels. They understand the technical details, but many have trouble transforming that technical risk into business risk. They will need your help with understanding the business risk strategies that directors already understand and separating all the “scary” risks – because they come from hackers – from the potential-material-impact risks that threaten the company. In other words, there are many alarming scenarios that we all can manufacture when it comes to hacker stories, but articulating the scenarios that will have high impact to the business if they occur and, at the same time, have a high probability of occurring in the short term is the key. This is a conversation with which many technical C-level executives do not have a lot of experience. Once done, the last thing to do is for the director to gain a high-level understanding of the technical solutions your technical C-level executives recommend. Director Homework When learning about a new knowledge domain, the thing to do is to check the literature. Fortunately, there is a community project at your disposal on which directors can rely, called the Cybersecurity Canon Project.4  Think of it as the Rock and Roll Hall of Fame for cybersecurity books. This is not just a book list. In order to get on the list, some network defender has to write a book review justifying why a particular book should have been read by all of us by now. There is a committee that consists of all types of network defender experts who read all of the submissions and decide which books make it onto the candidate list, and which books ultimately get put into the canon. For directors, I recommend two books that are currently on the candidate list and one book that is already in the canon. "Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers," published by the New York Stock Exchange and Palo Alto Networks "Navigating the Digital Age” is the first comprehensive book specifically designed to enlighten and educate corporate directors and officers in terms of cybersecurity. The book includes more than 30 contributors, so it is meaty; and while there is some overlap in the material covered, it contains a dense collection of information around fundamental principles for the board members to do their jobs; board standards to consult; the executive on whom they should rely – the CISO; which committees they should create to support their efforts; what they should worry about in terms of fiduciary responsibility and the potential for litigation; the perceived cybersecurity disconnect between shareholders and board members; and finally, how they should think about disclosing breach information to the public.5  This is a free-to-download book published in partnership by the New York Stock Exchange and Palo Alto Networks. Since the publication of this book, Palo Alto Networks has published companion books in France, Australia, Japan, Singapore and the U.K. We plan to publish books in Germany and Holland this year too.6 "How to Measure Anything in Cybersecurity Risk," by Douglas W. Hubbard and Richard Seiersen “How to Measure Anything in Cybersecurity Risk” is a book anyone who is responsible for assessing risk should read. It is grounded in classic quantitative analysis methodologies and provides a good balance of background and practical examples. The authors lay out a solid case for why other industries with the similar challenge of a lack of quantifiable, standardized or historical actuarial table-like data are able to use classic statistical modeling and methodologies to measure risk in a qualified, repeatable way.7 "Measuring and Managing Information Risk: A FAIR Approach," by Jack Freund and Jack Jones  "Measuring and Managing Information Risk" is a book that not only describes what risk is but also teaches you how to measure it quantitatively so that practitioners can demonstrate to their leadership that they understand the problem. It shows how to deliver financially derived results tailored for enterprise risk management and is intended for organizations that need to either build a risk management program from the ground up or strengthen an existing one. It covers key areas, such as risk theory, risk calculation, scenario modeling and risk communication within the organization.8 Conclusion Cybersecurity risk is no different from any other kind of risk that directors normally handle in their day-to-day jobs. In the early internet days, we let the technicians convince us otherwise. Now we are trying to re-learn what the real truth is: that we can use the same traditional risk strategies for cybersecurity as we do with all other business risks: acceptance, avoidance, mitigation and/or transfer. Many of our technical C-level executives need help transforming technical risk into business risk. The director can help with that. Insist that your technical C-levels sort out the “scary” risks from the probable high-impact risks. To gain a high-level understanding of some of the issues, directors should refer to the Cybersecurity Canon Project and read the literature that the network defender community recommends, beginning with these three books: "Navigating the Digital Age," "How to Measure Anything in Cybersecurity Risk," and "Measuring and Managing Information Risk: A FAIR Approach."   Sources 1 "In Cyber, Who Do We Trust to Protect the Business?" by Peter Gleason, http://www.darkreading.com/risk/in-cyber-who-do-we-trust-to-protect-the-business-/a/d-id/1328245. 2 Evolution of the CISO and the Confluence of IT Security 7 Audit," by Thomas Borton, ISACA (March 13, 2014), https://goo.gl/ocM6RL (last visited April 15, 2017). 3 "4 Ways to Handle Risk (Only One is Bad)," by Ken Stasiak, SecureState Blog (July 7, 2015), https://www.securestate.com/blog/2015/07/07/4-ways-to-handle-risk-(only-one-is-bad) (last visited April 16, 2017). 4 “The Cybersecurity Canon: Books Every Cybersecurity Professional Should Read," Palo Alto Networks, https://www.paloaltonetworks.com/threat-research/cybercanon.html (last visited April 18, 2017). 5 "Book Review: Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers," by Rick Howard, Palo Alto Networks CSO (January 2016), http://researchcenter.paloaltonetworks.com/2016/01/the-cybersecurity-canon-navigating-the-digital-age-the-definitive-cybersecurity-guide-for-directors-and-officers/ (last visited April 16, 2017). 6 “Navigating the Digital Age Download,” Security Roundtable, https://www.securityroundtable.org/navigating-the-digital-age-us/ (last visited April 17, 2017). 7 "How to Measure Anything in Cybersecurity Risk," by Douglas W. Hubbard and Richard Seiersen, published by Wiley (April 25, 2016), https://www.goodreads.com/book/show/26518108-how-to-measure-anything-in-cybersecurity-risk?ac=1&from_search=true (last visited April 16, 2017). 8 "Measuring and Managing Information Risk: A FAIR Approach," by Jack Freund and Jack Jones, published by Butterworth-Heinemann (January 1, 2014), https://www.goodreads.com/book/show/22637927-measuring-and-managing-information-risk?ac=1&from_search=true (last visited April 16, 2017).   Book Reviews "Book review: Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers," by Rick Howard, Palo Alto Networks CSO (January 2016), http://researchcenter.paloaltonetworks.com/2016/01/the-cybersecurity-canon-navigating-the-digital-age-the-definitive-cybersecurity-guide-for-directors-and-officers/ (last visited April 16, 2017). "Book review: How to Measure Anything in Cybersecurity Risk," by Steve Winterfeld, Cybersecurity Canon Committee Member (December 2, 2016), http://researchcenter.paloaltonetworks.com/2016/12/cybersecurity-canon-measure-anything-cybersecurity-risk/ (last visited April 16, 2017). "Book Review: Measuring and Managing Information Risk: A FAIR Approach," by Ben Rothke, Cybersecurity Canon Committee Member (September 10, 2015), http://researchcenter.paloaltonetworks.com/2015/09/the-cybersecurity-canon-measuring-and-managing-information-risk-a-fair-approach/ (last visited April 16, 2017).   References "The 6 Fundamental Techniques of Risk Control," by POMS & Associates (April 21, 2014), http://www.pomsassoc.com/6-fundamental-techniques-risk-control/ (last visited April 16, 2017). "The Library," The Security Roundtable (September 16, 2015), https://www.securityroundtable.org/library/ (last visited April 16, 2017).]]> 3467 0 0 0 Executive Advisory Report: Credential Theft https://www.securityroundtable.org/executive-advisory-report-credential-theft/ Tue, 16 May 2017 22:09:24 +0000 https://www.securityroundtable.org/?p=4848 4848 0 0 0 Executive Advisory Report: The Economics of Cyber Crime https://www.securityroundtable.org/executive-advisory-report-economics-cyber-crime/ Tue, 16 May 2017 22:12:18 +0000 https://www.securityroundtable.org/?p=4857 4857 0 0 0 GDPR/NIS Countdown: How Ready Are Organisations to Get Their Cybersecurity in Order for the Next Decade? https://www.securityroundtable.org/gdprnis-countdown-ready-organisations-get-cybersecurity-order-next-decade/ Mon, 22 May 2017 12:00:05 +0000 https://www.securityroundtable.org/?p=5027 research recently commissioned for Palo Alto Networks, we found that IT security professionals across Europe are generally optimistic about how these laws will help avoid personal data and cybersecurity breaches. However, there is still some hesitation when it comes to how easy the change will be. What is immediately clear is there are vast geographical differences when it comes to openness to new ideas; senior management in countries like Sweden are least likely (28 per cent) to accept suggested ideas for change from internal stakeholders, whereas Dutch respondents were far more willing to adopt new ways to best protect their organisation (39 per cent). A fear of the unknown continues to present a significant roadblock over the next year, and not all businesses can see the benefit in change. Only a third of respondents think they will get the support to implement the necessary changes, while the majority still feel there will be obstacles to overcome. With only one in ten respondents admitting that pressure to comply with new laws would make them open to ideas for change, there is a major shift in perception needed to ensure European businesses are ready come May 2018. Our research found that: ·       43 per cent of IT security practitioners were concerned changes to legislation will unleash a wave of previously unknown personal data and cybersecurity breaches that need to be reported. ·       Half of all IT professionals (49 per cent) said they avoid security system changes or updates because they think their current system is already broadly secure. ·       56 per cent of IT security professionals think the GDPR/NIS implementation will be a pain both financially and operationally. With all that in mind, there are several ways businesses can prepare themselves today ahead of May 2018: ·       Gain visibility of what information is being used and through which applications. If you don’t have ongoing insight into how your business is already processing information through technology, then you can’t validate if this is appropriate and what controls must be wrapped around it. ·       Too much of cybersecurity is legacy technology – leverage the new regulations as an opportunity to clean your house, validate that everything is fit for a purpose, today and in the future, especially considering that cybersecurity will continue to evolve, and the biggest shortfall is skilled cybersecurity people. Consider how you apply and maintain an adaptive cybersecurity ecosystem that is automated to work at the same speed as the attacker. ·       Ensure that you have clear leading and lagging metrics to validate the effectiveness of your cybersecurity. Can you prove to your own business and others that you are effectively aligning current best practices to the risks? ·       Test your capabilities – not just the technology, but also the people and processes around these, including the broader businesses teams. ·       Cybersecurity leaders will need to validate that their cybersecurity capabilities are relevant to the risk they face and that they leverage current best practices, referred to as “state of the art”, with clearly documented processes and measures. To learn more about how you can prepare your business for the upcoming new laws, please read the following: ]]> 5027 0 0 0 Cyber Hygiene Series: Data Storage Services https://www.securityroundtable.org/cyber-hygiene-series-data-storage-services/ Tue, 30 May 2017 13:00:51 +0000 https://www.securityroundtable.org/?p=5125 5125 0 0 0 ]]> Deterrence in Cyberspace: A Greater Role for Industry (Part 2) https://www.securityroundtable.org/deterrence-cyberspace-part-2/ Thu, 08 Jun 2017 12:00:15 +0000 https://www.securityroundtable.org/?p=5182 first essay of this series, I described cyberspace as one of the most unique and complex environments ever to exist. I then argued that deterrence in cyberspace is fundamentally an issue that is distributed among the private and public sectors within and between nations.  Therefore, I offered that deterrence solutions must be multi-faceted and include multi-party participation. Since the private sector owns, operates and maintains the vast majority of the cyberspace environment, industry should be one of the most important participants in the deterrence discussion. However, most of the discussion focuses on the role that governments play, while industry’s role is often an afterthought and its participation extremely limited. This essay series focuses on the role of the private sector and how industry can contribute to governmental efforts in deterring cyberthreats. My first essay in the series discussed the growing role of the private sector in cyberthreat intelligence and information sharing. This second essay discusses the role of industry in the development of norms of responsible behavior in cyberspace and how this supports deterrence. Component Elements of an Effective Cyber Deterrence Policy – a Refresher from My First Essay of the Series As a reminder, my first essay of this series described the basic components of an effective cyber deterrence policy as incorporating these components:
    • A description of what types of activities the policy seeks to deter
    • Deterrence by denial
    • Deterrence by cost imposition
    • Activities that support deterrence
    It’s within the last component – activities that support deterrence – that I’m focusing my effort to describe why I believe industry can become a more effective partner to governments in contributing to deterrence in cyberspace. Activities That Support Deterrence – Industry’s Role in Norms of Responsible Behavior in Cyberspace Most of the discussion about establishing norms of responsible behavior in cyberspace has been about activities and issues between nations. Not surprisingly, the majority of this discussion has occurred within purely governmental forums, the most well-known of which have been the United Nation Group of Government Experts (UNGGE) and the G20 Forum. These forums have been about gaining greater international acceptance that, during peacetime, nations:
    • Should not conduct or knowingly support online activity that intentionally damages critical infrastructure or otherwise impairs the use of critical infrastructure to provide services to the public.
    • Should not conduct or knowingly support activity intended to prevent national computer security incident response teams (CSIRTs) from responding to cyber incidents.
    • Should not conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantage to its companies or commercial actors.
    • Should cooperate, in a manner consistent with domestic law and international obligations, in requests for assistance from other states investigating cybercrimes, collecting electronic evidence, and mitigating malicious cyber activity emanating from its territory.1
    However, norms of responsible behavior in cyberspace should not be limited to governmental interaction. The private sector has significant interest to get involved because it can be directly impacted by norms from a global business perspective. The Australian Strategic Policy Institute has done some research on the potential impact, and some of examples include “intellectual property theft, data retention obligations, the preservation of the free flow of information, supply chain management, critical infrastructure protection and compliance with information control regimes.2 Additionally, private sector participation and influence can help to “be a key ally and ‘norm champion’ in the push to embed positive behaviours … and can assist with the establishment, socialisation and implementation of norms among … customers, other companies and governments.”3 As previously mentioned, the distributed cyberspace environment demands multi-party solutions to today’s challenges, and the issue of deterring cyberthreats through establishing and implementing norms of responsible cyberspace behavior is no exception. There are currently several high-profile and contentious issues which would benefit from greater private sector engagement, including the free flow of information across borders, mandatory insertion of “backdoors” into information technology products, the use of information security concerns as a pretext for trade restrictions, private sector responsibilities in controlling its own supply chain management, and even the right of businesses to “hack back.”4 These issues should be included in the heretofore government-only global norms forums and industry’s inclusion in the discussion will guarantee better, more practical and more sustainable outcomes for each issue. Conclusion and Practical Example of How This Can Work There should be clear recognition that industry has an increasingly important role to play in informing the discussion, supporting the establishment and enforcing the implementation of norms of responsible behavior in cyberspace. Moreover, governments should not only recognize this, but encourage private sector participation and perhaps even creatively incentivize implementation enforcement of the norms throughout industry to strengthen acceptance and scale the effects globally. I’m certain one of the governmental concerns about including the private sector in the norms formulation process is the sheer complexity and confusion resulting from adding even more voices to an already overcrowded forum. One way to deal with this challenge is to establish a participatory structure and process through manageable stages. An excellent example of how to do this was led by the U.S. Commerce Department in the formulation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework,5 a brilliant model of public-private partnership with extremely effective industry inclusion. There’s no need to start at square one either. Both Microsoft6 and Symantec7 have already shown leadership and initiated discussion about private sector norms, demonstrating industry interest and showing that this can be done. However, there has been little integration between these initial industry-led efforts and those of the governmental forums previously described. Additionally, it may prove more manageable to begin with one issue that is common to both public and private sector interests. Starting small, learning lessons, making adjustments and then expanding the effort has obvious advantages when it comes to complex efforts involving multiple interested parties. In this vein, the Carnegie Endowment for International Peace has already called for a similar approach in a recently published white paper titled “Toward A Global Norm Against Manipulating the Integrity of Financial Data.”8 This effort is about aligning a global financial sector concern directly under the UNGGE and G20 approved norm against attacks on critical civilian infrastructure during peacetime. Using this approach, the U.S. government could follow the same basic NIST framework process model to set an example of industry inclusion and encourage the development of complementary government and industry norms that can be showcased to garner support from the rest of the international community. Next month in my final essay of this series, I’ll discuss the need for a greater industry role in research, development and implementation of technical solutions to more effectively defend against modern cyberthreats. 1 http://federalnewsradio.com/cybersecurity/2015/12/white-house-finally-acquiesces-congress-cyber-deterrence-policy/  See embedded policy document link in article, 17. 2 Pamphlet published in 2016 by the Australian Strategic Policy Institute (ASPI), International Cyber Policy Centre, “Cyber Norms and the Australian Private Sector,” 9. 3 Ibid., 10. 4 Ibid., 17. 5 U.S. Department of Commerce, National Institute for Standards and Technology, official website for the NIST Cybersecurity Framework https://www.nist.gov/cyberframework 6 Nicholas P 2016. “Cybersecurity norms: From concept to implementation, Microsoft Secure Blog, 8 February, https://blogs.microsoft.com/cybertrust/2016/02/08/cybersecurity-norms-from-concept-to-implementation/ 7 International Cyber Norms: Legal, Policy & Industry Perspectives, NATO CCD COE, https://ccdcoe.org/multimedia/international-cyber-norms-legal-policy-industry-perspectives.html. 8Tim Maurer, Ariel (Eli) Levite, and George Perkovich 2017. “Toward A Global Norm Against Manipulating the Integrity of Financial Data,” Carnegie Endowment for International Peace white paper,  https://www.lawfareblog.com/toward-global-norm-against-manipulating-integrity-financial-data]]>
    5182 0 0 0
    How Countries Like Japan Can Be More Visible in Global Cybersecurity Discussions https://www.securityroundtable.org/how-countries-like-japan-can-be-more-visible-in-global-cybersecurity-discussions/ Thu, 15 Jun 2017 12:00:06 +0000 https://www.securityroundtable.org/?p=5224 KPMG's cybersecurity survey in 2013, only 13 percent of Japanese companies strongly believe business executives should be involved in discussions on how to prevent cyberattacks, whereas the percentage is 56 among overseas countries. This is a result of the continued belief among Japanese companies that cybersecurity is an information technology (IT) issue, not a human issue or a challenge to their business risk management. Japanese companies often perceive cybersecurity as something purely technical to be dealt with by hands-on IT people. Second, the Japanese tend to interpret cybersecurity as a cost center, not a business enabler. The Cross-Sectoral Committee for Cybersecurity Human Resources Development, to which 48 major Japanese companies belong, points out that Japanese companies employed IT as a tool to cut costs, and thus, the IT department is for cost-cutting. In December 2015, the Japanese government issued the Cybersecurity Guidelines for Business Leadership to encourage business executives to consider cybersecurity as a business enabler, not a cost center. The government aimed to speed up the process of enhancing the national cybersecurity capabilities in a top-down approach rather than a traditional bottom-up approach, because only a few years were left before Tokyo 2020. Third, there is very little Japanese exposure to English. I know only a few Japanese people who can publish articles or papers, or give a talk about cybersecurity in English at international conferences or symposiums. The language barrier is certainly a problem. It is challenging for the Japanese to express themselves when describing highly technical, geopolitical, or policy issues and write a proposal or peer-reviewed paper in a non-native language. This is, however, not just about the linguistic issue: the Japanese are culturally not adept at showing off their capabilities. An old Japanese saying, “A nail that stands will be hammered down,” demonstrates the Japanese lockstep mentality of avoiding doing anything differently from others. The Japanese tend to evaluate employees by giving demerit scores. When a new employee starts working for a company, he or she has a full score. As long as employees keep working and performing in line with their predecessor, they can keep their scores. However, if they decide to challenge the company’s traditional approach and try something new, but fail to achieve visible positive results, their scores are reduced. Their courage is rarely appreciated. The culture discourages employees from testing new approaches and encourages them to stay in a safe zone. For example, RSA 2017, one of the biggest IT conferences in the world, had several country booths, such as China, Germany, Israel and Korea. There was no Japan booth, although a couple of Japanese companies had set up their individual booths showcasing their products and services. Japan has missed a huge opportunity to highlight the direction its IT and cybersecurity innovations are going as we move toward the Tokyo Summer Olympic Games in 2020. If Japan wants to improve its visibility regarding cybersecurity capabilities and global collaboration, the country needs to take three immediate actions:
    • Use more visual help to draw more attention from Japanese business executives about the cyberthreat landscape and best practices.
    Even if a Japanese business executive thinks cybersecurity is a cost center, he or she still cares about their business continuity. In Japanese culture, cartoons or manga are not just for children; the government and security vendors use cartoons and a lot of screen shots to raise cybersecurity awareness and explain security concepts. It would be useful to have visual help to explain what the cyberattack trend is, what types of cyberattacks have impacted business operations, and how customers can prevent successful cyberattacks.
    • Fund projects for more English-language exposure, such as conferences and publications.
    Japan recognizes global cybersecurity collaboration is crucial for its national security and the success of Tokyo 2020. It is the responsibility of the Japanese government and companies to speak up and share their interests and concerns in English. Professional services are available to help organizations better present themselves in global settings, such as conferences, TV appearances and publications. As Charlie Chaplin said, “All it takes is courage, imagination ... and a little dough.” Ten major Japanese companies reportedly plan to participate in the cybersecurity technologies exhibition of the Interpol World in Singapore as “Japan Pavilion” in July 2017. This is the first time for Japanese businesses to take the initiative to provide any Japan IT exhibition, which is a great start. NATO's annual International Conference on Cyber Conflict (CyCon) in Tallinn, Estonia, Black Hat in Las Vegas, and RSA in San Francisco would be other good events for Japan to raise its visibility in cybersecurity and multilateral security cooperation.
    • Use this cultural difference as a golden opportunity to add new perspectives to global cybersecurity discussions
    While the Japanese tend to be more introverted in any global discussions, Tokyo 2020 would be a watershed in changing the mindset and sharing different perspectives with other counties. Without explaining how Japan is culturally different from other countries, it is impossible to make bilateral or multilateral cybersecurity discussions work. It is easy to fall into lost in translation. Since Japan has been more quiet about the cultural difference than other countries, this is actually a golden opportunity to turn it to a strength and make an impact on global discussions by speaking up.]]>
    5224 0 0 0
    Winning The Game Against Cyber Criminals https://www.securityroundtable.org/winning-game-cyber-criminals/ Wed, 05 Jul 2017 19:55:18 +0000 https://www.securityroundtable.org/?p=5269
  • Make training more exciting and engaging for employees
  • Using gamification can help businesses improve their cybersecurity in numerous ways, including showing employees how to avoid cyberattacks and learning about vulnerabilities in software. Global consulting firm PwC teaches cybersecurity through its Game of Threats.1 Executives compete against each other in real-world cybersecurity situations, playing as either attackers or defenders. Attackers choose the tactics, methods, and skills of attack, while defenders develop (defence) strategies, and invest in the right technologies and talent to respond to the attack. The game gives executives an understanding of how to prepare for and react to threats, how well-prepared the company is, and what their cybersecurity teams face each day. Gamifying will help make the training process more exciting and engaging for employees, increasing employee awareness of cybersecurity practices, including how to deal with attacks correctly.
    • Offer incentives and rewards to encourage desired behaviours
    Human error is responsible in most security breaches, with employees feeling pressured to complete work by certain deadlines and as quickly as possible, which can result in them overlooking important company policy regarding security. For example, running so-called PhishMe campaigns can be a great way to train employees on better email security. These include regular phishing emails sent across the organisation, testing the staff’s response and action. Gamification lets businesses reward those employees who follow security procedures and adhere to the correct security guidelines, which will further promote good behaviour. This may take the form of employees receiving a badge or recording points, which are then displayed on a scoreboard for the office to follow. In some organisations, after employees reach specific milestones, they are presented with a material reward, such as a gift voucher. This system also allows for the identification of those who display poor behaviour within gamification and may result in the employee needing to complete further cybersecurity training. Recognising and rewarding employees when they do the correct thing leads to continued positive behaviour, motivating employees to undertake safe practices and resulting in a more cyber-secure working environment. At the heart of any security awareness training is education to teach employees a shared sense of responsibility for the data they work with, and the data they create and use at home. All security awareness campaigns should become part of an ongoing process, not a one-time initiative. Leaders of any business, big or small, can sometimes feel they lack the resources needed to drive an effective cybersecurity education campaign, but this can be done without breaking the bank.
    • Visual aids work well. Start with some small videos, posters and/or contests as a reminder to drive the message home for all to understand that security is everyone's responsibility.
    • ‘Fear of God’ tactics do not work. The business goal should be to build a culture of cyber awareness, so treat this like a marketing campaign with the intent to persuade and change the behaviour of an employee.
    • Short and concise work best. Long emails always get ignored. Keep them short and fun, and ALWAYS ensure it is a top-down approach. Employees look up to their leaders. If the leaders do not embody a cyber-secure culture, why should the employees? The aim is to educate employees about best practices, not force them to be cybersecurity experts. Make it fun and have a laugh, so everyone can learn at the same time.
    • Reinforcement and follow-up are key. Training is a constant; learn from what works and re-educate as needed. Re-test your newly onboarded, as well as existing, staff members on whether they fall for a phishing email, and check to see how many employees still fail to recognise a fake email. Encourage communication to report a fake and call out departmental groups that may be lagging. The aim is not to single people out, but rather create some healthy rivalry within the organisation.
    Eliminating cyber risks in any business is an ongoing process, but it can be managed. We need to foster a way for employees to call out where they question something and re-educate as needed. If employees walk away from the security awareness program questioning before they click on something malicious, you have moved the needle towards being more secure. 1https://www.pwc.com/us/en/financial-services/cybersecurity-privacy/game-of-threats.html]]>
    5269 0 0 0
    Cybersecurity Lessons from the Target Litigation https://www.securityroundtable.org/cybersecurity-lessons-target-litigation/ Thu, 06 Jul 2017 15:00:28 +0000 https://www.securityroundtable.org/?p=5284 The following is excerpted from "Avoiding the Bullseye: CyberSecurity Lessons from the Target Litigation" a recent paper written by David M. Furr, JD and originally published on the American Bar Association website. Traditional retail in the United States has had two distinct issues negatively affecting its survival in this decade. First, the proliferation of E-commerce companies has severely reduced the profitability of the traditional brick and mortar businesses as shoppers’ habits are fundamentally changing. In the first four months of this year, nine retailers have filed for bankruptcy -- Payless Shoes, hhgregg, The Limited, RadioShack, BCBG, Wet Seal, Gormans, Eastern Outfitters, and Gander Mountain -- with the closing of hundreds of stores.1 Many other retailers are shuttering stores at such a record pace that 2017 is being bannered as the year of retail bankruptcies.2 Second, retail has been particularly hard hit by cybersecurity breaches because of the wealth of Personal Identity Information (PII) collected and, unfortunately retained, by the retailers. The 2013 massive compromise of retail giant Target’s systems has been litigated in the courts and subject to an extensive Multi-State Attorney-General Task Force action that has produced record payouts to plaintiffs. The purpose of this paper is to use the Target litigation as a backdrop of the cybersecurity measures a business must have in place if it is to protect adequately the PII of its lifeblood --- the customers. While common tort and specific statutory theories serve as the foundation for these claims, the sophistication of the Plaintiff counsels’ deep dive into the actual technology facts serve as an important road map to safe cybersecurity.

     The Target Breach, By The Numbers

    • 40 million - the number of credit and debit cards stolen between November 27 and December 15, 2013 
    • 70 million - the number of records stolen that included the name, address and email address of Target shoppers 
    • 46 - the percentage drop in profits at Target in the fourth quarter of 2013, compared with the year before 
    • 200 million - estimated dollar costs to the credit unions and community banks for reissuing 21.8 million cards -- about half the total stolen 
    • 0 -- the number of people in Chief Information Security Officer (CISO) or Chief Security Officer (CSO) jobs at Target
    • $18 - $35.70 - the median price range per card stolen from Target and resold on the international black market, reaping an estimated $53.7 million in income 
    • 1 - the resignation of the CEO3 
    • $252 million - costs associated with data breach through 20144
      Read the full version of "Avoiding the Bullseye: CyberSecurity Lessons from the Target Litigation" here.   1 Hayley Peterson, ‘The dominoes are starting to fall’: Retailers are going bankrupt at a staggering rate, Business Insider, (Apr. 11, 2017), http://www.businessinsider.com/retailers-are-going-bankrupt-at-a-staggering-rate-2017-4. 2 Id. 3Brian Krebs, Email Attack on Vendor Set Up Breach at Target, Krebs on Security Blog, (Feb. 12, 2014). http://krebsonsecurity.com/2014/02/email-attack-on-vendor-set-up-breach-at-target/ 4Kevin McGinty, Target Data Breach Price Tag: $252 Million and Counting, Mintz Levin Blog, (Feb. 26, 2015). https://www.privacyandsecuritymatters.com/2015/02/target-data-breach-price-tag-252-million-and-counting/.]]>
    5284 0 0 0
    Deterrence in Cyberspace (Part 3) https://www.securityroundtable.org/deterrence-in-cyberspace-part-3/ Wed, 12 Jul 2017 15:00:12 +0000 https://www.securityroundtable.org/?p=5368 Introduction and background This essay series focuses on the role of the private sector and how industry can contribute to governmental efforts in deterring cyberthreats. My first essay of the series discussed the growing role of the private sector in cyberthreat intelligence and information sharing. The second essay discussed the role of industry in the development of norms of responsible behavior in cyberspace. This final essay of the series will describe how industry can shape the future of cybersecurity by using an innovative new approach to provide technological options for deterring malicious cyber activities. This approach is about changing the current attacker advantage in the cyberspace environment and giving the defender opportunities to better prevent many, if not most, successful cyberattacks. Component elements of an effective cyber deterrence policy – A refresher from my first essay of the series As a reminder, my first essay of this series described the basic components of an effective cyber deterrence policy as incorporating these components:
    • A description of what types of activities the policy seeks to deter
    • Deterrence by denial
    • Deterrence by cost imposition
    • Activities that support deterrence
    It’s within the last component, “activities that support deterrence,” that I’m focusing my effort to describe why I believe industry can become a more effective partner for governments in contributing to deterrence in cyberspace. The problem that industry innovation must fix First, allow me to describe a growing problem before sharing some thoughts about how industry innovation can help solve that problem, and how this contributes to deterrence of malicious cyber activities and prevention of successful cyberattacks. Here’s the problem: The world of technology and the world of the security designed to protect technology are moving in opposite directions, and this is providing the attackers a distinct advantage over the defenders in the cyberspace environment. There are six trends in the world of information technology (IT), operational technology (OT) and, as these two technology communities are increasingly connected to one another, the internet of things (IoT): 1. Things are becoming simpler to understand and easier to use. 2. Because of the above, things are more convenient. 3. As a result of these first two trends, it takes fewer people to do more things. 4. Everything is increasingly connected, designed from the start to work together and not something people have to figure out how to make work together – things are natively integrated. This trend enables the three trends above. 5. The primary reason for all the above is because everything in the IT, OT and IoT world is increasingly automated. 6. The final trend is that things in this increasingly connected technology world are designed to solve problems proactively. These six trends are reflected in the technology industry’s movement to mobile, virtual and cloud environments, as well as the uber-connected IoT environment in general. Innovation in the technology industry is being driven by the requirements associated with these trends. As a result, the user and operator experience is increasingly fused, smooth and pleasant! Now, let’s contrast these technology world trends to those in the world of cybersecurity: 1. Instead of becoming simpler to understand and easier to use, things are becoming more difficult to understand and use. 2. Instead of becoming more convenient, things are more complicated. One must look no further than examples like password complexity requirements and network security orchestration difficulties to see evidence of this trend. 3. Instead of requiring fewer people to do more things, the cybersecurity world is requiring more people to do more things. I don’t know of any organization that has a sufficient cybersecurity workforce to keep up with the challenges, and there are estimates that this gap is not only widening but getting out of control. 4. Instead of things being designed to work together natively, the cybersecurity industry is rife with a growing number of point solutions that work in isolation and don’t communicate with each other. This contributes to each of the three reverse trend observations listed above. 5. Instead of increasingly taking advantage of automation to reduce complexity and resource requirements, the cybersecurity world is still largely reliant on manual action based on human decision-making. 6. Finally, instead of being designed to solve problems proactively, the common design framework in the cybersecurity industry is about responding to problems after they have occurred. The functions of detection, response, recovery and resilience are all necessary parts of a comprehensive cybersecurity framework, but if you don’t focus on a prevention-first mindset and supporting architectural posture, you are missing an opportunity to wipe away most of the “noise from the signal” so that you can focus your limited resources (capabilities, funding and people) on your most important problems. As a result of these opposing trends, the cybersecurity industry is greatly challenged with the mobile, virtual and cloud environments toward which the technology industry is moving.  Worse, the cybersecurity industry has its head in the sand regarding IoT. Innovation in the cybersecurity industry is magnifying the problem in many cases, causing these two worlds to move further apart. The experience for the user and operator from a cybersecurity perspective is piecemeal, filled with friction, downright overwhelming and even painful! A proposed industry innovation solution – it’s all about integration The cybersecurity industry must make a U-turn and better align with the direction in which the technology industry it is supposed to protect is moving. The challenge is how to do this, and innovation in the cybersecurity industry can help reverse the current direction to better align with the same trends in the technology industry. This can deter malicious cyber activities through four levels of integration: The first level of integration is about applying defender visibility and threat prevention controls across the attack lifecycle. This lifecycle describes the steps that any cyber actor needs to accomplish in order to conduct a successful attack regardless of whether it is for criminal, military, espionage, terrorism or activism purposes. 1. This first level of integration is a conceptual level, and is about applying the key functions of “see and stop” across each of the steps that cyberthreats must accomplish in order to successfully achieve their goal.-  The cyberthreat lifecycle steps include probing, exploitation of a vulnerability, delivery of malicious code, establishment of a control channel, escalation of privilege and lateral movement within a network, and then the final attack step – exfiltration of information, disruption, destruction, deception, encryption, for ransom, etc. The last step defines a “successful” attack.-  Since these steps occur in different locations within an organization’s network environment, you must consistently apply “see and stop” capabilities across the applicable portions of the environment. This includes the categories of fixed, mobile, physical, virtual, on-prem, cloud (public, private, hybrid and SAAS), enterprise edge, data centers and endpoints.- Innovation in the cybersecurity industry that enables this kind of integration fundamentally changes the the attacker’s current advantage. Instead of the attacker only having to be right once and the defender having to be right everywhere – and all the time – now the attacker must be right at each step of the lifecycle and the defender only has to “see and stop” a threat during one step along the path to a successful attack.
    • By applying threat prevention controls across each of the steps in an attacker’s playbook (playbooks are specific techniques and tools used by a specific actor or organization across the lifecycle steps), defenders can now impose greater costs on cyber adversaries. This is because adversaries can’t simply change the one feature that was detected and reuse all of the rest of the features in their playbooks (which is what happens today with polymorphic malicious software). Innovation like this drives up the adversary’s cost of doing business and drives down the number of successful cyberattacks.
    • This level of integration is also about reversing the cybersecurity trend of responding to problems after the fact and better aligning to the technology trend of solving as many problems proactively as possible.
    2. The second level of integration is at a technical level, and the key to success is innovative partnerships. In my opinion, there is no single entity in the public or private sectors that can do this kind of innovation described above in isolation. Integration at this level in industry requires deep technical partnerships between companies who are best-of-breed at what they do within the different portions of the network enterprise environment where the various cyberthreat lifecycle steps occur.
    • This level is focused on changing the cybersecurity trend of an increasing number of point solutions that don’t communicate with each other and are “bolted on” as an afterthought, and aligning to the technology industry’s move toward being better connected,  natively designed to work together, and “baked in” from the start.
    •  Innovation at this level may require some cultural adjustments in the business community as well. Effective competition in the market place has traditionally demanded that a company delivers the best individual product for the best price. To take advantage of this level of integration companies must now demonstrate a new key performance parameter. They must show their solution is an integrated component of a broader platform approach, and it’s engineered to do so natively in order to make things easier to understand and use, as well as more convenient. They must also show that it requires fewer people to do more things, further aligning to technology world trends.
    3.  The third level of integration is at a technical level, but has process implications as well. It also has excellent potential to set the stage for driving future innovation across the cybersecurity industry in ways that we cannot yet imagine. This level is about expanding the scope and flexibility of open application program interface (API) capabilities.
    • Let’s face it, not every cybersecurity capability that an organization thinks it needs to secure and defend its unique network environment can be deeply integrated at a technical level as described above. We should also acknowledge that one of the reasons the cyberspace environment is so unique is that things change very quickly and dramatically.
    • To provide the flexibility required to adapt capabilities to the scale and speed of changes in both the technology environment and the adversary underworld that threatens it, the cybersecurity industry must inspire and enable innovation by making it easy and inexpensive (maybe even free) to integrate quickly.
    • This takes “plug and play” innovation to a new level by providing incentives for emerging capabilities, including from startups, to integrate on a cadence that matches the need of the customer base.
    4.  The fourth and final level of integration is a combination of people, processes and technology innovation. The three innovation integration levels described above are still not sufficient to the challenge, in my view. The other levels must be wrapped in an overall ecosystem of cyberthreat intelligence and information integration. This requires innovative information sharing partnerships.
    • As described in level two, no single organization has the visibility required to be effective across the entire threat landscape. Organizations that partner in effective cyberthreat intelligence and information sharing benefit from a dynamic described in Part 1 of this essay series. Whatever is seen by one organization can quickly immunize all the other organizations in the partnership, drive the costs up for cyber adversaries, and contribute to the deterrence of malicious cyber activities.
    • Innovation from a leadership, cultural and even business model perspective is required in order to fully mature the concept that responsibly sharing and integrating cyberthreat intelligence as a greater public good instead of a commercial commodity is a better model. Industry should not compete over what they know about cyberthreats: they should compete over what they can do with that information.
    • However, as a reminder from Part 1 of this essay series, innovation in the standardized and automated integration of this intelligence and information is required.  This kind of innovation can make this fourth level of integration effective as a complement to each of the other three integration levels in deterring modern cyberthreats.
    Conclusion This essay series provides at least three ways that the private sector can assume greater responsibility in supporting governmental efforts at deterring cyberthreats. Part 1 of the series discussed the increasingly effective capabilities that industry is building in cyberthreat intelligence and information sharing. Part 2 explained how industry can contribute more effectively to government-dominated efforts to establish and enforce norms of responsible behavior in cyberspace. Part 3 proposed an innovative new approach for industry to provide technological options to rebalance the current advantage that attackers have over defenders in the cyberspace environment. Each of the essays provides examples of industry activities that can support the deterrence of modern cyberthreats. An effective public-private partnership focused on each of these proposed activities that support deterrence can add value and magnify the other governmental aspects of deterrence by denial and by cost imposition, and can help make a difference in cyberthreat deterrence in the digital age.]]>
    5368 0 0 0
    How The Most Progressive Boards Manage Cyber Risk https://www.securityroundtable.org/progressive-boards-managing-cyber-risk/ Wed, 19 Jul 2017 13:00:01 +0000 https://www.securityroundtable.org/?p=5425 5425 0 0 0 ]]> How Japan is Addressing Cybersecurity Awareness and Capacity-Building Challenges in ASEAN https://www.securityroundtable.org/how-japan-is-addressing-cybersecurity-awareness-and-capacity-building-challenges-in-asean/ Wed, 26 Jul 2017 12:00:45 +0000 https://www.securityroundtable.org/?p=5518 the world’s fourth-largest economy by 2030. As Information and Communications Technology (ICT) is integral to ASEAN’s industrial platform, cybersecurity has become more crucial than ever. ASEAN held the first Ministerial Conference on Cybersecurity in October 2016. In his opening remarks, Dr. Yaacob Ibrahim, Singapore’s minister for communications and information and minister-in-charge of cybersecurity, emphasized that ASEAN needs to promote cybersecurity technical capacity-building. ASEAN is a rapidly growing market with a population of 620 million, and its GDP has tripled over the last decade. ASEAN is also the second-largest trade partner for Japan (after China) at 14.7 percent. The association considers Japan its third-largest external trade partner – coming in at 9.1 percent – after China and the European Union. Given the borderless nature of cyberattacks, damages and consequences are not necessarily contained in one specific organization, sector or country. Thus, cybersecurity awareness-raising and capacity-building are essential to tackle the varied cybersecurity levels of ASEAN members. To address this challenge, Japan made two important announcements in 2016. First, at the Japan-ASEAN Summit Meeting in September 2016, Prime Minister Shinzo Abe stated that Japan would continue to help ASEAN by crafting a policy for cybersecurity capacity-building support in line with the Basic Policy described below. The ASEAN Chairman expressed appreciation for Japan’s determination for proactive support on behalf of ASEAN members at the summit. This marked the first time any Japanese Prime Minister had made such a commitment to ASEAN. Second, the Japanese government issued the Basic Policy to Support Cybersecurity Capacity-Building in Developing Countries in October 2016. The Japanese government aims to reduce cybersecurity vulnerabilities globally to minimize risks; enhance security for the daily lives and business operations of its citizens, who depend on critical infrastructure in those developing countries; obtain understanding of Japan’s basic principle of free information flow and rule of law from developing countries; and create infrastructure to develop the Japanese ICT industry in those countries. The Basic Policy has three pillars: to enhance capabilities for incident response, such as building computer emergency response teams (CERTs); to help law enforcement to tackle cybercrime; and to obtain understanding and raise awareness of the importance of international norm and confidence-building in cyberspace via the United Nations Group of Governmental Experts. The Japanese government uses Official Development Assistance to provide cybersecurity devices and equipment, as well as training to use them, at a bilateral cooperation level. Furthermore, the Japanese government uses multilateral frameworks to offer training for cybercrime investigation and share expertise via the Japan-ASEAN Cybercrime Dialogue. Japan and ASEAN hold an annual Information Security Policy Meeting at the Director-General level to discuss how to create a secure business environment and ensure information security. At the first such meeting in February 2009, both parties agreed that Japan would help ASEAN craft information security strategy to enhance its cybersecurity and share best practices between the public and private sectors. Over the last couple of years, the support has shifted from “what to do” to “how to do.” At first, discussions focused on what it takes to craft cybersecurity policy. Since ASEAN countries have developed national CERTs, the agenda has now shifted to how to improve national cybersecurity capability. In 2009, the Japanese National Information Security Center (NISC, which is now called the National Center of Incident Readiness and Strategy for Cybersecurity) began annually hosting an ASEAN-Japan Government Network Security Workshop to discuss each government’s information security efforts among division chiefs, and an ASEAN-Japan Government Information Security Training in 2010 to train working-level officials on how to craft information security policy and build operational capability. The Tokyo training in August 2010 consisted of two parts: a four-day policy-crafting course to share updates on each country’s policy and joint awareness-raising campaigns; and a five-day operational hands-on course with case studies and a cyber exercise. In November 2011, the fourth ASEAN-Japan Information Security Policy Meeting (Japanese link) agreed to increase joint efforts to raise cybersecurity awareness. More specifically, Japan started to provide educational videos and brochures in each local language, provide training on information security management for government officials, and additionally began to send experts to seminars and training in ASEAN countries in 2012. The Japanese government provided ASEAN countries with videos, brochures and posters. In September 2013, Japan and ASEAN held the ASEAN-Japan Ministerial Policy Meeting on Cybersecurity Cooperation in Tokyo to commemorate the 40th anniversary of the Japan-ASEAN relationship. During the event, Japan and ASEAN agreed to collaborate on the Internet Traffic Monitoring Data Sharing Project (TSUBAME Project) to expand cooperation between CSIRTs (Computer Security Incident Response Teams). JPCERT/CC started the project in 2007, and it has 25 members from 21 regions – mainly national CSIRTs – as of September 2015. Next, Japan agreed to keep providing capacity-building support: Proactive Response Against Cyberattacks Through International Collaborative Exchange (PRACTICE) and Japan-ASEAN Security PartnERship (JASPER). PRACTICE is a project between Japan and other countries to build a network to gather information on cyberattacks and malware, and to research and develop technologies to predict cyberattacks, enabling countries to respond quickly. JASPER comprises the PRACTICE project and infection alerts. This year has already seen a good start between Japan and ASEAN. The Japan International Cooperation Agency has already provided cybersecurity training twice. The first training, for national CERT and government officials, aimed to increase cyber incident handling capabilities by providing understanding of the current threat landscape, best practices and a series of steps to take to respond to incidents, which consisted of cyber exercises in monitoring, analysis, incident handling and reporting. The second training focused on cybersecurity standardization and information security management, covering ISO/IEC27000 and the information security management system (ISMS). Students were ASEAN government officials, including those from Government CSIRT and national CERT. In this training, they were required to give a presentation to compare Japan and their home country, and subsequently provide recommendations for their governments. The 10th ASEAN-Japan Information Security Policy Meeting will be held this fall. When the ninth meeting adopted the new Guidelines to Protect Critical Infrastructure Between Japan and ASEAN in October 2016, ASEAN countries began to use the guidelines as a reference to craft and implement their national critical information infrastructure policy (CIIP). The Japanese government issued cybersecurity guidelines for the electric power industry in 2016 and released a new national cybersecurity strategy for CIIP in April 2017. CIIP will be a great area in which Japan and ASEAN can cooperate to help business operations and economic growth. Japan’s support to date has focused on policy and technical capacity-building, and there will be many more ideas to come. The Japanese CIIP strategy shows that the Japanese government is keen to encourage business executives to invest in cybersecurity and have corporate governance in place, as well as to consider risk assessment and strategic business risk management as parts of their business strategies. This reflects the philosophy of the Cybersecurity Guidelines for Business Leadership. The involvement of business executives is crucial to accelerate successful cybersecurity efforts from a top-down approach, rather than a time-consuming bottom-up approach – especially with only three years left before the Tokyo Summer Olympic Games in 2020. That is why the Japanese Ministry of Economy, Trade and Industry launched the Cybersecurity Center of Excellence (COE), which will offer a short-term course for C-level people to learn about cybersecurity and CIIP later this year. Critical infrastructure is owned and operated by private companies in most cases. Japan’s lessons learned from the Japanese guidelines and COE would be beneficial to share with ASEAN countries. It will help the Association implement the new Guidelines to Protect Critical Infrastructure Between Japan and ASEAN and urge business leaders to take proactive roles in CIIP and cybersecurity.]]> 5518 0 0 0 Executive Roundtable: Boards Must Play an Active Role in Cybersecurity https://www.securityroundtable.org/boards-must-play-an-active-role-in-cybersecurity-preparedness/ Fri, 28 Jul 2017 18:57:41 +0000 https://www.securityroundtable.org/?p=5536
  • Lisa Sotto, chair of the global privacy and cyber security practice at the law firm Hunton & Williams;
  • Kal Bittianda focuses on technology at Egon Zehnder, where he is Global Head of its Information Security practice;
  • Rick Howard, chief security officer at Palo Alto Networks,
  • Sotto set the stage for the conversation by noting that the responsibilities for board members shifted dramatically in 2013 after the data breach that affected more than 40 million customers of Target Corp. “At Target, the CEO resigned and seven of 10 board of director members were threatened with ouster,” Sotto said. “That was the line in the sand.” Since Target, the focus of regulators has shifted, to some degree, from privacy to notification of data breaches. In New York State, for example, companies are required to report a breach within 72 hours, and the company must certify annually that it will be compliant. This, Sotto noted, is similar to GDPR (General Data Protection Regulations) laws that go into effect next May, in Europe. Sotto stressed that cybersecurity is not a technology issue, but a strategic risk issue. With that in mind, she posed several questions of particular interest to board members:
    • Should the board form a cyber committee?
    • Should the board form an audit committee?
    • Should there be executive sessions between the board and the chief information security officer (CISO)?
    • How can the board ensure that the proper resources are devoted to cybersecurity issues?
    These questions precipitated a lively exchange among the speakers and the nearly 20 board members in attendance, representing a broad cross-section of industries, including financial services, insurance, healthcare, travel, pharmaceuticals, and entertainment. The compelling discussion, which lasted more than three hours, heard participants cite challenges and examples from their own industries and experiences. Key issues raised were: The board and the CISO When looking for the right persona, managerial experience is more important than encryption expertise, Stroz suggested. One attendee said that boards are starting to bring in experts to help them ask the right questions. But, she noted, “that’s a lot of pressure to put on one person.” Another attendee said CISOs can get mired in tech talk, which limits their ability to communicate effectively with the board. To be more effective, they need to be able to speak clearly to the needs of the business. Cybersecurity awareness Bittianda said there is no lack of awareness about cybersecurity in the boardroom, but the amount of attention paid by the board can be shaped by the industry or whether the company has a culture of security. “If the CISO and CIO aren’t pushing it,” he said, “the conversation isn’t happening.” One attendee said board members always try to exercise independent business judgment—but they need to know what questions to ask. “In life, you only get in trouble when you don’t know something,” he said, adding, “What are the right business questions to ask around cybersecurity? If that was clear, then the board could play more of a role.” Boards taking on an active role Another attendee said she is on the board of a bank that formed a technology committee. The plan is to have interactive sessions with the audit committee and then a joint session with the governance and risk committees. Importantly, she said, the CISO is present for all committee meetings. Another vital task for the board is to understand how cybersecurity is addressed structurally within the company. One attendee said the CFO should be actively involved to ensure that spending commitments are set aside and/or mandated. WannaCry’s teachable moments Sotto said companies should be aware of their “crown jewels.” Not all data is equal, she said, so companies need to determine what is most important and what must be backed up and recovered in what time frames. Howard of Palo Alto Networks suggested that companies reduce the material risk and cost: “Measure how many people have to respond to an incident. That’s a good key performance indicator. Automate as much as you can so can you can focus on the things that matter instead of chasing your tail.” Top concerns The session concluded with an open-ended discussion focused on the chief concerns of the board members in attendance. Here are some of the highlights:
    • Clarity, please. “We need to know enough about what questions to ask. There’s so much jargon that board members are becoming numb.”
    • Communications. “We need a common language. CISOs are selling features and buzzwords.”
    • Understanding risk: “Where does the risk emanate from? How do you set the right tone and create limits?”
    • M&A: “M&A doesn’t always include cybersecurity and privacy. It’s important but is sometimes forgotten: Does the company even own the data that is being valued?”
    • Best practices: “There are great frameworks for self-assessments, but boards lack a framework. What do best practices even look like from a board perspective? We need a framework to go back and say ‘here’s an industry standard.’”
    • Being better informed: “We get lots of conversation that is not useful and does not help us do our jobs. As directors, we’re exposed to corporate and personal risk and I may not even know if our company has cybersecurity insurance.”
    Final thoughts Attacks such as WannaCry and Petya show us with great clarity that companies are facing cybersecurity challenges that are more sophisticated, coordinated, and potentially crippling than ever before. If you are on the board of directors of any company in any industry, you have a duty and responsibility to understand what company leadership is doing to mitigate risk. Your future, and the future of the company, depends on it. If you are a security executive who must report to and inform your board, pay heed to what it is they want to know and how they need to know it.  ]]>
    5536 0 0 0
    Chinese Perspective on ‘Cyber Sovereignty’ Takes New Tack https://www.securityroundtable.org/chinese-perspective-on-cyber-sovereignty-takes-new-tack/ Tue, 01 Aug 2017 16:52:58 +0000 https://www.securityroundtable.org/?p=5608 available here on Securityroundtable.org, is titled, “Unity of Opposites in Cyber Sovereignty as per Three-Perspective Theory.” It carries an introduction by John A. Davis, Major General, U.S. Army (Retired), and Vice President, Chief Security Officer (Federal), at Palo Alto Networks. Davis writes that General Hao’s paper “reflects an evolution in China’s thinking about the topic of sovereignty as it applies to cyberspace.” This new view of cyberspace includes three perspectives: the nation, the citizens, and the international community.  According to Davis, Hao argues for “a more inclusive view of the multiple parties and stakeholders involved in the cyberspace environment.” The retired Major General finds interest in Hao’s evolving views about sovereignty, suggesting that “a nation’s core interests and control over the cyber environment has significant limits and must be balanced with the interests of the international community and individual citizens.” What this does, said Davis, is contribute to a more inclusive, balanced, and stable description of cyber sovereignty, resulting in “a much more realistic direction in thought than I had ever experienced in all of my previous interactions with China while serving in the military and government.” International implications In an exclusive interview with Security Roundtable, Davis discussed the implications of this changing international environment for business: "The professional cybersecurity community would be wise to pay close attention to the evolving views about what the concept of sovereignty—as applied to the cyberspace environment—means to countries such as China,” he said. “This is especially true for senior leaders across governments, C-suites, and boardrooms, because of the very real and practical impact these views can have, not only on issues such as privacy and civil liberties, but others, as well, such as public safety, economic security, and even national and international security.” Davis went on to note that Hao is a leading academic expert and thought leader for her country, and that, while they might not agree completely about all of these issues, they both believe a continuing, direct and transparent discussion is vital for building more trust and avoiding misperceptions that can lead to instability and even conflict. Finally, Davis—who clearly points out that the views he espouses about the paper and cyber sovereignty are his and his alone—observed that there is one item missing from Hao’s observations: “the ‘glue’ that connects each of the three perspectives [the nation, the citizens, and the international community] is represented by the global private sector.” “On a positive note,” said Davis, “Hao and I also believe that our countries actually have some very important issues of common interest. This is where we intend to focus our efforts, and giving my former counterpart a platform to share her interesting views about sovereignty in cyberspace on the Security Roundtable website is a great way to keep this important discussion going. " He concluded by encouraging a “continuing evolution toward a more inclusive, flexible, and participatory view of sovereignty as it applies to cyberspace.” Davis’s full introduction and Hao’s complete paper are available here.]]> 5608 0 0 0 Board Members Should Care—a Lot—About Credentials Theft https://www.securityroundtable.org/board-members-care-lot-credentials-theft/ Thu, 03 Aug 2017 16:19:22 +0000 https://www.securityroundtable.org/?p=5656 at each stage of the attack life cycle. You have responded by approving your CIOs and CISOs requests for millions of dollars of security equipment designed to prevent and detect cyber adversaries. And you are thinking to yourself, “I got this.” You’ve seen the risk and mitigated it to acceptable levels. But there is one more thing you must consider: credentials theft. Cyber adversaries have basically two ways to penetrate their victim’s networks. They can either work their way down the attack life cycle—which is hard, since you just spent millions of dollars trying to prevent them from doing just that--or they can somehow steal employee login credentials and use them to legitimately access your network. Login credentials are those USERID and PASSWORD combinations that we all use to access our favorite web sites, laptops, and servers—those places where we store our sensitive and personal data. If cyber thieves can obtain those tokens, they can simply just log in as a legitimate employee and search for the data they came to steal or destroy. It’s not more complicated than that. This is exactly what happened to Target, in 2013. Cyber adversaries stole proper credentials from an HVAC third-party contractor and used them to infiltrate Target’s network and steal 40 million credit- and debit-card numbers. Additional questions Clearly, it is not enough to simply deploy state-of-the-art security controls at each phase of the attack lifecycle. When adversaries steal legitimate credentials, they by-pass that sophisticated security equipment. Therefore, you should be asking your security executives two additional questions:
    • What are they doing to reduce the damage cyber thieves can do who penetrate the network using legitimate credentials?
    • What are they doing to prevent cyber thieves from stealing credentials from employees in the first place?
    To the first question, you should be hearing things that sound like “reducing the attack surface.” What that means is that those high-end security controls should have some way to limit employee data-access to only the data they need to do their jobs. For instance, the marketing department should not have access to the product code base, and system developers should have no access to the legal department’s M&A documents—that kind of thing. In the 2013 Target breach, once the cyber adversaries legitimately logged into the corporate network, they were able to wander around anywhere they wanted, including hitting the point-of-sales devices where all the credit cards were stored. In other words, Target had not implemented any controls reduced the attack surface. To the second question, you should be hearing answers that sound like “preventing employees from giving their credentials to non-corporate environments.” To understand that, consider what cyber criminals must do to steal your credentials. They essentially must trick the employee into handing this information out. We call that social engineering. One way they might do that is to contact the employee on the phone or via email, say they are from the IT department, and convince the employee that they need his or her password to fix an error in the payroll database system or the employee will not get paid this month. Another way is for the bad guy to compromise a watering hole website--websites that employees typically like to visit. The adversary compromises the website and waits for visitors to type in their credentials. There are ways you can mitigate these social engineering campaigns and your security executives should be talking to you about them. Board members should be asking their security executives how they secure their employee credentials and how they can make sure that, if the credential is compromised, the attacker cannot necessarily get to all the organization’s valuable data. In the end, the theft of employee credentials, in many ways, is a much less complicated attack scheme than the traditional approach of working down the attack life cycle. But it is also one that might be harder to detect and stop.]]>
    5656 0 0 0
    Five Keys to Taking On Credentials Theft Right Now https://www.securityroundtable.org/five-keys-taking-credentials-theft-right-now/ Thu, 10 Aug 2017 15:36:45 +0000 https://www.securityroundtable.org/?p=5686 Board Members Should Care--a Lot--About Credentials Theft.") This ranges from consumer-focused cybercrime that traditionally targets banking credentials, or business oriented attacks that occur that in the middle of the attack lifecycle and try to gain and escalate stolen credentials required access to systems and data inside the compromised business. Whilst there are daily updates on how attack methods are evolving, much less is said about the evolving tactics used to gain and leverage credentials.  This is a critical gap, as credentials are being used more outside of businesses, so identifying and reducing the scope of what attackers can achieve needs to be addressed. Using a point of trust – In recent years we have seen social media accounts with high volumes of followers compromised, leveraging the trust in these to target tens of thousands of users.  The same concept is increasingly being used in the business space, where credentials stolen from a senior employee or executive can be used to influence both online and physical actions of more junior staff.  I came across several examples where enough information was gathered through reconnaissance to ensure that when such trusted electronic demands were sent, the person whose credentials had been compromised was uncontactable, thus forcing the recipients to decide themselves, which is typically socially engineered to be time bound. Technology is adding new layers of complexity - More businesses are seeing the value of cloud email and data storage services.  Once credentials are taken, they can be used without touching the businesses network, which has traditionally been the bastion of their security controls.  How would you validate if the correct user is leveraging these credentials in cloud services today? Credential sprawl - Likewise, these same credentials can be used and cached in multiple devices and systems.  Typically, multiple methods are used to gain access to the same business systems, whether they are apps, web interfaces or public clouds.  Whilst users are correctly educated not to write down their passwords, cybercriminals’ ability to screengrab, keyboard log, and leverage underlying system or application vulnerabilities - whether that’s on a smart phone, tablet or PC, or in an internet cafe or cloud architecture - means the scope of where and how credentials must be digitally protected is growing. For many users, it may seem easy to enforce policy around these credentials to minimize the risks, yet  execs and senior staff often have the broadest access and are more likely to be targeted, either directly or through their support staff or, worse still, via friends and family that can gain access to systems or passwords.  Likewise, it may seem obvious to enforce different passwords for differing systems, but with single sign-on tools aimed to simplify the user experience, and digital wallets/vaults becoming more popular, it’s important to consider which systems require more than just a single form of authentication, and how to apply and enforce this consistently across the technology-diverse user ecosystem. What to Do?  If credential theft continues to be a core focus for the adversary, we need to extend the scope of where and how the credentials being used are protected, whether that’s from employees doing the wrong things or attackers looking for the least path of resistance to achieve their goal.  While security professionals have years of experience protecting data and systems in their own networks, the most users today can effectively work outside the business-protected space, leveraging cloud services and portable devices. Although layers of security can and could continue to be applied throughout these technology systems, the constant across them is the credentials used.  The impact here is the access they give, and the implied trust that goes with communications from these accounts. Given the current landscape, here are five key issues you should be thinking about today:
    • How are you preventing credential theft attacks?
    Within your existing processes, procedures and tools, what can be specifically implemented to manage credential theft?  As an example, banks have commonly defined that they send users marketing information, but that they will not ask them for personal information or credentials via email.  The same concepts can apply to businesses: do you have an escalation process to validate email requests if the person is not contactable, so there is always a point of human verification?  Within the tools you use, what capabilities are there to spot credential theft?  This could include specific anti-phishing capabilities through to…
    • How do you identify and enforce the right level of validation against users to ensure they are who you think there are?
    Visibility is at the core of all security strategies.  Do you have a clear process to identify the information and accounts are that could be sensitive and to validate where and how users are leverage these?  If they are outside the business, how do you implement the right policy controls? This may mean reducing or refusing access, or adding in additional authentication layers.  How do you define and enforce this consistently, across the scope of connection methods being used, in a way that you can dynamically adapt to new requirements?
    • Where do you apply these enforcement controls?
    Considering the ongoing evolution and diversity of credentials use, how can you implement controls that can remain dynamic to changing requirements, such as the need to add in support for new apps, cloud resources and devices with minimal effort from an execution perspective.  It may be for example you are using a Multifactor authentication solution, but what happens where there is a resource they don’t support.  As user and their connection methods change how do you easily evolve the enforcement controls, are you doing it at the source connection point or at the end authentication/data use point or somewhere between the two?
    • How do you spot credential misuse be that insider or attacker?
    The goal is to prevent credentials being misused, whether that’s by attacker or by employees, yet you should have the ability to detect where instances occur quickly to marginalize impact.  What processes and capabilities do you have to spot when misuse does happen?  Can you identify the sudden change in connection location, and do you see the increase in activity or the change in activity profile?  When you spot these, how easily is it for you to then segregate that account, either in its entirety or (better) at the points of access that would cause harm?  What forensic data could you use to understand what has already occurred?
    • Test
    Security professionals have become more used to testing network resilience, by dealing with cyber breaches, but how frequently do you test to see what can be achieved with genuine credentials, when used from a non-business system outside your network?  As you build out your visibility, you should start to consider what scenarios would have greatest impact, and would test your capabilities to identify, prevent and - where required - respond to credential misuse? With its efficacy in facilitating access to myriad systems, credential theft is not going to go away soon, and will likely continue to grow as a way of facilitating attacks.  By asking yourself these questions now, identify how you can understand where your organization may be vulnerable and how you can shore up your defenses without impacting users.]]>
    5686 0 0 0
    Need a CISO? Then Have Good Answers to These Four Questions https://www.securityroundtable.org/need-ciso-good-answers-four-questions/ Thu, 31 Aug 2017 16:11:45 +0000 https://www.securityroundtable.org/?p=5725 Indeed shows that “severe cyber security skills shortages persist in every country.” In fact, in only two countries—the U.S. and Canada—does the supply of job seekers exceed even 50% of employer demand. In this environment, the best security professionals can be selective in choosing where to apply their talents. It is, therefore, important for corporate management and board members to get inside the heads of these leaders and understand what factors make them satisfied and successful in their jobs. To help, we have identified four overarching questions CISO candidates typically ask when evaluating an opportunity. As you look at the questions below, it is worth thinking about how your organization stacks up—and what actions you might be able to take to make improvements.
    • "Who is my sponsor and how much influence does he or she have?"
    This is likely to be the first question on the CISO candidate’s mind, and he or she is thinking about this issue in at least two specific ways. First, while the CISO is likely to have some interaction with the board and C-suite, there will still be many conversations that affect the information-security function to which the CISO will not be privy. As a result, the CISO will have to rely on his or her supervisor to act as an effective intermediary in advocating for resources and policy initiatives and in educating the board and CEO on information security issues as they unfold. Second, when the CISO needs to take an unpopular position to strengthen an organization’s information security profile, he or she must be confident that there will be support in high places.
    • "How deep is the organization’s commitment to information security?"
    This is more than a question of staff and budget allocation, although those elements are certainly important. The CISO wants to know that the C-suite and the board appreciate the complexity and uncertainty at the core of the information-security function and the need to make everyone in the organization—top to bottom—responsible for security. For the CISO to be successful, he or she must be empowered to act and be armed with the necessary resources to deploy, both in times of normalcy and crisis. Although the CISO expects organizations to have high standards, he or she will avoid enterprises that reflexively cycle through security teams.
    • "What key performance indicators will I be measured against?"
    Given that every large organization must assume that it is continually under cyberattack, it follows that security breaches are a matter of not “if,” but “when.” Therefore, it is not realistic for a company to hold its CISO to a “one strike and you’re out” performance benchmark. The conversation about expectations is just as important as those about resources, reporting lines, and compensation.
    • "Where will I be in five years?"
    Those who lead the information-security function are like other functional leaders in their range of career ambitions. For some, the opportunity to lead the function at a quality organization is the goal; others, however, are looking ahead to a CIO role or even a broader position in organizational leadership. It is important to understand each candidate’s desires vis a vis what the organization can offer. Remember that the CISO’s reporting relationship will be one factor that frames this issue in his or her mind. Conclusion In today’s environment, board members cannot afford to be complacent in their oversight of cybersecurity issues and, in particular in helping the organization hire the right people for the most critical positions. A big step is to understand the issues that are of the most importance to today’s CISOs.    ]]>
    5725 0 0 0
    It’s Time To Move Beyond Passwords—Even StR0n& Ones https://www.securityroundtable.org/time-move-beyond-passwords-even-str0n-ones/ Fri, 01 Sep 2017 16:26:37 +0000 https://www.securityroundtable.org/?p=5743 a recent article in the Wall Street Journal, the man who literally wrote the book on password management, Bill Burr, admitted that the password as primary protection is no longer valid. Burr was the author of a 2003 report that recommended using numbers, obscure characters, and capital letters, along with regular updating, for inreased security. Now, according to The Journal story, he says he “blew it” and regrets the error. Thanks, Bill. Yet, despite his confession, passwords still play an important role in security today—but they are not enough alone. If you are on the board of a company, or several companies, for instance, you are no doubt more than a little busy. Perhaps too busy to closely manage the various passwords you use for favorite Web sites and your myriad apps. If you tend to use the same, or similar, passwords for more than one site, or if a password is your only tool for credentials and authentication, you could be putting your organization—and yourself—at risk for identify theft and/or a significant security breach. Clearly, the notion of the password as the first, and sometimes only, line of defense has become limited. Passwords have a place, but should not be used in isolation. If you think about it, passwords came into vogue more than 20 years ago as the Internet started to become more ubiquitous and email  took over the primary mode of interpersonal and business communications. Impressive, considering there aren’t too many technology solutions developed 20 years ago that are still relevant. However, cybercrime is now an industry that’s becoming more sophisticated and pernicious every day. Why would we expect a 20-year old solution to still be effective in 2017? As a board member, you are at particular risk for credential-based attacks. You have access to valuable company data and attackers may assume—often often with uncanny accuracy—that you may not have adequate levels of security in place. And if you are attacked through a password theft and you use the same password for multiple Web sites, watch out. Your most intimate personal records—bank accounts, investment portfolios and the like—could all be at risk. So, what to do? First off, you don’t want to rely on passwords as your only line of defense. You should have at least two-factor authentication and, realistically, multi-factor authentication. This kind of authentication can be thought of as three levels: Something you know, something you are, something you have. The password fits into the category of “something you know,” and, because you are likely to continue using passwords as one method of security protection, you should take the time and care to manage them closely and not keep using the same word and character patterns over and over again. Beyond that,  biometrics have become a widely used method of authentication in the category of “something you are.” If you have an iPhone 5S or later, you are probably using touch ID, so you are aware of how simple it is to use and how commonplace it has become. Often two-factor authentication—password and biometrics—might be enough, but industry best practices are moving towards multi-factor authentication. This would also include “something you own,” such as a security token. As a senior-level executive or board member, it is important that you remain vigilant. If your organization only requires passwords, press the issue and, if necessary, refuse to use platforms that you think could be vulnerable. If someone at your level makes cybersecurity protection an issue, it is quite likely that the security teams will be keen to make the proper adjustments. Cyber security is only as strong as its weakest link—and you don’t want that weakest link to be you. Make sure you have authentication protections  that go beyond passwords—and make sure two-factor or multi-factor authentication become standard practice at your companies. The risks are far too great to ignore. PassWord123$$ doesn’t cut it anymore.  ]]> 5743 0 0 0 3 Steps to Strengthening Security Through Workforce Development https://www.securityroundtable.org/3-steps-strengthening-security-workforce-development/ Tue, 05 Sep 2017 19:11:08 +0000 https://www.securityroundtable.org/?p=5761 Step 1--Adopt a cybersecurity mindset: It is not enough for cybersecurity to be relegated to a subset of people, as with the IT function. Every employee faces cyberthreats, and talent management for IT and cyber operations should not be combined. By shifting this mindset and developing strategies that reflect these realities, the company’s ability to develop an effective workforce will immediately improve. Step 2--Develop alternative management strategies: Most cybersecurity professionals are well known for their love of cutting-edge technologies, casual work environments, and creative mindsets. These tendencies might differentiate them from the rest of the workforce in areas such as preferred work environments and career paths. Recruiting, developing, and retaining this unique workforce often requires management strategies that are different than those applied to other employees. Be flexible. Step 3--Understand work preferences: Cybersecurity professionals also have unique work traits. These traits, or work preferences, make them the perfect candidates to tackle the daily challenges from threat actors around the globe; but they can also separate them from the rest of your organization. Recognizing these work preferences is critical to developing  cyber talent management strategies. For example, organizations can capitalize on employees’ problem-solving skills by allowing them to be a part of strategy, offense, and defense and by fostering a culture that encourages every level of employee to suggest solutions. Companies can also reward employees for forward thinking, provide them with constantly changing tasks with different levels of difficulty, and present opportunities to work with emerging technologies. Conclusion Cybersecurity is not just about having the right technology in place; it is also about having the right people and the right mindset. By understanding the unique characteristics of cybersecurity professionals and adapting workforce development, organizations can do a better job of attracting and retaining the people that can keep them protected.              ]]> 5761 0 0 0 The 5 Most Important Questions to Ask Your Security Team https://www.securityroundtable.org/5-important-questions-ask-security-team/ Wed, 06 Sep 2017 15:46:53 +0000 https://www.securityroundtable.org/?p=5794 can hurt you. Recognizing this, the U.S. Department of Homeland Security worked with current and former executives to create five simple questions that CEOs and other ranking executives can ask the technical team to drive better security practices. They are:
    1.  What is the current level and business impact of cyber risks to our company, and what is the plan to address identified risks?
    2.  How is executive leadership informed about the current level and business impact of cyber risks to our company?
    3.  How does our cybersecurity program apply industry standards and best practices?
    4.  How many and what types of cyber incidents do we detect in a normal week, and what is the threshold for notifying executive leadership?
    5.  How comprehensive is our cyber incident response plan and how often is the plan tested?
    The team that coordinated the Cybersecurity Framework also provided recommendations to help business leaders align their cyber risk policies with these questions. First and foremost, they said, it is critical for CEOs to incorporate cyber risks into existing risk-management efforts. It may seem like a simple concept, but with cybersecurity the default practice is often to silo considerations about risks into a separate category apart from thinking about their valuable assets. Company leadership has to start by identifying what is most critical to protect. Conclusion The process of aligning a company’s core values with its top IT concerns is a journey and not something that can be solved in one big investment or board meeting. Just like any risk analysis, it requires serious consideration and thought about what is most important to core business practices. The five questions outlined above provide a great starting point for board members and executive management looking to mitigate risk.]]>
    5794 0 0 0
    Global Study: The Meaning of Security in the 21st Century https://www.securityroundtable.org/global-study-meaning-security-21st-century/ Thu, 07 Sep 2017 15:47:48 +0000 https://www.securityroundtable.org/?p=5812 The impact of societal trends Security vulnerabilities are no longer solely the byproduct of factors such as hackers looking for bragging rights or financial extortion. Increasingly, security breaches are the result of causes with deep roots in social and political change. These might include protests against traditional political power structures; the actions of rogue nation-states looking to disrupt democratic regimes; or socially committed groups hoping to upend perceived inequities in financial wealth, natural resources, or basic human needs such as food and living conditions. In fact, the research finds that “political or ideological differences within countries or across international borders” will be the most-cited root cause of security problems in the world over the next five years. Naturally, solving societal problems such as inequality or political unrest is typically not on the to-do list of corporate executives. But those issues have significant influence on the creation of security risks, and survey respondents believe corporate boards need to better understand the underlying causes of security woes. One way or another, they must be addressed—even if it’s unlikely that organizations will fully eradicate them. “There’s no amount of money that a company can spend for a guarantee that they’re going to be safe,” said Arvind Parthasarathi, co-founder and CEO of Cyence, which develops economic models of cyber risk for the insurance industry. “You can’t dial it down to zero.” Still, organizations have tangible strategies and tactics they can implement today in order to shift the scales in their favor against mounting and diversifying security risks. Steps to take One of the first steps is to focus on educating all key constituencies—board members, senior executives, internal staff, trading partners, and customers—about spotting and eliminating risks before they take hold. In fact, 70% of survey respondents overwhelmingly agree that board members need to become better informed on the underlying causes of security problems. Another vitally important step is committing to a strategy for cooperation and collective action. “Going it alone” is no longer a way to ensure competitive advantage, especially when you’re talking about recurring security problems. Collaborating with industry groups, government agencies, and even competitors can pay off in helping to make digital environments safe and secure. “I firmly believe that making the internet safer for everybody is not a competitive differentiator,” noted Troels Oerting, chief security officer and CIO at Barclays Plc. “I think we should share more than we do.” Other key steps business leaders and IT executives should embrace in order to head off security problems—even those emanating from tricky societal challenges—include:
    • Enhanced communication with customers in order to identify and promote better “digital hygiene,” particularly in e-commerce transactions or interactions that expose sensitive data.
    • Improved device security, especially with the increasing consumerization of IT endpoints, such as smartphones and tablets, and with the growing popularity of the Internet of Things.
    • Broader participation in industry standards groups that leverage collective knowledge and common interests to overcome security threats
    For a full version of the Economist Intelligent Unit research, please go to http://themeaningofsecurity.economist.com. http://gty.im/5320  ]]>
    5812 0 0 0

    ]]>
    3 Steps to Improving Cybercrime Prevention https://www.securityroundtable.org/3-steps-improving-cybercrime-prevention/ Mon, 11 Sep 2017 16:56:10 +0000 https://www.securityroundtable.org/?p=5872 cybercrime damages will cost the world $6 trillion annually by 2021, up from $3 trillion just a year ago. And, as in any industry, opportunity fuels more investment and innovation. The best way to get an industry to collapse on itself is to take away the potential for profit. How? One way is to make it so hard for cyber criminals to achieve their objectives that their only option is to invest more and more resources to stage a successful attack—to the point that it becomes unprofitable. Here are three critical steps organizations can take to minimize the risk of a successful cyberattack, making it as hard as possible for the bad guys. Step One: Reduce the attack surface Modern networks can be a rat’s nest of systems and users cobbled together from mergers, legacy architectures, and prior acquisitions. This confusion leaves many points of entry for attackers to slip in unnoticed and reside on the network for months, or even years. Be sure that your security and networking teams reduce the attack surface by:
    • Simplifying the architecture down to manageable pieces that can be controlled, watched, and defended.
    • Segmenting important components of the networks, which creates firebreaks that can prevent the spread of a breach.
    • Leveraging technology to prevent the type of actions taken by exploits and malware. Stopping the type of malicious activity associated with an attack is much more effective than hunting for an attack that, by nature, is stealthy and hidden.
    • Using the tools at their disposal. Purchasing next-generation technology is useless if it is not configured properly. Establishing a process for staying up to date on security investments should be a critical habit for your security and networking teams.
    Step 2: integrate and automate controls to disrupt the cyberattack lifecycle Make sure your teams are not using yesterday’s technology to address today’s and tomorrow’s security challenges. Legacy security approaches offer individual products to be bolted on for single-feature solutions. This leaves gaps that can be broken by new methods of attack. By using an integrated cybersecurity platform that protects across the entire enterprise, defenses can work together to identify and close gaps. The next step is to automate prevention measures. If the organization has an integrated platform that communicates visibility across defenses, it can automatically act on new threats, preventing what is malicious and interrogating what is unknown. Integration should also enable agility and innovation. Business doesn’t stop at the elevator, as employees take laptops to work from home or use their personal mobile devices to access the corporate cloud on the road. As data moves to enable the workforce, security must go with it. Step 3: Participate in a community that shares cyber-threat information End users cannot be relied on to identify every malicious URL or phishing attack. Organizations must educate their constituents about what they can do to stop cyberattacks. However, to protect against today’s truly advanced cyber-threats, IT must go beyond education, utilizing the global community to combine threat intelligence from a variety of sources to help “connect the dots.” Real-time, global intelligence feeds help security teams keep pace with threat actors and easily identify new security events. Conclusion As we have seen from recent highly publicized attacks, cybercriminals are becoming more bold, sophisticated, and effective. The best way to ensure that your organization is protected from advanced and targeted threats is to implement an integrated and extensible security platform that can prevent even the most challenging unknown threats across the entire attack lifecycle. Stopping even the most advanced attacks is possible, but it must begin with a prevention mindset.          ]]>
    5872 0 0 0
    Board Members: Don't Give Cybercriminals a Seat at the Table https://www.securityroundtable.org/board-members-dont-give-cybercriminals-seat-table/ Tue, 12 Sep 2017 14:48:30 +0000 https://www.securityroundtable.org/?p=5884
  • The value of the data they have access to
  • Board members have access to information that is sensitive, timely, and materially important to the business.
    • Ability to influence
    It’s not uncommon for a hacker to impersonate an influential person when sending a creative phishing lure. If a phishing email comes from a board member, the recipient is likely to pay attention.  Some of the most successful phishing scams succeeded because the victims thought they were acting upon the orders of someone in charge.
    • “Non-employee” status
    If a board member is not an employee of the organization, she may bring her own device to meetings, which might have the same level of security that a regular employee’s device has. Board members also typically do not go through the same security training that employees do, making them easier targets. Important Conversations  Because the information board members have access to can tip the scales of risk to the business, it is imperative to understand how the organization is providing protection to that data and to those who access it. Some of the most important conversations board members can have with their peers and technical teams are around how they access data. If using a username and password is the only barrier to escalating privilege or compromising the next device, then you could be extremely vulnerable. But If passwords alone are not enough, how does the company ensure that when a board member authenticates, it authenticates who she really is? What has the company instituted beyond passwords? When thinking about withdrawing money from a bank account, it’s hard to imagine a bank that wouldn’t require both an ATM card and a pin. The same concept should apply within an organization to the accessing of data. There are some key questions board members should ask the next time they access data:
    • What is the value of the information we have access to?
    • How are we getting access to that information?
    • How is that information protected?
    • Given the sensitivity of the information, do we think it is protected enough?
    Conclusion As influential leaders, board members play an important role in the culture of security in an organization. By asking the questions above, a director can demonstrate that he or she is thinking critically about the company’s cyber best practices and efforts to prevent credential theft. In doing this, they can help ensure that the organization is adequately protecting itself against the single most common element across cyber-attacks: credentials theft. Your future, and the future of the company, depends on it.]]>
    5884 0 0 0
    For the Board, Cyber Security Means Cyber Resilience https://www.securityroundtable.org/board-level-cyber-security-means-cyber-resilience/ Mon, 18 Sep 2017 14:43:13 +0000 https://www.securityroundtable.org/?p=5968 st century. As businesses digitize all aspects of their operations—from customer interactions to partner relationships in their supply chains—corporations become more and more electronically exposed and vulnerable to cyberattack. For board members, cybersecurity is an issue of enterprise risk. As with all enterprise risks, the key focus is mitigation, not prevention. This universally understood enterprise-risk guideline is especially helpful in the context of cybersecurity, because no one can prevent all cyber breaches. Every company is a target, and a sufficiently motivated and well-resourced adversary can—and will—break into a company’s network. Today, it’s more accurate to think of the board-level cybersecurity review goal as “cyber resilience.” The idea behind the cyber-resilience mindset is this: Because you know network breaches will happen, it is more important to focus on preparing to meet cyber threats as rapidly as possible and to mitigate the associated risks. Given this focus on enterprise risk and risk mitigation, the correct blueprint for cybersecurity review can best be achieved by asking these high-level questions:
    • Has your organization appropriately assessed its cybersecurity-related risks?
    • What reasonable steps have been taken to evaluate those risks?
    • Has the organization appropriately prioritized all cybersecurity risks from most critical to noncritical?
    • Are these priorities aligned with corporate strategy, other business requirements, and a customized assessment of the organization’s cyber vulnerabilities?
    • What action is the organization taking to mitigate cybersecurity risks—i.e., is there a regularly tested, resilience-inspired response plan with which to address cyber threats?
    Naturally, these questions are proxies for the industry-specific and/or situation specific questions particular to each organization. The key to formulating the relevant questions for your organization is to find the right balance between asking enough to achieve the assurance appropriate for board oversight, but not so much that management ends up floundering in the weeds.]]>
    5968 0 0 0