city of markham
play

City of Markham Date: March 26, 2018 Public Presentation Agenda - PowerPoint PPT Presentation

Cyber Security Audit City of Markham Date: March 26, 2018 Public Presentation Agenda 1. Background and Landscape 2. Approach 3. Overall Results 4. Industry Comparison 5. Auditor General Recommendation and Management Response 6. Questions


  1. Cyber Security Audit City of Markham Date: March 26, 2018 Public Presentation

  2. Agenda 1. Background and Landscape 2. Approach 3. Overall Results 4. Industry Comparison 5. Auditor General Recommendation and Management Response 6. Questions Page 2 Public Presentation

  3. Background and Landscape • Attackers find value in sensitive Employees Destructive information • Technical Malware • Business • Organizations are finding it challenging to • Former Hackers protect against threats • Organized • Non- • Attacks can originate from various organized sources Nation States • Avenues of attacks continue to evolve Business Information Personal Proprietary Credit Card Client Employee Page 3 Public Presentation

  4. Background and Landscape • The Verizon 2017 Data Breach Investigations Report describes public sector organizations as having the third highest number of reported breaches (and increasing) • Unreported (or undetected) breaches may be even worse Page 4 Public Presentation

  5. Background and Landscape Attackers are targeting industrial control systems • Water treatment and pumping • Electrical control systems • Traffic control systems These systems are converging with corporate IT systems Source: Schneider Electric Page 5 Public Presentation

  6. Audit Objective • MNP evaluated the effectiveness and reasonableness of the City’s logical security and management/monitoring controls relating to cybercrime prevention, detection and incident management processes, policies, procedures, and security governance activities • Focused on the following elements: Security policies, Physical and Operational Security training planning, risk logical security security and awareness management access controls practices Security Information Security monitoring and sensitivity assessment incident classification practices management Page 6 Public Presentation

  7. Approach 1. Project Planning 2. Project Execution (Controls Assessment) • Define objectives and scope • Confirm project duration and schedule 3. Project Reporting • Define team members and structure • Conduct interviews and discussions • Define deliverables • Review policies, standards, and • Obtain understanding of systems procedures documentation environment • Identify improvement opportunities • Observe IT systems and configurations • • Develop audit work program Draft report with findings and • Evaluate and assess current state • recommendations Draft Audit Planning Memo against best practices and security • • Validate observations and present Distribute to City and Council frameworks recommendations • Issue final report Page 7 Public Presentation

  8. Overall Results – Strengths • The City has implemented good practices to protect the security and confidentiality of information on its IT systems • Strengths noted include: ✓ Perimeter network defenses ✓ Anti-malware software ✓ Hard drive encryption ✓ IT system backup ✓ Administrative access ✓ Vulnerability assessments ✓ Mobile device management security Page 8 Public Presentation

  9. Overall Results – Risks • Notwithstanding the efforts and investment in security High 7 • We identified several areas for improvement • Gaps expose the City to a Medium 8 malicious attacker and unauthorized access to systems • 18 observations in total Low 3 Page 9 Public Presentation

  10. Overall Results – Security Program • Most notably, the City has not formally and sufficiently defined its overall security program • For example, there is no: – Strategy – Roadmap – Policies – Dedicated security resources Page 10 Public Presentation

  11. Overall Results – Security Program • An effective and comprehensive security program: – Forms the foundation for security Assess practices – Structured and tailored plan to manage security risks – Continually monitored and Improve Implement maintained – Addresses business requirements – Changes to the security threat landscape Monitor • Proactive vs re-active approach Page 11 Public Presentation

  12. Overall Results – Security Program • No one-size-fits-all approach to • City should define their risk managing cyber security risk appetite and target state that they want to achieve: • Security program should be  Implement the program based on:  Risk appetite  Address high and medium risks  Industry accepted practices Page 12 Public Presentation

  13. Overall Results – Impact • Weaknesses identified increase the risk Productivity of an information security incident or Loss data breach • Response Loss May have a significant and negative Replacement impact on the City Loss Fines and • Difficult to assess the actual cost of a Judgements data breach Competitive – Value and loss of information is challenging to Advantage measure – Many considerations – Cost of a breach ranges: Reputation $10,000 - $10,000,000 Page 13 Public Presentation

  14. Industry Comparison • Many organizations struggle to implement and sustain strong security practices • Many municipalities are starting to assess their cyber security posture and build their own security program Page 14 Public Presentation

  15. Auditor General Recommendation and Management Response • The Auditor General’s overall recommendation is for the City to enhance the current security program by formalizing efforts and priority for cyber security. The City should determine the level of security that they wish to achieve, improve their existing practices, and monitor progress towards its security objectives. • The City supports the Auditor General’s recommendation and will enhance its current cyber security practices by: – Developing a comprehensive security program which will provide a sustainable approach to enhance the City’s cyber security posture based on accepted levels of risk tolerance (deemed appropriate by the City), including: • Security strategy and roadmap; • Security policies and procedures; and, • Identification of budget and resources required. Page 15 Public Presentation

  16. Recommendation The Auditor General recommends that: 1) The Cyber Security Audit Presentation be received. Page 16 Public Presentation

  17. Questions? Page 17 Public Presentation

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend