Crafting a Cybersecurity Strategy that Works Texas Association of - - PowerPoint PPT Presentation

crafting a cybersecurity strategy that works
SMART_READER_LITE
LIVE PREVIEW

Crafting a Cybersecurity Strategy that Works Texas Association of - - PowerPoint PPT Presentation

Crafting a Cybersecurity Strategy that Works Texas Association of Broadcasters August 2016 Chris Homer PBS Technology & Operations Cybersecurity Strategy for Broadcasters Summary Broadcast Industry Challenges Understanding


slide-1
SLIDE 1

Crafting a Cybersecurity Strategy that Works

Texas Association of Broadcasters August 2016

Chris Homer PBS Technology & Operations

slide-2
SLIDE 2

Cybersecurity Strategy for Broadcasters

  • Summary

– Broadcast Industry Challenges – Understanding Risk – NIST Framework – How to establish a Cybersecurity Strategy

slide-3
SLIDE 3

Broadcast Industry Challenges

  • Broadcast Networks

– Emergency Alert Systems – News & Weather, Production, Graphics – Traffic & Scheduling – Playout & Automation Systems – STL transport & Broadcast (spokes & hubs)

slide-4
SLIDE 4
  • EAS Equipment

– Common Alerting Protocol

  • September 30 2011 FEMA
  • eXtensible Markup Language (XML) standard

– May be tied to local, state & FEMA Networks

slide-5
SLIDE 5

News Weather Production & Graphics

  • News Room Computer

Systems NRCS

  • Non-Linear Editing

Systems NLEs

  • Graphics Systems
  • Wire Services, Pool

Feeds, Bonded Cellular

  • Closed Captioning via IP
slide-6
SLIDE 6

Traffic & Scheduling

  • Sales Tools
  • Traffic Scheduling
  • Schedule Import
  • Programming
  • BXF Export to

Automation

slide-7
SLIDE 7

Playout & Automation Systems

  • Playout Servers

(Channel in a Box)

  • Automation Systems
  • IP Playout
  • Storage Area Networks

(SAN/NAS)

  • Library Systems (Disk,

Tape, Cloud)

slide-8
SLIDE 8

STL or Spoke & Hub

  • IP over Microwave
  • Network Spoke &

Hub Connectivity

slide-9
SLIDE 9

Broadcast Industry Challenges

  • Networks (Enterprise or Corporate)

– Enterprise Resource Planning (ERP) – Finance – Sales – Research – Intranet/Extranet – Human Resources/Community Service

slide-10
SLIDE 10

Finance & Accounting Systems

  • Finance
  • Accounting

– Accounts Payable – Accounts Receivable

  • Purchasing
slide-11
SLIDE 11

Broadcast Industry Challenges

– News Data – Finance & Sales – Traffic & Scheduling – File Based Workflow – Viewer Data – Social Media Data

slide-12
SLIDE 12

News

  • Laptops &

Thumb drives

  • NRCS

Rundowns

  • Non-Linear

Editing Systems

  • Wire Services
slide-13
SLIDE 13

Finance Sales & Admin

  • Human Resources/Employee Data
  • ERP Financial Data
  • Email
slide-14
SLIDE 14

Traffic & Scheduling

  • Contracts & Deals
  • Programming Grids
  • Schedules
slide-15
SLIDE 15

File Based Workflow

  • Media
  • Graphics
  • Meta Data/RDS
  • Marketing Content

(Posters, Ads)

  • Web Based Content
slide-16
SLIDE 16

Community Services/Viewer Data

  • Local Events Charities
  • Nielsen Data
  • Viewer Data
  • Social Media Content
slide-17
SLIDE 17

Cybersecurity Journey

  • Understanding the Risks
  • Cyber Attack Chain Model
  • FCC CSRIC IV Report
  • NIST Cybersecurity

Framework

slide-18
SLIDE 18

Understanding the Risks

  • Dead Air
  • Impact to Resources
  • Loss of Revenue
  • Embarrassment
  • Potential liability
  • Breach of employee, viewer or advertiser data
slide-19
SLIDE 19

Types of Attacks 7 of 10

Type Definition

Web App Attack Attack the vulnerabilities and authentication of a web application layer such as invalidated redirects, cross site forgery, cross site scripting and others. Point-of-Sale

Remote attacks against the environments where card transactions are conducted.

Insider Misuse Internal or partner misuse of resources. Physical Theft & Loss Loss of information asset whereas the data is more valuable than the asset. Crimeware Use of malware followed by ramsomeware Cyber-espionage Access to state or corporate sensitive data. Denial of Service Any attack to compromise network or system availability.

*2016 Data Breach Investigation Report-Verizon

slide-20
SLIDE 20

A Cyber Attack Chain Model

Step Description

Reconnaissance & Probing Find Target Harvest information (email, conference listings, public lists, etc.) Delivery & Attack Place delivery mechanism online Use social engineering to induce target to access malware or other exploits Installation & Exploitation Exploit vulnerabilities on target systems to acquire access Elevate user privileges and install additional “tools” Compromise & Expansion Exfiltration of data Use compromised systems to exploit additional systems

slide-21
SLIDE 21

Local Broadcast TV Station

slide-22
SLIDE 22

Local Broadcast Radio Station

slide-23
SLIDE 23

Central Broadcast TV Hub

slide-24
SLIDE 24

Model for Hardened Station

DAM Extra/Intra Net Traditional IT (ERP, HR, Programming, Research) File Ingest Enterprise Network Public Web Sites Internet NRCS

Internal Firewall

Station Playout STL or WAN to Hub General Users Traffic Scheduling Editing Graphics

slide-25
SLIDE 25

FCC CSRIC IV Working Group 4

  • FCC CSRIC IV Working Group 4 Report on

Cybersecurity for the Telecommunication Industry

  • https://transition.fcc.gov/pshs/advisory/csric4/CSRIC_IV_WG4_Final_Rep
  • rt_031815.pdf
  • Roadmap for Telecommunication Industry
  • Encourage Voluntary Action
  • The Communications Security, Reliability and Interoperability Council IV Working Group 4 March 2015
slide-26
SLIDE 26
  • Segment Analysis

– Broadcasting – Cable – Wireless – Wireline – Satellite

FCC CSRIC IV Working Group 4

slide-27
SLIDE 27

FCC CSRIC IV Working Group 4

  • Feeder Segments

– Cyber Ecosystem and Dependencies – Top Threats and Vectors – Framework Requirements and Barriers – Small and Medium Business – Measurements

slide-28
SLIDE 28

FCC CSRIC IV Working Group 4

  • Small/Medium Business

– Identifies what an SMB needs to protect, who has responsibility for a given task, and how an SMB can protect its critical infrastructure. – Use cases from various segments. – Identifies highest priority NIST Cybersecurity Framework subcategories for SMBs.

slide-29
SLIDE 29

NIST Cybersecurity Framework

  • Framework Core
  • Framework Tiers
  • Framework Profiles
  • Link
  • http://www.nist.gov/cyberframework/upload

/cybersecurity-framework-021214.pdf

slide-30
SLIDE 30

NIST Cybersecurity Framework

  • Framework Core

– Each item designed for desired outcome – Function – Category – Sub-category – Informative Reference

slide-31
SLIDE 31

Framework Core Functions

  • Identify
  • Protect
  • Detect
  • Respond
  • Recover
slide-32
SLIDE 32

*Framework for Improving Critical Infrastructure Cybersecurity NIST-2014

slide-33
SLIDE 33

*Framework for Improving Critical Infrastructure Cybersecurity NIST-2014

slide-34
SLIDE 34

Identify

  • Asset Management
  • Business Environment
  • Governance
  • Risk Assessment
  • Risk Management

Strategy

slide-35
SLIDE 35

Protect

  • Access Control
  • Awareness and Training
  • Data Security
  • Maintenance
  • Protective Technology
  • Information Protection Processes/Procedures
slide-36
SLIDE 36

Detect

  • Anomalies & Events
  • Detection Processes
  • Security Monitoring
  • SIEM
slide-37
SLIDE 37

Respond

  • Response

Planning

  • Communications
  • Analysis
  • Mitigation
  • Improvements
slide-38
SLIDE 38

Recover

  • Recovery Planning • Improvements • Communications
slide-39
SLIDE 39

Framework Tiers

  • Tier 1-Partial
  • Tier 2-Risk Informed
  • Tier 3-Repeatable
  • Tier 4-Adaptive
slide-40
SLIDE 40

Tier 1-Partial

  • Lack of formal process
  • Lack of awareness
  • Unable to collaborate outside of organization
slide-41
SLIDE 41

Tier 2-Risk Informed

  • Formal process may

exist within parts of the organization

  • Some awareness but

not organization wide

  • May understand role

but not formalized

slide-42
SLIDE 42

Tier 3-Repeatable

  • Formal process has

become policy

  • Organization wide

approach

  • Understands

dependencies

slide-43
SLIDE 43

Tier 4-Adaptive

  • Continuous improvement
  • Organization wide and has

become part of the culture

  • Has become a great

partner outside the

  • rganization
slide-44
SLIDE 44

Cyber Risk Management

  • Executive
  • Business Process
  • Operations/Implementation
slide-45
SLIDE 45

Executive

  • Successful Implementation

– Required support at the highest level – Buy-in from all stake holders – Continuous improvement – Governance

slide-46
SLIDE 46

Business Process

  • Process to include

– Risk Planning – Recovery Planning – Communication & Training

slide-47
SLIDE 47

Operations/Implementation

  • Operations and Engineering

– Asset Management – Change Management – Incident Management – Respond & Recover

slide-48
SLIDE 48

Steps to Establish a Cybersecurity Program

  • Prioritize & Orient
  • Create Current Profile
  • Perform Risk Assessment
  • Create Target Profile
  • Perform Gap Analysis
  • Create Action Plan
slide-49
SLIDE 49

Prioritize & Orient

  • Prioritize

– Determine the scope of systems and assets that support the business.

  • Orient

– Identifies assets, regulatory requirements, and overall risk approach.

slide-50
SLIDE 50

Create Current Profile

  • Create Curent Profile

– Current categories/sub-categories – e.g. Asset Management, User Control

slide-51
SLIDE 51

Perform Risk Assessment

  • Guided by Risk Management Process
  • Analyze current environment
  • Use pertinent and emerging data
slide-52
SLIDE 52

Create Target Profile

  • Create Target Profile

– Desired categories and sub-categories – e.g. Security policy, monitoring service – Customer and stakeholder requirements

slide-53
SLIDE 53

Analyze & Prioritize Gaps

  • Perform Gap Analysis
  • Differences between

current profile and target profile

  • e.g. Lack of

Governance, Process, Monitoring

slide-54
SLIDE 54

Action Plan/Execute

  • Create Action Plan
  • Cost analysis
  • Execute
  • Repeat
slide-55
SLIDE 55

Organizational Changes

  • Governance
  • Communication
  • Culture
  • Response
slide-56
SLIDE 56

Conclusion

  • Cybersecurity is:

– A Change of mindset & culture – Supported at the highest level in organization – Everyone’s responsibility – Doable through use of process & technology – Ongoing