HI MSS Cyb e rse c urity Co mmunity Spo nso r
1
HI MSS Cyb e rse c urity Co mmunity Spo nso r 1 Se c urity F unda - - PowerPoint PPT Presentation
HI MSS Cyb e rse c urity Co mmunity Spo nso r 1 Se c urity F unda me nta ls b a se d o n the NI ST Cyb e rse c urity F ra me wo rk 01.23.2020 Speaker I ntr oduction Ric k Spatafor e CPHI MS, GI SP, GCI H, HCI SPP Ma na g e r,
HI MSS Cyb e rse c urity Co mmunity Spo nso r
1
b a se d o n the NI ST Cyb e rse c urity F ra me wo rk
01.23.2020
Ric k Spatafor e
CPHI MS, GI SP, GCI H, HCI SPP Ma na g e r, Adviso ry Se rvic e s with Se ntine l T e c hno lo g ie s 15 ye a rs He a lthc a re I T 15 ye a rs c yb e rse c urity & c o mplia nc e 25 ye a rs in te c hno lo g y
3
4
5
6
Atta c ks a re o n the rise (2017, 2018, 2019)
Ra nso mwa re will c o ntinue AI wa s o ne o f the to p pre dic tio ns fo r 2019
is a g a in a to p pre dic tio n fo r 2020
Clo ud mig ra tio n will inc re a se se c urity risk Clo ud se c urity is no t ma ture
7
Capabilities Resources Threats
Re c onnaissanc e – r e se ar c h, ide ntify and se le c t tar ge ts c ommon use of we b site s, soc ial me dia, e ve nt listings, por t sc ans We aponization – pair ing ac c e ss to malwar e with de live r able payload (e .g. Adobe PDF , Mic r
ile s) De live r y – tr ansmission of we apon to tar ge t (e .g. via e mail, attac hme nts, we bsite s, USB or
physic al me dia E xploitation – Onc e de live r e d, the we apon’s c ode is tr igge r e d e xploiting vulne r able applic ations or syste ms Installation – Onc e de live r e d the we apon’s c ode is tr igge r e d, e xploiting vulne r able applic ations or syste ms Command & Contr
ve r c ommunic ate s with the we apons pr
ge t’s ne twor k Ac tions on Obje c tive s – Attac ke r wor ks to ac hie ve the obje c tive of the intr usion – e xfiltr ation, data de str uc tion, or intr usion of anothe r tar ge t
8
9
Asse t Ma na g e me nt Busine ss E nviro nme nt Go ve rna nc e Risk Asse ssme nt Risk Ma na g e me nt Supply Cha in Risk Ma na g e me nt Id e ntity Ma na g e me nt Ac c e ss Co ntro l Awa re ne ss & T ra ining Da ta Se c urity Pro c e ss & Pro c e d ure s Ma inte na nc e Pro te c tive T e c hno lo g y Ano ma lie s a nd E ve nts Se c urity Co ntinuo us Mo nito ring De te c tio n Pro c e ss Re spo nse Pla nning Co mmunic a tio ns Ana lysis Mitig a tio n Impro ve me nts Re c o ve ry Pla nning Impro ve me nts Co mmunic a tio ns
IDE NT IF Y RE SPOND RE COVE R PROT E CT DE T E CT
10
ID.AM-1 ID.AM-2 ID.AM-3 ID.AM-2: Software platforms and applications within the organization are inventoried ID.AM-3: Organizational communication and data flows are mapped ID.AM-1: Physical devices and systems within the organization are inventoried
Identify
Asset Management
11
12
PR.AC-1 PR.AC-4 PR.AC-7 PR.AC-1: Identities and credentials are managed for authorized devices and users PR.AC-4: Access permissions are managed, incorporating the principles of least privilege and separation of duties PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks) (1.1)
Protect
Identity Management, Authentication and Access Control
Dig ita l I de ntity Guide line s E nro llme nt & I de ntity Pro o fing Authe ntic a tio n & L ife c yc le Ma na g e me nt F e de ra tio n & Asse rtio n
13
Password: x Password: Locu$t0% Passphrase: I like to vacation in Hawaii!
14
15
PR.IP-1 PR.IP-2 PR.IP-12 PR.PT-3 PR.IP-1: A baseline configuration of information technology/industrial control systems is created and maintained (e.g. concept of least functionality) PR.IP-2: A System Development Life Cycle to manage systems is implemented PR.IP-12: A vulnerability management plan is developed and implemented PR.PT-3: The principle of least functionality is incorporated by configuring systems to provide only essential capabilities (1.1) Information Protection, Processes & Procedures
16
PR.IP-12 DE.CM-8
Protect
DE.CM-8: Vulnerability scans are performed PR.IP-12: A vulnerability management plan is developed and implemented
Detect
Information Protection, Processes & Procedures Security Continuous Monitoring
17
C o n ta c t In fo rm a tio n : Ric k Spa ta fore Ma na g e r, Advisory Se rvic e s Se ntine l T e c hnolog ie s Offic e : 630.786.8062 rspa ta fore @se ntine l.c om
18