Homework: Send Alex a private message asking what section of - - PowerPoint PPT Presentation

homework
SMART_READER_LITE
LIVE PREVIEW

Homework: Send Alex a private message asking what section of - - PowerPoint PPT Presentation

Homework: Send Alex a private message asking what section of HiTrust to look at 1 pa page resp sponse onse about out a HiTrus ust Objec ecti tive Su Submit mit PDF F to home mewor ork k eng ngine HiTrus ust PDF


slide-1
SLIDE 1

Homework:

■ Send Alex a private message asking what section of HiTrust to look at – 1 pa page resp sponse

  • nse about
  • ut a HiTrus

ust Objec ecti tive – Su Submit mit PDF F to home mewor

  • rk

k eng ngine – HiTrus ust PDF on n home mework eng ngine e + ■ Submit your UPDATED resume to be reviewed by SecDev by Sunday 11:59pm (October 28, 2018)

slide-2
SLIDE 2

RI RISK SK MAN MANAGE GEME MENT NT

BY ALE LEXAND NDER ER BITAR

slide-3
SLIDE 3

Who I Am

■ B.S.

  • S. Bus

usine ness ss Admini inist stra rati tion

  • n – Spring

ing 2017 – Concentration: MIS – IS & T Auditor Internship – Sodexo – 2017 ■ Master er of Scien ence ce in MIS – Spring ng 2019 – Security Development Track – Certificate in Information Assurance – TA for MGS 351 – Information Risk Assurance Internship - Blue Cross Blue Shield of WNY – 2018 – President of ISACA Student Group UB

slide-4
SLIDE 4

What is ri risk sk?

slide-5
SLIDE 5

Is Skydiving risky?

slide-6
SLIDE 6

Skydiving Statistics

Year Skydiving Fatalities in U.S. Estimated Annual Jumps Fatalities Per 1,000 Jumps 2017 24 3.2 million 0.0075 2016 21 3.2 million 0.0065 2015 21 3.5 million 0.0061 2014 24 3.2 million 0.0075

slide-7
SLIDE 7

Agenda

■ What is risk? ■ What do we do with Risks? – Personally – An organization

slide-8
SLIDE 8

Risk

■ The pot poten entia ial l of losin ing g something of value. ■ Informati rmation

  • n sec

ecurit urity y ris isks – are risks as they apply to data assets.

slide-9
SLIDE 9

Risk Management

■ Information Security Policies ■ Organization of Information Security ■ Human Resources Security ■ Asset Management ■ Access Control ■ Encryption ■ Physical and Environmental Security ■ Operations Security

■ Communications Security ■ System Acquisition, Development, and Maintenance ■ Supplier Relationships ■ Information Security Incident Management ■ Information Security Aspects of Business Continuity Management ■ Compliance ■ Career and Workforce Development ■ Security Awareness

slide-10
SLIDE 10

Risks are not only external or technical..

■ Financial ■ Vendor Driven ■ Accidental ■ Internal ■ Civil ■ Legal ■ Natural Disasters or Environmental

slide-11
SLIDE 11

Impact x Likelihood

■ Impa mpact ct - If a threat were to materialize, how could it affect our business? ■ Likel eliho hood d –what is the probability of a threat materializing? ■ Risk = Likel eliho ihood

  • d X Impa

mpact ct – Likelihood - chanc nce of a risk event occurring – Impact - Fina nanc ncial ial impact of the risk event

slide-12
SLIDE 12

What Do We Do With Risk?

■ Take the risk ■ Avoid the risk ■ Accept the risk ■ Ignore the risk ■ Transfer the risk ■ Exploit the risk

slide-13
SLIDE 13
slide-14
SLIDE 14

How do we measure risk?

■ Threat eat Agents ents- Malicious hacker, Employees, Other Organizations, etc. ■ Threats eats – something that can cause harm to an organization. Can be internal or External – DDOS Attack – Snow storm ■ Owners ers- People within the organization that are responsible for an asset or process – Director of Payroll ■ Asset ets – anything of value to an organization – Web Servers – Payroll Applications ■ Count nter er Measure sures – Any controls that are put in place to reduce the threat – MFA – Privileged Access Management process

slide-15
SLIDE 15

What should we do about risk?

■ Coun unter r Measures res – Any contr ntrols s that are put in place to reduce the threat – MFA – Privileged Access Management process ■ Contr ntrols

  • ls – Put in place to mitig

igat ate risk

slide-16
SLIDE 16

Driving a car

■ What risk do we deal with when driving a car? ■ How to deal with those risks? – What controls are in place to mitigate those risks?

slide-17
SLIDE 17

Case Study: University at Buffalo

■ Your team (4 people) have been hired by SUNY UB to implement a security framework for various compliance. ■ First things first, you will need to setup a risk management plan. ■ SUNY UB is a large organization, one of the largest university of the SUNY

  • system. ~30,000 Students; ~6,000 Employees, ~2,500 Faculty, ~$716M Budget,

~12 Schools, ~40 Departments. ■ Let’s discuss

slide-18
SLIDE 18

Planning

■ Scope & boundary – What are we working within? ■ Resources – What resources do we have at our disposal? – 1 vs 100 ■ Criteria – What constitutes a risk to the organization? Is it being measured consistently? ■ Policy – Do we have policy in place? ■ Enforcement – Who will enforce this? ■ Information Classification and Handling – Do we know what we need to protect?

slide-19
SLIDE 19
slide-20
SLIDE 20

Assets

Invent entor

  • ry

Own wnership hip Ac Accep cepta tabl ble Use Imp mpact ct to the busine usiness ss

Physical Access Network User Software Hardware Operational Procedural and Policy Information and Data

slide-21
SLIDE 21

5 Min – Brainstorm what assets UB has + uses

  • Quick list of 4-6 assets

with your group

slide-22
SLIDE 22

Mini Case-Study

Active Directory (User Management) Students’ Computers Exchange (Email) Wifi File Servers UBLearns Print Servers Research Assets VoIP System Hypervisor (Virtualization) Network (Switches & Routers) Classrooms Workstations Software Server Rooms Sensitive Data/Information Offices UBHub

slide-23
SLIDE 23

Mini Case-Study

Asset Asset Invent ntor

  • ry

y & Us & Use UBHub

  • Students’ PII, Grades, Schedule
  • Employee Info
  • Databases & ODBC
  • Multiple Privilege & Regular Users

Exchange (Email)

  • PII?, Privacy, Grades?
  • Conversations - Personal & Business
  • Research
  • Multiple Privilege & Regular Users

Server Rooms

  • Hypervisor (Virtual Machines)
  • Network Equipment
  • Users with Physical Access
  • Data & Info
slide-24
SLIDE 24

Threats

■ Internal ernal to our organization

  • Budget loss for needed projects
  • Systems growing overly complex
  • System failures
  • Staff turnover
  • Insider threats
  • Politics/Agendas

■ Ex Externa ernal to our organization

  • Regulatory
  • Legal
  • Environmental / Weather related
  • Utility related
  • Natural disasters
  • Economic
  • Geo-political
  • Civil unrest
  • Cybersecurity events
slide-25
SLIDE 25

Vulnerabilities

■ Similar to Threats, But within our control ■ Weaknesses or gap ■ Not just techn hnical cal controls ■ Usually specific ■ What t is the e Likel eliho ihood

  • d of exploi

loita tati tion

  • n?

■ How w can it be exploit loited ed?

slide-26
SLIDE 26

5 min – Brainstorm what threats and vulnerabilities the assets maybe affected by

slide-27
SLIDE 27

Threats and Vulnerabilities

Asset et Asset et Invent ntor

  • ry & Use

Thre reats ats Vulnera erabiliti ties UBHub

  • Students’ PII, Grades, Schedule
  • Employee Info
  • Databases & ODBC
  • Multiple Privilege & Regular Users
  • Failure
  • Insider Threats
  • Overly Complex
  • Regulations and

Legal Exchang ange (Email)

  • PII, Privacy, Grades
  • Conversations - Personal & Business
  • Research
  • Multiple Privilege & Regular Users
  • Regulations and

Legal

  • System Failure
  • Complexity
  • Staff Turnover
  • Insider Threats
  • Misconfigured, Patching

behind

  • Too much access
  • Lack of knowledge
  • Stored PII

Server r Ro Rooms

  • Hypervisor (Virtual Machines)
  • Network Equipment
  • Physical Access Needed
  • Data & Info
  • Natural Disasters
  • Utilities
  • Civil Unrest
  • Staff Turnover
  • Budgets, $$$$
  • Physical Access
  • Location
  • Older HVAC
  • Older equipment
  • No Documentation
slide-28
SLIDE 28

Risk Identification & Risk Analysis

■ Follow consistent criteria and measurements ■ Prioritize and plan (risk treatment) ■ Risk Register & Matrix ■ Impact ■ Likelihood ■ Security Frameworks

slide-29
SLIDE 29

5 min – What is the impact and likelihood

  • f each threat/vulnerabilities?

■ Qualitative - Impact + Likelihood ■ Quantitative – Using #’s

slide-30
SLIDE 30

Qualatative Risk Assesment

Asset Threat ats Vulnerab erabil iliti ties es Impa mpact ct Likelihood ihood Risk UBHub Hub

  • Failure
  • Insider Threats
  • Overly Complex
  • Regulations and

Legal

  • Too much access
  • No Documentation
  • Misconfigured
  • Lack of Knowledge

Medium Low Medium um Exch chan ange ge (Email) il)

  • Regulations and

Legal

  • System Failure
  • Complexity
  • Staff Turnover
  • Insider Threats
  • Misconfigured, Patching

behind

  • Too much access
  • Lack of knowledge
  • Stored PII

Medium Low Medium um Server er Rooms

  • ms
  • Natural Disasters
  • Utilities
  • Civil Unrest
  • Staff Turnover
  • Budgets, $$$$
  • Physical Access
  • Location
  • Older HVAC
  • Older equipment
  • No Documentation

High Medium High

slide-31
SLIDE 31

Quantitative Assessment

Asset et Thre reats ats Vulnera erabiliti ties Imp mpact ct Likeli elihoo hood Risk sk UBHub

  • Failure
  • Insider Threats
  • Overly Complex
  • Regulations and

Legal

  • Too much access
  • No Documentation
  • Misconfigured
  • Lack of Knowledge

$1.5M 3 $4.5M Exchange (Email)

  • Regulations and

Legal

  • System Failure
  • Complexity
  • Staff Turnover
  • Insider Threats
  • Misconfigured, Patching

behind

  • Too much access
  • Lack of knowledge
  • Stored PII

$1M 2 $2M Server Rooms

  • Natural Disasters
  • Utilities
  • Civil Unrest
  • Staff Turnover
  • Budgets, $$$$
  • Physical Access
  • Location
  • Older HVAC
  • Older equipment
  • No Documentation

$3M 6 $18M

slide-32
SLIDE 32

Risk Response

Avoid Mitigate Transfer/Share Accept

slide-33
SLIDE 33

Mini Case-Study

Asset et Vulnera erabiliti ties Risk sk POA&M or Risk sk Treatme tment nt UBHub

  • Too much access
  • No Documentation
  • Misconfigured
  • Lack of Knowledge

Medium

  • Restriction of Users (Least

Privilege Principle)

  • Documentation
  • Within a year

Exchange (Email)

  • Misconfigured, Patching

behind

  • Too much access
  • Lack of knowledge
  • Stored PII

Medium

  • Restriction of Users (Least

Privilege Principle)

  • Documentation
  • Encryption
  • With two years

Server Rooms

  • Physical Access
  • Location
  • Older HVAC
  • Older equipment
  • No Documentation

High

  • Replacement of HVAC and

equipment

  • Documentation
  • Access Control - Card System
  • With 6 months
slide-34
SLIDE 34

Mini Case-Study

Asset Vul ulne nerabiliti rabilities es Risk sk POA&M &M or Risk sk Treatme atment nt UBHub

  • Too much access

Medium

  • Restriction of Users

(Least Privilege Principle)

  • Within a year
  • No Documentation
  • Lack of Knowledge

Medium

  • Documentation
  • Encryption
  • With two years
  • Misconfigured

High

  • Reconfiguration and

Documentation with screenshots

  • Contact Consultants
  • Within 6 months
slide-35
SLIDE 35

Monitoring Risk

  • Yearly reviews/audits
  • Change in policies
  • New risk assessment criterias
  • Change in criminal landscape
  • Risk Dashboards
  • E-GRC

Governance

Risk

Compliance

slide-36
SLIDE 36

5 min – How can we check that our plan is working?

  • Brainstorm how we can check that our

controls work on an annual basis

slide-37
SLIDE 37

Mini Case-Study

Asset Vulnerab erabil iliti ties es Risk POA&M or Risk sk Treatme tment nt Yearly y Check eck

UBHub

  • Too much

access Medium

  • Restriction of Users

(Least Privilege Principle)

  • Within a year
  • No changes
  • ccurred, Possible

DATO needed

  • No

Documentation

  • Lack of

Knowledge Medium

  • Documentation
  • Encryption
  • With two years
  • Encryption is in

testing environment

  • Misconfigured

High

  • Reconfiguration and

Documentation with screenshots

  • Contact Consultants
  • Within 6 months
  • Configured properly,

Risk Mitigated

slide-38
SLIDE 38

10 min break

slide-39
SLIDE 39

Information and Data | Handling and Classification

  • At Rest
  • In Transit
  • Disposal
  • Hard Copy
  • Electrical Format
  • Storage Media
  • Public
  • Internal
  • Departmental
  • Confidential/Sensitive
  • Highly Restricted
  • Need

d to Know

  • Le

Least ast Pri rivi vilege ege

slide-40
SLIDE 40

Regulations And Industry Standards

■ What regulations affect our

  • rganization?

■ HIPAA ■ FERPA ■ FISMA ■ State Laws – NY DFS ■ International Laws - GDPR ■ What Industry Standards affect our

  • rganization?

■ PCI – DSS

slide-41
SLIDE 41

Security Frameworks

■ COBIT ■ ISO 27000 Series – 27001 ■ NIST SP 800 Series – NIST 800-53 ■ HiTrust CSF (Current version is 9.1) – Health Care

slide-42
SLIDE 42

What do organizations do with frameworks?

■ Frameworks tell organizations what controls should be in place ■ Standards + Regulations affect the organization – Frameworks pr prescribe escribe controls to “Treat eat” those Industry Standards + Regulations

slide-43
SLIDE 43

Controls

■ Recomm commen ende ded d by Risk management ■ As Assu sured red by Internal Audit

Securit ity y Operat atio ions ns IT Risk k Manageme agement nt IT Audit it Interna ernal Audit

slide-44
SLIDE 44

Risk Management - Summarized

  • Planning!

Scope, Boundaries

  • Asset Management
  • Threat Identification
  • Vulnerability Identification

Auditing and Reviews

  • Risk Assessment

Asset Risk Level

Threat Risks

Vulnerability Risks

  • Risk Treatment or Risk Response
  • Monitoring
  • Security Framework
  • Compliance
  • Info Handling and Classifications
  • Compliance
  • Security Frameworks
  • Planning
  • Asset Management
  • Threat Identification
  • Risk Assessment
  • Vulnerability Identifications
  • Risk Treatment & Governance
  • Monitoring
  • https://www.nist.gov/cyberframework
slide-45
SLIDE 45

Demo HiTrust 6.0 – Current Version is 9.1

  • Level 1 vs Level 2 vs Level 3
  • Control Specification
  • Regulatory Factors
  • Implementation
slide-46
SLIDE 46

References

■ https://uspa.org/Find/FAQs/Safety