Insider Threat Programs:
How To Get Started
IMPACT 2015
Phil Robinson
How To Get Started IMPACT 2015 Phil Robinson 2 Video removed due - - PowerPoint PPT Presentation
Insider Threat Programs: How To Get Started IMPACT 2015 Phil Robinson 2 Video removed due to size constraints 3 Theme Insider Threat is NOT ONLY about protecting data on your network Risk: Tolerance/Avoidance/Acceptance
Phil Robinson
2
Insider Threat is NOT ONLY about protecting data on your network… Risk: Tolerance/Avoidance/Acceptance Company culture and willingness to adjust Understand your business environment Needs vs. wants vs. dollars Advancement of your program – total assets protection
3
When issued NISPOM Conforming Change 2 will require cleared industry to implement insider threat program Industry has six-months to implement upon issuance of the NISPOM Conforming Change 2 The NISPOM will outline minimum standards that include;
Establish and maintain an insider threat program Designate insider threat senior official Gather, integrate, and report Conduct self-assessments of insider threat program Insider threat training Monitoring network activity User acknowledgements Classified Banners
4 Source: DSS
Ask yourself a host of questions:
Why have an Insider Threat Program? What does Insider Threat mean to your company? What’s the stated goal? What are the objectives? Are you prepared to drive the message? Do you have needed resources? Do you have an SME on your team? Do you have a network to bounce ideas off?
5
Do you have support?
Senior Leadership Potential Stakeholders Business
What’s your company’s tolerance / culture?
Size Scope Acceptance “Insider Threat” the right phraseology
6
Assess your data – determine what needs to be protected under this umbrella Perform a risk analysis of your data Understand what you are protecting
7
8 Source: CERT
Definition DoD: Acts of commission or omission by an insider who intentionally or unintentionally compromises or potentially compromises DoD’s ability to accomplish its
espionage, unauthorized disclosure of information, and any other activity resulting in the loss or degradation
[focus: protection of national security information]
9 Source: DSS
An Insider Threat is a current or former employee, contractor,
violently negatively impacts COMPANY’S assets; computer systems, networks, people, information, processes, reputation, facilities, equipment, operations, etc. This includes any person with authorized access to United States Government resources; personnel, facilities, information, equipment, networks, or systems while a representative of the company.
[focus: protection of the company; extended to clients]
10
Formal Insider Threat Team with assigned analysts and SMEs Defined insider threat response plan Integrated information sharing and data collection including technical and behavioral indicators Focused across current and former employees, contractors, subcontractors, supply chain, and
Ad-hoc group called together to handle events and incidents or incident handled by response processes and personnel Use existing incident response plan or no response plan User monitoring via host and network based analysis only Focused on current and former employees
11 Source: CERT
Robust GOLD plated
Formal Insider Threat Team with assigned analysts and SMEs Defined insider threat response plan Integrated information sharing and data collection including technical and behavioral indicators Focused across current and former employees, contractors, subcontractors, supply chain, and other trusted business partners
Ad-hoc group called together to handle events and incidents or incident handled by response processes and personnel Use existing incident response plan or no response plan User monitoring via host and network based analysis only Focused on current and former employees
12 Source: CERT
13
3
Source: ASIS D&C ITWG
review historical insider threat incidents
for ITP articulated
executive buy-in for program charter
and components
and advocacy among core stakeholders (Convergence)
General Council and HR develop corporate ITP policy
comprehensive plan and timelines
Group (ITWG)
positions and modify position descriptions based on criticality
ITP metrics/ measures developed
dashboard designed
comprehensive education plan
company-wide policies are approved and published
launched and is
Audit procedures initiated
procedures
Risk Management (ESRM) processes initiated to identify assets, threats and vulnerabilities
and ITP metrics into an analytical structure
requirements for core elements: Operations, Analytics, Collaboration, and Education
EVALUATION FORMULATION INITIATION
I M P L E M E N T A T I O N
procedures are written to support the development and operation of all ITP elements
counterintelligen ce controls and measures
education plan modified to incorporate ITP requirements
technologies for monitoring and analytics
incident response requirements
improvement requirements incorporated
plan is reviewed and approved as appropriate
collaboration plan for external relationships
14 Source: ASIS D&C ITWG
15 Source: INSA
16
Insider Threat Program
HR Security Legal IT/SOC Business Exec Sponsor
17
Insider Threat is NOT ONLY about protecting data on your network… Risk: Tolerance/Avoidance/Acceptance Company culture and willingness to adjust Needs vs. wants vs. dollars
18
Understand your company’s dynamics
Cultural acceptance of a program
Naming convention sensitivities [Insider Threat] Who/what org leads investigative activities today?
Is security / risk a focus area supported by management? What could be managements expectations? Do you have the clout to “carry the message”? How does a program benefit your company?
Identify, understand, and outline the need
Contractual & Regulatory Compliancy's
NISPOM Conforming Change #2 (TBA – EOM July 15 >) DFAR FAR DD254 Contractual Source Documentation
19
Know if you have Proprietary Information Where your government information is housed
Classified Sensitive Technology
Do elements of a program already exist?
Fraud Counterintelligence (NISP) Physical Security Information Systems Security Ethics hot line Etc…
Leverage client driven requirements
20
Frame the conversation to your benefit Guide opinions and direct your team Acceptance and tolerance of others’ opinions Guard against your AAA Security Practitioner stubbornness (my way or hi-way attitude) Learn how to compromise Does the end state concur with your goal?
21
Build a Communication Plan
Design your message so that it carries on its merits Level set message to particular audiences / individuals Know what you communicate
Who you communicate with Understand their tolerance for the discussion
Work the halls of the company
Start to message your intentions with stakeholder departments Insert verbiage in your traditional security awareness materials
22
Interject Insider Threat into the business
“Bang for the Buck” approach Market the Idea
Work relationships
Senior Executive staff Business Leaders Department Heads - (to be stakeholders) Functional Managers
Seek guidance and advice of industry and government colleagues
23
24
Don’t approach this project as a high school project – it is your doctoral thesis
“There’s no force in the universe that makes things
thinking, let things happen and be the ball. --Ty Web
Tools:
What tools do you have in place today? IT Monitoring Systems?
People:
What skill sets does your team posses? Do you need an expert?
Processes:
Policies and procedures? Event escalation?
25
Demonstrate the need for a program
Identify risks and threats Regulatory compliance
Company culture Identify a Senior Executive Sponsor Sway leadership & CFO to set aside funds
Software purchases Additional personnel (dedicated to the program) Space and supplies Assessments
Stakeholders commitment, time, and inputs Analyze what people, processes and tools are presently in place and how to maximize their use in the program
26
Stakeholder group playing nice Company internal pressures / stressors Recurring meetings Educate the stakeholder group
Behavioral traits Characteristics Statistical data Compare and contrast Offer case examples Outside experts External training sessions
27
Recognition as the Company’s SME Stay ahead of perceptions
Control the message Get the ear of the exec sponsor Avoid “rabbit hole” and “what if” scenarios Keep the group focused
Training
FSO and security staff Company leadership Stakeholders Management / supervisor focused Employees / partners
28
29
30
Investigations
Assign the right people Properly trained Knowing limitations of the investigative team
Fusion analysis
Culture Stove pipe mentality (my bucket) Legalities (privacy)
CONUS OCONUS (by country)
31
Will alleviate and diffuse many challenges
32
You’ll need these to get started
Definition of a program Board Members as Champions A senior leader as the program’s sponsor Dedicated program manager A solid program framework A signed program charter Approvals
Hiring of personnel if needed A budget line dedicated to the program
When company leadership and other managers repeat your words verbatim at Board meetings and the like
33
Insider Threat Focus Areas
Financials Shared Services Legal Information Technology Training Physical Security Human Resources
34
35
Physical Security
Facility Accesses Visitors Odd Hours Sensitive Areas
36
Financials
Accounts Payable Accounts Receivable Fraud Embezzlement
37
Shared Services
Payroll Timesheets Credit Card
38
Legal
Sensitive Investigations Contractual Improprieties Ethics Allegations of Wrong Doing
39
Human Resources
On-Boarding
Off-Boarding
Job Performance Termination Behavioral Issues
40
Information Technology
Telecommunications
Non-Company email
Drop Box
Personal Devices Social Media Networks Financial
Proposal
Compartmented
External Internal Development
Classified
Privileged
41
Financial Business Continuity and Resiliency Reputation and Ethics Human Capital Information Legal: Regulation/Compliance and Liability New or Emerging Markets for Business Physical Premises Intellectual Property and Products National Industrial Security Program Compliance
42
HR
SME Inputs
(as needed)
Industrial Security IT Security Business Owners Legal Cyber (SOC)
43
44
Risk Steering Committee
Chief Security Officer Vice Chairperson Chief Information Security Officer BU Management Representation Human Resources Legal Ad-Hoc Invitee as Needed Chief Operating Officer Chairperson
Comprises the Risk Steering Committee
Board
Government Security Committee
45 Counterintelligence Industrial Security Information/Cyber Security (CISO)
Training & Awareness Audit & Compliance Physical Security FOCI NISP Compliance Focused Risk Mitigated Approach
Office of Security and Risk
Emergency/Crisis Management Response Team
Chief Security Officer Chief Operating Officer President
46
47
48
49
50
51
Cygnus Advisory Group, LLC (CAG) Global Skills X-change (GSX) Carnegie Mellon CERT INSA ASIS DoD and DSS Multiple open source documentation
52
53
Phil Robinson 703.227.7412 Philr.cygnusag@gmail.com
54