Infusing Risk Management into Cybersecurity Education
Barbara.Fox@gatech.edu Georgia Tech Research Institute
1
Infusing Risk Management into Cybersecurity Education - - PowerPoint PPT Presentation
Infusing Risk Management into Cybersecurity Education Barbara.Fox@gatech.edu Georgia Tech Research Institute 1 Fear Uncertainty Doubt 2 Mid-career Leaders, Decision Makers Cybersecurity is an overwhelming sea. The more I learn,
Barbara.Fox@gatech.edu Georgia Tech Research Institute
1
2
equipped I feel.
3
company cybersecurity posture or promoting their own careers?
4
You can't protect properly unless you buy more hardware You need to upgrade to the expensive premier version of
your organization. You need another certification. You don't have enough expertise, so you need to buy
You have the wrong product. You don't have enough skilled personnel. You are doing an insufficient job unless you have eliminated all risk.
5
6
Likelihood = Probability
Highly Unlikely Nearly Certain Probable Likely Unlikely Catastrophic Critical Minor Moderate
Likelihood Impact
7
Low Moderate High High Low Moderate Moderate High Low Moderate Moderate Moderate Low Low Moderate Moderate Low Low Low Low
eliminate the cause
reward is worth the risk, but have a contingency plan
8
eliminate the cause
reduce probability or impact
reward is worth the risk, but have a contingency plan
transfer risk to a third party
9
10 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10
Cybersecurity Risk
Impact (Cost in real $ or low/mod/high) Likelihood H/W Failure Obsolete Applications High Low Mod Nationstate Cyber Attack
Module 1.5 Cyber Risk Assessment Process
eliminate the cause
reduce probability or impact
reward is worth the risk, but have a contingency plan
transfer risk to a third party
11
Community College
than offensive skills (pentesting)
Professional Education
perspective on what is important and what is most at risk
Undergraduate
coding is more valuable than the number of languages; Cybersecurity principles used in all tech projects
Graduate
technology
Community Outreach
not re-using passwords, changing default passwords on IoT devices
Your Own Organization
cybersecurity risk; Monthly awareness vs. once-per-year compliance
12
You are the Expert.
your risk tolerance
avoid, mitigate or transfer risks
human resources class, a leadership class The solution is to spend more money. Message 1
Cybersecure Message Naive Message
13
Code securely.
Learn more languages.
Naive Message Cybersecure Message
14
Build cybersecurity strategies around principles, not tools.
not market influences. Focus on the "next big thing." Message 1
Cybersecure Message
Naive Message
15
Communicate the risks and the mitigations in terminology that can be understood by the target audience.
but about risk to your job security and your bank account. Obfuscate by using insider words like obfuscation. Message 1
Cybersecure Message Naive Message
Identify Protect Detect Respond Recover
Business Environment Governance Risk Assessment Risk Management Strategy Access Control Awareness & Training Data Security
Information Protection Processes & Procedures
Maintenance Anomalies & Events Security & Continuous Monitoring Detection Processes Response Planning Communications Analysis Mitigation Improvements Recovery Planning Improvements
16
https://www.nist.gov/cyberframework
1 2 3 4 5
CIS - Center for Internet Security
Secure Configurations for Hardware and Software Continuous Vulnerability Assessment and Remediation Controlled Use of Administrative Privileges ...
These Top 5 provide an effective defense against approximately 85% of cyber attacks.
Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software
17
https://learn.cisecurity.org/first-five-controls-download
cyber professionals
18
https://www.nist.gov/sites/default/files/documents/2018/10/15/cybersecurity_is_everyones_job_v1.0.pdf