Infusing Risk Management into Cybersecurity Education - - PowerPoint PPT Presentation

infusing risk management into cybersecurity education
SMART_READER_LITE
LIVE PREVIEW

Infusing Risk Management into Cybersecurity Education - - PowerPoint PPT Presentation

Infusing Risk Management into Cybersecurity Education Barbara.Fox@gatech.edu Georgia Tech Research Institute 1 Fear Uncertainty Doubt 2 Mid-career Leaders, Decision Makers Cybersecurity is an overwhelming sea. The more I learn,


slide-1
SLIDE 1

Infusing Risk Management into Cybersecurity Education

Barbara.Fox@gatech.edu Georgia Tech Research Institute

1

slide-2
SLIDE 2

Fear Uncertainty Doubt

2

slide-3
SLIDE 3

Mid-career Leaders, Decision Makers

  • Cybersecurity is an
  • verwhelming sea.
  • The more I learn, the less

equipped I feel.

  • I don't know where to begin.

3

slide-4
SLIDE 4

Opportunity-Driven Student

  • Are their efforts more toward improving

company cybersecurity posture or promoting their own careers?

4

slide-5
SLIDE 5

Message from software, hardware, and education suppliers: You are inadequate

You can't protect properly unless you buy more hardware You need to upgrade to the expensive premier version of

  • ur software to truly protect

your organization. You need another certification. You don't have enough expertise, so you need to buy

  • ur services.

You have the wrong product. You don't have enough skilled personnel. You are doing an insufficient job unless you have eliminated all risk.

5

slide-6
SLIDE 6

Risk is the potential of a threat to cause a negative impact. Risk is measured by the likelihood of the event and the severity of the impact.

6

slide-7
SLIDE 7

What risk are we most concerned about?

Likelihood = Probability

Highly Unlikely Nearly Certain Probable Likely Unlikely Catastrophic Critical Minor Moderate

Likelihood Impact

7

Low Moderate High High Low Moderate Moderate High Low Moderate Moderate Moderate Low Low Moderate Moderate Low Low Low Low

slide-8
SLIDE 8

Goal is to manage risk, not eliminate it Avoid

eliminate the cause

Accept

reward is worth the risk, but have a contingency plan

8

slide-9
SLIDE 9

Goal is to manage risk, not eliminate it Avoid

eliminate the cause

Mitigate

reduce probability or impact

Accept

reward is worth the risk, but have a contingency plan

Transfer

transfer risk to a third party

9

slide-10
SLIDE 10

Risk Assessment - Qualitative

10 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10

Cybersecurity Risk

Impact (Cost in real $ or low/mod/high) Likelihood H/W Failure Obsolete Applications High Low Mod Nationstate Cyber Attack

Module 1.5 Cyber Risk Assessment Process

slide-11
SLIDE 11

How do we do this in education? Avoid

eliminate the cause

Mitigate

reduce probability or impact

Accept

reward is worth the risk, but have a contingency plan

Transfer

transfer risk to a third party

11

Community College

  • Focus on defensive skills (IT, networking, defend, protect, recover) more

than offensive skills (pentesting)

Professional Education

  • Leverage non-cyber mid-level professional SMEs, affirming their

perspective on what is important and what is most at risk

Undergraduate

  • First program – sanitize input, check boundary conditions; Higher quality

coding is more valuable than the number of languages; Cybersecurity principles used in all tech projects

Graduate

  • Communicate to decision makers in language related to risk, not

technology

Community Outreach

  • Focus on highest risk actions already in their control – email vigilence,

not re-using passwords, changing default passwords on IoT devices

Your Own Organization

  • Each department makes at least one suggestion quarterly to improve

cybersecurity risk; Monthly awareness vs. once-per-year compliance

slide-12
SLIDE 12

Decision Makers

12

You are the Expert.

  • Assess your risks with the help of subject matter experts
  • Identify low-impact/low-likelihood risks and accept them according to

your risk tolerance

  • Identify high-impact and high-likelihood risks and determine whether to

avoid, mitigate or transfer risks

  • Cyber risk is a part of all conversations – include it in a finance class, a

human resources class, a leadership class The solution is to spend more money. Message 1

Cybersecure Message Naive Message

slide-13
SLIDE 13

Software Engineers, Programmers

13

Code securely.

  • Validate and sanitize inputs
  • Adhere to principle of least privilege
  • Modular design
  • Testing is built into design and implementation

Learn more languages.

Naive Message Cybersecure Message

slide-14
SLIDE 14

Information Technology

14

Build cybersecurity strategies around principles, not tools.

  • Use critical thinking skills to analyze, assess, and make decisions.
  • Hardware and software purchases should be driven from business needs

not market influences. Focus on the "next big thing." Message 1

Cybersecure Message

  • Segregate networks
  • Separation of duties
  • Strong authentication
  • Inventory
  • Patch management
  • Assess vulnerabilities
  • Defense-in-depth
  • Least privilege
  • Trust then verify
  • Change management

Naive Message

slide-15
SLIDE 15

All Technical Positions

15

Communicate the risks and the mitigations in terminology that can be understood by the target audience.

  • Use case studies to demonstrate the risk
  • Talk about the cost of a breach instead of number of records stolen.
  • Build a cooperative culture not "us vs. them". It is truly not about compliance

but about risk to your job security and your bank account. Obfuscate by using insider words like obfuscation. Message 1

Cybersecure Message Naive Message

slide-16
SLIDE 16

Identify Protect Detect Respond Recover

Business Environment Governance Risk Assessment Risk Management Strategy Access Control Awareness & Training Data Security

Information Protection Processes & Procedures

Maintenance Anomalies & Events Security & Continuous Monitoring Detection Processes Response Planning Communications Analysis Mitigation Improvements Recovery Planning Improvements

NIST Cybersecurity Framework (CSF)

16

https://www.nist.gov/cyberframework

slide-17
SLIDE 17

1 2 3 4 5

CIS Top 20 Controls

CIS - Center for Internet Security

Secure Configurations for Hardware and Software Continuous Vulnerability Assessment and Remediation Controlled Use of Administrative Privileges ...

These Top 5 provide an effective defense against approximately 85% of cyber attacks.

Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software

17

https://learn.cisecurity.org/first-five-controls-download

slide-18
SLIDE 18

NIST NICE Guidebook: Cybersecurity is Everyone’s Job

  • Oriented toward non-

cyber professionals

18

https://www.nist.gov/sites/default/files/documents/2018/10/15/cybersecurity_is_everyones_job_v1.0.pdf

slide-19
SLIDE 19

Cybersecurity Risk Management All In. All Win.