Raising Cybersecurity Awareness at a Small Agency, What Works for - - PowerPoint PPT Presentation

raising cybersecurity awareness at a small agency what
SMART_READER_LITE
LIVE PREVIEW

Raising Cybersecurity Awareness at a Small Agency, What Works for - - PowerPoint PPT Presentation

Raising Cybersecurity Awareness at a Small Agency, What Works for Me, Will it Work for You??? Ralph Mosios Federal Housing Finance Agency Chief Information Security Officer March 16, 2016 AGENDA Who is FHFA? The FHFA Security Awareness


slide-1
SLIDE 1

Ralph Mosios

Federal Housing Finance Agency

Chief Information Security Officer

March 16, 2016

Raising Cybersecurity Awareness at a Small Agency, What Works for Me, Will it Work for You???

slide-2
SLIDE 2

AGENDA

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 2

  • Who is FHFA?
  • The FHFA Security Awareness Program – Circa 2011
  • Transition to the Human Firewall Campaign
  • Cybersecurity Newsletters
  • The Threat Landscape
  • The Social Engineering Experiment
  • Social Engineering Results
  • How You Can Be Vigilant
  • Final Thoughts…
slide-3
SLIDE 3

WHO IS THE FEDERAL HOUSING FINANCE AGENCY?

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 3

  • On July 30, 2008, the Housing and Economic Recovery Act of

2008 (HERA) was enacted, creating FHFA with the combined responsibilities of the Office of Federal Housing Enterprise Oversight, the Federal Housing Finance Board and the HUD Government-Sponsored Enterprises mission team. HERA also provided FHFA with additional authority to regulate Fannie Mae, Freddie Mac and the 12 Federal Home Loan Banks.

  • These government-sponsored enterprises provide more than

$5.7 trillion in funding for the U.S. mortgage markets and financial institutions.

slide-4
SLIDE 4

FHFA DEMOGRAPHICS

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 4

  • 548 Federal Employees
  • 56% Male/44% Female
  • Average Age is 48
  • 88.7% of employees have a bachelor

’s degree or higher (59% have advanced degrees).

  • FHFA has the second highest percent of

advanced degrees.

slide-5
SLIDE 5

THE FHFA SECURITY AWARENESS PROGRAM – CIRCA 2011

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 5

  • New users received general awareness training

during employee indoctrination.

  • 90% of employees received annual security

training.

ØComputer-based training was conducted.

  • Users required to re-sign annual rules of

behavior.

  • No real indication of how effective the program

was.

slide-6
SLIDE 6

TRANSITION TO THE HUMAN FIREWALL

CAMPAIGN

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 6

  • Distributed monthly cybersecurity newsbytes

ØNon-technical, user friendly articles designed primarily for home use.

  • Enhanced Security Intranet site by posting

useful links:

Ø Fighting Identity Theft - Federal Trade Commission's Consumer Protection Division Ø Consumer and Internet Safety - Federal Trade Commission's Consumer Protection Division

  • Educated users to report suspicious email /

behavior to the FHFA Help Desk.

slide-7
SLIDE 7

CYBERSECURITY NEWSLETTERS

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 7

slide-8
SLIDE 8

THE THREAT LANDSCAPE

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 8

  • Sony - Five unreleased movies, an estimated 38 million files of

corporate information, and personal information of employees and stars.

  • Anthem – 78.8 million records exposed containing customer

and employee names, birth dates, Social Security numbers, addresses, email addresses and member IDs.

  • Snapchat – Payroll department was targeted by someone

impersonating their CEO who asked for employee payroll information.

  • Spear phishing attacks continues to be the biggest threat to

federal agencies.

Ø 91% of cyberattacks begin with spear phishing email 1

Note: 1 Email: Most Favored APT Attach Bait, Trend Micro Research Paper 2012.

slide-9
SLIDE 9

THE SOCIAL ENGINEERING EXPERIMENT

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 9

  • Security conducted three social engineering

tests in three years.

  • Phishing emails were sent from outside the

FHFA network notifying users to change their passwords and announcing a new Performance Management System.

  • USB devices were left on different floors with

sample salary data.

  • A fake Website was set up to track results.
slide-10
SLIDE 10

THE EMAIL - 2014!!!!

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 10

slide-11
SLIDE 11

THE EMAIL - 2015!!!!

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 11

slide-12
SLIDE 12

SOCIAL ENGINEERING RESULTS

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 12

2012:

  • 23 out of 34 users clicked on the embedded link (68%).
  • 32% of the users who received this email either deleted it, ignored

it, reported it to the Help Desk, or sent emails to IT Security. 2014:

  • 53 out of 668 users clicked the embedded link (7.9%).
  • 92.1% of the users who received this email either deleted it, ignored

it, reported it to the Help Desk, or sent emails to IT Security. 2015:

  • 26 out of 679 users clicked the embedded link (3.8%).
  • 96.2% of the users who received this email either deleted it, ignored

it, reported it to the Help Desk, or sent emails to IT Security.

slide-13
SLIDE 13

SOCIAL ENGINEERING RESULTS BY YEAR

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 13

68.0% 7.9% 3.8% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 2012 2014 2015 Success Rate (clicked the link)

slide-14
SLIDE 14

HOW CAN YOU BE VIGILANT

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 14

How to identify potential email phishing attempts:

  • Outlook Warning Messages: Outlook will flag suspicious
  • messages. This warning message is a strong indicator of a

suspicious message, but is not guaranteed to catch every malicious email.

  • Examine the “From” and “To” Address
  • Examine Hyperlinks
slide-15
SLIDE 15

FINAL THOUGHTS …

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 15

  • End users are your first line of defense so leverage

them.

Ø Have them report suspicious activity to the appropriate office.

  • Your training approach may require a cultural

change.

  • Know your audience and tailor your program for

your end users.

Ø Baby Boomers (1946-1964) vs. Gen X (1965-1979) vs. Millennials (Gen Y; 1980 – 2000) vs. Gen Z (post 2000)

  • Raise awareness by using different training

techniques.

slide-16
SLIDE 16

FINAL THOUGHTS (CONT)…

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 16

  • Take small steps when necessary.
  • Measure your training effectiveness.
  • Be proactive and look for different training

techniques and mechanisms.

  • Invest in your cybersecurity training program, it’s a cost-

effective way to protect your network.

slide-17
SLIDE 17

QUESTIONS?????

R A I S I N G C Y B E R S E C U R I T Y A W A R E N E S S 17

Ralph Mosios e-mail: ralph.mosios@fhfa.gov (202) 649-3680