Sharing Act of 2015: Joel Benge Risk Evangelist Emergent Network - - PowerPoint PPT Presentation

sharing act of 2015
SMART_READER_LITE
LIVE PREVIEW

Sharing Act of 2015: Joel Benge Risk Evangelist Emergent Network - - PowerPoint PPT Presentation

The U.S. Cybersecurity Information Sharing Act of 2015: Joel Benge Risk Evangelist Emergent Network Defense joel@ENDsecurity.com Points to cover Overview History, Provisions, Challenges Implementation Application to reality


slide-1
SLIDE 1

The U.S. Cybersecurity Information Sharing Act of 2015:

Joel Benge – “Risk Evangelist” Emergent Network Defense joel@ENDsecurity.com

slide-2
SLIDE 2

Points to cover

Overview

History, Provisions, Challenges

Implementation

Application to reality

Momentum

Where do we go from here?

slide-3
SLIDE 3

Joel Benge

“Who is this guy?”

Storytelling and Communications Digital and Impact Perspective Cybersecurity Awareness and Reporting Executive Communications & Risk Quantification Entertainment, Communications, & Education Network Operations & Incident Response Homeland Security 2009-2015 Emergent Network Defense 2015-Today

About Emergent:

  • Digital Risk Management
  • CEO, Founder – Dr. Earl Crane, National Security Staff, DHS, CMU
slide-4
SLIDE 4

Overview

Major Features and Provisions

Voluntary sharing by procedures provides companies with: Antitrust Exemption, Non-Waiver of Privilege, Proprietary Information protections, FOIA Exemption, No Regulation or Enforcement Actions due to information shared.

Remove information “not directly related to a cybersecurity threat” that the company “knows” at the time of sharing to be “personal information of a specific individual or information that identifies a specific individual.”

“information necessary… to describe or identify a cybersecurity threat or vulnerability.” & “detects, prevents, or mitigates a known or suspected cyber security threat or vulnerability.” A company is authorized to “monitor” and “operate defensive measures” on its own information system—or, with written authorization, another party’s system—for cybersecurity purposes.

Incentives Personal Data Protection Cyber Threat Indicators and Defensive Measures Monitor and Defend

HISTORY

U.S. Cybersecurity Information Sharing Act of 2015

slide-5
SLIDE 5

With whom is data shared?

HISTORY

Department of Defense Office of the Director of National Intelligence Department of Commerce Department of Energy Department of Justice Department of Treasury Homeland Security

“Appropriate Federal Agencies”

slide-6
SLIDE 6

DHS AIS Personal Information Scrub

  • Companies are required to

remove any information “not directly related to a cybersecurity threat” that they know at the time of sharing to be “personal information of a specific individual or information that identifies a specific individual.”

  • Certain fields are scanned for

pattern matching and held for human review while the rest of the indicator is sent to appropriate federal agencies.

  • If the fields in question are

found to not hold personal information or are pertinent to the indicator, they are released to the agencies after redaction. If the field is not relevant to the threat, the field is deleted. Companies Submit CTI or DM data to DHS via AIS Specific fields tagged and held for human review by DHS Only CTI or DM relevant data passed to partners IMPLEMENT

IP Address: 192.168.1.1 Account: Jason Bourne Threat: APT28 IOC: ABCDEFG Email Content: Hi, Jason. Your package has been delivered! IP Address: 192.168.1.1 Account: XXXXXXXXXXX Threat: APT28 IOC: ABCDEFG Email Content: Hi, Jason. Your package has been delivered! IP Address: 192.168.1.1 Account: XXXXXXXXXXX Threat: APT28 IOC: ABCDEFG Email Content: Hi, XXXXXX. Your package has been delivered!

slide-7
SLIDE 7

IMPLEMENT

DHS Implementation

Companies may share CTI and DM with the US-CERT via email and web form. Or use the DHS Automated Information Sharing (AIS) Network

slide-8
SLIDE 8

40

February/March 2016 DHS releases guidance and launches AIS As of September 2016 DHS reports 40 Private & 10 Federal Agencies on AIS (1 contributing) As of March 2017 DHS reports 201 non-Federal entities on AIS April 2017 Adoption expected to grow as more industries mature

201

MOMENTUM

Adoption and Momentum

slide-9
SLIDE 9

Reaction so far

“These indicators of compromise are like

  • breadcrumbs. It is only when you aggregate

them in the context that you see what the meal is.”

  • Intel

“…not as effective as it could be, but based on where we were five years ago, they certainly have made a lot more progress in a short amount of time”

  • HITRUST Alliance

“… the private and public sectors [are] empowered to safely share more information about cyber threats and work together to jointly defend against attacks.

  • Rapid7

Too much data to be useful: “Data management, scale, and algorithmic strengths may give Facebook an advantage in threat intelligence sharing.”

  • (Opinion) Network World

MOMENTUM

slide-10
SLIDE 10

Difficult to say… The level of detail is too discrete/tactical without context. CTIs have short shelf lives. Risk of personal data leakage Data is Local Risk is Global.

So, is it working?

MOMENTUM

slide-11
SLIDE 11

So, what would work?

An open, abstracted, and modular way to talk about, measure, and share risk.

slide-12
SLIDE 12

Reputation & Legal Leak Operational Data Phishing

UE Ph OpD Conf Rep

Actors Vulnerabilities Targets Consequences Impacts

Metrics

  • Twitter Chatter
  • “Risky Day” calendar
  • Blacklisted Traffic

Metrics

  • Increased DLP alerts
  • Asset exposure alerts

Untrusted External Project Impact

Compare to historical incidents of this type or calibrated estimation.

Assign to Risk

categories based on business unit and type of consequence. Multiple impacts possible.

Legal

calendar “clickiness” no data self-reporting spam filters

Share Changes in Risk Posture, Not the Data

(normalized metrics)

Example Scenario: A malicious actor takes advantage of a vulnerability in phishing defense capability that results in data leak of operational data that has a HIGH Service Delivery Impact.

slide-13
SLIDE 13

Indicator Sharing

Decontextualized facts and numbers

64.53.232.100 204.100.5.31

slide-14
SLIDE 14

A System for Shared Risk

Using Common Scenario Ontology

Example Scenario: A malicious actor takes advantage of a vulnerability in phishing defense capability that results in data leak of operational data that has a HIGH Service Delivery Impact.

UE Ph OpD Conf UE Ph OpD Conf UE Ph OpD Conf ?

slide-15
SLIDE 15

Impacts Consequences Targets Vulnerabilities Actors

Sharing Nervousness in the Risk Space

slide-16
SLIDE 16

Emergence and Swarm

Big impact from small changes. Finding context in uncertainty. Finding Context in Uncertainty!

Nervous Data

Actor Vuln Target

slide-17
SLIDE 17

SEE AROUND THE CORNER

Joel Benge – “Risk Evangelist” Emergent Network Defense joel@ENDsecurity.com

Thank You!

slide-18
SLIDE 18

Finding Risk in the Data

  • Emergent Algorithms: to measure small

changes for big impacts

  • Swarming Artificial Intelligence: using

biomimicry to find high-risk scenarios