+ All Categories
Home > Documents > Presented by: Peter S. Browne Principal Manager Peter Browne & Associates, LLC

Presented by: Peter S. Browne Principal Manager Peter Browne & Associates, LLC

Date post: 21-Jan-2016
Category:
Upload: zach
View: 45 times
Download: 0 times
Share this document with a friend
Description:
ABA WEBCAST BRIEFING. Foundations of Information Security. Presented by: Peter S. Browne Principal Manager Peter Browne & Associates, LLC. Projected B2B eCommerce Growth. 2004 Predictions. Gartner 7.3 Trillion. Forrester 6.3 Trillion. Goldman 3.2 Trillion. emarketer 2.8 Trillion. - PowerPoint PPT Presentation
Popular Tags:
43
Presented by: Presented by: Peter S. Browne Peter S. Browne Principal Manager Principal Manager Peter Browne & Associates, LLC Peter Browne & Associates, LLC ABA WEBCAST BRIEFING Foundations of Information Security
Transcript
Page 1: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Presented by:Presented by:

Peter S. Browne Peter S. Browne Principal ManagerPrincipal Manager

Peter Browne & Associates, LLCPeter Browne & Associates, LLC

ABA WEBCAST BRIEFING

Foundations of Information Security

Page 2: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Projected B2B eCommerce Growth

$0

$1,000

$2,000

$3,000

$4,000

$5,000

$6,000

$7,000

$8,000

2001 2002 2003 2004

In B

illi

on

s

GartnerGartner7.3 Trillion7.3 Trillion

OvumOvum1.4 Trillion1.4 Trillion

ForresterForrester6.3 Trillion6.3 Trillion

Goldman3.2 Trillion3.2 Trillion

emarketeremarketer2.8 Trillion2.8 Trillion

2004 Predictions2004 Predictions

Page 3: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Internet Users Worldwide

1438

6997

132170

228

320

0

50

100

150

200

250

300

350

1995 1996 1997 1998 1999 2000 2001 2002

(Millions)

Source: IDC

Page 4: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Risk Management In Perspective - Drivers

New Technologies– Web presence– Online transactions– Delivery of professional services via the Internet

New Risks– Cyber-extortion– Network security breaches– Litigation– Loss of “intangible” information

Dependence on third party service providers

Page 5: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

The Problem 85% of Companies report at least one Computer

Security Breaches last year 90% report Vandalism attacks 78% report Denial of Service attacks 64% Acknowledged financial losses due to these

attacks Average loss: $2,000,000

– Melissa = $80 million total– Denial of Service (Mafia Boy) = $1.2 billion– Love Bug - $10 billion

Statistical data provided by CSI/FBI 2001 report

Page 6: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

The Computer Attack Risks

Loss or damage to Data Legal Liability to Others Loss or damage to Reputation Loss of Market capitalization and resulting

Shareholder lawsuits

Page 7: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Foundations

Managing risk includes the following components:– Accept – Mitigate – Transfer a portion of the risk to an insurance

underwriter

Page 8: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Electronic Commerce: A Paradigm ShiftTraditional Commerce Centralized systems

in glass house Economy of scale Managed risk Security says NO

Electronic Commerce Distributed systems

everywhere Economy of

dispersion Distributed risk Security is an

enabler

Page 9: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Business Drivers for Security

The effect of the Internet on banking and financial services

Movement from information “silos” to information integration

Holistic view of risk management Increasing global regulatory oversight

– Effect of GLBA

– Increasingly proactive regulatory agencies and audits

More pervasive and complex technologies

Page 10: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

The Four Foundations of Protection

People– Board and management commitment, dedicated technical

personnel, crisis management team all in place and active!

Process– Enterprise ISO7799 ready, on-going management, employee

education and regular training, patch management.

Technology– Monitoring/log review, DMZ zones, firewall, anti-virus

software, intrusion detection systems, remote access two factor authentication, audit trails.

Page 11: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

11

Security should be at the table whenever the technology or the

business strategy changes, whether the technology is managed in-house

or it is outsourced to third parties

The Overriding Objective

Page 12: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

People Success Factors

1. Set up the right organization

Page 13: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Organizational Placement of IT Security Report separately from IT (Audit, Security,

Legal, Finance) Report directly to CIO/Head of Technology Report into CTO/Operations Part time function Split function

Page 14: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Roles and Responsibilities

Set policy/standards/guidance Act as internal consultant Perform system/security operations Provide oversight over outsourced/third

party technology providers Conduct/manage assessments and audits

Page 15: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Ownership

What to centralize:– Policy, standards, guidance– Test and validation of security– Cross-enterprise coordination– System-wide administration

What to decentralize:– Accountability – Risk acceptance– User access administration

Page 16: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

People Success Factors

1. Set up the right organization

2. Get good people and train them adequately

Page 17: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Security Must Add Value

Facilitate, don’t obfuscate Be a perpetual student Provide solutions to business needs Communicate, communicate, communicate Be an agent of change Focus on operational excellence Treat risk as part of the business equation Clearly articulate what is expected

Page 18: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

What Is the Scope?

Make security enterprise-wide… and coordinated with all business units

Focus early in the product/software life cycle Enlist allies:

– Business units

– Legal

– Operations

– Risk management

Earn your budget!

Page 19: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Preach Security Awareness

Educated management Understand risk

– To the enterprise– To the given business– To the individual

Application of security standards– In the software development life cycle– In the management of platforms

Page 20: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

People Success Factors

1. Set up the right organization

2. Get the good people and train them adequately

3. Get management commitment

Page 21: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Articulate Risk in Business Terms Value of the asset Probability of a loss Likely cost over time

Pro

bab

ility

of

Occ

urr

ence

Value of Fraud0

Page 22: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Control Analogy: ATM versus Internet

Known and limited number of customer entry points

Two-factor authentication required (card plus PIN)

Camera recording all activity

Limited amount of cash available for withdrawal

Full audit trail of all activity

Physical limits to bulk fraud

Customer cannot stop an initiated transaction

Settlement and problem resolution processes in place

Customer has receipt to verify transaction

Internet

No

No

No

Maybe

Maybe

No

No

Maybe

Maybe

ATM

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Page 23: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Management Involvement

Top-level steering committee Task force Advisory board Reporting key performance indicators Reporting incidents Compliance checking

Page 24: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Process Success Factors

1. Put policy and standards in place

Page 25: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Assess current security state

Update policies

Develop and document"baseline" security standard

Translate standards intosecurity guidelines

Implement guidelineson systems

Ensure compliance with standards

Security Life Cycle Steps

Page 26: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Policy Standards Guidelines Procedures Practice

Top-level Policy

Broad statement of intent Sets the expectations for compliance Must acknowledge individual accountability Culture-dependent Must cover appropriate use Must be enforced

Page 27: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Policy Standards Guidelines Procedures Practice

Standards

Describe what to do, not how to do it Explain the application of policy Cover all elements of information security Use existing models (I4 & ISF) Provide the cornerstone for compliance

Page 28: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Policy Standards Guidelines Procedures Practice

Guidelines

Tell how to meet standards Are platform- or technology-specific Provide examples and configuration

recommendations Must be kept up to date

Page 29: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Process Success Factors1. Put policy and standards in place

2. Build a robust program

Page 30: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Desired State of Security Desired state of security: The level of security controls

needs to correspond to the value/sensitivity of the underlying information asset: “risk-based”

Security must:– Be incorporated into the development process

– Be part of the overall architecture

– Be part of the project management and implementation process

– Be part of system administrators’ and network planners’ job function

– Keep current with technologies because they evolve rapidly. What worked yesterday may not be valuable today (digital certificates, application proxy firewalls, biometrics, IDS)

Page 31: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Process Success Factors1. Put policy and standards in place

2. Build a robust program

3. Track metrics for accountability

Page 32: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Platform Compliance

Page 33: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Security Awareness

Security Awareness Survey Results

02468

10

Jan

Feb

Mar Ap

r

May Jun Jul

Aug

Sep

Oct

Nov

Dec

Month

Ave

rage

Sco

re

on S

cale

of 1

- 10

Score Goal

Page 34: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Operational Statistics

Page 35: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Technology Success Factors

1. Protect the perimeter

Page 36: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Perimeter Control

Firewall technology in place to protect Concept of a DMZ Intrusion Detection

– Network based– Host based

Standardized system configuration

Page 37: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Hosts(system

of record)

MiddlewareCall Center

Internet Web Servers

Kiosks

Home Phone

PFM

ATM Nets

Tandem

PFMNetwork

VendorsVRU

Bank Systems Vendors

AOL

Third Party

Middleware

Page 38: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Technology Success Factors

1. Protect the perimeter

2. Provide consistent security services

Page 39: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Consistent Security Services

Remote access authentication and authorization– Remote dial in access– Internet access– Business to business links

System management– Lockdown of access– File protection– Security patches

Page 40: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Technology Success Factors

1. Protect the perimeter

2. Provide consistent security services

3. Capture audit data

Page 41: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Audit Trails

What to capture– All access to systems– All intrusion attempts– Financial transactions– Access to sensitive data

Uses– Digital forensics– Monitoring of security– Improving performance

Page 42: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

Information Security as the Foundation for Electronic Commerce

The people are the critical components, but they must be supported by management and trained

The process starts with the policy, and concludes with implementation

The technology must be put in place to manage and enforce security

Management commitment is not difficult… if Metrics: If you can’t measure it, you can’t control it Information security bridges the business and the

technology

Page 43: Presented by: Peter S. Browne  Principal Manager Peter Browne & Associates, LLC

The FutureIn the future, there’ll be just two kinds of banks —the ones on the Internet

and the ones who never saw it coming.


Recommended