Top Banner
Finding and Protecting Your Organization’s Crown Jewels Doug Landoll , CEO Lantego
24

Finding and Protecting Your Organizations Crown Jewels

Jan 22, 2018

Download

Business

Doug Landoll
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Finding and Protecting Your Organizations Crown Jewels

Finding and Protecting Your

Organization’s Crown Jewels

Doug Landoll , CEO Lantego

Page 2: Finding and Protecting Your Organizations Crown Jewels

Background

2

• 25+ Years Experience in Information Security• Led Professional Service Organizations for

Several Large Consultancies• Assessed and Built Information Security

Programs for Federal Agencies, State Agencies, Universities, Hospitals, Major Retailers, and Internet Companies.

• Prepared over 2000+ students for security certifications

• Developed RIOT Data Gathering Method for Risk Assessment

• Revised Security Policy Development Approaches

Page 3: Finding and Protecting Your Organizations Crown Jewels

Background

3

Work Smarter – Not Harder

Page 4: Finding and Protecting Your Organizations Crown Jewels

Overview

Threat Update

Response - Spot Solutions

Crown Jewels Approach

Summary and Discussion

4

Page 5: Finding and Protecting Your Organizations Crown Jewels

Threat Update

…Target Review

Page 6: Finding and Protecting Your Organizations Crown Jewels

Information Security Breaches 2013-2015

6Symantec Internet Security Threat Report, April 2016

Page 7: Finding and Protecting Your Organizations Crown Jewels

Information Security Breaches 2013-2015

7Symantec Internet Security Threat Report, April 2016

Page 8: Finding and Protecting Your Organizations Crown Jewels

Overview

Threat Update

Response - Spot Solutions

Crown Jewels Approach

Summary and Discussion

8

Page 9: Finding and Protecting Your Organizations Crown Jewels

Information Security Breach Response

Detection Initial Assessment

Triage Escalation

Analysis

Recovery

Post-Incident

9Parsons ProprietaryITAR CM.01.2014

Many Breaches Go Undiscovered / Unreported

Detecting intrusions and breaches64% - percentage of organizations that took greater than 90 days to detect a breach243 days – median number of days that attackers were present on a victim network before detection86% of breaches were reported by an external party (U.S. Justice Dept notified Target)

Page 10: Finding and Protecting Your Organizations Crown Jewels

Information Security Breach Response

Detection

AnalysisImpact Analysis

Response Activities

Initial Recovery

Recovery

Post-Incident

10Parsons ProprietaryITAR CM.01.2014

Incident Response Mistakes:- Under-scoping incident- Improperly staffed response- Legal Missteps

Page 11: Finding and Protecting Your Organizations Crown Jewels

Information Security Breach Response

Detection

Analysis

Recovery Impact Mitigation

Eradication Recovery

Post-Incident

11Parsons ProprietaryITAR CM.01.2014

Incident Recovery Mistakes:- Communication Errors- Incomplete Mitigation / Eradication

Page 12: Finding and Protecting Your Organizations Crown Jewels

Information Security Breach Response

Detection

Analysis

Recovery

Post-Incident

Root Cause Analysis

Incident Costing

Prevention Activities

12Parsons ProprietaryITAR CM.01.2014

Post-Incident Response Mistakes:- Lack / Improper Root Cause Analysis- Incomplete Costing (e.g., operational, fines)- Effective Prevention

Page 13: Finding and Protecting Your Organizations Crown Jewels

Typical Responses

Spot Solutions –

• Security Awareness

• System Hardening / Patching

• Access Control

• Network / System Monitoring

• Vulnerability Scanning / Penetration Testing

• Secure Development

• Email Filtering

• Boundary Defense

13Parsons ProprietaryITAR CM.01.2014

Page 14: Finding and Protecting Your Organizations Crown Jewels

Overview

Threat Update

Response - Spot Solutions

Crown Jewels Approach

Summary and Discussion

14

Page 15: Finding and Protecting Your Organizations Crown Jewels

Crown Jewel Approach

15Parsons ProprietaryITAR CM.01.2014

Threats Impact

Most Critical Data & Systems

All System Threats+ Unique threats+ Targeted attacks

Catastrophic Impact• upon system loss• upon data loss

Page 16: Finding and Protecting Your Organizations Crown Jewels

Crown Jewels

16Parsons ProprietaryITAR CM.01.2014

Volume Impact

Most Critical Data & Systems

For most organizations –0.01% - 2.0% of total sensitive data

Represents up to 70% of sensitive data value

Source: U.S. President’s 2006 Economic Report to Congress

Page 17: Finding and Protecting Your Organizations Crown Jewels

Crown Jewels Project

17ITAR CM.01.2014

Define For Each Business Unit:

Identify Critical Systems

Define Critical Data

Discover For Each Crown Jewel:

Identify Lifecycle,

Environment, and Flows

Identify System & Environment

Controls

Baseline For Each Crown Jewel:

Identify Requirements

Assess Control Effectiveness

Analyze Identify Control Gaps

Identify Security Risk

Prioritize Security Gaps

Secure Create Security Solution Sets

Deploy SolutionsMonitor Solutions

Page 18: Finding and Protecting Your Organizations Crown Jewels

Crown Jewels Project

18ITAR CM.01.2014

Define

Discover

Baseline

Analyze

Secure

Application Risk Survey

Responses & Scoring

Required Controls

Controls Assessment

Risk Analysis

Solutions Development

Key Project Artifacts – Largely aided by automation (surveys, tools)

Page 19: Finding and Protecting Your Organizations Crown Jewels

Crown Jewels Project Results

19Parsons Proprietary

Identification of Corporate “Crown Jewels”

Determination of Crown Jewel Risk

Limitation of Assessment to Most Impactful Elements

Creation of Security Controls Plan with Most Significant Risk Reduction

Less Work – More Results

Page 20: Finding and Protecting Your Organizations Crown Jewels

Overview

Threat Update

Response - Spot Solutions

Crown Jewels Approach

Summary and Discussion

20

Page 21: Finding and Protecting Your Organizations Crown Jewels

Applying Crown Jewel Lessons

21Parsons ProprietaryITAR CM.01.2014

Define

Discover

Baseline

Analyze

Secure

Next Week

• Identify Organization’s Security Assessment Plan

• Self vs. Third Party

• Frequency

• Rigor / Technique (tests vs. assessments)

• Determine Adequacy of Plan

Page 22: Finding and Protecting Your Organizations Crown Jewels

Applying Crown Jewel Lessons

22Parsons ProprietaryITAR CM.01.2014

Define

Discover

Baseline

Analyze

Secure

Within 1 Month

• Identify and Review Contractual and Legal Security Requirements

• Review Latest Security Assessment Reports

• Identify Business Process Owners

Within 3 Months

• Conduct Crown Jewels Project

• Apply Lessons Learned

Page 23: Finding and Protecting Your Organizations Crown Jewels

Thank You

Contacts Doug Landoll, CEO Lantego

• (512) 633-8405

[email protected]

Slides

• Slideshare

23Parsons ProprietaryITAR CM.01.2014

Page 24: Finding and Protecting Your Organizations Crown Jewels

Project Challenges

24Parsons ProprietaryITAR CM.01.2014

Define

Discover

Baseline

Analyze

Secure

1. Common Organizational Definition of “Crown Jewels”

2. Identification of Business Processes

3. Identification of Business / Systems Owners

4. Identifying a Business Champion