SlideShare une entreprise Scribd logo
1  sur  14
The New Era of Incident
Response Planning
Are you protecting the business or simply securing the
enterprise?
Agenda:
• Introduction
• BOD Concerns
• Business Risk and the Consequences
• Actionable Planning
• External Reporting Obligations
• Cyber Insurance
• Q&A
3
Dell - Internal Use - Confidential
Classification: //SecureWorks/Confidential - Limited External Distribution:
Introduction
• 20+ year IT career as a systems programmer, IT consultant, technical manager & IT sales
• 30 + years as a Marine Corps reservist obtaining the rank of Lieutenant Colonel
– Post 9/11 ~4 years active duty as an Information Warfare Officer working at the US Strategic
Command, the Pentagon, and the National Security Agency (NSA)
– Five years with US Cyber Command
• Managed the Information Security Operations / Threat & Vulnerability Management for a Fortune 100
Corporation:
– International Staff
– security patch remediation, vulnerability scans & remediation, penetration testing, system
configuration monitoring & remediation, maintaining the various Computer Incident Response
Plans (CIRP), and an active threat portfolio for key business functions, users,
applications/platforms and persistent vulnerabilities
• Board of Directors of the San Francisco Bay Area / Silicon Valley chapter of the FBI’s Infragard program
• BS in Computer Science, an MBA, and a CISSP
4
Dell - Internal Use - Confidential
Classification: //SecureWorks/Confidential - Limited External Distribution:
Introduction
5
Dell - Internal Use - Confidential
Classification: //SecureWorks/Confidential - Limited External Distribution:
Risk = a Vulnerability that is exploited by a Threat, which manifests into a Consequence
It’s All About Business Risk
• Up until you are breached, the standards of due care are still fairly nebulous
• Once you have a breach, the expectations of your organization are clearly defined and backed
by numerous regulators eager to show their constituencies that they mean business, this is a
major concern for your board of directors
While most organizations have
threat and vulnerability
management programs; very few,
if any, have consequence
management programs.
However, consequences are the
focus of the board.
6
Dell - Internal Use - Confidential
Classification: //SecureWorks/Confidential - Limited External Distribution:
Taken from a real Annual Report (SEC 10-K)
Board of Director Level Concerns
• If we suffer a cyber-security event we may lose customers, lose future sales, experience
business interruption and injury to our competitive position, and incur significant liabilities, any
of which would harm our business and operating results
• Disruptions in our services could damage our customers’ businesses, subject us to substantial
liability and harm our reputation and financial results
• If we lose key employees or are unable to attract and retain the employees we need, our
business and operating results will be adversely affected
• Privacy laws and concerns, evolving regulation of cloud computing, and the changes in laws,
regulations and standards related to the Internet may cause our business to suffer
• Our intellectual property protections may not provide us with a competitive advantage, and
defending our intellectual property may result in substantial expenses that harm our
operating results
7
Dell - Internal Use - Confidential
Classification: //SecureWorks/Confidential - Limited External Distribution:
Part one of the actual narrative
Understanding the Consequences
Our operations involve the storage, transmission and processing of our customers’ confidential,
proprietary and sensitive information, including in some cases personally identifiable information,
protected health information, proprietary information and credit card and other sensitive financial
information. While we have security measures in place designed to protect customer information
and prevent data loss, they may be breached as a result of third-party action, including intentional
misconduct by computer hackers, employee error, malfeasance or otherwise, and result in
someone obtaining unauthorized access to our customers’ data or our data, including our
intellectual property and other confidential business information. A security breach or
unauthorized access could result in the loss or exposure of this data, litigation, indemnity and
other contractual obligations, government fines and penalties, mitigation expenses and other
liabilities. Additionally, the cost and operational consequences of responding to breaches and
implementing remediation measures could be significant.
8
Dell - Internal Use - Confidential
Classification: //SecureWorks/Confidential - Limited External Distribution:
Part two of the actual narrative
Understanding the Consequences Cont’d
Computer malware, viruses and hacking and phishing attacks by third parties have become more
prevalent in our industry, have occurred on our systems in the past and may occur on our systems
in the future. Because techniques used to obtain unauthorized access to or sabotage systems
change frequently and generally are not recognized until successfully launched against a target,
we may be unable to anticipate these techniques or to implement adequate preventative
measures. As cyber-security threats develop and grow, it may be necessary to make significant
further investments to protect data and infrastructure. If an actual or perceived breach of our
security occurs, we could suffer severe reputational damage adversely affecting customer or
investor confidence, the market perception of the effectiveness of our security measures could
be harmed, we could lose potential sales and existing customers, our ability to deliver our
services or operate our business may be impaired, we may be subject to litigation or regulatory
investigations or orders, and we may incur significant liabilities. We do not have insurance
sufficient to compensate us for the potentially significant losses that may result from security
breaches.
9
Dell - Internal Use - Confidential
Classification: //SecureWorks/Confidential - Limited External Distribution:
New Age of Incident Response
Incident CommandThe OODA loop
• Senior Mgmt. Reporting
• Decision Making
• Battle Rhythm
• Scribe
• Task Management
• Assumption Tracking
• Third Party Coordination
Technical
Actions
Supporting
Actions• Threat ID
• Threat Intelligence
• Threat Monitoring
• Threat Mitigation
• Threat Containment
• Threat Eradication
• Forensics
• Law Enforcement Liaison
• Evidence Collection/Mgmt.
• Vulnerability Mgmt.
• Key Asset Protection
• Brand Reputation Protection
• External Obligations
• Litigation Preparation
• Business Impact Mitigation
Fog of War Friction
Center of Gravity
The Ad Hoc
Organization
during Crisis
Anticipation,
Collaboration &
Research
Requirements
Driven Execution
Maintaining the
Initiative
10
Dell - Internal Use - Confidential
Classification: //SecureWorks/Confidential - Limited External Distribution:
If your CIRP was for your daughter’s wedding – would she ever talk to you again?
Actionable Planning
• Addressing the strategic risks of the organization
• Make “your” plan an “our” plan
• Socialized / vetted by the organization
• IT focus versus ‘business’ focus
• WHO (resources) will do WHAT (requirements), HOW (playbooks/Procedures) & (Research); WHY
(aligned with Business Objectives – Consequence based)
• Defined Decision Making process to make “Business Impacting” decisions
• Vendors ready to go
• Updated quarterly
• Tested at least annually
• Mature “Lessons Learned” process
11
Dell - Internal Use - Confidential
Classification: //SecureWorks/Confidential - Limited External Distribution:
Statutory, Contractual and just being a good business partner
External Reporting Obligations
• PCI is a contractual reporting obligation
• HIPAA is a statutory reporting obligation
• Almost every State has a statutory reporting obligation
• If you connect to someone else or share data, you have a reporting obligation (TPSA)
• Public Company: Obligation to notify shareholders of a “material” event
• “Release of Public Facing Information” obligation to your company
• Customers / Data Center / Cloud(?) in Europe? Asia?
• Cyber Insurance
12
Dell - Internal Use - Confidential
Classification: //SecureWorks/Confidential - Limited External Distribution:
Would you like to be reimbursed for your efforts?
Cyber Insurance
13
Dell - Internal Use - Confidential
Classification: //SecureWorks/Confidential - Limited External Distribution:
Plugged in to your Cyber Incident Response Program (CIRP)?
Cyber Insurance
• Pre-approval of vendors
• Notification requirements
• Add the Cyber Insurance manager to the CIRT
• Do you want to call them every time?
14
Dell - Internal Use - Confidential
Classification: //SecureWorks/Confidential - Limited External Distribution:
If you remember only Three things from this presentation:
Summary
• Review your company’s Annual Report and align your Preventative,
Detective, and Corrective measures with those business risks.
• If you have Cyber Insurance, make sure it is integrated into your
CIRP. Add your cyber insurance manager to the CIRT.
• Conduct a Table Top Exercise (TTX) of one your BOD’s most
significant risks (see above). If your CIRP doesn’t tell you who to
invite – it’s not actionable and isn’t fully preparing you to protect the
business.

Contenu connexe

Tendances

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 

Tendances (20)

Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentation
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Retail Security: Closing the Threat Gap
Retail Security: Closing the Threat GapRetail Security: Closing the Threat Gap
Retail Security: Closing the Threat Gap
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&A
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Incident Response
Incident Response Incident Response
Incident Response
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 

En vedette

Dell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting PresentationDell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting Presentation
Erwin Carrow
 
Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...
Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...
Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...
Bryan Borra
 

En vedette (20)

Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
VMware 2015: Next Horizon for Cloud Networking and Security
VMware 2015: Next Horizon for Cloud Networking and SecurityVMware 2015: Next Horizon for Cloud Networking and Security
VMware 2015: Next Horizon for Cloud Networking and Security
 
Business Agility and Security with VMware
Business Agility and Security with VMwareBusiness Agility and Security with VMware
Business Agility and Security with VMware
 
My presentation to iCERT in Orlando Florida 10/26/14
My presentation to iCERT in Orlando Florida 10/26/14My presentation to iCERT in Orlando Florida 10/26/14
My presentation to iCERT in Orlando Florida 10/26/14
 
Analytics That Drive The Value Of Content
Analytics That Drive The Value Of Content  Analytics That Drive The Value Of Content
Analytics That Drive The Value Of Content
 
Dell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting PresentationDell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting Presentation
 
NoSQL, no security?
NoSQL, no security?NoSQL, no security?
NoSQL, no security?
 
Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...
Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...
Tips and tricks for MSSPs leveraging HPE Security ArcSight ESM to win proof o...
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Webinar: Data warehouse na nuvem da AWS
Webinar: Data warehouse na nuvem da AWSWebinar: Data warehouse na nuvem da AWS
Webinar: Data warehouse na nuvem da AWS
 
Network Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next LevelNetwork Security Trends for 2016: Taking Security to the Next Level
Network Security Trends for 2016: Taking Security to the Next Level
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
 
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
 
Dizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the water
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
 
MSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsMSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales Leads
 

Similaire à MT 70 The New Era of Incident Response Planning

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
Resilient Systems
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 

Similaire à MT 70 The New Era of Incident Response Planning (20)

Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
Protecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the BeefeatersProtecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the Beefeaters
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 

Plus de Dell EMC World

Plus de Dell EMC World (20)

MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC World
 
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
 
MT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussionMT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussion
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
 
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
 
MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected
 
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization planMT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
 
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
 
MT101 Dell OCIO: Delivering data and analytics in real time
MT101 Dell OCIO:  Delivering data and analytics in real timeMT101 Dell OCIO:  Delivering data and analytics in real time
MT101 Dell OCIO: Delivering data and analytics in real time
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...
 
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the CloudMT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
 
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoTMT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined DatacentreMt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
 
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
 
MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the Campus
 

MT 70 The New Era of Incident Response Planning

  • 1. The New Era of Incident Response Planning Are you protecting the business or simply securing the enterprise?
  • 2. Agenda: • Introduction • BOD Concerns • Business Risk and the Consequences • Actionable Planning • External Reporting Obligations • Cyber Insurance • Q&A
  • 3. 3 Dell - Internal Use - Confidential Classification: //SecureWorks/Confidential - Limited External Distribution: Introduction • 20+ year IT career as a systems programmer, IT consultant, technical manager & IT sales • 30 + years as a Marine Corps reservist obtaining the rank of Lieutenant Colonel – Post 9/11 ~4 years active duty as an Information Warfare Officer working at the US Strategic Command, the Pentagon, and the National Security Agency (NSA) – Five years with US Cyber Command • Managed the Information Security Operations / Threat & Vulnerability Management for a Fortune 100 Corporation: – International Staff – security patch remediation, vulnerability scans & remediation, penetration testing, system configuration monitoring & remediation, maintaining the various Computer Incident Response Plans (CIRP), and an active threat portfolio for key business functions, users, applications/platforms and persistent vulnerabilities • Board of Directors of the San Francisco Bay Area / Silicon Valley chapter of the FBI’s Infragard program • BS in Computer Science, an MBA, and a CISSP
  • 4. 4 Dell - Internal Use - Confidential Classification: //SecureWorks/Confidential - Limited External Distribution: Introduction
  • 5. 5 Dell - Internal Use - Confidential Classification: //SecureWorks/Confidential - Limited External Distribution: Risk = a Vulnerability that is exploited by a Threat, which manifests into a Consequence It’s All About Business Risk • Up until you are breached, the standards of due care are still fairly nebulous • Once you have a breach, the expectations of your organization are clearly defined and backed by numerous regulators eager to show their constituencies that they mean business, this is a major concern for your board of directors While most organizations have threat and vulnerability management programs; very few, if any, have consequence management programs. However, consequences are the focus of the board.
  • 6. 6 Dell - Internal Use - Confidential Classification: //SecureWorks/Confidential - Limited External Distribution: Taken from a real Annual Report (SEC 10-K) Board of Director Level Concerns • If we suffer a cyber-security event we may lose customers, lose future sales, experience business interruption and injury to our competitive position, and incur significant liabilities, any of which would harm our business and operating results • Disruptions in our services could damage our customers’ businesses, subject us to substantial liability and harm our reputation and financial results • If we lose key employees or are unable to attract and retain the employees we need, our business and operating results will be adversely affected • Privacy laws and concerns, evolving regulation of cloud computing, and the changes in laws, regulations and standards related to the Internet may cause our business to suffer • Our intellectual property protections may not provide us with a competitive advantage, and defending our intellectual property may result in substantial expenses that harm our operating results
  • 7. 7 Dell - Internal Use - Confidential Classification: //SecureWorks/Confidential - Limited External Distribution: Part one of the actual narrative Understanding the Consequences Our operations involve the storage, transmission and processing of our customers’ confidential, proprietary and sensitive information, including in some cases personally identifiable information, protected health information, proprietary information and credit card and other sensitive financial information. While we have security measures in place designed to protect customer information and prevent data loss, they may be breached as a result of third-party action, including intentional misconduct by computer hackers, employee error, malfeasance or otherwise, and result in someone obtaining unauthorized access to our customers’ data or our data, including our intellectual property and other confidential business information. A security breach or unauthorized access could result in the loss or exposure of this data, litigation, indemnity and other contractual obligations, government fines and penalties, mitigation expenses and other liabilities. Additionally, the cost and operational consequences of responding to breaches and implementing remediation measures could be significant.
  • 8. 8 Dell - Internal Use - Confidential Classification: //SecureWorks/Confidential - Limited External Distribution: Part two of the actual narrative Understanding the Consequences Cont’d Computer malware, viruses and hacking and phishing attacks by third parties have become more prevalent in our industry, have occurred on our systems in the past and may occur on our systems in the future. Because techniques used to obtain unauthorized access to or sabotage systems change frequently and generally are not recognized until successfully launched against a target, we may be unable to anticipate these techniques or to implement adequate preventative measures. As cyber-security threats develop and grow, it may be necessary to make significant further investments to protect data and infrastructure. If an actual or perceived breach of our security occurs, we could suffer severe reputational damage adversely affecting customer or investor confidence, the market perception of the effectiveness of our security measures could be harmed, we could lose potential sales and existing customers, our ability to deliver our services or operate our business may be impaired, we may be subject to litigation or regulatory investigations or orders, and we may incur significant liabilities. We do not have insurance sufficient to compensate us for the potentially significant losses that may result from security breaches.
  • 9. 9 Dell - Internal Use - Confidential Classification: //SecureWorks/Confidential - Limited External Distribution: New Age of Incident Response Incident CommandThe OODA loop • Senior Mgmt. Reporting • Decision Making • Battle Rhythm • Scribe • Task Management • Assumption Tracking • Third Party Coordination Technical Actions Supporting Actions• Threat ID • Threat Intelligence • Threat Monitoring • Threat Mitigation • Threat Containment • Threat Eradication • Forensics • Law Enforcement Liaison • Evidence Collection/Mgmt. • Vulnerability Mgmt. • Key Asset Protection • Brand Reputation Protection • External Obligations • Litigation Preparation • Business Impact Mitigation Fog of War Friction Center of Gravity The Ad Hoc Organization during Crisis Anticipation, Collaboration & Research Requirements Driven Execution Maintaining the Initiative
  • 10. 10 Dell - Internal Use - Confidential Classification: //SecureWorks/Confidential - Limited External Distribution: If your CIRP was for your daughter’s wedding – would she ever talk to you again? Actionable Planning • Addressing the strategic risks of the organization • Make “your” plan an “our” plan • Socialized / vetted by the organization • IT focus versus ‘business’ focus • WHO (resources) will do WHAT (requirements), HOW (playbooks/Procedures) & (Research); WHY (aligned with Business Objectives – Consequence based) • Defined Decision Making process to make “Business Impacting” decisions • Vendors ready to go • Updated quarterly • Tested at least annually • Mature “Lessons Learned” process
  • 11. 11 Dell - Internal Use - Confidential Classification: //SecureWorks/Confidential - Limited External Distribution: Statutory, Contractual and just being a good business partner External Reporting Obligations • PCI is a contractual reporting obligation • HIPAA is a statutory reporting obligation • Almost every State has a statutory reporting obligation • If you connect to someone else or share data, you have a reporting obligation (TPSA) • Public Company: Obligation to notify shareholders of a “material” event • “Release of Public Facing Information” obligation to your company • Customers / Data Center / Cloud(?) in Europe? Asia? • Cyber Insurance
  • 12. 12 Dell - Internal Use - Confidential Classification: //SecureWorks/Confidential - Limited External Distribution: Would you like to be reimbursed for your efforts? Cyber Insurance
  • 13. 13 Dell - Internal Use - Confidential Classification: //SecureWorks/Confidential - Limited External Distribution: Plugged in to your Cyber Incident Response Program (CIRP)? Cyber Insurance • Pre-approval of vendors • Notification requirements • Add the Cyber Insurance manager to the CIRT • Do you want to call them every time?
  • 14. 14 Dell - Internal Use - Confidential Classification: //SecureWorks/Confidential - Limited External Distribution: If you remember only Three things from this presentation: Summary • Review your company’s Annual Report and align your Preventative, Detective, and Corrective measures with those business risks. • If you have Cyber Insurance, make sure it is integrated into your CIRP. Add your cyber insurance manager to the CIRT. • Conduct a Table Top Exercise (TTX) of one your BOD’s most significant risks (see above). If your CIRP doesn’t tell you who to invite – it’s not actionable and isn’t fully preparing you to protect the business.