260 likes | 270 Vues
Join us for a discussion on the challenges and successes of the evolving information security organization. Learn about compliance, operational risk, translating business needs into security requirements, and more.
E N D
The Evolving Information Security Organization – Challenges and Successes Jason Taule, Chief Security and Privacy Officer, FEi Systems (Moderator)Robert Booker, Vice President and Chief Information Security Officer, UnitedHealth GroupErick Rudiak, Information Security Officer, Express ScriptsRoy Mellinger, Vice President, IT Security and Chief Information Security Officer, WellPointOmar Khawaja, Vice President and Chief Information Security Officer, Highmark
Chief Information Security Office HITRUST 2014 Conference The Evolving Information Security Organization Challenges and Successes Tuesday – April 22, 2014 Roy R. Mellinger, CISSP – ISSAP, ISSMP, CIM Vice President, IT Security Chief Information Security Officer
The Evolving Information Security Organization Compliance Operational Risk Preventing Enterprise Risk Management Security Viewed as a Business Enabler Translating Business Needs into Security Requirements Translating Security Requirements into Technical Security Controls Operating Technical Security Controls Fires Anticipating Fires Containing Fires Fighting Fires IT Risk IT Compliance Enterprise Risk Security Threat Management
The Evolving Information Security Organization • CYBER THREAT MANAGEMENT • 24x7 Security Operations Center (SOC) • End to End DLP (Data Loss Prevention) Strategy • Tracking of Malware Threats and Coding Techniques • Effective Firewalls, IDS / IPS Strategy Implementations • Effective Security and Event Log Management & Monitoring • Robust Safeguarding Polices, Programs and Processes
The Evolving Information Security Organization Hacking Then Hacking Now • Automated / Sophisticated Malware • Hactivism – Freedom of Speech, Statements to Influence Change, Sway Public Opinion and Publicize Views • Criminal – Drug Cartels, Domestic and Foreign Organized Crime for Identity Theft and Financial Fraud • Espionage – IP, Business Intelligence, Technology, Military / Political Secrets • Terrorism – Sabotage, Disruption and Destruction • Nation-State – Intelligence Gathering, Disruptive Tactics, Clandestine Ops, Misinformation, Warfare Strategies, and Infrastructure Destruction • Individual or Computer Clubs/ Groups • Manual efforts with Social Engineering • Success = Badge Of Honor • Personal Monetary Gain or to pay for / fund hacking activity • War Protesting and Civil Disobedience • Anti-Establishment Rhetoric • Social Rebels and Misfits FRINGE MAINSTREAM . . . . . . . . . . . 30 YEARS . . . . . . .
The Evolving Information Security Organization Initial compromise — spear phishing via email, planting malware on a target website or social engineering. Establish Foothold — plant administrative software and create back doors to allow for stealth access. Escalate Privileges — use exploits and password cracking tools to gain privileges on victim computer and network. Internal Reconnaissance — collect info on network and trust relationships. Move Laterally — expand control to other workstations and servers. Harvest data. Maintain Presence — ensure continued control over access channels and credentials acquired in previous steps. Complete Mission — exfiltrate stolen data from victim's network.
The Evolving Information Security Organization – Challenges and Successes Omar KhawajaApril 23, 2014
Risk is increasing (Assets Our information is increasing in value… • More data (EMRs) • More collaboration (ACOs) • More regulation (FTC) Our weaknesses are increasing… • More suppliers (Cloud) • More complexity (ACA) Opportunities to attack are increasing… • More access (consumer portals) • More motivated attackers Becoming increasingly difficult to secure • Multiple Compliance Requirements • Evolving Compliance Requirements • Unclear Compliance Requirements • Less visibility • Less control X Vulnerabilities X Threats) - Controls
Security org needs to evolve To… Explaining the "why" Growing security in the org Making security part of more processes Assisting them with their job Differentiated controls Reporting on what matters to audience From… Explaining the “what” Growing the security org Creating more security processes Telling them what to do Protecting everything equally Measuring what matters to security org