SlideShare una empresa de Scribd logo
1 de 41
Larry Clinton
     President & CEO
Internet Security Alliance
 lclinton@isalliance.org
       703-907-7028
       202-236-0001
   www.isalliance.org
During the Last Minute…
• 45 new viruses

• 200 new malicious web sites

• 180 personal identities stolen

• 5,000 new versions of malware created

• 2 million dollars lost
Advanced Persistent
     Threat—What is it?
• Well funded
• Well organized---state supported
• Highly sophisticated---NOT ―hackers‖
• Thousands of custom versions of malware
• Escalate sophistication to respond to
  defenses
• Maintain their presence and ―call-home‖
• They target vulnerable people more than
  vulnerable systems
ISA Goals
• Promote thought leadership in the field of
  cyber security
• Advocate to government for pro security
  policies consistent with the ISA mission
• Promote the development and adoption of
  sound security programs practices and
  technologies in the public and private sectors
• Enhance the foundation of the organization
ISAlliance
         Mission Statement


ISA seeks to integrate advanced technology
with business economics and public policy to
create a sustainable system of cyber security.
ISA Board of Directors
•   Tim McKnight VP CISO Northrop Grumman (Board Chair)
•   Jeff Brown VP CISO Raytheon (Board First V Chair)
•   Garry McAlum, VP CSO USAA (Board Second V Chair)
•   Dr. Pradeep Khosla, Dean CMU School of Engendering and Computer
    Science
•   Valerie Abend, Bank of New Your/Mellon financial
•   Barry Hensley, Dell/SecureWorks
•   Lt General (Ret.) Charlie Croom, VP Cyber Security, Lockheed Martin
•   Marc Sachs, VP Government Affairs and Homeland Security, Verizon
•   Julie Taylor, VP Government Systems, SAIC
•   Joe Bounomo, CEO, Direct Computer Resources
•   Tom Kelly, Boeing
•   JR Reagan, CEO, AVG
•   Brian Raymond, Director Security and Technology NAM
The Internet
      Changes Everything
• The way our brains function

• Concepts of Privacy
• Principles of National Defense
• Economics

• Security
Are you thinking About
     Security All Wrong?
• Hackers?
• ―I’m safe or They Don’t Care about me‖
• Breaches?
• Firewalls and passwords?
• Networks ?
• Perimeter Defense---keep the bad guys out
YOU ARE THINKING ABOUT THIS ALL
  WRONG
APT
• ―The most revealing difference is that when
  you combat the APT, your prevention efforts
  will eventually fail. APT successfully
  compromises any target it desires.‖----M-
  trend Reports
The APT----Average
      Persistent Threat
―The most sophisticated, adaptive and
  persistent class of cyber attacks is no longer
  a rare event…APT is no longer just a threat
  to the public sector and the defense
  establishment …this year significant
  percentages of respondents across industries
  agreed that APT drives their organizations
  security spending.‖ PricewaterhouseCoopers
  Global Information Security Survey
  September 2011
% Who Say APT Drives
       Their Spending
•   43% Consumer Products
•   45% Financial services
•   49% entertainment and media
•   64% industrial and manufacturing sector
•   49% of utilities

PWC 2011 Global Information Security Survey
Are we thinking of APT
      all wrong?
• ―Companies are countering the APT
  principally through virus protection (51%) and
  either intrusion detection/prevention solutions
  (27%) –PWC 2011
• ―Conventional information security defenses
  don’t work vs. APT. The attackers
  successfully evade all anti-virus network
  intrusion and other best practices, remaining
  inside the targets network while the target
  believes they have been eradicated.‖---M-
  Trend Reports 2011
We Are Not Winning
―Only 16% of respondents say their
  organizations security policies address APT.
  In addition more than half of all respondents
  report that their organization does not have
  the core capabilities directly or indirectly
  relevant to countering this strategic threat.
Why is this the case?
• The vast majority of Sr management---and
  the majority of all employees---are digital
  immigrants
• Cyber Security is not, just, an ―IT‖ problem
• There are short term economic incentives to
  be insecure (e.g. VOIP, long supply chains,
  Cloud computing
• ―Insiders‖ (including lawyers and PR/sales
  Execs) are the single biggest cyber security
  vulnerability
Technology or Economics?
―Security failure is caused as least as often
by bad incentives as by bad technological
design… everywhere we look we see online
risk allocated poorly…people who connect
their machines to risky places do not bear
full consequences of their actions. And
developers are not compensated for costly
efforts to strengthen their code‖ Anderson &
Moore ―Economics of Information Security‖
   Anderson and Moore ―The Economics of Information
Cost Issues: CSIS 2010

  Overall, cost was most frequently cited as
“the biggest obstacle to ensuring the security
            of critical networks. p14
  Making the business case for cybersecurity
     remains a major challenge, because
management often does not understand either
the scale of the threat or the requirements for
                a solutions. p14
 The number one barrier is the security folks
  who haven’t been able to communicate the
urgency well enough and they haven’t actually
been able to persuade the decision makers of
         the reality of the threat. p14
 Making the business case for security could
  be a challenge – no one wants to pay their
 insurance bill until the building burns down.
Cost Issues PWC 2011
• ―Executives worldwide have been reluctant to
  release funding to support Info security.
• ―As spending constraint continues ―block and
  tackle‖ security capabilities that took decades
  to build up are degrading creating new levels
  of risk’
• ―Increased risk elevates the importance of
  security & ongoing cost reduction makes
  adequate security difficult to achieve.‖
• 47% reported decreasing info security
  spending in 2010, same as in 2009‖
Now… the Harsh Reality
• Only 13% of the Executives polled by PWC
  actually had done what is considered to be
  ―adequate‖ security.
• Most executives didn’t have an overall
  security strategy, had not reviewed the
  effectiveness of their strategy or knew what
  types of breaches had hit them in the past 12
  months.
• Only 1 in 3 said their companies had a policy
  for dealing with employee use of social media
There Are Things We
      Can Do
• Need to take a more strategic approach
• Focus on internal analysis and incident
  response i.e. more Intel gathering & analysis
• Shut down the low hanging vulnerabilities
• Get serious @ effective user training
• Re- architect IT as needed
• Participate in information exchange
  organizations
Roach Motel: Bugs Get In Not Out

• No way to stop determined intruders
• Stop them from getting back out (w/data) by
  disrupting attackers command and control
  back out of our networks
• Identify web sites and IP addresses used to
  communicate w/malicious code
• Cut down on the ―dwell time‖ in the network
• Don’t stop attacks—make them less useful
Cyber Insurance:
                  A Brief History
•   Traditional Insurance Policies to Cover Business Loss –
     –   (1) Business Personal Insurance Policies (first-party loss)
     –   (2) Business Interruption Policies
     –   (3) Commercial General Liability (CGL) or Umbrella Liability Policies (for damage to third parties)
     –   (4) Errors and Omissions Insurance (for Corp. Officers)

•   1970s – Development of specialized policies that typically extended crime insurance to cover
    against outsider gaining physical access to computer systems

•   1998 – Advent of Hacker Insurance Policies

•   2000 – Early Forms of Cyber Insurance (1st and 3rd Party) Appear
                                        1st Party – Generally, covers destruction or loss of information
                                         assets, internet business interruption, cyber extortion, DDoS loss, PR
                                         reimbursement, fraudulent EFTs
                                        3rd Party – Generally, covers claims arising from Internet
                                         content, security, tech errors and omissions as well as defense costs

                                Post 9/11 – Increased risk (e.g., Code Red, Nimda, Klez
                                   [2001], Slammer [2003), awareness, and regulation
                                   (e.g., HIPAA, GLB, SOX, HITECH, CA SB 1386), lead to more
State of the Market
                                                           Cyber Risk Insurance Providers
 Number of Carriers – Betterly Report survey
   finds an increase of Cyber Insurers from 19 in
   2010 to 29 in 2011
       An increase of over 52%

 Annual U.S. Gross Written Premiums (GWP) –
   Betterly Report estimates an increase from
   $600M to $800M over the past survey year
      An increase of 33%
      Market Drivers – 3rd Party Privacy Breach
        Policies



                           Betterly, Richard. ―Cyber/Privacy/Media Liability Market Survey –
                              2011.‖ The Betterly Report (2011): Web.
                              http://betterley.com/samples/CyberRisk11_nt.pdf

                           Armin, Jart. ―Hackers Take Notice: Cyber-Insurance is on the Rise.‖
                             internet evolution. 27 June 2011: Web.
                             http://www.internetevolution.com/author.asp?section_id=717&doc_id=2307
                             82
Zurich v. Sony




 Basic Facts – April and May intrusions into the Sony PlayStation
   Network (PSN) and other systems led to Sony temporarily
   shutting down PSN and possible exposure of personal data of
   100M+ users. In May, Sony looked to its CGL policy providers for
   helping paying for the data breach

 Lawsuit – In July, Zurich – Sony’s CGL insurance provider – filed
   the above suit against Sony seeking , among other
   things, indemnification from Sony against its class action
   suits, arguing that the CGL does not cover cyber attacks.
Cyber Insurance
                  and Public Policy
 2002 – The National Strategy to Secure Cyber Space – Market-based approach, but no
  need for incentives; policy makers think insurance not ready for prime time

 2004 – Congress Creates the ―Corporate Information Security Working Group‖ w/Subgroup
   on incentives; cyber insurance is advocated

 2006 – Internet Security Alliance (ISA) issues White Paper, ―Using Cyber-Insurance to
   Improve Cyber-Security: Legislative Solutions for the Insurance Market‖; testifies before
   Commerce and HLS

 2007 – ANSI & ISA publish The Financial Impact of Cyber Risk: 50 Questions Every CFO
   Should Ask, with a chapter devoted to insurance & financial risk management

                               2009 – Citing ISA publications, the Obama Administration’s
                                 Cyberspace Policy Review advocates use of market
                                 incentives, including cyber insurance
                               2009 – DHS Cross Sector Cyber Security Working Group (all
                                 critical sectors) advocates use of cyber insurance
Cyber Insurance
                    and Public Policy
 2010 – ISA and ANSI publish follow-up, ―The Financial Management of Cyber Risk: An
   Implementation Framework for CFOs,‖ which also includes a chapter and discussion of
   cyber insurance

 2010– White House holds spring conference call with insurance industry, academics, and
   govt. on the use of cyber insurance

 2010– Dept. of Commerce issues Notice of Inquiry on economics of cyber
   security, including requests for information on of cyber insurance

 2011 – U.S. Chamber of Commerce, TechAmerica, Business Software Alliance, Center for
   Democracy and Technology, and ISA co-author and publish White Paper, Improving our
   Nation’s Cybersecurity through the Public‐Private Partnership, advocating a market-based
     approach to cybersecurity including the promotion of cyber insurance.

  2011 – Dept. of Commerce publishes its follow-up Green Paper, and asks how insurance can
     lead to enhanced cyber security

  2012 – October 22 DHS Conference on how to stimulate the market for first party cyber
     insurance
50 Questions Every CFO
                    Should Ask (2008)
It is not enough for the information technology
workforce to understand the importance of cyber
security; leaders at all levels of government and
industry need to be able to make business and
investment decisions based on knowledge of risks
and potential impacts. – President’s Cyber Space
Policy Review May 30, 2009 page 15

ISA-ANSI Project on Financial Risk Management
of Cyber Events: ―50 Questions Every CFO
should Ask ----including what they ought to be
asking their General Counsel and outside
counsel. Also, HR, Bus Ops, Public and Investor
Communications & Compliance
Financial Management of
Cyber Risk (2010)
ANSI-ISA Program
• Outlines an enterprise wide process to attack
  cyber security broadly and economically
• CFO strategies
• HR strategies
• Legal/compliance strategies
• Operations/technology strategies
• Communications strategies
• Risk Management/insurance strategies
What CFO needs to do
• Own the problem
• Appoint an enterprise wide cyber risk team
• Meet regularly
• Develop an enterprise wide cyber risk
  management plan
• Develop an enterprise wide cyber risk budget
• Implement the plan, analyze it regularly, test
  and reform based on feedback
Human Resources
•   Recruitment
•   Awareness
•   Remote Access
•   Compensate for cyber security
•   Discipline for bad behavior
•   Manage social networking
•   Beware of vulnerability especially from IT and
    former employees
Legal/Compliance Cyber
      Issues
• What rules/regulations apply to us and
  partners?
• Exposure to theft of our trade secrets?
• Exposure to shareholder and class action
  suits?
• Are we prepared for govt. investigations?
• Are we prepared for suits by customers and
  suppliers?
• Are our contracts up to date and protecting
  us?
Operations/IT
• What are our biggest vulnerabilities? Re-
  evaluate?
• What is the maturity of our information
  classification systems?
• Are we complying with best
  practices/standards
• How good is our physical security?
• Do we have an incident response plan?
• How long till we are back up?---do we want
  that?
Communications
• Do we have a plan for multiple audiences?
--general public
--shareholders
--Govt./regulators
--affected clients
--employees
---press
Financial Management of
Cyber Risk – PHI Project
Cyber Risk Management Reference Framework
                                                       Before                              During                               After
          Stakeholder                                 (Govern)                           (Respond)                           (Contain)
                                            Before an incident and as governance     During an incident possibly    After a breach involving successfu
                                                          programs                    escalating to as breach                   exfiltration.


Board of          What responsibility                                              • Receive breach                • Re-evaluate current cyber
                                           • Set an adequate standard of due
                  does the BOD engage                                                notifications and               governance oversight and
Directors         in, such as …              care
                                                                                     governance updates              standard of due care


                                           • Evaluate periodically cyber risk
                                                                                                                   • Re-evaluate standard of du
                                             governance effectiveness
Audit             What responsibility                                              • Receive risk realization        care
                                           • Review annual cyber risk
                  does the AC engage                                                 updates                       • Re-evaluate risk tolerance
Committee         in, such as …              management assessment
                                                                                   • Receive cyber incident        • Re-evaluate cyber risk &
                                           • Issue cyber risk & incident
                                                                                     consequence updates             incident disclosure
                                             disclosure, as per SEC guidance

                                           • Participate in business impact
                                             analysis
Business                                                                           • Monitor damage to
                  What responsibility do   • Set cyber risk tolerance
                                                                                     business including            • Re-evaluate cyber risk
(Office of CEO,   business stakeholders    • Participate in defining risk
                  engage in, such as …                                               revenues, margins, and          tolerance
BU GM)                                       management options
                                                                                     brand damage
                                           • Make cyber risk management
                                             decision
                                                                                                                   • Re-evaluate resource alloc
Financial         What responsibility do   • Participate in financial              • Receive updates as to the       for cyber risk management
Stakeholders      financial stakeholders     cost/benefit analysis of different      cost impact of incident or    • Re-evaluate risk managem
                  engage in, such as …       risk management options                 breach                          options for top cyber agen
(e.g., CFO)
                                                                                                                     threats
                                           • Define and oversee cyber risk
                                             management program
                                           • Participate in cyber threat agent
                                             analysis                              • Monitor breach and cyber
Risk                                       • Participate in business impact          risk trends
                  What responsibility do                                                                           • Evaluate effectiveness of c
                                             analysis                              • Measure risk
Management        risk stakeholders                                                                                  breach response and cybe
ISA Extended Cyber Risk Management Project
            DIB, IT and Financial Services (spring fall
                              2012)
• Enterprise-wide Team - All utilize cross-functional, cross-organizational team to
assess and manage risk
• Attention at Highest Levels - This team may have just one layer between it and
the Board/CEO, but items they determine to be top items are reported at this level
• CISO Owns Risk Decisions and Decision-making - Within 1 DIB member, all
projects and programs have to be cleared by the CISO, who also determines risk
tolerance levels in accordance with Senior Leadership guidance
•Risk Management Approach Utilized - All utilize a risk management approach in
which risks are assessed, mapped, and impact and probability is explored; plans are
developed, and the highest level of executives and Board are notified.
• Security Awareness Through Internal Testing - Unannounced tests company wide
which are then tied to incentive system. For one company, such an phishing
initiatives reduced click through rates from 5 to 2.5%.
Growth toward Enterprise
     wide cyber management
• In 2008 only 15% of companies had
  enterprise wide risk management teams for
  privacy/cyber
• In 2011 87% of companies had cross
  organizational cyber/privacy teams
• Major firms (E & Y) are now including ISA
  Financial Risk Management in their
  Enterprise Programs
• Even govt. (e.g. DOE) has now adopted
  these principles for their sector risk
  management
House GOP Task Force
            & ISA Policy Positions
       ISA Social Contract             House GOP Cybersecurity Task
                                         Force Recommendations
• ―Menu‖ of Market Incentives Tied    • ―Menu‖ of Market Incentives Tied
to Voluntary Adoption of Cyber        to Voluntary Adoption of Cyber
Security Measures                     Security Measures, p.7
• Regulation CANNOT Keep Up –         • Regulation CANNOT Keep Up –
By the Time It Is Created, It Is      By the Time It Is Created, It Is
Outdated                              Outdated, p.7
• Streamline Regulation in return for • Allow Access to Streamlined
increased voluntary security          Regulation as an Incentive and to
measures                              Reduce Government Costs, p.8
• Limited Liability for Good Actors   • Limited Liability for Good Actors,
                                      p.9
• Utilize Tax Incentives and Tie      • Utilize Tax Incentives and Tie
Grant Funding to Cyber Security       Grant Funding to Cyber Security,
Larry Clinton
     President & CEO
Internet Security Alliance
 lclinton@isalliance.org
       703-907-7028
       202-236-0001
www.isalliance.org
Senate (Admin) bill
             moves toward ISA
        ISA Policy Positions                      HSGAC Bill – S.3414
• The Public-Private Partnership:         • The Public-Private Partnership:
Codification of the NIPP Framework,       Codification of the NIPP Framework,

• A Voluntary, Incentives-Based           • A Voluntary, Incentives-Based
Approach,                                 Approach,

• Liability Incentives – Among other liab. • Liability Incentives –Punitive Damages
inctvs, Punitive Damages protections       protections,

• Govt Procurement as an incentive        • Procurement Incentives – Collab.
toward greater security,                  examine Govt Procurement as an
                                          incentive toward greater security,

• Cost-Benefit Analysis of Suggested      • Cost-Benefit Analysis of Suggested
Cybersecurity Measures,                   Cybersecurity Measures,

Más contenido relacionado

La actualidad más candente

Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Onlineevolutionaryit
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information SecuritySimoun Ung
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final ResultsCIONET
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsResilient Systems
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail SecurityIBM Software India
 

La actualidad más candente (20)

Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Online
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber Webinar
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail Security
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 

Destacado

BADATOZ INAUTERIAK!!
BADATOZ INAUTERIAK!!BADATOZ INAUTERIAK!!
BADATOZ INAUTERIAK!!LLODIO
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Dan Hausmann 2010 Fowler Seminar
Dan Hausmann 2010 Fowler SeminarDan Hausmann 2010 Fowler Seminar
Dan Hausmann 2010 Fowler SeminarDon Grauel
 
Code of-conduct-insider-trading
Code of-conduct-insider-tradingCode of-conduct-insider-trading
Code of-conduct-insider-tradingSurabhi Singh
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
Ensuring Your Weight Loss Survives The Hype
Ensuring Your Weight Loss Survives The HypeEnsuring Your Weight Loss Survives The Hype
Ensuring Your Weight Loss Survives The HypeRudolph Kirkland
 

Destacado (8)

BADATOZ INAUTERIAK!!
BADATOZ INAUTERIAK!!BADATOZ INAUTERIAK!!
BADATOZ INAUTERIAK!!
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Eiropas Jauniešu parlaments
Eiropas Jauniešu parlamentsEiropas Jauniešu parlaments
Eiropas Jauniešu parlaments
 
Harassment2
Harassment2Harassment2
Harassment2
 
Dan Hausmann 2010 Fowler Seminar
Dan Hausmann 2010 Fowler SeminarDan Hausmann 2010 Fowler Seminar
Dan Hausmann 2010 Fowler Seminar
 
Code of-conduct-insider-trading
Code of-conduct-insider-tradingCode of-conduct-insider-trading
Code of-conduct-insider-trading
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Ensuring Your Weight Loss Survives The Hype
Ensuring Your Weight Loss Survives The HypeEnsuring Your Weight Loss Survives The Hype
Ensuring Your Weight Loss Survives The Hype
 

Similar a ISAlliance President Discusses Advanced Persistent Threats and Cybersecurity Challenges

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfVikashSinghBaghel1
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry BrianHuntMSFCPACRISC
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response ManagementDon Caeiro
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 

Similar a ISAlliance President Discusses Advanced Persistent Threats and Cybersecurity Challenges (20)

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 

Más de Don Grauel

Surety Industry Overview: State of the Industry by Cissie Scoggin
Surety Industry Overview: State of the Industry by Cissie ScogginSurety Industry Overview: State of the Industry by Cissie Scoggin
Surety Industry Overview: State of the Industry by Cissie ScogginDon Grauel
 
Unti-Claims Handling Following Catastrophes 2013-10
Unti-Claims Handling Following Catastrophes 2013-10Unti-Claims Handling Following Catastrophes 2013-10
Unti-Claims Handling Following Catastrophes 2013-10Don Grauel
 
Ryan-Special Events Insurance Considerations 2013-10
Ryan-Special Events Insurance Considerations 2013-10Ryan-Special Events Insurance Considerations 2013-10
Ryan-Special Events Insurance Considerations 2013-10Don Grauel
 
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10Don Grauel
 
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10Don Grauel
 
Lininger-Property & Casualty Legislative Up-date 2013-10
Lininger-Property & Casualty Legislative Up-date 2013-10Lininger-Property & Casualty Legislative Up-date 2013-10
Lininger-Property & Casualty Legislative Up-date 2013-10Don Grauel
 
Waite- Flood IRT Balto 10_2012
Waite- Flood IRT Balto 10_2012Waite- Flood IRT Balto 10_2012
Waite- Flood IRT Balto 10_2012Don Grauel
 
Shields- Equity View IRT Balto 10_2012
Shields- Equity View IRT Balto 10_2012Shields- Equity View IRT Balto 10_2012
Shields- Equity View IRT Balto 10_2012Don Grauel
 
LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012Don Grauel
 
Hal White 2010 Fowler Seminar
Hal White 2010 Fowler SeminarHal White 2010 Fowler Seminar
Hal White 2010 Fowler SeminarDon Grauel
 
Sabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarSabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarDon Grauel
 
Ron Adams 2010 Fowler Seminar
Ron Adams 2010 Fowler SeminarRon Adams 2010 Fowler Seminar
Ron Adams 2010 Fowler SeminarDon Grauel
 

Más de Don Grauel (12)

Surety Industry Overview: State of the Industry by Cissie Scoggin
Surety Industry Overview: State of the Industry by Cissie ScogginSurety Industry Overview: State of the Industry by Cissie Scoggin
Surety Industry Overview: State of the Industry by Cissie Scoggin
 
Unti-Claims Handling Following Catastrophes 2013-10
Unti-Claims Handling Following Catastrophes 2013-10Unti-Claims Handling Following Catastrophes 2013-10
Unti-Claims Handling Following Catastrophes 2013-10
 
Ryan-Special Events Insurance Considerations 2013-10
Ryan-Special Events Insurance Considerations 2013-10Ryan-Special Events Insurance Considerations 2013-10
Ryan-Special Events Insurance Considerations 2013-10
 
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
Petit-Workers Compensation—Medicare Secondary Payer Issues 2013-10
 
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
Donald-Climate Change, Uncovering Risk in a Warming World 2013-10
 
Lininger-Property & Casualty Legislative Up-date 2013-10
Lininger-Property & Casualty Legislative Up-date 2013-10Lininger-Property & Casualty Legislative Up-date 2013-10
Lininger-Property & Casualty Legislative Up-date 2013-10
 
Waite- Flood IRT Balto 10_2012
Waite- Flood IRT Balto 10_2012Waite- Flood IRT Balto 10_2012
Waite- Flood IRT Balto 10_2012
 
Shields- Equity View IRT Balto 10_2012
Shields- Equity View IRT Balto 10_2012Shields- Equity View IRT Balto 10_2012
Shields- Equity View IRT Balto 10_2012
 
LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012LaCroix- D&O IRT Balto 10-2012
LaCroix- D&O IRT Balto 10-2012
 
Hal White 2010 Fowler Seminar
Hal White 2010 Fowler SeminarHal White 2010 Fowler Seminar
Hal White 2010 Fowler Seminar
 
Sabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarSabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler Seminar
 
Ron Adams 2010 Fowler Seminar
Ron Adams 2010 Fowler SeminarRon Adams 2010 Fowler Seminar
Ron Adams 2010 Fowler Seminar
 

Último

letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...Amil Baba Dawood bangali
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)ECTIJ
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
Managing Finances in a Small Business (yes).pdf
Managing Finances  in a Small Business (yes).pdfManaging Finances  in a Small Business (yes).pdf
Managing Finances in a Small Business (yes).pdfmar yame
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...Amil baba
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...amilabibi1
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》rnrncn29
 
Current Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptxCurrent Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptxuzma244191
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...Amil baba
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 

Último (20)

letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
NO1 Certified Ilam kala Jadu Specialist Expert In Bahawalpur, Sargodha, Sialk...
 
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)Economics, Commerce and Trade Management: An International Journal (ECTIJ)
Economics, Commerce and Trade Management: An International Journal (ECTIJ)
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
Managing Finances in a Small Business (yes).pdf
Managing Finances  in a Small Business (yes).pdfManaging Finances  in a Small Business (yes).pdf
Managing Finances in a Small Business (yes).pdf
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
 
Current Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptxCurrent Economic situation of Pakistan .pptx
Current Economic situation of Pakistan .pptx
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 

ISAlliance President Discusses Advanced Persistent Threats and Cybersecurity Challenges

  • 1. Larry Clinton President & CEO Internet Security Alliance lclinton@isalliance.org 703-907-7028 202-236-0001 www.isalliance.org
  • 2. During the Last Minute… • 45 new viruses • 200 new malicious web sites • 180 personal identities stolen • 5,000 new versions of malware created • 2 million dollars lost
  • 3. Advanced Persistent Threat—What is it? • Well funded • Well organized---state supported • Highly sophisticated---NOT ―hackers‖ • Thousands of custom versions of malware • Escalate sophistication to respond to defenses • Maintain their presence and ―call-home‖ • They target vulnerable people more than vulnerable systems
  • 4. ISA Goals • Promote thought leadership in the field of cyber security • Advocate to government for pro security policies consistent with the ISA mission • Promote the development and adoption of sound security programs practices and technologies in the public and private sectors • Enhance the foundation of the organization
  • 5. ISAlliance Mission Statement ISA seeks to integrate advanced technology with business economics and public policy to create a sustainable system of cyber security.
  • 6. ISA Board of Directors • Tim McKnight VP CISO Northrop Grumman (Board Chair) • Jeff Brown VP CISO Raytheon (Board First V Chair) • Garry McAlum, VP CSO USAA (Board Second V Chair) • Dr. Pradeep Khosla, Dean CMU School of Engendering and Computer Science • Valerie Abend, Bank of New Your/Mellon financial • Barry Hensley, Dell/SecureWorks • Lt General (Ret.) Charlie Croom, VP Cyber Security, Lockheed Martin • Marc Sachs, VP Government Affairs and Homeland Security, Verizon • Julie Taylor, VP Government Systems, SAIC • Joe Bounomo, CEO, Direct Computer Resources • Tom Kelly, Boeing • JR Reagan, CEO, AVG • Brian Raymond, Director Security and Technology NAM
  • 7.
  • 8. The Internet Changes Everything • The way our brains function • Concepts of Privacy • Principles of National Defense • Economics • Security
  • 9. Are you thinking About Security All Wrong? • Hackers? • ―I’m safe or They Don’t Care about me‖ • Breaches? • Firewalls and passwords? • Networks ? • Perimeter Defense---keep the bad guys out YOU ARE THINKING ABOUT THIS ALL WRONG
  • 10. APT • ―The most revealing difference is that when you combat the APT, your prevention efforts will eventually fail. APT successfully compromises any target it desires.‖----M- trend Reports
  • 11. The APT----Average Persistent Threat ―The most sophisticated, adaptive and persistent class of cyber attacks is no longer a rare event…APT is no longer just a threat to the public sector and the defense establishment …this year significant percentages of respondents across industries agreed that APT drives their organizations security spending.‖ PricewaterhouseCoopers Global Information Security Survey September 2011
  • 12. % Who Say APT Drives Their Spending • 43% Consumer Products • 45% Financial services • 49% entertainment and media • 64% industrial and manufacturing sector • 49% of utilities PWC 2011 Global Information Security Survey
  • 13. Are we thinking of APT all wrong? • ―Companies are countering the APT principally through virus protection (51%) and either intrusion detection/prevention solutions (27%) –PWC 2011 • ―Conventional information security defenses don’t work vs. APT. The attackers successfully evade all anti-virus network intrusion and other best practices, remaining inside the targets network while the target believes they have been eradicated.‖---M- Trend Reports 2011
  • 14. We Are Not Winning ―Only 16% of respondents say their organizations security policies address APT. In addition more than half of all respondents report that their organization does not have the core capabilities directly or indirectly relevant to countering this strategic threat.
  • 15. Why is this the case? • The vast majority of Sr management---and the majority of all employees---are digital immigrants • Cyber Security is not, just, an ―IT‖ problem • There are short term economic incentives to be insecure (e.g. VOIP, long supply chains, Cloud computing • ―Insiders‖ (including lawyers and PR/sales Execs) are the single biggest cyber security vulnerability
  • 16. Technology or Economics? ―Security failure is caused as least as often by bad incentives as by bad technological design… everywhere we look we see online risk allocated poorly…people who connect their machines to risky places do not bear full consequences of their actions. And developers are not compensated for costly efforts to strengthen their code‖ Anderson & Moore ―Economics of Information Security‖ Anderson and Moore ―The Economics of Information
  • 17. Cost Issues: CSIS 2010 Overall, cost was most frequently cited as “the biggest obstacle to ensuring the security of critical networks. p14 Making the business case for cybersecurity remains a major challenge, because management often does not understand either the scale of the threat or the requirements for a solutions. p14 The number one barrier is the security folks who haven’t been able to communicate the urgency well enough and they haven’t actually been able to persuade the decision makers of the reality of the threat. p14 Making the business case for security could be a challenge – no one wants to pay their insurance bill until the building burns down.
  • 18. Cost Issues PWC 2011 • ―Executives worldwide have been reluctant to release funding to support Info security. • ―As spending constraint continues ―block and tackle‖ security capabilities that took decades to build up are degrading creating new levels of risk’ • ―Increased risk elevates the importance of security & ongoing cost reduction makes adequate security difficult to achieve.‖ • 47% reported decreasing info security spending in 2010, same as in 2009‖
  • 19. Now… the Harsh Reality • Only 13% of the Executives polled by PWC actually had done what is considered to be ―adequate‖ security. • Most executives didn’t have an overall security strategy, had not reviewed the effectiveness of their strategy or knew what types of breaches had hit them in the past 12 months. • Only 1 in 3 said their companies had a policy for dealing with employee use of social media
  • 20. There Are Things We Can Do • Need to take a more strategic approach • Focus on internal analysis and incident response i.e. more Intel gathering & analysis • Shut down the low hanging vulnerabilities • Get serious @ effective user training • Re- architect IT as needed • Participate in information exchange organizations
  • 21. Roach Motel: Bugs Get In Not Out • No way to stop determined intruders • Stop them from getting back out (w/data) by disrupting attackers command and control back out of our networks • Identify web sites and IP addresses used to communicate w/malicious code • Cut down on the ―dwell time‖ in the network • Don’t stop attacks—make them less useful
  • 22. Cyber Insurance: A Brief History • Traditional Insurance Policies to Cover Business Loss – – (1) Business Personal Insurance Policies (first-party loss) – (2) Business Interruption Policies – (3) Commercial General Liability (CGL) or Umbrella Liability Policies (for damage to third parties) – (4) Errors and Omissions Insurance (for Corp. Officers) • 1970s – Development of specialized policies that typically extended crime insurance to cover against outsider gaining physical access to computer systems • 1998 – Advent of Hacker Insurance Policies • 2000 – Early Forms of Cyber Insurance (1st and 3rd Party) Appear  1st Party – Generally, covers destruction or loss of information assets, internet business interruption, cyber extortion, DDoS loss, PR reimbursement, fraudulent EFTs  3rd Party – Generally, covers claims arising from Internet content, security, tech errors and omissions as well as defense costs  Post 9/11 – Increased risk (e.g., Code Red, Nimda, Klez [2001], Slammer [2003), awareness, and regulation (e.g., HIPAA, GLB, SOX, HITECH, CA SB 1386), lead to more
  • 23. State of the Market Cyber Risk Insurance Providers  Number of Carriers – Betterly Report survey finds an increase of Cyber Insurers from 19 in 2010 to 29 in 2011  An increase of over 52%  Annual U.S. Gross Written Premiums (GWP) – Betterly Report estimates an increase from $600M to $800M over the past survey year  An increase of 33%  Market Drivers – 3rd Party Privacy Breach Policies Betterly, Richard. ―Cyber/Privacy/Media Liability Market Survey – 2011.‖ The Betterly Report (2011): Web. http://betterley.com/samples/CyberRisk11_nt.pdf Armin, Jart. ―Hackers Take Notice: Cyber-Insurance is on the Rise.‖ internet evolution. 27 June 2011: Web. http://www.internetevolution.com/author.asp?section_id=717&doc_id=2307 82
  • 24. Zurich v. Sony  Basic Facts – April and May intrusions into the Sony PlayStation Network (PSN) and other systems led to Sony temporarily shutting down PSN and possible exposure of personal data of 100M+ users. In May, Sony looked to its CGL policy providers for helping paying for the data breach  Lawsuit – In July, Zurich – Sony’s CGL insurance provider – filed the above suit against Sony seeking , among other things, indemnification from Sony against its class action suits, arguing that the CGL does not cover cyber attacks.
  • 25. Cyber Insurance and Public Policy  2002 – The National Strategy to Secure Cyber Space – Market-based approach, but no need for incentives; policy makers think insurance not ready for prime time  2004 – Congress Creates the ―Corporate Information Security Working Group‖ w/Subgroup on incentives; cyber insurance is advocated  2006 – Internet Security Alliance (ISA) issues White Paper, ―Using Cyber-Insurance to Improve Cyber-Security: Legislative Solutions for the Insurance Market‖; testifies before Commerce and HLS  2007 – ANSI & ISA publish The Financial Impact of Cyber Risk: 50 Questions Every CFO Should Ask, with a chapter devoted to insurance & financial risk management  2009 – Citing ISA publications, the Obama Administration’s Cyberspace Policy Review advocates use of market incentives, including cyber insurance  2009 – DHS Cross Sector Cyber Security Working Group (all critical sectors) advocates use of cyber insurance
  • 26. Cyber Insurance and Public Policy  2010 – ISA and ANSI publish follow-up, ―The Financial Management of Cyber Risk: An Implementation Framework for CFOs,‖ which also includes a chapter and discussion of cyber insurance  2010– White House holds spring conference call with insurance industry, academics, and govt. on the use of cyber insurance  2010– Dept. of Commerce issues Notice of Inquiry on economics of cyber security, including requests for information on of cyber insurance  2011 – U.S. Chamber of Commerce, TechAmerica, Business Software Alliance, Center for Democracy and Technology, and ISA co-author and publish White Paper, Improving our Nation’s Cybersecurity through the Public‐Private Partnership, advocating a market-based approach to cybersecurity including the promotion of cyber insurance. 2011 – Dept. of Commerce publishes its follow-up Green Paper, and asks how insurance can lead to enhanced cyber security 2012 – October 22 DHS Conference on how to stimulate the market for first party cyber insurance
  • 27. 50 Questions Every CFO Should Ask (2008) It is not enough for the information technology workforce to understand the importance of cyber security; leaders at all levels of government and industry need to be able to make business and investment decisions based on knowledge of risks and potential impacts. – President’s Cyber Space Policy Review May 30, 2009 page 15 ISA-ANSI Project on Financial Risk Management of Cyber Events: ―50 Questions Every CFO should Ask ----including what they ought to be asking their General Counsel and outside counsel. Also, HR, Bus Ops, Public and Investor Communications & Compliance
  • 29. ANSI-ISA Program • Outlines an enterprise wide process to attack cyber security broadly and economically • CFO strategies • HR strategies • Legal/compliance strategies • Operations/technology strategies • Communications strategies • Risk Management/insurance strategies
  • 30. What CFO needs to do • Own the problem • Appoint an enterprise wide cyber risk team • Meet regularly • Develop an enterprise wide cyber risk management plan • Develop an enterprise wide cyber risk budget • Implement the plan, analyze it regularly, test and reform based on feedback
  • 31. Human Resources • Recruitment • Awareness • Remote Access • Compensate for cyber security • Discipline for bad behavior • Manage social networking • Beware of vulnerability especially from IT and former employees
  • 32. Legal/Compliance Cyber Issues • What rules/regulations apply to us and partners? • Exposure to theft of our trade secrets? • Exposure to shareholder and class action suits? • Are we prepared for govt. investigations? • Are we prepared for suits by customers and suppliers? • Are our contracts up to date and protecting us?
  • 33. Operations/IT • What are our biggest vulnerabilities? Re- evaluate? • What is the maturity of our information classification systems? • Are we complying with best practices/standards • How good is our physical security? • Do we have an incident response plan? • How long till we are back up?---do we want that?
  • 34. Communications • Do we have a plan for multiple audiences? --general public --shareholders --Govt./regulators --affected clients --employees ---press
  • 35. Financial Management of Cyber Risk – PHI Project
  • 36. Cyber Risk Management Reference Framework Before During After Stakeholder (Govern) (Respond) (Contain) Before an incident and as governance During an incident possibly After a breach involving successfu programs escalating to as breach exfiltration. Board of What responsibility • Receive breach • Re-evaluate current cyber • Set an adequate standard of due does the BOD engage notifications and governance oversight and Directors in, such as … care governance updates standard of due care • Evaluate periodically cyber risk • Re-evaluate standard of du governance effectiveness Audit What responsibility • Receive risk realization care • Review annual cyber risk does the AC engage updates • Re-evaluate risk tolerance Committee in, such as … management assessment • Receive cyber incident • Re-evaluate cyber risk & • Issue cyber risk & incident consequence updates incident disclosure disclosure, as per SEC guidance • Participate in business impact analysis Business • Monitor damage to What responsibility do • Set cyber risk tolerance business including • Re-evaluate cyber risk (Office of CEO, business stakeholders • Participate in defining risk engage in, such as … revenues, margins, and tolerance BU GM) management options brand damage • Make cyber risk management decision • Re-evaluate resource alloc Financial What responsibility do • Participate in financial • Receive updates as to the for cyber risk management Stakeholders financial stakeholders cost/benefit analysis of different cost impact of incident or • Re-evaluate risk managem engage in, such as … risk management options breach options for top cyber agen (e.g., CFO) threats • Define and oversee cyber risk management program • Participate in cyber threat agent analysis • Monitor breach and cyber Risk • Participate in business impact risk trends What responsibility do • Evaluate effectiveness of c analysis • Measure risk Management risk stakeholders breach response and cybe
  • 37. ISA Extended Cyber Risk Management Project DIB, IT and Financial Services (spring fall 2012) • Enterprise-wide Team - All utilize cross-functional, cross-organizational team to assess and manage risk • Attention at Highest Levels - This team may have just one layer between it and the Board/CEO, but items they determine to be top items are reported at this level • CISO Owns Risk Decisions and Decision-making - Within 1 DIB member, all projects and programs have to be cleared by the CISO, who also determines risk tolerance levels in accordance with Senior Leadership guidance •Risk Management Approach Utilized - All utilize a risk management approach in which risks are assessed, mapped, and impact and probability is explored; plans are developed, and the highest level of executives and Board are notified. • Security Awareness Through Internal Testing - Unannounced tests company wide which are then tied to incentive system. For one company, such an phishing initiatives reduced click through rates from 5 to 2.5%.
  • 38. Growth toward Enterprise wide cyber management • In 2008 only 15% of companies had enterprise wide risk management teams for privacy/cyber • In 2011 87% of companies had cross organizational cyber/privacy teams • Major firms (E & Y) are now including ISA Financial Risk Management in their Enterprise Programs • Even govt. (e.g. DOE) has now adopted these principles for their sector risk management
  • 39. House GOP Task Force & ISA Policy Positions ISA Social Contract House GOP Cybersecurity Task Force Recommendations • ―Menu‖ of Market Incentives Tied • ―Menu‖ of Market Incentives Tied to Voluntary Adoption of Cyber to Voluntary Adoption of Cyber Security Measures Security Measures, p.7 • Regulation CANNOT Keep Up – • Regulation CANNOT Keep Up – By the Time It Is Created, It Is By the Time It Is Created, It Is Outdated Outdated, p.7 • Streamline Regulation in return for • Allow Access to Streamlined increased voluntary security Regulation as an Incentive and to measures Reduce Government Costs, p.8 • Limited Liability for Good Actors • Limited Liability for Good Actors, p.9 • Utilize Tax Incentives and Tie • Utilize Tax Incentives and Tie Grant Funding to Cyber Security Grant Funding to Cyber Security,
  • 40. Larry Clinton President & CEO Internet Security Alliance lclinton@isalliance.org 703-907-7028 202-236-0001 www.isalliance.org
  • 41. Senate (Admin) bill moves toward ISA ISA Policy Positions HSGAC Bill – S.3414 • The Public-Private Partnership: • The Public-Private Partnership: Codification of the NIPP Framework, Codification of the NIPP Framework, • A Voluntary, Incentives-Based • A Voluntary, Incentives-Based Approach, Approach, • Liability Incentives – Among other liab. • Liability Incentives –Punitive Damages inctvs, Punitive Damages protections protections, • Govt Procurement as an incentive • Procurement Incentives – Collab. toward greater security, examine Govt Procurement as an incentive toward greater security, • Cost-Benefit Analysis of Suggested • Cost-Benefit Analysis of Suggested Cybersecurity Measures, Cybersecurity Measures,