SlideShare una empresa de Scribd logo
1 de 17
Board member Security Per Thorsheim CISA, CISM, CISSP-ISSAP Security coordinator April 4, 2011
The CodesofConduct Dilemma General assembly Bedriftsforsamling (Norway) BoardofDirectors CEO Executiveboard Chief  Security Officer (CSO) 2 CodesofConduct Security policy Standards Guidelines ?
Company (Security) policy ISACA 4 April 2011 – Per Thorsheim May requirethat all usersuse pc + phoneprovided by company Requireseparationbetweenwork and other private (work) engangements Requireshardening and periodicupdating Disallowsthesharingofaccounts / passwords 3 A practicalchallenge for peoplebeing a memberonmanyboards Easily broken by theabovepracticalchallenge If computer is personal, than it is by definitioninsecure and ”illegal” to use Personal assistant to thexxxmay be a practicalchallenge to solve
ISACA 4 April 2011 – Per Thorsheim 4
ISACA 4 April 2011 – Per Thorsheim 5 HACKED
The CodesofConduct Dilemma ISACA 4 April 2011 – Per Thorsheim DirectorsLiability Assurance ”Styreansvarsforsikring” in Norway (Gross) Negligencewillimpacttheassuranceagreement 6 Iftheboarddoes not complywith (theirown) Codes ofConduct and/or security policy, willthat be considered (gross) negligenceby theinsurancecompany?
Recommendations(work in progress) ISACA 4 April 2011 – Per Thorsheim Useof personal PC Remoteaccess Printouts Electronic documents E-mail Leavingtheboard Problems? 7 Disallowed. PC from company Terminal server with 2-factor Cross-cutshredder MS Office passwordprotection Encryptedattachments Standard companyroutine VIP customer service (CSO) CSO / IA : ”Right to audit” ? NASDAQ Directors Desk?
Primary insiders Primary insiderA person who is a member of the board of directors or management of a listed company, or who is associated with the company in some other way, and who is therefore subject to certain requirements in respect of trading and reporting trades carried out, cf. Sections 3-1 and 2-6 of the Securities Trading Act. Each listed company is responsible for identifying its primary insiders, and is responsible for providing an up-to-date list of its primary insiders to Oslo Børs. Each primary insider is personally responsible for ensuring that the requirements imposed on him or her by the Securities Trading Act are adhered to. 8
DefinitionofPrimary insiders 9
ISACA 4 April 2011 – Per Thorsheim 10 Example list ofprimary insiders(nonamesshown)
However… ISACA 4 April 2011 – Per Thorsheim (this is thepointwhere I start to getdifficult and annoying…) 11
Externals: Access to insideinformation Advertisingagency Communications agency Translation service Externalauditor 12 E-mail (usuallyunencrypted) E-mailwithattachments Usuallyunencrypted Postal mail Mail by courier Fax (for signatures!) ,[object Object]
(Norwegian) post
Postal courier
E-mailMitMattackshttp://www.edb.com/Documents/Articles/E-post_sikkerhet_i_Norge.pdf
Internals: Access to insideinformation LEGAL vstechnicalaccess Unauthorizedaccessshould be logged and prosecuted Company encryption (PCI) End-to-endencryption (personal) 13 DomainAdmins, helpdesk Administrative access is not logged (it is technically ”legal”) Same problem withadmins Difficult, requireseducation
Third-partyaccess to insider information Non-DisclosureAgreements (NDA) widely used : reactivecontrol NDA seemsconsired as proactivecontrol(?) Detectivecontrolsseems rare Security requirements in contractsseemssparse (”Trust” is common) 14

Más contenido relacionado

Más de Per Thorsheim

WhatsHot Stavanger 2011 - Per Thorsheim
WhatsHot Stavanger 2011 - Per ThorsheimWhatsHot Stavanger 2011 - Per Thorsheim
WhatsHot Stavanger 2011 - Per ThorsheimPer Thorsheim
 
Er styremedlemmer en sikkerhetsrisiko?
Er styremedlemmer en sikkerhetsrisiko?Er styremedlemmer en sikkerhetsrisiko?
Er styremedlemmer en sikkerhetsrisiko?Per Thorsheim
 
Brettvett og Skyvett
Brettvett og SkyvettBrettvett og Skyvett
Brettvett og SkyvettPer Thorsheim
 
Passord - fremdeles den store synderen?
Passord - fremdeles den store synderen?Passord - fremdeles den store synderen?
Passord - fremdeles den store synderen?Per Thorsheim
 
Boring password statistics
Boring password statisticsBoring password statistics
Boring password statisticsPer Thorsheim
 
Passwords & security
Passwords & securityPasswords & security
Passwords & securityPer Thorsheim
 
Firsttuesday Per Thorsheim
Firsttuesday Per ThorsheimFirsttuesday Per Thorsheim
Firsttuesday Per ThorsheimPer Thorsheim
 
Hackers Pub Per Thorsheim Jan 31, 2011
Hackers Pub Per Thorsheim Jan 31, 2011Hackers Pub Per Thorsheim Jan 31, 2011
Hackers Pub Per Thorsheim Jan 31, 2011Per Thorsheim
 
Creating Secure Passwords
Creating Secure PasswordsCreating Secure Passwords
Creating Secure PasswordsPer Thorsheim
 

Más de Per Thorsheim (10)

WhatsHot Stavanger 2011 - Per Thorsheim
WhatsHot Stavanger 2011 - Per ThorsheimWhatsHot Stavanger 2011 - Per Thorsheim
WhatsHot Stavanger 2011 - Per Thorsheim
 
Er styremedlemmer en sikkerhetsrisiko?
Er styremedlemmer en sikkerhetsrisiko?Er styremedlemmer en sikkerhetsrisiko?
Er styremedlemmer en sikkerhetsrisiko?
 
Brettvett og Skyvett
Brettvett og SkyvettBrettvett og Skyvett
Brettvett og Skyvett
 
Passord - fremdeles den store synderen?
Passord - fremdeles den store synderen?Passord - fremdeles den store synderen?
Passord - fremdeles den store synderen?
 
Boring password statistics
Boring password statisticsBoring password statistics
Boring password statistics
 
Passwords & security
Passwords & securityPasswords & security
Passwords & security
 
Firsttuesday Per Thorsheim
Firsttuesday Per ThorsheimFirsttuesday Per Thorsheim
Firsttuesday Per Thorsheim
 
Hackers Pub Per Thorsheim Jan 31, 2011
Hackers Pub Per Thorsheim Jan 31, 2011Hackers Pub Per Thorsheim Jan 31, 2011
Hackers Pub Per Thorsheim Jan 31, 2011
 
Creating Secure Passwords
Creating Secure PasswordsCreating Secure Passwords
Creating Secure Passwords
 
Styresikkerhet
StyresikkerhetStyresikkerhet
Styresikkerhet
 

Último

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Último (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

BOARD MEMBER SECURITY

  • 1. Board member Security Per Thorsheim CISA, CISM, CISSP-ISSAP Security coordinator April 4, 2011
  • 2. The CodesofConduct Dilemma General assembly Bedriftsforsamling (Norway) BoardofDirectors CEO Executiveboard Chief Security Officer (CSO) 2 CodesofConduct Security policy Standards Guidelines ?
  • 3. Company (Security) policy ISACA 4 April 2011 – Per Thorsheim May requirethat all usersuse pc + phoneprovided by company Requireseparationbetweenwork and other private (work) engangements Requireshardening and periodicupdating Disallowsthesharingofaccounts / passwords 3 A practicalchallenge for peoplebeing a memberonmanyboards Easily broken by theabovepracticalchallenge If computer is personal, than it is by definitioninsecure and ”illegal” to use Personal assistant to thexxxmay be a practicalchallenge to solve
  • 4. ISACA 4 April 2011 – Per Thorsheim 4
  • 5. ISACA 4 April 2011 – Per Thorsheim 5 HACKED
  • 6. The CodesofConduct Dilemma ISACA 4 April 2011 – Per Thorsheim DirectorsLiability Assurance ”Styreansvarsforsikring” in Norway (Gross) Negligencewillimpacttheassuranceagreement 6 Iftheboarddoes not complywith (theirown) Codes ofConduct and/or security policy, willthat be considered (gross) negligenceby theinsurancecompany?
  • 7. Recommendations(work in progress) ISACA 4 April 2011 – Per Thorsheim Useof personal PC Remoteaccess Printouts Electronic documents E-mail Leavingtheboard Problems? 7 Disallowed. PC from company Terminal server with 2-factor Cross-cutshredder MS Office passwordprotection Encryptedattachments Standard companyroutine VIP customer service (CSO) CSO / IA : ”Right to audit” ? NASDAQ Directors Desk?
  • 8. Primary insiders Primary insiderA person who is a member of the board of directors or management of a listed company, or who is associated with the company in some other way, and who is therefore subject to certain requirements in respect of trading and reporting trades carried out, cf. Sections 3-1 and 2-6 of the Securities Trading Act. Each listed company is responsible for identifying its primary insiders, and is responsible for providing an up-to-date list of its primary insiders to Oslo Børs. Each primary insider is personally responsible for ensuring that the requirements imposed on him or her by the Securities Trading Act are adhered to. 8
  • 10. ISACA 4 April 2011 – Per Thorsheim 10 Example list ofprimary insiders(nonamesshown)
  • 11. However… ISACA 4 April 2011 – Per Thorsheim (this is thepointwhere I start to getdifficult and annoying…) 11
  • 12.
  • 16. Internals: Access to insideinformation LEGAL vstechnicalaccess Unauthorizedaccessshould be logged and prosecuted Company encryption (PCI) End-to-endencryption (personal) 13 DomainAdmins, helpdesk Administrative access is not logged (it is technically ”legal”) Same problem withadmins Difficult, requireseducation
  • 17. Third-partyaccess to insider information Non-DisclosureAgreements (NDA) widely used : reactivecontrol NDA seemsconsired as proactivecontrol(?) Detectivecontrolsseems rare Security requirements in contractsseemssparse (”Trust” is common) 14
  • 18. Recommendation(the ”easy” one…) ISACA 4 April 2011 – Per Thorsheim 15
  • 19. Last, but not least: Passwords^11 2 dayconferenceonpasswords & pins only Attacks, defenses, forensics and usabilityaspectscovered Panel discussion: ”willwe ever get rid ofpasswords?” Bergen (Norway), June 7-8 Free-for-all (limited seatsavailable) International speakers In collaborationwith: University of Bergen, Professor Tor Helleseth Sponsored by NISNET Free live streamingonustream.tv securitynirvana.blogspot.com& Twitter: #passwords11 16