SlideShare a Scribd company logo
1 of 15
Cybersecurity: Mindset
Investigations: Informed decisions
Audit: Perspective
1. A vulnerability will be exploited
2. Everything is vulnerable, somehow
3. We trust, even when we shouldn’t
4. Innovation leads to exploitation
5. When in doubt, see #1
Cybersecurity:
The
(simplified)
Approach
Identify
‘Crown
Jewels’
Protect
Assets
Detect
Incidents
Incident
Response
Mature processes, methods, tools and skills, working in
unison with a common goal.
The ‘Cyber’ objective:
Resulting in:
Well trained people, following
well developed procedures, using
well implemented technology
1. You can never have enough intel
2. Science is your friend
3. Tools are tools. There is no ‘find evidence’ button
4. Someone is going to court
5. Caffeine and jazz seem to help
Digital
Investigations:
Incident or
Need
Research
Hypothesis
Experiment
Analysis
Conclusion
1.
Technical &
Management
Awareness
3.
Incident Response
Escalation
2.
Triage &
Risk Review
4.
Reputational
Management
Digital
Investigatio
n
Lifecycle
Technical &
Management
Awareness
Reputational
Management
Triage &
Risk Review
Incident Response
Escalation
Initial alerting from varied Sources.
Questions are asked. Reviews (tech & process)
INFORMATION*
*Process, workflows, technology, change management, etc..
IR Teams. War rooms. Decisions being made. Lots of noise.
Definitely a problem. PR/HR/Legal are involved.
Audit
Factual source of information in most
organizations?
“…a systematic, disciplined approach to evaluate and improve the
effectiveness of risk management, control and governance
processes."
Internal
Innovation =
Audit challenges
“Why can’t we combat this, easily?”
• Complex Technology
• Adapting Processes
• People
Create relationships
Incident + Operational knowhow + Audit knowledge =
1. Knowledge transfer / cross training is good.
2. Be flexible. Always.
3. Evolve. There’s a world outside of the walls.
4. It takes a village.
…A truly collaborative approach:
ISO/IEC 27032
Training Courses
• ISO/IEC 27032 Introduction
1 Day Course
• ISO/IEC 27032 Foundation
2 Days Course
• ISO/IEC 27032 Lead Cybersecurity Manager
5 Days Course
Exam and certification fees are included in the training price.
www.pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
www.pecb.com/events
THANK YOU
?
jasongreen@hexigent.com
www.hexigent.com/
linkedin.com/in/jasongreen

More Related Content

More from PECB

Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
PECB
 
ISO/IEC 27005:2022 – What are the changes?
ISO/IEC 27005:2022 – What are the changes?ISO/IEC 27005:2022 – What are the changes?
ISO/IEC 27005:2022 – What are the changes?
PECB
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
PECB
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
PECB
 
ISO/IEC 27001 and ISO 22301: How do they map?
ISO/IEC 27001 and ISO 22301: How do they map?ISO/IEC 27001 and ISO 22301: How do they map?
ISO/IEC 27001 and ISO 22301: How do they map?
PECB
 
ISO/IEC 27001, Cybersecurity, and Risk Management: How to avoid data breaches?
ISO/IEC 27001, Cybersecurity, and Risk Management: How to avoid data breaches?ISO/IEC 27001, Cybersecurity, and Risk Management: How to avoid data breaches?
ISO/IEC 27001, Cybersecurity, and Risk Management: How to avoid data breaches?
PECB
 
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
PECB
 
Top 5 information security challenges - How does ISO/IEC 27001 help you?
Top 5 information security challenges - How does ISO/IEC 27001 help you?Top 5 information security challenges - How does ISO/IEC 27001 help you?
Top 5 information security challenges - How does ISO/IEC 27001 help you?
PECB
 

More from PECB (20)

Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management systemISO 28000:2022 – Reduce risks and improve the security management system
ISO 28000:2022 – Reduce risks and improve the security management system
 
ISO/IEC 27005:2022 – What are the changes?
ISO/IEC 27005:2022 – What are the changes?ISO/IEC 27005:2022 – What are the changes?
ISO/IEC 27005:2022 – What are the changes?
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
 
ISO/IEC 27001 and ISO 22301: How do they map?
ISO/IEC 27001 and ISO 22301: How do they map?ISO/IEC 27001 and ISO 22301: How do they map?
ISO/IEC 27001 and ISO 22301: How do they map?
 
ISO/IEC 27001, Cybersecurity, and Risk Management: How to avoid data breaches?
ISO/IEC 27001, Cybersecurity, and Risk Management: How to avoid data breaches?ISO/IEC 27001, Cybersecurity, and Risk Management: How to avoid data breaches?
ISO/IEC 27001, Cybersecurity, and Risk Management: How to avoid data breaches?
 
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
George, Tony, Michael - PECB Webinar 27701 Data Protection Risk Management V1...
 
Top 5 information security challenges - How does ISO/IEC 27001 help you?
Top 5 information security challenges - How does ISO/IEC 27001 help you?Top 5 information security challenges - How does ISO/IEC 27001 help you?
Top 5 information security challenges - How does ISO/IEC 27001 help you?
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

Cybersecurity, Digital investigations, and the 'unsung' Heroes of Incident Support

Editor's Notes

  1. What I’d like to do is talk about the mindset of cybersecurity, demonstrate how more informed decisions are possible using investigative methods, and provide a – possibly – different perspective when considering audits/auditors.
  2. When considering cybersecurity, I’ve found some things that are fact. These haven’t changed much throughout my career and so I’d suggest they will likely to continue to be relevant. Although applying different lens to the following, will allow for a diverse approach. Note – I saw the basis of this list in a Forbes article from Jan 2018, but have repurposed here since it’ll help make some succinct points. The speed of change in technology and the way we use it, has meant that vulnerabilities appear continuously. Bad guys, bad code, bad luck or bad karma means we’re seeing a steep uptick in operational impacts. Fort knox, the whitehouse, my laptop, or the wifi network here at the conference. All, have a one or more weakness. With the application of enough time and effort, they could be found. Then it’s just a matter of time… In any ‘security’ program one things holds true – the human element is the weakest link. We’re pre-programmed to think in certain ways and that can be used against us. In the cyber space, as things improve, things get worse. Functionality v security. Whatever you’re look ing at… it’s vulnerable. If you’re auditing, remember that. Most folk see this list through a technical lens – servers, systems, applications & devices. But what if we re-considered it from a governance perspective…. A vulnerability in your governance model etc… Fresh thinking. Don’t just think technically, about what appears to be a technical issue. It’s bigger. This is usually thought of the in the technical sense, but consider these through the lens of governance/strategy/or process.
  3.   A simple approach to the cybersecurity problem. How do we look at it. Figure out what you need to protect Come up with controls (detective and preventative) Have a way of seeing when things go sideways, or wrong. Have a plan.. a good one.. to make sure fires can be put out…quickly.
  4.   It all sounds great, but what are we actually trying to achieve. What is the ‘cyber objective’  Ultimately, we want to help the folks that pay our salary - or fees - make informed decisions, and keep the lights on at our place of employment. Simple premise. Complex execution.
  5. Switching gears. One of the ‘spokes’ of cyber is incident response. Regardless of what it is, if an investigation is needed, there are some things were remembering. Much like cyber – these don’t really change. Lots of information is needed; in fact… get ‘all the data and information’. A logical and structured approach is needed to make sense of things. Forensic ‘science’ is typically applied to ensure that all avenues are explored, and findings derived. Rinse, repeat. It’s not about the tools… but they help. Everything needs documenting….someone will be going to court and have to defend activities…maybe years away. Self explanatory 
  6.   Blue -The approach to incidents. Note the analysis to research cyclic aspect (for the scientists amongst the audiences). Example could be applied to any type of incident/situation, but lets assume a significant security incident. {walkthrough to examples each component} Orange - Then consider the macro level ‘business view’ of whats going on. {Same – examples – brief}
  7.  Flipping to the business view Tech & management. Initial notifications or understanding. Something is wrong. Needs explanation. Incident management approach is dusted off  Triage & risk. Typically technical triage to validate notification or suspicions. Likely involving 2nd line technical folks, but as things are established, possibly switching to business stakeholders to perform ad hoc risk reviews / suspected impact assessments. IR escalation. Game on. It’s an incident…SMT / board is involved. Now decisions start to get made for a variety or reasons, all with different drivers. Bias becomes a problem (usually). Crisis managers need to step in to wrangle things. While #3 is taking place, if things are serious enough, leadership would look to manage their reputation. Get the right message out…work with facts and not speculation, carefully frame messages, all the while making decisions. All of this needs one thing – information.
  8.   So… information… it’s coming from all directions…but if we step back and consider where the non-traditional sources of some information come from, we see audit. The IA function is one that has been ever present throughout my time in the workforce. They adapt, they evolve, but they’re ever present with the same task.. Rarely seen in incident/investigation situations, but actually valuable. Here’s the story of why…{share story} Not to say my experience either supporting audit, or working with clients to help them through an audit, has always been simple. In fact.. Here’s a visual that best describes the cyber functionsd relationship with auditors, or auditees (depending on your perspective)  Its not that there is conflict, but there can be the perception of conflict. Audit (especially internal audit) can be seen as challenging. Folks don’t have time, don’t’ want to have time. Have better things to do, that they are measured on. The business – rightly – see’s IA as just another function and ‘we’re all in it together for the greater good of the organization’, but those on the ground don’t alway’s align. It can create….friction.
  9. …and it’s not surprising. The raft of technology changes that come so rapidly, mean that security and investigative professionals change the way in which they do things, the tools and methods they use, and agile/lean approach's to combat security challenges. We then ask IA to audit those. They don’t always understand them (as they’re new and constantly moving), and the process of auditing becomes frustrating, on both sides.
  10. The question is asked frequently. Audit want to know why something more measurable might not be in place; The business just assume IA can ‘figure it out’. Compliance requirements help to formalize things, but new requirements are coming continuously they will change the landscape. Mandatory breach reporting across Canada and GDPR – while straightforward in description – will have significant upstream affects when one considers how to comply…effectively and efficiently.
  11. So where’s this going. Bridging the audit/operations gap by building a true appreciation for each others role is beneficial. Sharing knowledge about the challenges and perspectives from both sides will result in more positive interactions. When considering incidents and investigations, using operational know how AND drawing on audit knowledge where needed could potentially result in the unthinkable….
  12. A truly collaborative approach! So let me leave you with another short list. If each business unit or party has an appreciation and understanding of the goals, and the challenges faced…things will be better. If ever the opportunity arises to shadow in each others department, do it. Both sides here…accept that cyber approaches now are flexible. They change continuously and traditional approaches need to adapt. Be open to change, and give more time to truly share context around either requirements , architecture, processes etc.. Keep an eye on how others do things. The cyber community is rich with knowledge which is frequently shared. It’s all readily available, so take a few mins a week to understand how things are changing. Don’t assume your way is the right way (it’s just your way). Contribute, don’t just wait to be told. We’re all in it together. We want to protect our organizations in the most sustainable manner. Everyone plays a part, and when things don’t go to plan, or when incidents are occurring it can take the entire team to course correct, put the fires out, and keep moving forward. All under the watchful, and collaborative eye of the audit function 