Overcoming Hidden Risks in a Shared Security Model

OnRamp
Dec. 6, 2017
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
1 of 23

More Related Content

What's hot

Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
Information Security ManagementInformation Security Management
Information Security ManagementEC-Council
The insider versus external threatThe insider versus external threat
The insider versus external threatzhihaochen
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overviewelvinchan
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardSecurityScorecard
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data SecurityImperva

Similar to Overcoming Hidden Risks in a Shared Security Model

Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
Digital Ethical Risk AssessmentDigital Ethical Risk Assessment
Digital Ethical Risk AssessmentMarc St-Pierre
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 DVV Solutions Third Party Risk Management
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations

More from OnRamp

Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)OnRamp
Transform Your Business with Supply Chain AI and a Modern InfrastructureTransform Your Business with Supply Chain AI and a Modern Infrastructure
Transform Your Business with Supply Chain AI and a Modern InfrastructureOnRamp
Insider Secrets to Oracle License ManagementInsider Secrets to Oracle License Management
Insider Secrets to Oracle License ManagementOnRamp
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the CloudOnRamp
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations OnRamp
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp

Recently uploaded

GDSC Cloud Lead Presentation.pptxGDSC Cloud Lead Presentation.pptx
GDSC Cloud Lead Presentation.pptxAbhinavNautiyal8
Webhook Testing StrategyWebhook Testing Strategy
Webhook Testing StrategyDimpy Adhikary
Need for Speed: Removing speed bumps in API ProjectsNeed for Speed: Removing speed bumps in API Projects
Need for Speed: Removing speed bumps in API ProjectsŁukasz Chruściel
"Building Asynchronous SOA for Modern Applications", Sai Pragna Etikyala "Building Asynchronous SOA for Modern Applications", Sai Pragna Etikyala
"Building Asynchronous SOA for Modern Applications", Sai Pragna Etikyala Fwdays
How is AI changing journalism? Strategic considerations for publishers and ne...How is AI changing journalism? Strategic considerations for publishers and ne...
How is AI changing journalism? Strategic considerations for publishers and ne...Damian Radcliffe
Take Control of Podcasting thanks to Open Source and Podcasting 2.0Take Control of Podcasting thanks to Open Source and Podcasting 2.0
Take Control of Podcasting thanks to Open Source and Podcasting 2.0🎙 Benjamin Bellamy

Recently uploaded(20)

Overcoming Hidden Risks in a Shared Security Model

Editor's Notes

  1. Chad Provide insights into risk management governance. What are the obstacles? Budget, resources, knowledge, etc.   Maria Discuss differences and similarities in the landscape among the industries you serve. Discuss top threat sources.     Michael Discuss the cost of compliance versus non-compliance. Remaining non-compliant is not an option. Organizations are on the hook for ongoing penalties until they become compliant. Penalties are not openly discussed nor widely publicized, but they can be catastrophic to a small business.  
  2. Chad Discuss the evolution to a third party ecosystem and how it’s only one of the many challenges executives face. Compliance and security is not their core business.   Third parties are not limited to outsourcing alone, though. Third parties can also be your suppliers. Think about a large global organization with a massive supply chain could have thousands of supplier relationships with digital entities.
  3. Chad Compliance regulations are written as though there’s one party responsible, even though there are a number of participants.   Football analogy: it’s like creating a play for one player when there are multiple players, and multiple teams.
  4. Maria  Discuss challenges at a high level.   Continuing the football analogy: It’s as if your coach isn’t tell you what position you’re playing during the game or evaluating post-game recaps to continue to improve your performance. You weren’t given a helmet and have no clue what plays you’re running.  
  5. Maria Discuss the limitations of compliance frameworks. Highlight the fact that they are not prescriptive, but instead are up for interpretation. Discuss regulations that offer certification by a third-party auditor, versus others do not have a formalized way to prove compliance.   Michael Discuss PCI DSS requirements and which ones require shared responsibilities with vendors and partners. Discuss Common misconceptions of the requirements.  
  6. Michael   Internal policies and processes are PREREQUISTES to bringing in a 3rd party – you must have those in order prior to adding complexity of external parties. When your organization doesn’t have a baseline of standards, you open your organization up to vulnerabilities. If you suspect you don’t have the right policies and procedures in place, chances are you are right – and you won’t have control or confidence over your security internally or exchanging data with providers. You must not only develop policies and processes, but also enforce them. (1st and last symptom) who has access to their information and that they rely on contractual agreements for peace of mind. Highlight the fact that organizations are unable to determine
  7. Michael
  8. Maria Discuss the stats from the State of Compliance 2016 report.   Most boards and executives perceive compliance and security to be important to their organization’s growth and well-being, but the majority of them are not involved. They do not play a key role in the strategy or execution of the plans that maintain risk management. This disconnect impacts employee perception of senior leadership’s role in their organizations’ compliance programs, as only 16% of respondents indicated their employees view the CEO as the compliance and ethics champion at their organizations.    
  9. Maria Discuss who is responsible for what across departments. Operations, Security, Compliance, and IT take the lead on strategy, information custodians (i.e. Database Administrator) control access to the data, and information owners can be in any department. Everyone plays a part in reducing vulnerabilities, reporting possible security incidents, etc.    
  10. Chad Discuss how security is different across different types of infrastructures. Some responsibilities are shared, while others are clearly one or the other party. Include examples of differences in physical vs virtualized environment security.
  11. Chad   Organizations admin they are sharing sensitive data with vendors and supplies that have poor security, but they also aren’t doing anything about it. In Ponemon’s 2017 Data Risk Survey, 58% of organizations stated that it’s not possible to determine if their 3rd parties have sufficient safeguards.   Only 1/3 of organizations perform frequent review of vendor management policies to make sure they address the changing landscape. And about 38% of organizations have no tracking methods regarding their risk management program internally or externally.
  12. Michael   Discuss the warning signs of a 3rd party that is struggling with their own security measures, and will likely put you at risk, too. It’s not impossible to determine like some organizations indicate across studies.
  13. Michael   Target breach due to HVAC vendor hack: HVAC vendor did not use appropriate anti-malware software or two-factor authentication for contractors, leaving a backdoor open to Target’s network. Hackers breach Equifax’s portal, stealing W-2 data: The trouble stemmed from TALX, an Equifax subsidiary that provides online payroll, HR and tax services. Hackers were able to reset the 4-digit PIN given to customer employees as a password and then steal W-2 tax data after successfully answering personal questions about those employees. The PIN was the only security measure put in place. Uber pays hackers $100,000 to hide year-old breach of 57 million users. Hackers accessed Github.com, a third-party cloud storage website used by Uber software engineers. Employee training could have prevented passwords from being on a public forum.   Sources: http://www.zdnet.com/article/anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned/ https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/thomasbrewster/2017/09/08/equifax-data-breach- history/&refURL=https://www.google.com/&referrer=https://www.google.com/ https://www.usatoday.com/story/tech/2017/11/21/uber-kept-mum-year-hack-info-57-million-riders-and-drivers/887002001/
  14. Maria Discuss the risk management lifecycle. Review the lifecycle and draw particular attention to documentation and audit-prep, as it’s not enough to be compliant and secure—you must have proof of your efforts: Documentation To address the risk, companies should have an inventory of all third-party vendors. In your contracts with 3rd party vendors, make sure you address how our information is being access and processed, including with whom you have no direct relationship – aka a 4th party. Audits ‘Weakest Link’ Attack Methodology’: An attacker does not want to spend a great deal of time looking for a way into a target network. The objective is to obtain entry, gather valuables, and abscond in a minimal timeframe To address the risk, companies should have an inventory of all third-party vendors. In your contracts with 3rd party vendors, make sure you address how our information is being access and processed, including with whom you have no direct relationship – aka 4th party  
  15. Chad Develop a strong compliance and security posture within your organization (policies, processes, technology). Discuss the ideal strategy and highlight a few of the most important aspects.
  16. Chad