SlideShare a Scribd company logo
1 of 37
THERE’S A CRIPPLING
CYBERSECURITY ATTACK COMING
YOUR WAY!
Is Our Coordinated Response Ready to Stop It?
Brian Dickard, Director – Enterprise Risk Management, First Data
Introduction
 The threat is real and sophisticated
 The damage could be catastrophic
 Our current ability to mount a
coordinated response is limited
 It doesn’t have to be this way!
2
Top Threats to the USA
1. Terrorism
 We are still a huge target
2. Cyber Attack
 Especially to critical infrastructure
3. Still Weak US Economy
 No buffer in monetary policy
4. (Large Nation States)
 Will seek territorial expansion
5. Climate Change
 Source: 2014 RSA Archer GRC Summit, Gen. Wesley Clark keynote address
3
Is Anyone Else Concerned?
Worldwide Survey of Security Professionals:
 Do you expect a cyberattack to strike your
organization in 2015?
 Yes = 48%
 ISACA “State of Cybersecurity Survey” reported Very Likely and Likely at a
combined 83%
 Do you think cyberattacks are among the three
biggest threats facing organizations today?
 Yes = 83%
 Source: 2015 ISACA Global Cybersecurity Status Report; State of Cybersecurity:
Implications for 2015 (ISACA/RSA)
4
Is Anyone Else Concerned?
 On a national level, what are you concerned
about?
 95% concerned about a cyberattack, physical attack or both
 Is your organization prepared for a sophisticated
cyberattack?
 Combined No and Unsure = 61%
 Do you believe there is a shortage of skilled
cybersecurity professionals?
 Yes = 86%
 Source: 2015 ISACA Global Cybersecurity Status Report; State of Cybersecurity:
Implications for 2015 (ISACA/RSA)
5
The Threat is Real
 Nation-states (Russia, China, Iran) are more
than willing to steal or destroy US digital property
 Non-state actors (Hamas or Hezbollah) have
demonstrated advanced cyberattack methods
 US companies estimate $250 billion in IP losses
alone each year
 Source: The Heritage Foundation – A Congressional Guide: Seven Steps to US Security,
Prosperity and Freedom in Cyberspace
6
Cyber Threat Tiers
 Cyber Crime
 Ex. Identify Theft – 10’s of billions in losses each year
 Cyber Espionage
 Ex. Stealing military secrets – trillions in US national
security interest IP has been stolen to date
 Cyber Warfare
 Impair critical infrastructure as a stand-alone attack, or
in connection with a kinetic attack
7
A Scary Scenario
8
American Blackout
 Day 1:
 Nationwide rolling blackout initiated by a
coordinated cyberattack
 Widespread traffic gridlock within hours in metro
areas
 Gas stations and ATMs no longer work
 Day 2:
 Grid engineers report widespread physical grid
damage inflicted
 US work force unable to work; billions in
immediate negative economic impact
 Citizens advised to shelter in place
9
American Blackout
 Day 3:
 No more running water or functioning toilets
 US food distribution network shuts down
 Remaining functional gas stations and grocery stores close
as stock sells out
 Sporadic food and water riots break out
 National state of emergency declared (dusk to dawn curfew)
 All US banks and financial markets remain closed
 Widespread criminal activity breaks out
 Day 4:
 Fed government takes over food, water and gas supply
distribution
 Riots more widespread
 Veneer of civilized behavior starting to fray
10
American Blackout
 Day 5:
 Candles and generators cause widespread house
fires (no water to contain them)
 Generators at emergency and communication
facilities start to run out of fuel
 Day 6:
 Red Cross camps stay open but are limited and
overwhelmed
 Hospitals treating emergencies only
 FEMA/military supervision of infrastructure
increases
 Gang violence widespread
11
American Blackout
 Day 8:
 President requests international aid
 Death toll from civil unrest rising
 Martial Law imminent
 Day 9:
 US Allies unleash massive aid delivery
 Grid engineers close to limited power restore
 Day 10:
 Widespread power restored; specific source of the
attack still not identified; no claim of responsibility
12
Fallout
 Conservative projections:
 10’s of thousands dead from civil unrest alone
 100’s of billions in economic impact
 Physical grid repair will take years
 Real Life Comparison:
 2003 two day blackout in 8 NE US states
 50 million people impacted, 11 deaths, $10 billion in
economic impact
 Watch:
https://www.youtube.com/watch?v=FYoXxVnTePA
13
Farfetched?
 A USA Today study found that once every four days
part of the US power grid is hit with a cyber or physical
attack
 Trend Micro Survey:
 575 companies or agencies maintaining critical infrastructure
 40% have faced malicious attacks seeking to shutdown
networks; 44% seeking to delete files; 54% attempted
control system takeovers
 Source: Reuters
 Some of this is advance recon and planting malware
for future use
14
State of Prevention and Response
 Federal Legislation
 Private Industry
 The Attackers
 Issues and Concerns
15
Federal Legislative History
 Cyberspace Policy Review – 2009
 Exec branch report encouraged info sharing and
coordinated incident response
 Cybersecurity Legislative Proposal - 2011
 National breach reporting
 Lots of debate, little action
 International Strategy for Cyberspace – 2011
 Let’s all play nice
16
Federal Legislative History
 Cyber Intelligence Sharing and Protection
Act of 2012
 Provide for sharing cyber threat intelligence
 Passed House; stalled in Senate
 Senate Cybersecurity Act of 2012
 Similar info sharing provisions
 Protection of critical infrastructure
 Voted down by Senate Republicans
17
Federal Legislative History
 2013 Executive Order: Improve Critical
Infrastructure Cybersecurity
 Continued inaction in Congress
 2015 Executive Order: Cybersecurity
Legislative Proposal
 Info sharing with liability limits
 Cyber Threat Intelligence Integration Center
created (Office of Dir. National Intelligence)
18
Recently Enacted Legislation
 Cybersecurity Enhancement Act of 2014
 Voluntary public-private partnership to improve
cybersecurity
 National Cybersecurity Protection Act
 Established National Cybersecurity and
Communications Integration Center (NCCIC)
 Cybersecurity Workforce Assessment Act
 DoHS directed to conduct every three years
 Source: ISACA Cybersecurity Legislation Watch Center
19
Modernizing Law Enforcement
 Update Computer Fraud and Abuse Act
 Active prosecution for intentional attacks;
revisit Patriot Act provisions
 April 2015: National Emergency declared
 Impose sanctions on entities that pose a
cyber threat (freeze assets; block potential
attacks)
 Includes stealing IP and fraud
20
Private Industry - Any Better?
 Critical infrastructure largely privately
owned and operated
 March 2015: Joint letter to Congress to
urge new legislation
 Lockheed Martin, Microsoft, Morgan
Stanley, Ford
 Did not sign: Apple, Google, Facebook
21
Private Industry - Any Better?
 Facebook: “ThreatExchange”
 Participants: Bitly, Dropbox, Facebook,
Pinterest, Tumblr, Twitter, Yahoo
 Share cyber threat information with strict
controls on content sharing and data privacy
22
How About This One?
 “Google Threatens to Air Microsoft and
Apple’s Dirty Code” – Bloomberg Feb. 2015
 “Project Zero” identified 39 critical vulns
in Apple products, 20 Microsoft, 37
Adobe, 22 Freetype font library
 Publish software vulnerabilities unless
they are patched within 90 days
23
Cybersecurity Insurance
 Participate in NCCIC/CTIIC or purchase
cybersecurity event insurance?
 Insurance purchases increased 32% in
2014 (Source: Business Insurance)
 Issue: Can’t find enough underwriters
24
Cybercriminal Element
 Waiting for legislated information sharing?
 Growing more bold and sophisticated
 They don’t care about:
 Your privacy or constitutional rights
 Your financial or emotional well being
25
Issues and Concerns
 Should business wait or proceed on their
own?
 Is legislation the right approach given the
threat?
 Will info sharing expand government
surveillance?
 NSA reforms needed – should Patriot Act
provisions be extended?
26
Issues and Concerns
 Data Breach Notification
 What do you think of the US President’s
proposal to require companies to notify
customers within 30 days of a data breach?
 76% agree or strongly agree
 What do you think the greatest challenge
companies would face if they needed to notify
consumers of a data breach?
 55% = Concern over corporate reputation
 Source: ISACA 2015 Global Security Status Report
27
Issues and Concerns
 Audits of critical infrastructure and industrial
automation systems – mandatory with state
or federal oversight?
 Implications of “safe harbor” provisions – should
meeting a specific level of preparedness exempt
you from breach liability?
 Should participation in information sharing
forums give you liability protection?
28
Issues and Concerns
 Can companies be sued for violating data
privacy or anti-trust provisions if they share
information for cybersecurity purposes?
 Cyber self-defense – counterattacks
 Should the government limit the extent of
countermeasures?
29
Key Components of Effective
Legislation
 Enabling information sharing instead of
mandating it
 Encouraging the development of a viable
cybersecurity liability and insurance system
 Creating a private-sector structure that
fosters cyber-supply-chain security ratings
 Defining limited cyber self-defense standards
for industry
 Source: The Heritage Foundation - A Congressional Guide: Seven Steps to
US Security, Prosperity and Freedom in Cyberspace
30
Key Components of Effective
Legislation
 Advocating for more private-sector efforts to
promote general awareness, education, and
training across America
 Reforming science, technology, engineering,
and mathematics (STEM) education to create
a strong cyber workforce within industry and
government
 Leading responsible international cyber
engagement
 Source: The Heritage Foundation - A Congressional Guide: Seven Steps to
US Security, Prosperity and Freedom in Cyberspace
31
Bills Worth Watching
 USA Freedom Act
 Cyber Privacy Fortification Act (HR 104)
 Cyber Intelligence Sharing and Protection Act
(HR 234)
 Federal Exchange Data Breach Notification
Act (HR 555)
 Data Accountability and Trust Act (HR 580)
 Commercial Privacy Bill of Rights Act (HR 1053)
 Protecting Cyber Networks Act (HR 1560)
 Passed House on April 23
 Source: ISACA Cybersecurity Legislation Watch Center
32
Bills Worth Watching
 National Cybersecurity Protection
Advancement Act (HR 1731)
 Secure Data Act (S 135)
 Data Security and Breach Notification Act (S
177)
 Cyber Threat Sharing Act (S 456)
 Commercial Privacy Bill of Rights Act (S 547)
 Cybersecurity Information Sharing Act (S 754)
 Source: ISACA Cybersecurity Legislation Watch Center
33
Call to Action
 ISACA Cybersecurity Legislation Watch Center
 http://www.isaca.org/cyber/Pages/cybersecuritylegislation.as
px
 2015 Global Cybersecurity Status Report
 http://www.isaca.org/pages/cybersecurity-global-status-
report.aspx
 State of Cybersecurity: Implications for 2015
 http://www.isaca.org/cyber/Documents/State-of-
Cybersecurity_Res_Eng_0415.pdf
 Presented in conjunction with the RSA Conference
34
Call to Action
 ISACA / ISSA sponsorship with member
advocacy and involvement:
 National Strategic Risk Policy
 Global Cyber Governance Framework
 NIST Cybersecurity Framework
 Is there enough active involvement from ISACA
beyond supplying COBIT 5 as a reference model?
35
Call to Action
 Get involved on a company, community,
state and federal level
 Encourage your company to participate in the
private and government-sponsored
cybersecurity information sharing forums
 Lobby your congressional representatives for
responsible legislation; enablers not absolutes
36
Thank You!
Questions?
bdickard@yahoo.com
37

More Related Content

What's hot

An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of GovernmentsRobbie Mitchell
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
#Protect2020: Securing the Heart of Our Election Systems
#Protect2020: Securing the Heart of Our Election Systems#Protect2020: Securing the Heart of Our Election Systems
#Protect2020: Securing the Heart of Our Election SystemsDevOps.com
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Kevin Murphy
 
Marriage of Cyber Security with Emergency Management - Congress
Marriage of Cyber Security with Emergency Management  - CongressMarriage of Cyber Security with Emergency Management  - Congress
Marriage of Cyber Security with Emergency Management - CongressDavid Sweigert
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
Michigan Cyber TTX response planning ESF 18
Michigan Cyber TTX response planning   ESF 18 Michigan Cyber TTX response planning   ESF 18
Michigan Cyber TTX response planning ESF 18 David Sweigert
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030Scott Dickson
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
Fbi Ppt Que Vazou Cisco Falsificado Omb Briefing 2008 01 11 A
Fbi Ppt Que Vazou Cisco Falsificado Omb Briefing 2008 01 11 AFbi Ppt Que Vazou Cisco Falsificado Omb Briefing 2008 01 11 A
Fbi Ppt Que Vazou Cisco Falsificado Omb Briefing 2008 01 11 ACarlos Alberto Teixeira
 

What's hot (20)

An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
ARTICLE 4/27/12
ARTICLE 4/27/12ARTICLE 4/27/12
ARTICLE 4/27/12
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
#Protect2020: Securing the Heart of Our Election Systems
#Protect2020: Securing the Heart of Our Election Systems#Protect2020: Securing the Heart of Our Election Systems
#Protect2020: Securing the Heart of Our Election Systems
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
 
Marriage of Cyber Security with Emergency Management - Congress
Marriage of Cyber Security with Emergency Management  - CongressMarriage of Cyber Security with Emergency Management  - Congress
Marriage of Cyber Security with Emergency Management - Congress
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Michigan Cyber TTX response planning ESF 18
Michigan Cyber TTX response planning   ESF 18 Michigan Cyber TTX response planning   ESF 18
Michigan Cyber TTX response planning ESF 18
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Fbi Ppt Que Vazou Cisco Falsificado Omb Briefing 2008 01 11 A
Fbi Ppt Que Vazou Cisco Falsificado Omb Briefing 2008 01 11 AFbi Ppt Que Vazou Cisco Falsificado Omb Briefing 2008 01 11 A
Fbi Ppt Que Vazou Cisco Falsificado Omb Briefing 2008 01 11 A
 

Viewers also liked

Barberis -article_AFDI 1999 doc.1
Barberis -article_AFDI 1999 doc.1Barberis -article_AFDI 1999 doc.1
Barberis -article_AFDI 1999 doc.1Photography
 
is the bible reliable
is the bible reliableis the bible reliable
is the bible reliablePhotography
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Brian K. Dickard
 
Why Cell Phones Should not be Banned While Driving
Why Cell Phones Should not be Banned While DrivingWhy Cell Phones Should not be Banned While Driving
Why Cell Phones Should not be Banned While DrivingRefurbished Apple
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 

Viewers also liked (10)

Photo-eye
Photo-eyePhoto-eye
Photo-eye
 
Barberis -article_AFDI 1999 doc.1
Barberis -article_AFDI 1999 doc.1Barberis -article_AFDI 1999 doc.1
Barberis -article_AFDI 1999 doc.1
 
Ddu for ap ms edit
Ddu for ap ms   editDdu for ap ms   edit
Ddu for ap ms edit
 
Lumbar
LumbarLumbar
Lumbar
 
Attachment (1)
Attachment (1)Attachment (1)
Attachment (1)
 
is the bible reliable
is the bible reliableis the bible reliable
is the bible reliable
 
Nikon d50
Nikon d50Nikon d50
Nikon d50
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)
 
Why Cell Phones Should not be Banned While Driving
Why Cell Phones Should not be Banned While DrivingWhy Cell Phones Should not be Banned While Driving
Why Cell Phones Should not be Banned While Driving
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 

Similar to There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?

61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infrasimisterchristen
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...Fas (Feisal) Mosleh
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...SophiaPalmira
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agendanationalconsumersleague
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationPECB
 
Message to White House to take Cyber Security seriously - from MIT
Message to White House to take Cyber Security seriously - from MITMessage to White House to take Cyber Security seriously - from MIT
Message to White House to take Cyber Security seriously - from MITDavid Sweigert
 
June 16 2015 P&S Update Webinar
June 16 2015 P&S Update WebinarJune 16 2015 P&S Update Webinar
June 16 2015 P&S Update WebinarMichael R Geske
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
The Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data BreachesThe Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data BreachesLightCyber-Inc
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportLandon Harrell
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxronak56
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfssuserc1c354
 
Rvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info SharingRvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info Sharingcwysopal
 
National security during covid
National security during covidNational security during covid
National security during covidShaynaBlum
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 

Similar to There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it? (20)

61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agenda
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
 
Message to White House to take Cyber Security seriously - from MIT
Message to White House to take Cyber Security seriously - from MITMessage to White House to take Cyber Security seriously - from MIT
Message to White House to take Cyber Security seriously - from MIT
 
June 16 2015 P&S Update Webinar
June 16 2015 P&S Update WebinarJune 16 2015 P&S Update Webinar
June 16 2015 P&S Update Webinar
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
The Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data BreachesThe Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data Breaches
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final Report
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
Rvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info SharingRvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info Sharing
 
National security during covid
National security during covidNational security during covid
National security during covid
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?

  • 1. THERE’S A CRIPPLING CYBERSECURITY ATTACK COMING YOUR WAY! Is Our Coordinated Response Ready to Stop It? Brian Dickard, Director – Enterprise Risk Management, First Data
  • 2. Introduction  The threat is real and sophisticated  The damage could be catastrophic  Our current ability to mount a coordinated response is limited  It doesn’t have to be this way! 2
  • 3. Top Threats to the USA 1. Terrorism  We are still a huge target 2. Cyber Attack  Especially to critical infrastructure 3. Still Weak US Economy  No buffer in monetary policy 4. (Large Nation States)  Will seek territorial expansion 5. Climate Change  Source: 2014 RSA Archer GRC Summit, Gen. Wesley Clark keynote address 3
  • 4. Is Anyone Else Concerned? Worldwide Survey of Security Professionals:  Do you expect a cyberattack to strike your organization in 2015?  Yes = 48%  ISACA “State of Cybersecurity Survey” reported Very Likely and Likely at a combined 83%  Do you think cyberattacks are among the three biggest threats facing organizations today?  Yes = 83%  Source: 2015 ISACA Global Cybersecurity Status Report; State of Cybersecurity: Implications for 2015 (ISACA/RSA) 4
  • 5. Is Anyone Else Concerned?  On a national level, what are you concerned about?  95% concerned about a cyberattack, physical attack or both  Is your organization prepared for a sophisticated cyberattack?  Combined No and Unsure = 61%  Do you believe there is a shortage of skilled cybersecurity professionals?  Yes = 86%  Source: 2015 ISACA Global Cybersecurity Status Report; State of Cybersecurity: Implications for 2015 (ISACA/RSA) 5
  • 6. The Threat is Real  Nation-states (Russia, China, Iran) are more than willing to steal or destroy US digital property  Non-state actors (Hamas or Hezbollah) have demonstrated advanced cyberattack methods  US companies estimate $250 billion in IP losses alone each year  Source: The Heritage Foundation – A Congressional Guide: Seven Steps to US Security, Prosperity and Freedom in Cyberspace 6
  • 7. Cyber Threat Tiers  Cyber Crime  Ex. Identify Theft – 10’s of billions in losses each year  Cyber Espionage  Ex. Stealing military secrets – trillions in US national security interest IP has been stolen to date  Cyber Warfare  Impair critical infrastructure as a stand-alone attack, or in connection with a kinetic attack 7
  • 9. American Blackout  Day 1:  Nationwide rolling blackout initiated by a coordinated cyberattack  Widespread traffic gridlock within hours in metro areas  Gas stations and ATMs no longer work  Day 2:  Grid engineers report widespread physical grid damage inflicted  US work force unable to work; billions in immediate negative economic impact  Citizens advised to shelter in place 9
  • 10. American Blackout  Day 3:  No more running water or functioning toilets  US food distribution network shuts down  Remaining functional gas stations and grocery stores close as stock sells out  Sporadic food and water riots break out  National state of emergency declared (dusk to dawn curfew)  All US banks and financial markets remain closed  Widespread criminal activity breaks out  Day 4:  Fed government takes over food, water and gas supply distribution  Riots more widespread  Veneer of civilized behavior starting to fray 10
  • 11. American Blackout  Day 5:  Candles and generators cause widespread house fires (no water to contain them)  Generators at emergency and communication facilities start to run out of fuel  Day 6:  Red Cross camps stay open but are limited and overwhelmed  Hospitals treating emergencies only  FEMA/military supervision of infrastructure increases  Gang violence widespread 11
  • 12. American Blackout  Day 8:  President requests international aid  Death toll from civil unrest rising  Martial Law imminent  Day 9:  US Allies unleash massive aid delivery  Grid engineers close to limited power restore  Day 10:  Widespread power restored; specific source of the attack still not identified; no claim of responsibility 12
  • 13. Fallout  Conservative projections:  10’s of thousands dead from civil unrest alone  100’s of billions in economic impact  Physical grid repair will take years  Real Life Comparison:  2003 two day blackout in 8 NE US states  50 million people impacted, 11 deaths, $10 billion in economic impact  Watch: https://www.youtube.com/watch?v=FYoXxVnTePA 13
  • 14. Farfetched?  A USA Today study found that once every four days part of the US power grid is hit with a cyber or physical attack  Trend Micro Survey:  575 companies or agencies maintaining critical infrastructure  40% have faced malicious attacks seeking to shutdown networks; 44% seeking to delete files; 54% attempted control system takeovers  Source: Reuters  Some of this is advance recon and planting malware for future use 14
  • 15. State of Prevention and Response  Federal Legislation  Private Industry  The Attackers  Issues and Concerns 15
  • 16. Federal Legislative History  Cyberspace Policy Review – 2009  Exec branch report encouraged info sharing and coordinated incident response  Cybersecurity Legislative Proposal - 2011  National breach reporting  Lots of debate, little action  International Strategy for Cyberspace – 2011  Let’s all play nice 16
  • 17. Federal Legislative History  Cyber Intelligence Sharing and Protection Act of 2012  Provide for sharing cyber threat intelligence  Passed House; stalled in Senate  Senate Cybersecurity Act of 2012  Similar info sharing provisions  Protection of critical infrastructure  Voted down by Senate Republicans 17
  • 18. Federal Legislative History  2013 Executive Order: Improve Critical Infrastructure Cybersecurity  Continued inaction in Congress  2015 Executive Order: Cybersecurity Legislative Proposal  Info sharing with liability limits  Cyber Threat Intelligence Integration Center created (Office of Dir. National Intelligence) 18
  • 19. Recently Enacted Legislation  Cybersecurity Enhancement Act of 2014  Voluntary public-private partnership to improve cybersecurity  National Cybersecurity Protection Act  Established National Cybersecurity and Communications Integration Center (NCCIC)  Cybersecurity Workforce Assessment Act  DoHS directed to conduct every three years  Source: ISACA Cybersecurity Legislation Watch Center 19
  • 20. Modernizing Law Enforcement  Update Computer Fraud and Abuse Act  Active prosecution for intentional attacks; revisit Patriot Act provisions  April 2015: National Emergency declared  Impose sanctions on entities that pose a cyber threat (freeze assets; block potential attacks)  Includes stealing IP and fraud 20
  • 21. Private Industry - Any Better?  Critical infrastructure largely privately owned and operated  March 2015: Joint letter to Congress to urge new legislation  Lockheed Martin, Microsoft, Morgan Stanley, Ford  Did not sign: Apple, Google, Facebook 21
  • 22. Private Industry - Any Better?  Facebook: “ThreatExchange”  Participants: Bitly, Dropbox, Facebook, Pinterest, Tumblr, Twitter, Yahoo  Share cyber threat information with strict controls on content sharing and data privacy 22
  • 23. How About This One?  “Google Threatens to Air Microsoft and Apple’s Dirty Code” – Bloomberg Feb. 2015  “Project Zero” identified 39 critical vulns in Apple products, 20 Microsoft, 37 Adobe, 22 Freetype font library  Publish software vulnerabilities unless they are patched within 90 days 23
  • 24. Cybersecurity Insurance  Participate in NCCIC/CTIIC or purchase cybersecurity event insurance?  Insurance purchases increased 32% in 2014 (Source: Business Insurance)  Issue: Can’t find enough underwriters 24
  • 25. Cybercriminal Element  Waiting for legislated information sharing?  Growing more bold and sophisticated  They don’t care about:  Your privacy or constitutional rights  Your financial or emotional well being 25
  • 26. Issues and Concerns  Should business wait or proceed on their own?  Is legislation the right approach given the threat?  Will info sharing expand government surveillance?  NSA reforms needed – should Patriot Act provisions be extended? 26
  • 27. Issues and Concerns  Data Breach Notification  What do you think of the US President’s proposal to require companies to notify customers within 30 days of a data breach?  76% agree or strongly agree  What do you think the greatest challenge companies would face if they needed to notify consumers of a data breach?  55% = Concern over corporate reputation  Source: ISACA 2015 Global Security Status Report 27
  • 28. Issues and Concerns  Audits of critical infrastructure and industrial automation systems – mandatory with state or federal oversight?  Implications of “safe harbor” provisions – should meeting a specific level of preparedness exempt you from breach liability?  Should participation in information sharing forums give you liability protection? 28
  • 29. Issues and Concerns  Can companies be sued for violating data privacy or anti-trust provisions if they share information for cybersecurity purposes?  Cyber self-defense – counterattacks  Should the government limit the extent of countermeasures? 29
  • 30. Key Components of Effective Legislation  Enabling information sharing instead of mandating it  Encouraging the development of a viable cybersecurity liability and insurance system  Creating a private-sector structure that fosters cyber-supply-chain security ratings  Defining limited cyber self-defense standards for industry  Source: The Heritage Foundation - A Congressional Guide: Seven Steps to US Security, Prosperity and Freedom in Cyberspace 30
  • 31. Key Components of Effective Legislation  Advocating for more private-sector efforts to promote general awareness, education, and training across America  Reforming science, technology, engineering, and mathematics (STEM) education to create a strong cyber workforce within industry and government  Leading responsible international cyber engagement  Source: The Heritage Foundation - A Congressional Guide: Seven Steps to US Security, Prosperity and Freedom in Cyberspace 31
  • 32. Bills Worth Watching  USA Freedom Act  Cyber Privacy Fortification Act (HR 104)  Cyber Intelligence Sharing and Protection Act (HR 234)  Federal Exchange Data Breach Notification Act (HR 555)  Data Accountability and Trust Act (HR 580)  Commercial Privacy Bill of Rights Act (HR 1053)  Protecting Cyber Networks Act (HR 1560)  Passed House on April 23  Source: ISACA Cybersecurity Legislation Watch Center 32
  • 33. Bills Worth Watching  National Cybersecurity Protection Advancement Act (HR 1731)  Secure Data Act (S 135)  Data Security and Breach Notification Act (S 177)  Cyber Threat Sharing Act (S 456)  Commercial Privacy Bill of Rights Act (S 547)  Cybersecurity Information Sharing Act (S 754)  Source: ISACA Cybersecurity Legislation Watch Center 33
  • 34. Call to Action  ISACA Cybersecurity Legislation Watch Center  http://www.isaca.org/cyber/Pages/cybersecuritylegislation.as px  2015 Global Cybersecurity Status Report  http://www.isaca.org/pages/cybersecurity-global-status- report.aspx  State of Cybersecurity: Implications for 2015  http://www.isaca.org/cyber/Documents/State-of- Cybersecurity_Res_Eng_0415.pdf  Presented in conjunction with the RSA Conference 34
  • 35. Call to Action  ISACA / ISSA sponsorship with member advocacy and involvement:  National Strategic Risk Policy  Global Cyber Governance Framework  NIST Cybersecurity Framework  Is there enough active involvement from ISACA beyond supplying COBIT 5 as a reference model? 35
  • 36. Call to Action  Get involved on a company, community, state and federal level  Encourage your company to participate in the private and government-sponsored cybersecurity information sharing forums  Lobby your congressional representatives for responsible legislation; enablers not absolutes 36