SlideShare a Scribd company logo
1 of 24
Download to read offline
ICS Security Compliance -
Ensuring the rubber hits the road
Head Cyber Security Strategy
Mohammed Zumla
Agenda
1.  The Future (back to the..)
2. The Beginning
3. The Journey
4. The End…?
2
1. Back to the future…
3
End state for compliance
Management System
•  Regular reporting BAU
•  Holistic (Wide and deep in key areas)
4
Objectives
v Policy metrics for conformance, driving course changes
v Assurance to management, board, authority and regulator
v Annual improvement programme to improve maturity
v Risk based approach with enhanced control sets ‘enabling business’
So…how to get there….?
Agenda
2. The Beginning
5
Reality check…
6
Identify ‘as-is’ (rule 101)
Biggest challenge..why?
•  Reluctance
•  Undocumented
•  Outdated/incomplete documentation
•  Unverified state
•  Cross-functional domain
7
How to address?
ü Build up trust internally
ü Build templates
ü Build 80% view and move on
Establish leadership model
Centralized Decentralized
Ø  Less responsive to users
Ø  No BU ownership
Ø  No BU cost control
Ø  Doesn’t meet everyone’s
needs
Ø  More costly
Ø  Variable security
competencies
Ø  Reinventing the wheel
Ø  Lack of synergy
BU
ownership
User
priority
Standardize
Right skills
Functional leadership
Enterprise perspective
Pooled resources
Synergy
Top level Information Security Policy
ICS Policy
ICS Standards
ICS Procedures
ICS Guidelines
TG05
Framework
9
Agenda
3. The Journey
10
Garbage in…
11
Summary Compliance & Risk
12
•  Important not to be ‘rule followers’ but instead become ‘risk
leaders’
•  Security should state YES, but..
•  Compliance should state NO, but..
•  Adopt a risk based approach that works for your company
•  Just doing compliance or doing risk assessment alone
doesn’t work
•  Focus on risk assessment and compliance will follow suit
Pre-empting worst case
•  Attackers Goals:
–  Search, access, copy, alter, delete sensitive
information
–  Steal passwords and take screen capture
–  Turn on camera and microphone to eavesdrop
–  Issue commands masquerading as
authenticated device/user
•  Attackers Motivation:
–  Impact state economy
–  Gain competitive edge
–  Social/Political agenda
–  Personal revenge
Echoes from the past…
14
ICT Security
Strategic -
Develop a segmentation model for
additional items. Reprioritize where
required
Ø Logging & monitoring
Ø Business continuity arrangements
Ø Re-architecture
Ø Additional layers defense
Context
•  Been around for some time, F/W, IDS/IPS, A/V etc
•  Plethora of new technologies, but which ones to adopt?
•  Deal with media hype, audits, incidents - Prepare a list of prioritized
controls and take the ‘big ticket’ items for approval first
Tactical -
Limit the attack surface and
spreading capabilities
Ø Minimum assurance level of
operational environment
Ø Third party connectivity
Ø Desktops/Laptops/Mobile devices,
(services, connectivity, media etc.)
Ø Remote access 15
ICS/SCADA
Context
•  Traditionally segregated from corporate networks
•  Scope creep over time
•  Operations managing their own ICT (ICT team not trusted)
•  ‘Air gap’ not always feasible, especially with Digital Oil Field
Tactical -
Segregate wherever possible
Ø Get in new projects FIRST and build
in from the outset (FEED, EPIC…)
Ø Look for ‘quick wins’ in compliance
(Minimal resistance, high impact)
Strategic-
Partner with business and get them to
own their risks
Ø Recruit/identify those with a balance
of ICT, OT skillset and empower
Ø If doing assurance role DON’T get
involved in implementation
Ø Be seen as helping address their
risks and compliance issues
Agenda
4. The End?
17
•  Work is being done to meet timeframe ONLY to satisfy the audit
rather than addressing issues at hand
•  Dominate decision making - impede ability to innovate, perform or
prioritize programs accordingly
•  Allows for ambiguity in large documents sets or worse if it’s in
foreign language
•  Doesn’t provide a view on effectiveness of controls in relation to
the CURRENT environmental landscape, ie Audit Universe for 1 or
2 years
•  Provides a false sense of security if no major concerns brought
up. (If the auditors are not trained up or experienced in the
specialized field then big items may be missed.)
Compliance is the beginning
18
End state for compliance
Typical
•  Address FUD surrounding public incidents
•  Knee-jerk reaction to an in-house incident/near-miss
•  Perceived as trustworthy internally/externally
•  Compliance with regulatory environment
(Gartner CEO survey, #1 concern)
Reality
v  To be a business enabler (extend corporate boundaries)
v  Allow steady increase in usage and exploitation of information
v  Inform there’s a paradigm shift in determination of attackers
v  Ensure continuity of business and plan for the unthinkable
19
Science..not fiction!
20
Balancing Compliance & Risks
•  Compliant but not necessarily secure (ISO/IEC 27001 does
NOT require the use of evaluated products)
•  Secure at a point in time but not compliant (Information Security
Awareness)
•  What’s needed is informed decision making- flexibility for
unique environment, situations, enable business to meet
objectives.
•  So… having an established risk management program will lead
to being compliant
21
Risk Based Approach
•  Adopt and refine a Methodology, appropriate for the business
•  Are the controls commensurate with risk profile?
Maybe, but only at a particular time. After an incident the
controls may not be deemed enough
•  Subjective if not normalized centrally
•  Tendency to make it purely math based
•  May not want to disclose issues to other parts of the business
Impact Levels
Risk Tolerance Levels
Baseline Control Set
Criteria to assess the
effectiveness of Controls
Risk Treatment Plans
Risk remediation
Prioritization of remediation
Risk acceptance
Etc.
22
Summary
23
•  Compliance only goes so far – use it to keep the finger on the pulse,
but don’t get hung up!
•  Risk assessment should qualify your intuition - use it to gain Senior
Management attention and prioritize remediation programs
•  Don’t rely only on traditional control set – introduce a security
capability model and develop tactical and strategic plans
•  Break mentality that it’s just a sole departmental issue – build up
awareness and reinforce that everyone is responsible
•  Adopt a phased approach for dealing with
complex environment - but most importantly if
you are leading, gain trust of operational
managers and drive with GOVERNANCE!
Questions and Answers
	
  
	
  
Thank	
  you
24

More Related Content

What's hot

Risk evaluation presentation power point
Risk evaluation presentation power pointRisk evaluation presentation power point
Risk evaluation presentation power point
Alberto Mico
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product Development
Amandeep Midha
 

What's hot (20)

Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business Continuity
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
R1
R1R1
R1
 
Cse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project ManagementCse it seminar ppt1, An Approach To IT Project Management
Cse it seminar ppt1, An Approach To IT Project Management
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...
3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...
3A - Turning Data into Decisions - Implementing a Cloud-based HSE Leading Ind...
 
Enterprise security incident management
Enterprise security incident managementEnterprise security incident management
Enterprise security incident management
 
Basic risk management presentation 17th june 2015
Basic risk management presentation 17th june 2015Basic risk management presentation 17th june 2015
Basic risk management presentation 17th june 2015
 
Risk evaluation presentation power point
Risk evaluation presentation power pointRisk evaluation presentation power point
Risk evaluation presentation power point
 
Risk Management In Software Product Development
Risk Management In Software Product DevelopmentRisk Management In Software Product Development
Risk Management In Software Product Development
 
Risk and Business Continuity Management
Risk and Business Continuity ManagementRisk and Business Continuity Management
Risk and Business Continuity Management
 
Enterprise risk management presentation to APM SWWE branch
Enterprise risk management presentation to APM SWWE branchEnterprise risk management presentation to APM SWWE branch
Enterprise risk management presentation to APM SWWE branch
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security
 
risk management
risk managementrisk management
risk management
 
Derek Wright: risk v uncertainty case study
Derek Wright: risk v uncertainty case studyDerek Wright: risk v uncertainty case study
Derek Wright: risk v uncertainty case study
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 

Similar to Mzumla_Dome_2015

Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
360 BSI
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
James Rutt
 
ISO Internal Auditors Workshop_Final Version
ISO Internal Auditors Workshop_Final VersionISO Internal Auditors Workshop_Final Version
ISO Internal Auditors Workshop_Final Version
Duncan O. Ogutu; CPA, CFE
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 

Similar to Mzumla_Dome_2015 (20)

Role of the virtual ciso
Role of the virtual cisoRole of the virtual ciso
Role of the virtual ciso
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
It and business risk alignment guide
It and business risk alignment guideIt and business risk alignment guide
It and business risk alignment guide
 
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
Business Continuity, Disaster Recovery Planning & Leadership, 16 - 19 Februar...
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Pm session10
Pm session10Pm session10
Pm session10
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
ISO Internal Auditors Workshop_Final Version
ISO Internal Auditors Workshop_Final VersionISO Internal Auditors Workshop_Final Version
ISO Internal Auditors Workshop_Final Version
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilience
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 

Mzumla_Dome_2015

  • 1. ICS Security Compliance - Ensuring the rubber hits the road Head Cyber Security Strategy Mohammed Zumla
  • 2. Agenda 1.  The Future (back to the..) 2. The Beginning 3. The Journey 4. The End…? 2
  • 3. 1. Back to the future… 3
  • 4. End state for compliance Management System •  Regular reporting BAU •  Holistic (Wide and deep in key areas) 4 Objectives v Policy metrics for conformance, driving course changes v Assurance to management, board, authority and regulator v Annual improvement programme to improve maturity v Risk based approach with enhanced control sets ‘enabling business’ So…how to get there….?
  • 7. Identify ‘as-is’ (rule 101) Biggest challenge..why? •  Reluctance •  Undocumented •  Outdated/incomplete documentation •  Unverified state •  Cross-functional domain 7 How to address? ü Build up trust internally ü Build templates ü Build 80% view and move on
  • 8. Establish leadership model Centralized Decentralized Ø  Less responsive to users Ø  No BU ownership Ø  No BU cost control Ø  Doesn’t meet everyone’s needs Ø  More costly Ø  Variable security competencies Ø  Reinventing the wheel Ø  Lack of synergy BU ownership User priority Standardize Right skills Functional leadership Enterprise perspective Pooled resources Synergy
  • 9. Top level Information Security Policy ICS Policy ICS Standards ICS Procedures ICS Guidelines TG05 Framework 9
  • 12. Summary Compliance & Risk 12 •  Important not to be ‘rule followers’ but instead become ‘risk leaders’ •  Security should state YES, but.. •  Compliance should state NO, but.. •  Adopt a risk based approach that works for your company •  Just doing compliance or doing risk assessment alone doesn’t work •  Focus on risk assessment and compliance will follow suit
  • 13. Pre-empting worst case •  Attackers Goals: –  Search, access, copy, alter, delete sensitive information –  Steal passwords and take screen capture –  Turn on camera and microphone to eavesdrop –  Issue commands masquerading as authenticated device/user •  Attackers Motivation: –  Impact state economy –  Gain competitive edge –  Social/Political agenda –  Personal revenge
  • 14. Echoes from the past… 14
  • 15. ICT Security Strategic - Develop a segmentation model for additional items. Reprioritize where required Ø Logging & monitoring Ø Business continuity arrangements Ø Re-architecture Ø Additional layers defense Context •  Been around for some time, F/W, IDS/IPS, A/V etc •  Plethora of new technologies, but which ones to adopt? •  Deal with media hype, audits, incidents - Prepare a list of prioritized controls and take the ‘big ticket’ items for approval first Tactical - Limit the attack surface and spreading capabilities Ø Minimum assurance level of operational environment Ø Third party connectivity Ø Desktops/Laptops/Mobile devices, (services, connectivity, media etc.) Ø Remote access 15
  • 16. ICS/SCADA Context •  Traditionally segregated from corporate networks •  Scope creep over time •  Operations managing their own ICT (ICT team not trusted) •  ‘Air gap’ not always feasible, especially with Digital Oil Field Tactical - Segregate wherever possible Ø Get in new projects FIRST and build in from the outset (FEED, EPIC…) Ø Look for ‘quick wins’ in compliance (Minimal resistance, high impact) Strategic- Partner with business and get them to own their risks Ø Recruit/identify those with a balance of ICT, OT skillset and empower Ø If doing assurance role DON’T get involved in implementation Ø Be seen as helping address their risks and compliance issues
  • 18. •  Work is being done to meet timeframe ONLY to satisfy the audit rather than addressing issues at hand •  Dominate decision making - impede ability to innovate, perform or prioritize programs accordingly •  Allows for ambiguity in large documents sets or worse if it’s in foreign language •  Doesn’t provide a view on effectiveness of controls in relation to the CURRENT environmental landscape, ie Audit Universe for 1 or 2 years •  Provides a false sense of security if no major concerns brought up. (If the auditors are not trained up or experienced in the specialized field then big items may be missed.) Compliance is the beginning 18
  • 19. End state for compliance Typical •  Address FUD surrounding public incidents •  Knee-jerk reaction to an in-house incident/near-miss •  Perceived as trustworthy internally/externally •  Compliance with regulatory environment (Gartner CEO survey, #1 concern) Reality v  To be a business enabler (extend corporate boundaries) v  Allow steady increase in usage and exploitation of information v  Inform there’s a paradigm shift in determination of attackers v  Ensure continuity of business and plan for the unthinkable 19
  • 21. Balancing Compliance & Risks •  Compliant but not necessarily secure (ISO/IEC 27001 does NOT require the use of evaluated products) •  Secure at a point in time but not compliant (Information Security Awareness) •  What’s needed is informed decision making- flexibility for unique environment, situations, enable business to meet objectives. •  So… having an established risk management program will lead to being compliant 21
  • 22. Risk Based Approach •  Adopt and refine a Methodology, appropriate for the business •  Are the controls commensurate with risk profile? Maybe, but only at a particular time. After an incident the controls may not be deemed enough •  Subjective if not normalized centrally •  Tendency to make it purely math based •  May not want to disclose issues to other parts of the business Impact Levels Risk Tolerance Levels Baseline Control Set Criteria to assess the effectiveness of Controls Risk Treatment Plans Risk remediation Prioritization of remediation Risk acceptance Etc. 22
  • 23. Summary 23 •  Compliance only goes so far – use it to keep the finger on the pulse, but don’t get hung up! •  Risk assessment should qualify your intuition - use it to gain Senior Management attention and prioritize remediation programs •  Don’t rely only on traditional control set – introduce a security capability model and develop tactical and strategic plans •  Break mentality that it’s just a sole departmental issue – build up awareness and reinforce that everyone is responsible •  Adopt a phased approach for dealing with complex environment - but most importantly if you are leading, gain trust of operational managers and drive with GOVERNANCE!
  • 24. Questions and Answers     Thank  you 24