360 likes | 627 Views
National Webcast Initiative. Performing a Cyber Security Risk Assessment. Why? When? and How?. Cyber Security Workshop. August 26, 2004 3:00pm – 4:00pm Eastern. National Webcast Initiative. Joint Partnership between MS-ISAC and DHS US-CERT
E N D
National Webcast Initiative Performing a Cyber Security Risk Assessment Why? When? and How? Cyber Security Workshop August 26, 2004 3:00pm – 4:00pm Eastern
National Webcast Initiative • Joint Partnership between MS-ISAC and DHS US-CERT • Coordinated through the New York State Office of Cyber Security and Critical Infrastructure Coordination and the New York State Forum William F. Pelgrin
Webcast Attendees • 94 Federal Government • 491 State Government • 117 Local Government • 145 Academia, non-profit
Accenture AT&T Aon Computer Associates CDW-G CGI CMA D&D Consulting Ernst & Young Gartner HP IIC Jay Dee Systems Keane Microsoft Nortel Networks Novell NYSTEC Oracle SAIC SAS Sybase Symantec Veritas Current Listing of Vendors Interested In Participation This listing will continue to evolve over time
Today’s Speakers 3:00pm-3:15pm • Introduction and Opening Remarks • William Pelgrin, Chair of the Multi-State ISAC; Director, New York State Office of Cyber Security and Critical Infrastructure Coordination • Lawrence C. Hale,Deputy Director, National Cyber Security Division, US CERT, Department of Homeland Security • Performing a Cyber Security Risk Assessment • Graeme Payne, CA, CISSP, CISM, CISA; Partner, Security & Technology Solutions, Ernst & Young • Rick Trapp, Vice President, Product Management, Computer Associates 3:15pm-4:00pm
US-CERT US-CERT – established in September 2003 and is the operational arm of the National Cyber Security Division at the Department of Homeland Security. US-CERT is the nation’s focal point for preventing, protecting against, and responding to cyber security threats and vulnerabilities. US-CERT interacts with all federal agencies, private industry, the research community, state and local governments, and others on a 24x7 basis to disseminate timely and actionable cyber security information.
US-CERT US-CERT and the Multi-State ISAC are working together on a number of programs, including this webcast series, to help enhance our Nation’s cyber security readiness and response. The Multi-State ISAC has recently become a member of the HSIN/US-CERT portal, which provides a secure mechanism for sharing information between and among partners, improving cyber preparedness, readiness and response capabilities. US-CERT also hosts a public website, at www.us-cert.gov, which provides a wealth of information regarding cyber security – helpful tips for protecting against cyber security threats; cyber security alerts and bulletins, as well as the ability to sign up to receive free cyber security alerts via email.
Graeme Payne Ernst & Young Rick Trapp Computer Associates CA, CISSP, CISM, CISA Partner, Security & Technology Solutions Vice President, Product Management
Today’s Objectives • Identify reasonsfor performing a CyberSecurity Risk Assessment • Identify key components of a CyberSecurity Risk Assessment • Understand considerations in performing a CyberSecurity Risk Assessment
Today’s Agenda • Developing a Common Language • Why Perform Cyber Security Assessments? • When to perform a CyberSecurity Risk Assessment? • How to perform a CyberSecurity Risk Assessment • Q&A
What is a Risk Assessment? Source: GAO/AIMD-00-33
Definitions Refer: Glossary of Terms
Hackers Customers Malware Partners Contractors Spam
Helpful Hint The Need for CyberSecurity Risk Assessments • Reported vulnerabilities rose from 417 in 1999 to 3,784 in 2003 (CERT Coordination Center) • 2004 CSI/FBI Computer Crime and Security Survey respondents reported nearly $142 million in total losses as a result of computer security incidents
Objectives of a CyberSecurity Risk Assessment • Baseline • Where am I today? • What controls do I have in place? • Evaluate effectiveness of security controls • Where do I want to be? • Identify gaps or opportunities for improvement • Establish awareness of threats and vulnerabilities • Lay foundation for development of security improvement plan
Helpful Hint When to Perform • Periodic • Often event driven • Typically year-over-year comparison • Generally labor-intensive • Most organizations start with periodic assessments • Continuous • Part of the normal workflow • Provides “real-time” risk view • Often supported by technology and analysis tools • Integrated with other IT/business processes
Key Steps • Define the objectives • Define deliverables • Establish workplan • Perform assessment • Review results and develop risk mitigation plans • Plan next assessment (steps 1-5)
Helpful Hint 1. Define the Objectives
Helpful Hint 3. Establish the Workplan
Helpful Hint 3. Establish the Workplan (cont’d)
4. Perform the Risk Assessment Example Worksteps Activities • Interview system owner • Review system documents Characterize System/Area • Use threat checklist • Review external sources Identify Threats • Review vulnerability sources • Perform security testing Identify Vulnerabilities Identify Controls • Review security requirements checklist • Review system documents Assess Risk • Prepare likelihood/impact matrix
Helpful Hint Next Steps
Summary • Developing a Common Language • Why Perform Cyber Security Assessments? • When to perform a CyberSecurity Risk Assessment? • How to perform a CyberSecurity Risk Assessment
Thank you for participating • Future webcast sessions will offer a variety of topics • Please remain online to participate in an interactive series of survey questions • Written Q and A to the presenters is available for the next 15 minutes
Thank You! Thank you for attending this virtual learning session