180 likes | 196 Views
Learn how to safeguard your IT infrastructure against malicious breaches and disasters. Discover the business trade-offs and non-technical vulnerabilities essential for resilience.
E N D
Ch 8: Security and Business Continuity Protecting Corporate IT against Malice and Disaster AJ Raven
Agenda The IT security problem Protecting against malice and disaster Why technical safeguards fail Security as exercise in business tradeoffs
Jargon Decoder • IT security breach: Maliciously making a system inaccessible or stealing sensitive data or IP • Security tradeoff: Increasing IT security inconveniences users • Social engineering: Tricking a legit user to access a system • Security credentials: Something you know, have, or are • Continuity planning: Tactical plan to resume operations if IT portfolio compromised
The Security Problem • $4 million Average corporate IT breach costs • 5 months to recognize a breach • 8 months free reign after hacker breaks in • Industrial espionage costs = $½ trillion/ year = Austria’s GDP • Mega-breaches <10 million records increasingly common • IT security not strategic but failings can threaten survival • Penalties: • Paralyze operations • Compromise sensitive information; reputational damage • Survival • Widely underreported: liability, negative publicity, cannot prosecute • Strongest technology cannot contribute what non-IT managers can
Cost of one stolen record varies by industry Less regulated More regulated $ Cost of a single breached record
The Myth of Secure IT • Two Broad IT Security Problems • Denial of service • Hacking – social engineering or brute force attacks • Secure computing = myth • Aspiration should be: • Acceptable security • Resilience to bounce back without excruciating losses • IT unit responsible for executing IT security but… • Some IT assets need more protection than others • Business judgments • Must come from non-IT managers
Where non-IT managers can contribute Motivated to exploit or alter data • customer information • trade secrets • intellectual property IT unit must know: explicit guidance from non-IT managers • What data and apps are more critical • Security-convenience tradeoff acceptable to business users
Case: How Target became the Target Sidebar – not included in these slides
Why Technical-only Approaches Fail IT is secured using… Multifactor authentication Outside attacks focus on these Technical safeguards: credit card industry inspired approaches • intrusion detection (scan for suspicious patterns) • intrusion prevention (block access) Defenseless against • Legit, socially-engineered passwords • Social engineering – easier to fool a human than a machine • Rouge insiders – even fingerprints, retina scans (e.g., Snowden incident) Technical-only approach • Overemphasize identifiable risks Lulls firms into unfounded complacency
5x Non-technical Security Vulnerabilities • Treating it as a technical, IT unit problem • No safeguard against #1 risk = human blunders • Overlooking insider threats • Defenseless against disgruntled employees or inadvertent slipups • Porous inter-firm boundary with business partners • Connected partners makes data more valuable but more vulnerable • Increased connectivity weakest link defines vulnerability • Convenience-security imbalance • A business—not technical—decision • Internet-of-things • Computationally lean devices, large data traffic makes them vulnerable
Insider Threats: Safeguards Needs stronger internal controls and user awareness IT access policies tailored to your firm • Who can access what data, what they can do, and when and where • Simplest approach: Tiers of access privileges • Generic security policies = generic protection • IT unit should only implement—not create—them Six other practices • Monitor (transparently) for suspicious activities • Encrypt data in transit and storage = gobbledygook if accessed • Wall off systems with truly sensitive data • Unlink sensitive data from other data • Anonymize sensitive data if only aggregates needed for analytics • Refrain from collecting excessive data just because you can
Prepping for a Security Crisis Non-IT managers play an integral role • Requires skills rarely used in day-to-day activities • Advance dress rehersal: To respond internally and externally to minimize damage • Swift response: Sloppy response more damaging than breach itself • First few hours count most • Long-term focus: • Matters more how it’s handled • Reassuring customers how it will never repeat • Misinformation backfires
Business Continuity and Disaster Recovery • Redundancies and backups kick in if a piece of hardware fails • Business continuity planning: Unexpected disruption of entire environment • Hurricanes, blackouts, fires, floods, earthquakes, or other Acts of God • = insurance against the worst (like your car’s spare tire) • A tactical plan for resuming your operations after a catastrophe • Boils down to risks that can derail your revenue stream • esp. primary value chain activities in every line function • Relies on a backup site
Hot, Warm, or Cold Sites Fully operational replica of mission-critical IT assets Cost Hot site Harder for custom-built IT Costliest No hardware or software Warm site • Mission-critical apps • Hardware • Lagged data Cold site Cheapest Switchover speed Weeks Days Hours Choice depends on what makes business sense
Non-IT Contributions to Continuity Planning 3 questions determine ongoing costs acceptable for scope and responsiveness • What IT assets are critical? • Mission-critical IT apps and data (can stall revenue-generating activities) • Begin with vulnerable primary activities in your value chain • Include employees, contractors, and business partners • Prioritize key IT assets individually • Recovery time objective • How long can you withstand interruption in each of them? • How quickly before irreversible loss of public trust? • Recovery point objective • How old can the recovered data be? • How much data loss tolerable? • Remember: IT systems produce most Federal compliance data
Summary • IT insecurity unavoidable – comes with value-creating connectivity • Risks derailing firm operations; business survival; public trust • Breaches mostly human failings • Humans more “hackable” than machines • Overconfidence in technical solutions = naïve • Security IT’s responsibility or solely a technical problem • Non-IT involvement contributes what IT cannot • Prioritizes what’s worth protecting more • Mitigates business consequences • Strikes the right security-convenience balance