220 likes | 231 Views
Understand the nuances of compliance and cyber security, the risks involved, and how to effectively implement strategies. Learn the importance of security culture, risk-based approach, and staying ahead in the evolving threat landscape.
E N D
Compliance Vs cyber security Milda Petraityte, MSc, SSCP, ISO27001 LA
Complying with Regulatory requirements • PCI DSS, GDPR, HIPAA have different types of data in scope • Gaming authorities focus on very specific requirements and turn some information security frameworks into a checklist. • UKGC, a UK gaming authority, does not require organisations to have a business continuity plan. • …or controls around change management • …or background checks of employees
Following A CHECKLIST • Checklists could be overly specific • Checklists are useful for static environments and repetitive processes • Checklists mislead people into believing that there are shortcuts for high-stakes predictions.
Performing audits • Checking that ‘everything is all right’ • Organisations prepare for an audit • A state at a point in time based on the information that an organisation provides to the auditor • A dependency on auditor’s knowledge and experience
Trades for compliance • Focused on regulatory requirements; • Focused on scope and narrow or academic; • Based on a checklist; • Focused on a point in time snapshot (i.e. audit). Bottom line: compliance doesn't guarantee security (nothing guarantees it)
Involvement from the top • Where in the organisational chart does cyber security team sit in your organisation? • Cyber security must be on the agenda of top management • Cyber security is a ‘team sport’
Security culture and behaviour • Is speaking up and whistleblowing encouraged? • Do people receive appropriate training? • What kind of behaviours are rewarded? • Are audit findings frowned upon?
Risk Based approach • Name all applicable risks! • Any activities and implementations must work for the organisation, they must make sense • Cyber security must be reasonable, based on risks and cost-benefit analysis • Controls should be flexible and adaptable to multiple systems across the organisation • Cyber security is not static, it is a continuous process
Trades of cyber security • Covers people, processes and technology • Is strategic due to involvement from the leadership • Flexible, based on risk management and cost-benefit analysis • Focused on creating a cyber security culture and mindset across the organization Again: practicing cyber security does not guarantee no breaches! (nothing guarantees it)
An Accident.. or is it? “Though we want to believe that violence is a matter of cause and effect, it is actually a process, a chain in which the violent outcome is only one link. The process of [attack] starts way before the [actual attack].” (G. de Becker, The Gift of Fear)
Threat drives the risk calculation New cyber jargon: • Threat • Threat landscape • Threat intelligence • Cyber kill chain
Is it a threat? Potential Impending Insubstantial
https://www.citycomp.de/English/enterprise/stellungnahme.htmlhttps://www.citycomp.de/English/enterprise/stellungnahme.html https://www.vice.com/en_us/article/d3np4y/hackers-steal-ransom-citycomp-airbus-volkswagen-oracle-valuable-companies
Malicious insider People who take advantage of their access to inflict harm on an organization: • Disgruntled employees ..but could also be: • Tired and distracted employees (accidental) • Unaware and uneducated employees
Cyber kill chain Cost and risk to contain and remediate https://www.eventtracker.com/blog/2017/january/siemphonic-cyber-kill-chain/
Learning from incidents (of others?) What organisations do after an incident: • Playing The Blame Game • Stacking up new ‘singing and dancing’ technology solutions • Hiring a silver bullet ‘magician’ security expert who is ‘skilled in Splunk intrusion detection, network administration and Cisco routers, Cloud security including AWS, Gsuite, Azure. Can code in Java, Python and Ruby. Must be a team player, experienced in risk management and excellent communicator with C-suite. Should be able to fix the ventilation and fire suppression system in the server room if required. Ability to make good tea is a big plus.’ …when it happens to someone else: • Adopting ‘This will not happen to us’ mentality • Assuring each other that ‘this is how we always did things and it was fine so far’
Staying ahead Similar to what you do when you walk in a dark alley in the middle of the night: • Don’t walk alone, have ‘buddies’ • Understand what criminals would be interested in what you do • Understand what is happening around you and how that could impact you • Do not be the low hanging fruit.
Thank You Email: milda@kyte.global Skype: milda.kyte Linkedin: mildapetraityte