Organizational Security: When People Are Involved Mike Ellsworth StratVantage Consulting, LLC MnIPS Business Security Seminar April 16, 2003
The Security Problem “ Computer security is a 40-year-old discipline; every year there's new research, new technologies, new products, even new laws. And every year things get worse.” Bruce Schneier, CIO, Counterpane Internet Security Inc.
Top Ten User Errors Passwords on Post-it Notes Leaving your computer on, unattended  Opening e-mail attachments from strangers  Poor password etiquette  Laptops on the loose  Blabber mouths  Plug and Play without protection  Not reporting security violations  Always behind the times / no virus protection  Focusing outside the organization   Source: www.HumanFirewall.com
Where’s the Problem? 5 th  Annual Global Information Security Survey by PwC Security breaches at  66 percent  of worldwide sites in the past year External hacking which rose from  46 percent  in 2001 to  55 percent  in 2002 Internal sources, such as employee misuse or disgruntled staff, declined year-on-year to  50 percent
Where’s the Problem? But: 53 percent  of European organizations didn’t report security incidents
Where’s the Problem? Human Firewall Council Security Management Index (9/02): The vast majority of organizations taking the survey failed to meet what may be considered minimally acceptable standards for managing security across the enterprise. All but one category (physical security) scored an “F” or failing grade across 10 key areas of security management.
Where’s the Problem? Human Firewall Council Security Management Index (9/02): Results suggest a reactive, “Techno-Centric Solution” perspective for security still prevails
Where’s the Problem?
Social Engineering Use of psychological tricks on legitimate users of a computer system, in order to gain the information (usernames and passwords) needed to gain access to the system
Social Engineering
Social Engineering "Hi Bev, this is Sam from the IS Department. We just got in a new corporate screensaver and since you’re the VP’s secretary you will get it first. It’s really cool; wait ‘till you see it. All I need is your password so I can log on to your PC from the computer center and install it. Oh Great!!!!!! My password is rover. I can’t wait to see that new screen saver!!!!!"
Social Engineering Other types: E-mail  – the I Love You virus “ Dumpster Diving”  – hired guns for Oracle dug into Microsoft’s trash In person  – walking into a building and checking password post-it-notes stuck to monitors Regular mail  – sending a bogus survey offering a cash award for completion and asking sensitive questions
Eight Steps to Better Organizational Security Get top management buy-in and commitment   You’ll fail without it More than  40 percent  of CEOs, CFOs, company presidents and managing directors involved setting security policy 52 percent  of those have direct input into information security spending Majority of companies spend less than  $500,000  a year on security Source: PwC GISS survey of 4,500 security professionals in 42 countries 9/ 2001
Eight Steps to Better Organizational Security That includes your board   Three major questions for executives and boards:  Is our security policy enforced fairly, consistently and legally across the organization?  Would our employees, contractors and partners know if a security violation was being committed?  Would they know what to do about it if they did recognize a security violation?
Eight Steps to Better Organizational Security Assign and clarify roles and responsibilities   Set up an information security task force Chief Information Officer Chief Security Officer  (Don’t have one? – Name one!) Internal Audit Manager Physical Security Manager Representatives from Legal and Human Resources departments
Eight Steps to Better Organizational Security Including rank and file   Spell out information security functions and responsibilities in all job descriptions and organizational structures and reporting relationships
Eight Steps to Better Organizational Security Create an Action Plan with a budget   Asset assessment 40 percent of companies don't classify the sensitivity of their data Risk assessment Include “white hat” hacking Risk mitigation plan
Eight Steps to Better Organizational Security Develop and/or update information security policies   (Don’t have ‘em? – Write ‘em!) 50 percent  of companies don’t have written security policies 7 percent  have no information security policies at all  25 percent  have neither reviewed nor measured the effectiveness of their corporate security policy in the past year
Eight Steps to Better Organizational Security Policies include:   Network acceptable usage Email usage Internet usage Don’t forget employee termination processes and policies Who lets IT know and when?
Eight Steps to Better Organizational Security Develop an organization-wide Information Security Awareness Program (ISAP) Heighten awareness, change attitudes and influence behavior Use "Test Your Security Awareness" at www.HumanFirewall.com
Eight Steps to Better Organizational Security Measure the progress of your Security Awareness/ Education efforts   Need to measure it to manage it
Eight Steps to Better Organizational Security Adapt and improve according to progress/feedback   It’s not just one and done Revise, revise, revise Stay current on latest threats Security is a process, not a destination
Eight Steps to Better Organizational Security Develop a Security Incident Response Team (SIRT) and plan It’s too late when the crisis hits A multi-disciplinary, multi-departmental response team provides a structured, formal capability to respond to actual or attempted intrusions Be sure to involve Public Relations/ Communications Fewer than  25 percent  of organizations have established a formal SIRT capability Source: Meta Group white paper, 2002
Remember, Security is a Process, Not a Destination
Further Study Secrets and Lies: Digital Security in a Networked World , by Bruce Schneier Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation and Market Share  by Mary Pat McCarthy & Stuart Campbell www.misti.com/  www.sans.org/newlook/resources/policies/bssi3/  www.baselinesoft.com/ispme.html
Further Study www.sans.org/infosecFAQ/aware/lack.htm  www.sans.org/infosecFAQ/policy/sec_aware.htm  www.techrepublic.com/article.jhtml?id=r00520010717aue01.htm&src=search&_requestid=65429
Further Study To report information security incidents: www.nipc.gov/incident/incident.htm  or  www.infragard.net/ireporting.htm
Further Study www.msci.memphis.edu/%7Eryburnp/cl/glossary.html#social_engineering "Oracle’s Boardroom Spy Tricks"  www.zdnet.com/zdnn/stories/news/0,4586,2596401,00.html "Summit: Ban the Internet bad guys!"  www.zdnet.com/zdnn/stories/news/0,4586,2566543,00.html "Kevin Mitnick: Timeline”  www.takedown.com/coverage/mitnick-timeline.html "Mitnick teaches ‘social engineering’"  www.zdnet.com/zdnn/stories/news/0,4586,2604480,00.html
Further Study www.cert.org/advisories/CA-1991-04.html “ Create Order with a Strong Security Policy”  www.networkmagazine.com/article/NMG20000710S0015
Thank You! Mike Ellsworth StratVantage Consulting, LLC Emerging technology strategy and permission marketing [email_address] www.stratvantage.com Receive free emerging technology news and commentary with the Stratvantage News Summary

More Related Content

PDF
Cybersecurity in the Boardroom
PPT
State of endpoint risk v3
PDF
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
PDF
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
PDF
Websense
PDF
Best practices for_implementing_security_awareness_training
PDF
5 Questions Executives Should Be Asking Their Security Teams
PPTX
Sans 20 CSC: Connecting Security to the Business Mission
Cybersecurity in the Boardroom
State of endpoint risk v3
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Websense
Best practices for_implementing_security_awareness_training
5 Questions Executives Should Be Asking Their Security Teams
Sans 20 CSC: Connecting Security to the Business Mission

What's hot (19)

PDF
Synack cirtical infrasructure webinar
PDF
Cybersecurity Goverence for Boards of Directors
PPTX
What is WebSense?
PDF
Cyber security: Five leadership issues worthy of board and executive attention
PDF
Forrester Infographic
PDF
Leveraging Board Governance for Cybersecurity
PDF
Prevent & Protect
PPTX
IT security
PDF
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
PPTX
Imperva ppt
PPTX
Companies Aware, but Not Prepared for GDPR
PDF
VIPRE --Responding to Cyberattacks
PDF
Security Program Guidance and Establishing a Culture of Security
PPTX
Idge dell reignite2014 qp #2
PDF
7 cyber security questions for boards
PPTX
Evolving State of the Endpoint Webinar
PPTX
Productivity 3.0
PDF
Mimecast Threat Report
PDF
Cyber-risk Oversight Handbook for Corporate Boards
Synack cirtical infrasructure webinar
Cybersecurity Goverence for Boards of Directors
What is WebSense?
Cyber security: Five leadership issues worthy of board and executive attention
Forrester Infographic
Leveraging Board Governance for Cybersecurity
Prevent & Protect
IT security
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Imperva ppt
Companies Aware, but Not Prepared for GDPR
VIPRE --Responding to Cyberattacks
Security Program Guidance and Establishing a Culture of Security
Idge dell reignite2014 qp #2
7 cyber security questions for boards
Evolving State of the Endpoint Webinar
Productivity 3.0
Mimecast Threat Report
Cyber-risk Oversight Handbook for Corporate Boards
Ad

Viewers also liked (10)

PPTX
Internet Marketing in een notendop
PPT
Jeopardy
PDF
Sell yourself with social media and get that job
PDF
Minnebar Going Social:Discovering Enterprise Social Media Touch Points
PPTX
Internet marketing
PDF
Social media in the enterprise
PDF
Social Media Basics for Job Search
PDF
Crowd Sourcing Platforms - An UnPresentation
PPT
H80 Digital Update
PPT
H80 Update Dag2
Internet Marketing in een notendop
Jeopardy
Sell yourself with social media and get that job
Minnebar Going Social:Discovering Enterprise Social Media Touch Points
Internet marketing
Social media in the enterprise
Social Media Basics for Job Search
Crowd Sourcing Platforms - An UnPresentation
H80 Digital Update
H80 Update Dag2
Ad

Similar to Organizational Security: When People are Involved (20)

PPTX
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
PPSX
Meraj Ahmad - Information security in a borderless world
PDF
Security Priorities Sample Slides 2023.pdf
PDF
Proactive information security michael
DOCX
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
PDF
Cybersecurity risk assessments help organizations identify.pdf
PDF
Security policy.pdf
PDF
Security Priorities Sample Slides 2023.pdf
PPTX
Optimizing Security Operations: 5 Keys to Success
PPTX
Common Sense Security Framework
PPTX
Information Security for Business Leaders - Eric Vanderburg - JurInnov
PDF
Module 2 - Cybersecurity On the Defense.pdf
DOCX
IT 552 Milestone One Guidelines and Rubric The fina.docx
DOCX
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
DOCX
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
DOCX
CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
PPT
Claranetpresentation
PDF
Fissea09 mgupta-day3-panel process-program-build-effective-training
PDF
A CIRO's-eye view of Digital Risk Management
PDF
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Meraj Ahmad - Information security in a borderless world
Security Priorities Sample Slides 2023.pdf
Proactive information security michael
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Cybersecurity risk assessments help organizations identify.pdf
Security policy.pdf
Security Priorities Sample Slides 2023.pdf
Optimizing Security Operations: 5 Keys to Success
Common Sense Security Framework
Information Security for Business Leaders - Eric Vanderburg - JurInnov
Module 2 - Cybersecurity On the Defense.pdf
IT 552 Milestone One Guidelines and Rubric The fina.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CRITERIA DISTINGUISHED Analyze the origins and evolution of th.docx
Claranetpresentation
Fissea09 mgupta-day3-panel process-program-build-effective-training
A CIRO's-eye view of Digital Risk Management
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf

More from Social Media Performance Group (11)

PDF
How to sell yourself with social media and get that job
PPTX
What is CareerOneStop? April 2019
PDF
Sell Yourself with Social Media and Get That Job
PPTX
Use #SocialSelling to Get That Job
PPTX
Social Media and Enterprise Architecture - Introduction and Implications
PDF
Using social media to find a job
PDF
What is social media and why should you care
PDF
LinkedIn Basic Training
PPTX
Website As A Product Product Camp Mn
PDF
Making The Transition What To Pack, What To Buy And What To Leave Behind Wh...
PPT
Open Source in the Enterprise
How to sell yourself with social media and get that job
What is CareerOneStop? April 2019
Sell Yourself with Social Media and Get That Job
Use #SocialSelling to Get That Job
Social Media and Enterprise Architecture - Introduction and Implications
Using social media to find a job
What is social media and why should you care
LinkedIn Basic Training
Website As A Product Product Camp Mn
Making The Transition What To Pack, What To Buy And What To Leave Behind Wh...
Open Source in the Enterprise

Recently uploaded (20)

PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPT
Geologic Time for studying geology for geologist
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Architecture types and enterprise applications.pdf
A comparative study of natural language inference in Swahili using monolingua...
1 - Historical Antecedents, Social Consideration.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
sustainability-14-14877-v2.pddhzftheheeeee
Microsoft Excel 365/2024 Beginner's training
Abstractive summarization using multilingual text-to-text transfer transforme...
A proposed approach for plagiarism detection in Myanmar Unicode text
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
The influence of sentiment analysis in enhancing early warning system model f...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Chapter 5: Probability Theory and Statistics
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
UiPath Agentic Automation session 1: RPA to Agents
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Geologic Time for studying geology for geologist
Consumable AI The What, Why & How for Small Teams.pdf
sbt 2.0: go big (Scala Days 2025 edition)
Architecture types and enterprise applications.pdf

Organizational Security: When People are Involved

  • 1. Organizational Security: When People Are Involved Mike Ellsworth StratVantage Consulting, LLC MnIPS Business Security Seminar April 16, 2003
  • 2. The Security Problem “ Computer security is a 40-year-old discipline; every year there's new research, new technologies, new products, even new laws. And every year things get worse.” Bruce Schneier, CIO, Counterpane Internet Security Inc.
  • 3. Top Ten User Errors Passwords on Post-it Notes Leaving your computer on, unattended Opening e-mail attachments from strangers Poor password etiquette Laptops on the loose Blabber mouths Plug and Play without protection Not reporting security violations Always behind the times / no virus protection Focusing outside the organization Source: www.HumanFirewall.com
  • 4. Where’s the Problem? 5 th Annual Global Information Security Survey by PwC Security breaches at 66 percent of worldwide sites in the past year External hacking which rose from 46 percent in 2001 to 55 percent in 2002 Internal sources, such as employee misuse or disgruntled staff, declined year-on-year to 50 percent
  • 5. Where’s the Problem? But: 53 percent of European organizations didn’t report security incidents
  • 6. Where’s the Problem? Human Firewall Council Security Management Index (9/02): The vast majority of organizations taking the survey failed to meet what may be considered minimally acceptable standards for managing security across the enterprise. All but one category (physical security) scored an “F” or failing grade across 10 key areas of security management.
  • 7. Where’s the Problem? Human Firewall Council Security Management Index (9/02): Results suggest a reactive, “Techno-Centric Solution” perspective for security still prevails
  • 9. Social Engineering Use of psychological tricks on legitimate users of a computer system, in order to gain the information (usernames and passwords) needed to gain access to the system
  • 11. Social Engineering "Hi Bev, this is Sam from the IS Department. We just got in a new corporate screensaver and since you’re the VP’s secretary you will get it first. It’s really cool; wait ‘till you see it. All I need is your password so I can log on to your PC from the computer center and install it. Oh Great!!!!!! My password is rover. I can’t wait to see that new screen saver!!!!!"
  • 12. Social Engineering Other types: E-mail – the I Love You virus “ Dumpster Diving” – hired guns for Oracle dug into Microsoft’s trash In person – walking into a building and checking password post-it-notes stuck to monitors Regular mail – sending a bogus survey offering a cash award for completion and asking sensitive questions
  • 13. Eight Steps to Better Organizational Security Get top management buy-in and commitment You’ll fail without it More than 40 percent of CEOs, CFOs, company presidents and managing directors involved setting security policy 52 percent of those have direct input into information security spending Majority of companies spend less than $500,000 a year on security Source: PwC GISS survey of 4,500 security professionals in 42 countries 9/ 2001
  • 14. Eight Steps to Better Organizational Security That includes your board Three major questions for executives and boards: Is our security policy enforced fairly, consistently and legally across the organization? Would our employees, contractors and partners know if a security violation was being committed? Would they know what to do about it if they did recognize a security violation?
  • 15. Eight Steps to Better Organizational Security Assign and clarify roles and responsibilities Set up an information security task force Chief Information Officer Chief Security Officer (Don’t have one? – Name one!) Internal Audit Manager Physical Security Manager Representatives from Legal and Human Resources departments
  • 16. Eight Steps to Better Organizational Security Including rank and file Spell out information security functions and responsibilities in all job descriptions and organizational structures and reporting relationships
  • 17. Eight Steps to Better Organizational Security Create an Action Plan with a budget Asset assessment 40 percent of companies don't classify the sensitivity of their data Risk assessment Include “white hat” hacking Risk mitigation plan
  • 18. Eight Steps to Better Organizational Security Develop and/or update information security policies (Don’t have ‘em? – Write ‘em!) 50 percent of companies don’t have written security policies 7 percent have no information security policies at all 25 percent have neither reviewed nor measured the effectiveness of their corporate security policy in the past year
  • 19. Eight Steps to Better Organizational Security Policies include: Network acceptable usage Email usage Internet usage Don’t forget employee termination processes and policies Who lets IT know and when?
  • 20. Eight Steps to Better Organizational Security Develop an organization-wide Information Security Awareness Program (ISAP) Heighten awareness, change attitudes and influence behavior Use "Test Your Security Awareness" at www.HumanFirewall.com
  • 21. Eight Steps to Better Organizational Security Measure the progress of your Security Awareness/ Education efforts Need to measure it to manage it
  • 22. Eight Steps to Better Organizational Security Adapt and improve according to progress/feedback It’s not just one and done Revise, revise, revise Stay current on latest threats Security is a process, not a destination
  • 23. Eight Steps to Better Organizational Security Develop a Security Incident Response Team (SIRT) and plan It’s too late when the crisis hits A multi-disciplinary, multi-departmental response team provides a structured, formal capability to respond to actual or attempted intrusions Be sure to involve Public Relations/ Communications Fewer than 25 percent of organizations have established a formal SIRT capability Source: Meta Group white paper, 2002
  • 24. Remember, Security is a Process, Not a Destination
  • 25. Further Study Secrets and Lies: Digital Security in a Networked World , by Bruce Schneier Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation and Market Share by Mary Pat McCarthy & Stuart Campbell www.misti.com/ www.sans.org/newlook/resources/policies/bssi3/ www.baselinesoft.com/ispme.html
  • 26. Further Study www.sans.org/infosecFAQ/aware/lack.htm www.sans.org/infosecFAQ/policy/sec_aware.htm www.techrepublic.com/article.jhtml?id=r00520010717aue01.htm&src=search&_requestid=65429
  • 27. Further Study To report information security incidents: www.nipc.gov/incident/incident.htm or www.infragard.net/ireporting.htm
  • 28. Further Study www.msci.memphis.edu/%7Eryburnp/cl/glossary.html#social_engineering "Oracle’s Boardroom Spy Tricks" www.zdnet.com/zdnn/stories/news/0,4586,2596401,00.html "Summit: Ban the Internet bad guys!" www.zdnet.com/zdnn/stories/news/0,4586,2566543,00.html "Kevin Mitnick: Timeline” www.takedown.com/coverage/mitnick-timeline.html "Mitnick teaches ‘social engineering’" www.zdnet.com/zdnn/stories/news/0,4586,2604480,00.html
  • 29. Further Study www.cert.org/advisories/CA-1991-04.html “ Create Order with a Strong Security Policy” www.networkmagazine.com/article/NMG20000710S0015
  • 30. Thank You! Mike Ellsworth StratVantage Consulting, LLC Emerging technology strategy and permission marketing [email_address] www.stratvantage.com Receive free emerging technology news and commentary with the Stratvantage News Summary