SlideShare a Scribd company logo
Assuring the Security of the Supply Chain
Designing best practices for cybersecurity in supply chains
Ollie Whitehouse, Technical Director
Agenda
Supply Chains and the Cyber Challenge
Regulatory (FCA) Outsourcing Requirements
Historic Approaches
Models for the Future – our maturity model
2
3
Supply chains…
• Software: common-off-the-shelf (COTS) and proprietary
• Equipment: the routers, servers, tablets, phones, storage, multi function
devices, the doors, conditional access devices, building management
system etc.
• Services: business process outsourcing, data processing, IaaS, PaaS,
SaaS, people, other generic terms like data feeds, cloud and managed
service etc.
4
Supply chains…
5
Supply chains cyber risk ..
6
Supplier tiers..
Tiers of suppliers..
.. need to focus on
tier 1 and 2 initially ..
the tier a supplier exists in
will be dictated by the business
criticality of the what they supply
7
Supplier tiers..
Tiers of suppliers
have tiers of suppliers
it is an exponential problem creating
inadvertent centralized hot pockets
of data or function for certain roles
(legal, HR etc.) or sector niches
8
Supply chains cyber risk ..
9
Suffice to say
Suppliers are increasingly operating
business critical functions
10
Today it is a challenge for customers
Suppliers today need to show good will in order to support
supply chain cyber maturity programs..
Legacy contractual cover is typically weak beyond compliance
against standards such as ISO27001..
Cost of contract renegotiating is typically high..
If a supplier is unique or niche then commercial leverage evaporates..
11
FCA outsourcing regulatory requirements
• Senior Management Arrangements, Systems and Controls
• SYSC 8.1: General outsourcing requirements
• SYSC 13.7.9: Geographic location considerations
• Threshold Conditions
• COND 2.4: Appropriate resources
• COND 2.5: Suitability..
.. then there is the DPA etc…
Handbook
http://fshandbook.info/FS/
12
FCA outsourcing regulatory reality
At the time of authorisation, a firm’s regulated activities must be supported by
IT services which are effective, resilient and secure and have been
appropriately designed to meet expected future as well as current business
needs so as to avoid risks to our (the FCA’s) objectives.
Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014
https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
13
FCA outsourcing regulatory reality
Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014
https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
The firm must have undertaken sufficient preparatory work to provide
reasonable assurance that each OSP will deliver its services effectively,
resiliently and securely.
14
FCA outsourcing regulatory reality
Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014
https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
The firm has established appropriate arrangements for the on-going oversight
of its OSPs and the management of any associated risks such that the firm
meets all its regulatory requirements.
15
FCA outsourcing regulatory reality
Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014
https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
Above all, a regulated firm should be clear that it retains full accountability for
discharging all of its regulatory responsibilities. It cannot delegate any part of
its responsibility to a third party.
16
FCA protection considerations
Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014
https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
17
FCA protection considerations
Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014
https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
18
FCA protection considerations
Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014
https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
19
FCA protection considerations
Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014
https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
20
FCA protection considerations
Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014
https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
21
Current approach to the supply chain
today only the most
mature
22
This is not enough…
Resilience
23
What does cyber resilience mean?
We will have incidents both of internal and external origin
we will contend with accidents and malicious acts
we will face an evolving set of threats requiring agility
We will build services for the business which are appropriately secure and resilient
… which frustrate threat actors and reduce likelihood of accidents
… which minimize the impact of any incident whilst being useable
We will be in a position to detect incidents in a timely fashion
… whilst being able to answer who, what, when and how … and then recover
24
How we deal with risk today
• Elements / Tenants: CIA and Parkerian Hexad etc.
• Models / Indexes: custom or off the shelf.
• Taxonomies / Frameworks: FAIR, NIST RMF, OCTAVE, TARA, EBIOS,
ISO/IEC 13335-2, SP800-30 etc.
• Standards / Regulation: ISO/IEC 27001, PCI, FCA/PRA, SOC-1, SOX etc.
• Maturity Models: recognizing risk isn’t static nor do we need to be perfect
• Audit: tell us the gaps against regulation, standards, taxonomies etc.
25
How we deal with risk today
C AI
this priority is good for your sensitive data
C = confidentiality, I = integrity or A = availability
26
How we deal with risk today
CA I
this priority is good for your buildings management system
27
How we deal with risk today
N I C
this priority is good for high frequency trading
A
N = nonrepudiation
28
Biggest challenges today are still
• Where will my organizations data or the ability to significantly impact my
business end up (logically and physically)?
• Who will have access to it?
• What is my suppliers ability to protect themselves in the first instance?
• What is their ability to detect an incident, respond and notify me?
• How cyber resilient is my supplier?
29
A maturity model for the supply chain
Immature Early Starter Progressive Semi-Mature Mature
Cyber security
strategy
Approach to
risk management
Contractual cover /
supplier relationship
Standards and
validation
Overall cyber
resilience
Reactive
Ad-hoc
None
Cyber Essentials
None
Regulatory (customer)
driven
Conformance and
audit driven
Minimal cyber security
requirements
Cyber Essentials +
ISO 27001
Ability to defend
against some attacks
Regulatory, customer
and maybe peer driven
Audit and proactive
Allows independent
cyber security review
CE+, ISO plus paper
validation
Ability to defend and
detect common
incidents
Regulatory, customer,
peer & threat driven
Audit, proactive with
dynamic risk models
Independent validation
/ information shared
CE+, ISO, paper &
tech validation
Ability to defend, detect
and respond to most
incidents
Regulatory, peer,
customer, threat and
intelligence driven
.. plus continual
validation of risk
models
… plus requires pro-
active notification of
incidents
CE+, ISO, paper, tech
& end-to-end ongoing
validation
Ability to defend,
detect, respond and
gain intelligence
Implementation
NCC Group Supply Chain Cyber Security Maturity Model for Enterprise Risk Management
30
CBEST in this context
As a critical supplier to the UK economy of an economic function it validates
• Level of threat awareness of the supplier i.e. tier 1 institution
• Their ability to protect their estate in the first instance
• Their ability to detect an incident, respond and notify in the second
• The end-to-end technical and soft defence countermeasure effectiveness
including from vectors such as the Internet and trusted partners etc.
31
So where is the best supply chain today?
Immature Early Starter Progressive Semi-Mature Mature
Cyber security
strategy
Approach to
risk management
Contractual cover /
supplier relationship
Standards and
validation
Overall cyber
resilience
Reactive
Ad-hoc
None
Cyber Essentials
None
Regulatory (customer)
driven
Conformance and
audit driven
Minimal cyber security
requirements
Cyber Essentials +
ISO 27001
Ability to defend
against some attacks
Regulatory, customer
and maybe peer driven
Audit and proactive
Allows independent
cyber security review
CE+, ISO plus paper
validation
Ability to defend and
detect common
incidents
Regulatory, customer,
peer & threat driven
Audit, proactive with
dynamic risk models
Independent validation
/ information shared
CE+, ISO, paper &
tech validation
Ability to defend, detect
and respond to most
incidents
Regulatory, peer,
customer, threat and
intelligence driven
.. plus continual
validation of risk
models
… plus requires pro-
active notification of
incidents
CE+, ISO, paper, tech
& end-to-end ongoing
validation
Ability to defend,
detect, respond and
gain intelligence
Implementation
NCC Group Supply Chain Cyber Security Maturity Model for Enterprise Risk Management
32
Closing… CBEST is mature
But we can expect it to be trickle down
in terms of what is looked at in the supply chain…
33
Further reading / viewing…
http://www.slideshare.net/OllieWhitehouse/red-teaming-and-the-supply-chainhttps://www.nccgroup.trust/uk/our-research/cyber-red-
teaming-business-critical-systems-while-managing-
operational-risk/
34
How we help our customers …
Red Team Assessments
STAR and CBEST
Phishing Assessments
Cyber Incident Response
Cyber Defence Operations
Regulatory Advice
Cyber Resilience
Risk & Governance
Supply Chain Assurance
Operational Support
35
Final thought…
Maturity is happening globally in financial services…
Israeli Cyber Defense Management directive , March 2015
Prescriptive in comparison including 24x7x365 SOCs, incident rooms,
mandatory reporting of cyber incidents etc…
http://www.bankisrael.gov.il/en/BankingSupervision/SupervisorsDirectives/ProperConductOfBankingBusinessRegulations/361_et.pdf?AspxAutoDetectCookieSupport=1
36
Europe
Manchester - Head Office
Amsterdam
Cambridge
Copenhagen
Cheltenham
Edinburgh
Glasgow
Leatherhead
London
Luxembourg
Munich
Zurich
Australia
Sydney
North America
Atlanta
Austin
Chicago
New York
San Francisco
Seattle
Sunnyvale
Ollie Whitehouse
ollie.whitehouse@nccgroup.trust

More Related Content

PPTX
Logistic n Distribution
PDF
How can machine learning help coordinate the supply chain?
PPTX
Supply Chain Management, Procurement, Sourcing, Acquire, and Logistics
PDF
Warehouse automation
PDF
Tedarik zinciri Yƶnetimi
PDF
Digital transformation in transport and logistics
DOC
Reverse supply-chain
PPT
Supply Chain Best Practices
Logistic n Distribution
How can machine learning help coordinate the supply chain?
Supply Chain Management, Procurement, Sourcing, Acquire, and Logistics
Warehouse automation
Tedarik zinciri Yƶnetimi
Digital transformation in transport and logistics
Reverse supply-chain
Supply Chain Best Practices

What's hot (20)

PDF
Ultimate Guide to Supply Chain Resiliency Program Success
PPTX
Role of it in scm
PPTX
green SCM-group 8
PDF
10 itf-tutorial mmmmm
PPTX
Third party logistics
PDF
Purchasing and Procurement management
PPT
3 Inventory Management And Risk Pooling
PDF
Logistics
PDF
Vehicle fleet management in humanitarian organization
PPTX
Preventing and Managing Supply Chain Disruptions
PDF
Digital supply chain management
DOC
SUPPLY CHAIN MANAGEMENT
PPTX
Internet of Things in Logistics
PPTX
3patry and 4 party logistics
PPTX
Suppliers selection in construction supply chain management
PDF
Emerging trends in supply chain management
PPTX
3PL AND 4PL
PPTX
Bullwhip Effect ppt
PPTX
Building Outside-in Supply Chain Processes
PPTX
Optimization in supply chain
Ultimate Guide to Supply Chain Resiliency Program Success
Role of it in scm
green SCM-group 8
10 itf-tutorial mmmmm
Third party logistics
Purchasing and Procurement management
3 Inventory Management And Risk Pooling
Logistics
Vehicle fleet management in humanitarian organization
Preventing and Managing Supply Chain Disruptions
Digital supply chain management
SUPPLY CHAIN MANAGEMENT
Internet of Things in Logistics
3patry and 4 party logistics
Suppliers selection in construction supply chain management
Emerging trends in supply chain management
3PL AND 4PL
Bullwhip Effect ppt
Building Outside-in Supply Chain Processes
Optimization in supply chain
Ad

Viewers also liked (20)

PPTX
Agile software security assurance
PDF
Threat Intelligence - Routes to a Proactive Capability
PDF
NCC Group C Suite Cyber Security Advisory Services
PPTX
From Problem to Solution: Enumerating Windows Firewall-Hook Drivers
PPTX
Secure App Aspirations: Why it is very difficult in the real world
PPTX
Why defensive research is sexy too.. … and a real sign of skill
PPTX
Designing and building post compromise recoverable services
PPTX
Smart grid in the Critical National Infrastructure
PPTX
Finding The Weak Link in Windows Binaries
PPTX
Securing your supply chain & vicarious liability (cyber security)
PPTX
Red Teaming and the Supply Chain
PDF
NCC Group Pro-active Breach Discovery: Network Threat Assessment
PPTX
Countering the Cyber Threat
PPTX
Practical Security Assessments of IoT Devices and Systems
PPTX
Technical Challenges in Cyber Forensics
PPTX
Cyber Incident Response & Digital Forensics Lecture
PPTX
Supply Chain Best Practices
PDF
Supply Chain Security
PDF
Private sector cyber resilience and the role of data diodes
PPTX
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Agile software security assurance
Threat Intelligence - Routes to a Proactive Capability
NCC Group C Suite Cyber Security Advisory Services
From Problem to Solution: Enumerating Windows Firewall-Hook Drivers
Secure App Aspirations: Why it is very difficult in the real world
Why defensive research is sexy too.. … and a real sign of skill
Designing and building post compromise recoverable services
Smart grid in the Critical National Infrastructure
Finding The Weak Link in Windows Binaries
Securing your supply chain & vicarious liability (cyber security)
Red Teaming and the Supply Chain
NCC Group Pro-active Breach Discovery: Network Threat Assessment
Countering the Cyber Threat
Practical Security Assessments of IoT Devices and Systems
Technical Challenges in Cyber Forensics
Cyber Incident Response & Digital Forensics Lecture
Supply Chain Best Practices
Supply Chain Security
Private sector cyber resilience and the role of data diodes
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Ad

Similar to Assuring the Security of the Supply Chain - Designing best practices for cybersecurity in supply chains (20)

PPTX
CRISC Course Preview
PDF
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
PPTX
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Ā 
PDF
Standards in Third Party Risk - DVV Solutions ISACA North May 19
PDF
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
PDF
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
PPTX
How to Make Your Enterprise Cyber Resilient
PPTX
C.3.1.E4 ICT404 Lectuure Slides 6_A.pptx
PDF
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
PDF
š‘š¢š¬š¤ š€š§ššš„š²š¬š­ šˆš§š­šžš«šÆš¢šžš° šš®šžš¬š­š¢šØš§š¬
PPT
Class 2003 05 22
Ā 
PDF
Kmicro Cybersecurity Offerings 2020
PDF
Cybersecurity in the Boardroom
PPTX
Risk Product.pptx
PPTX
2016 Risk Management Workshop
PDF
Cs cmaster
PDF
Emerging Trends in Information Privacy and Security
PDF
Emerging Trends in Information Privacy and Security
PDF
The Ultimate Guide to Cybersecurity Services and Solutions for Businesses
PPTX
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
CRISC Course Preview
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Ā 
Standards in Third Party Risk - DVV Solutions ISACA North May 19
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
How to Make Your Enterprise Cyber Resilient
C.3.1.E4 ICT404 Lectuure Slides 6_A.pptx
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
š‘š¢š¬š¤ š€š§ššš„š²š¬š­ šˆš§š­šžš«šÆš¢šžš° šš®šžš¬š­š¢šØš§š¬
Class 2003 05 22
Ā 
Kmicro Cybersecurity Offerings 2020
Cybersecurity in the Boardroom
Risk Product.pptx
2016 Risk Management Workshop
Cs cmaster
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
The Ultimate Guide to Cybersecurity Services and Solutions for Businesses
Aicpa tech+panel presentation t6 managing risks and security 2014 v3

Recently uploaded (20)

PDF
Architecture types and enterprise applications.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
The various Industrial Revolutions .pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
1. Introduction to Computer Programming.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
DP Operators-handbook-extract for the Mautical Institute
Architecture types and enterprise applications.pdf
Chapter 5: Probability Theory and Statistics
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Getting started with AI Agents and Multi-Agent Systems
The various Industrial Revolutions .pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
O2C Customer Invoices to Receipt V15A.pptx
NewMind AI Weekly Chronicles – August ’25 Week III
Zenith AI: Advanced Artificial Intelligence
OMC Textile Division Presentation 2021.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
WOOl fibre morphology and structure.pdf for textiles
A comparative study of natural language inference in Swahili using monolingua...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
1. Introduction to Computer Programming.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
DP Operators-handbook-extract for the Mautical Institute

Assuring the Security of the Supply Chain - Designing best practices for cybersecurity in supply chains

  • 1. Assuring the Security of the Supply Chain Designing best practices for cybersecurity in supply chains Ollie Whitehouse, Technical Director
  • 2. Agenda Supply Chains and the Cyber Challenge Regulatory (FCA) Outsourcing Requirements Historic Approaches Models for the Future – our maturity model 2
  • 3. 3 Supply chains… • Software: common-off-the-shelf (COTS) and proprietary • Equipment: the routers, servers, tablets, phones, storage, multi function devices, the doors, conditional access devices, building management system etc. • Services: business process outsourcing, data processing, IaaS, PaaS, SaaS, people, other generic terms like data feeds, cloud and managed service etc.
  • 6. 6 Supplier tiers.. Tiers of suppliers.. .. need to focus on tier 1 and 2 initially .. the tier a supplier exists in will be dictated by the business criticality of the what they supply
  • 7. 7 Supplier tiers.. Tiers of suppliers have tiers of suppliers it is an exponential problem creating inadvertent centralized hot pockets of data or function for certain roles (legal, HR etc.) or sector niches
  • 9. 9 Suffice to say Suppliers are increasingly operating business critical functions
  • 10. 10 Today it is a challenge for customers Suppliers today need to show good will in order to support supply chain cyber maturity programs.. Legacy contractual cover is typically weak beyond compliance against standards such as ISO27001.. Cost of contract renegotiating is typically high.. If a supplier is unique or niche then commercial leverage evaporates..
  • 11. 11 FCA outsourcing regulatory requirements • Senior Management Arrangements, Systems and Controls • SYSC 8.1: General outsourcing requirements • SYSC 13.7.9: Geographic location considerations • Threshold Conditions • COND 2.4: Appropriate resources • COND 2.5: Suitability.. .. then there is the DPA etc… Handbook http://fshandbook.info/FS/
  • 12. 12 FCA outsourcing regulatory reality At the time of authorisation, a firm’s regulated activities must be supported by IT services which are effective, resilient and secure and have been appropriately designed to meet expected future as well as current business needs so as to avoid risks to our (the FCA’s) objectives. Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014 https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
  • 13. 13 FCA outsourcing regulatory reality Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014 https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf The firm must have undertaken sufficient preparatory work to provide reasonable assurance that each OSP will deliver its services effectively, resiliently and securely.
  • 14. 14 FCA outsourcing regulatory reality Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014 https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf The firm has established appropriate arrangements for the on-going oversight of its OSPs and the management of any associated risks such that the firm meets all its regulatory requirements.
  • 15. 15 FCA outsourcing regulatory reality Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014 https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf Above all, a regulated firm should be clear that it retains full accountability for discharging all of its regulatory responsibilities. It cannot delegate any part of its responsibility to a third party.
  • 16. 16 FCA protection considerations Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014 https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
  • 17. 17 FCA protection considerations Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014 https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
  • 18. 18 FCA protection considerations Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014 https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
  • 19. 19 FCA protection considerations Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014 https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
  • 20. 20 FCA protection considerations Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions, July 2014 https://www.fca.org.uk/static/documents/barriers-to-entry-third-party-technology-considerations.pdf
  • 21. 21 Current approach to the supply chain today only the most mature
  • 22. 22 This is not enough… Resilience
  • 23. 23 What does cyber resilience mean? We will have incidents both of internal and external origin we will contend with accidents and malicious acts we will face an evolving set of threats requiring agility We will build services for the business which are appropriately secure and resilient … which frustrate threat actors and reduce likelihood of accidents … which minimize the impact of any incident whilst being useable We will be in a position to detect incidents in a timely fashion … whilst being able to answer who, what, when and how … and then recover
  • 24. 24 How we deal with risk today • Elements / Tenants: CIA and Parkerian Hexad etc. • Models / Indexes: custom or off the shelf. • Taxonomies / Frameworks: FAIR, NIST RMF, OCTAVE, TARA, EBIOS, ISO/IEC 13335-2, SP800-30 etc. • Standards / Regulation: ISO/IEC 27001, PCI, FCA/PRA, SOC-1, SOX etc. • Maturity Models: recognizing risk isn’t static nor do we need to be perfect • Audit: tell us the gaps against regulation, standards, taxonomies etc.
  • 25. 25 How we deal with risk today C AI this priority is good for your sensitive data C = confidentiality, I = integrity or A = availability
  • 26. 26 How we deal with risk today CA I this priority is good for your buildings management system
  • 27. 27 How we deal with risk today N I C this priority is good for high frequency trading A N = nonrepudiation
  • 28. 28 Biggest challenges today are still • Where will my organizations data or the ability to significantly impact my business end up (logically and physically)? • Who will have access to it? • What is my suppliers ability to protect themselves in the first instance? • What is their ability to detect an incident, respond and notify me? • How cyber resilient is my supplier?
  • 29. 29 A maturity model for the supply chain Immature Early Starter Progressive Semi-Mature Mature Cyber security strategy Approach to risk management Contractual cover / supplier relationship Standards and validation Overall cyber resilience Reactive Ad-hoc None Cyber Essentials None Regulatory (customer) driven Conformance and audit driven Minimal cyber security requirements Cyber Essentials + ISO 27001 Ability to defend against some attacks Regulatory, customer and maybe peer driven Audit and proactive Allows independent cyber security review CE+, ISO plus paper validation Ability to defend and detect common incidents Regulatory, customer, peer & threat driven Audit, proactive with dynamic risk models Independent validation / information shared CE+, ISO, paper & tech validation Ability to defend, detect and respond to most incidents Regulatory, peer, customer, threat and intelligence driven .. plus continual validation of risk models … plus requires pro- active notification of incidents CE+, ISO, paper, tech & end-to-end ongoing validation Ability to defend, detect, respond and gain intelligence Implementation NCC Group Supply Chain Cyber Security Maturity Model for Enterprise Risk Management
  • 30. 30 CBEST in this context As a critical supplier to the UK economy of an economic function it validates • Level of threat awareness of the supplier i.e. tier 1 institution • Their ability to protect their estate in the first instance • Their ability to detect an incident, respond and notify in the second • The end-to-end technical and soft defence countermeasure effectiveness including from vectors such as the Internet and trusted partners etc.
  • 31. 31 So where is the best supply chain today? Immature Early Starter Progressive Semi-Mature Mature Cyber security strategy Approach to risk management Contractual cover / supplier relationship Standards and validation Overall cyber resilience Reactive Ad-hoc None Cyber Essentials None Regulatory (customer) driven Conformance and audit driven Minimal cyber security requirements Cyber Essentials + ISO 27001 Ability to defend against some attacks Regulatory, customer and maybe peer driven Audit and proactive Allows independent cyber security review CE+, ISO plus paper validation Ability to defend and detect common incidents Regulatory, customer, peer & threat driven Audit, proactive with dynamic risk models Independent validation / information shared CE+, ISO, paper & tech validation Ability to defend, detect and respond to most incidents Regulatory, peer, customer, threat and intelligence driven .. plus continual validation of risk models … plus requires pro- active notification of incidents CE+, ISO, paper, tech & end-to-end ongoing validation Ability to defend, detect, respond and gain intelligence Implementation NCC Group Supply Chain Cyber Security Maturity Model for Enterprise Risk Management
  • 32. 32 Closing… CBEST is mature But we can expect it to be trickle down in terms of what is looked at in the supply chain…
  • 33. 33 Further reading / viewing… http://www.slideshare.net/OllieWhitehouse/red-teaming-and-the-supply-chainhttps://www.nccgroup.trust/uk/our-research/cyber-red- teaming-business-critical-systems-while-managing- operational-risk/
  • 34. 34 How we help our customers … Red Team Assessments STAR and CBEST Phishing Assessments Cyber Incident Response Cyber Defence Operations Regulatory Advice Cyber Resilience Risk & Governance Supply Chain Assurance Operational Support
  • 35. 35 Final thought… Maturity is happening globally in financial services… Israeli Cyber Defense Management directive , March 2015 Prescriptive in comparison including 24x7x365 SOCs, incident rooms, mandatory reporting of cyber incidents etc… http://www.bankisrael.gov.il/en/BankingSupervision/SupervisorsDirectives/ProperConductOfBankingBusinessRegulations/361_et.pdf?AspxAutoDetectCookieSupport=1
  • 36. 36 Europe Manchester - Head Office Amsterdam Cambridge Copenhagen Cheltenham Edinburgh Glasgow Leatherhead London Luxembourg Munich Zurich Australia Sydney North America Atlanta Austin Chicago New York San Francisco Seattle Sunnyvale Ollie Whitehouse ollie.whitehouse@nccgroup.trust

Editor's Notes

  • #24: Doesn’t include technical counter measures..
  • #25: Doesn’t include technical counter measures..
  • #26: Doesn’t include technical counter measures..
  • #27: Doesn’t include technical counter measures..
  • #28: Doesn’t include technical counter measures..