SlideShare a Scribd company logo
May 18, 2016
John M. Gilligan
Is Cyber Resilience Really That Difficult?
6th Cyber Resiliency Workshop
Cyber Resilience: A Personal Journey
• The Early Days
• Chasing the Dream
• The Dark Ages of Cybersecurity
• Dawn of the Internet
• The “Cat is Out of the Bag”
• Everyone’s Challenge
2
Personal Conclusions
• Achieving original dream of resilience is a (very) long term
objective
• Cyber resiliency is a complex, system of systems engineering
challenge
• Cyber risk management requires knowledge most
organizations do not possess
• Market forces are not well aligned to achieve resiliency
• Weak focus by IT development and operations communities
hampers progress toward resilience
3
A Useful Framework
For Addressing Cyber Resilience
Sophisticated
Unsophisticated
Low HighMISSION/FUNCTION
CRITICALITY
THREAT
4
A Top Level Resilience Strategy
Accept Risk
(Low Risk)
Deploy Targeted
Advanced Security
Controls/Methods
Implement Comprehensive Baseline of Security
Controls
(“Good Hygiene”)
Low High
MISSION/FUNCTION
CRITICALITY
Sophisticated
Unsophisticated
THREAT
5
Implementing Resilience
Step 2: Expand control coverage/augment methods to address
sophisticated threats and reduce risk footprint as appropriate
Deploy Targeted
Advanced Security
Controls/Methods
Implement Comprehensive Baseline of Security
Controls
Step 1:
Build CSS
Baseline
HighLow
MISSION/FUNCTION
CRITICALITY
Sophisticated
Unsophisticated
THREAT
6
Accept Risk
Comprehensive Baseline of Security Controls
(CIS Critical Security Controls – Version 6)
7
Comprehensive Baseline of Security Controls
(CIS Critical Security Controls – Version 6)
Basic Hygiene:
80+% of Threats!*
8* Australian Signals Directorate Study
Cybersecurity Resiliency Framework:
Economic Considerations*
Sophisticated
Unsophisticated
MISSION/FUNCTION
CRITICALITY
Investment in Cyber Operations and Security
(High Return for Modest or No Investment)
THREAT
Low High
Targeted Investment
(Careful Risk-Return Analysis)
No Investment
*See also “The Economics of Cyber Security: Part I and Part II”,
AFCEA Cyber Committee, October 2013 and April 2014. 9
Cybersecurity Resilience Maturity Framework*
Maturity
Level
Employment
of Security
Controls
Security Tailored
to Mission
Participate in
Information
Sharing
(threat/vul)
Response to
Cyber Threats
Resilience to Cyber
Attack s
Level 5: Resilient Augment CSC
Based on Mission
Mission
Assurance
Focused
Real Time
Response to
Inputs
Anticipate
Threats
Operate Through
Sophisticated Attack
Level 4: Dynamic Augment CSC
Based on Mission
Mission Focused Real Time
Response to
Inputs
Rapid Reaction
To Threats
Able to respond to
Sophisticated Attack
Level 3: Managed CSC
Integrated and
Continuously
Monitored
Partially Mission
Focused
Respond to
Information Inputs
Respond to
Attacks After
the Fact
Protection against
Unsophisticated
Attack
Level 2:
Performed
Foundational/
Critical Security
Controls (CSC)
Implemented
Mission Agnostic Inconsistent
Response to
Information Inputs
Respond to
Attacks After
the Fact
Some Protection
Against
Unsophisticated
Attacks
Level 1: No
Resilience
Inconsistent
Deployment of
Security Controls
None None
Step 1:
Implement
CSC Baseline
Step 2:
Address
Sophisticated
Attacks
Most
Organizations
Today
*Reference Robert Lentz “Cyber Security
Maturity Model”, Presentation 2011
10
Characteristics
• Security controls are implemented in an ad hoc or fragmented manner
• Response to threats/attacks is as a result of outside stimulus (e.g., CERT notification of successful attack)
• Intermittent participation in sharing of threat and vulnerability information
• No discrimination of protection among missions
• Unsophisticated attacks have high probability of success
Maturity
Level
Employment
of Security
Controls
Mission
Tailoring
Information
Sharing
(threat/vul.)
Threat
Response
Cyber Attack
Response
Level 1: No
Resilience
Inconsistent
Deployment of
Security
Controls
None None No Response Susceptible to
Unsophisticated
Attacks
Level 1: No Resilience
11
Maturity
Level
Employment
of Security
Controls
Mission
Tailoring
Information
Sharing
(threat/vul.)
Threat
Response
Cyber Attack
Response
Level 2:
Performed
Foundational/
Critical Security
Controls (CSC)
Implemented
Mission
Agnostic
Inconsistent
Response to
Information
Inputs
Respond to
Attacks After the
Fact
Some Protection
Against
Unsophisticated
Attacks
Characteristics
• Critical Security Controls implemented across the organization but in a delegated or fragmented approach
• Organization implements critical security controls although implementation is “tailored” by sub organizations and/or
implementation of critical controls is incomplete
• Mission Agnostic
• All missions are protected equally
• Inconsistent Response to Information Inputs
• Inconsistent or periodic engagement and response to malware/CERT community updates on threats/vulnerabilities
• Respond to Attacks (after the fact)
• Organizations deploy countermeasures as they are available and they have the opportunity to respond
• Some protection against unsophisticated attack
• Critical Security Controls that are implemented will be effective against most unsophisticated attacks
• Overlapping and inconsistent implementation of critical security controls leave protection “gaps” that could be
exploited by relatively unsophisticated attacks
Level 2: Performed
12
Maturity
Level
Employment
of Security
Controls
Mission
Tailoring
Information
Sharing
(threat/vul.)
Threat
Response
Cyber Attack
Response
Level 3:
Managed
CSC
Integrated and
Continuously
Monitored
Partially
Mission
Focused
Respond to
Information
Inputs
Respond to
Attacks After
the Fact
Protection
against
Unsophisticated
Attack
Characteristics
• Critical Security Controls integrated across enterprise with continuous monitoring
• Risk evaluation focused on priority missions matched against past and emerging threats guides risk-benefit decision
regarding fielding controls to augment foundation/critical controls
• Partially Mission Focused
• Clear understanding of mission critical information and systems
• Protection focused on most critical mission capabilities
• Respond to Information Inputs
• Cooperation with larger malware/CERT community for updates on threats/vulnerabilities
• Respond to Attacks (after the fact)
• Deploy countermeasures as they are available
• Protection against unsophisticated attack
• Critical Security Controls will be effective against 80+% of attacks
• Continuous monitoring and threat/vulnerability information sharing will provide ability to respond to some
sophisticated attacks
Level 3: Managed
13
Maturity
Level
Employment
of Security
Controls
Mission
Tailoring
Information
Sharing
(threat/vul.)
Threat
Response
Cyber Attack
Response
Level 4:
Dynamic
Augment CSC
Based on
Mission
Mission
Focused
Real Time
Response to
Inputs
Rapid Reaction
To Threats
Respond to
Sophisticated
Attack
Characteristics
• Augment Critical Security Controls based on Mission
• Risk evaluation focused on priority missions matched against past and emerging threats guides risk-benefit decision
regarding fielding controls to augment foundation/critical controls
• Mission Focused
• Analysis of spectrum of mission and information criticality results in agreement of priorities for cyber protection/restoral
• The architecture of the organization implements boundaries between
• Real Time Response to Inputs
• Cyber intelligence program (Multiple Sources, Disciplined Indications and Warning, Good understanding of sector-
specific threats)
• Incident response baked into defensive posture
• Rapid Reaction To Threats
• Cooperation with larger malware/CERT community
• Deploy countermeasures as they are available
• Respond to sophisticated attack
• After recognizing attack, assess impact and implement response (e.g., disconnect/shut down system, block attack, etc.)
• Ability to respond to most sophisticated attacks
Level 4: Dynamic
14
Level 5: Resilient
Maturity
Level
Employment
of Security
Controls
Mission
Tailoring
Information
Sharing
(threat/vul.)
Threat
Response
Cyber Attack
Response
Level 5:
Resilient
Augment CSC
Based on
Mission
Mission
Assurance
Focused
Real Time
Response to
Inputs
Anticipate
Threats
Operate Through
Sophisticated
Attack
Characteristics
• Augment Critical Security Controls based on Mission
• Risk evaluation focused on priority missions matched against past and emerging threats guides risk-benefit decision
regarding fielding controls to augment foundation/critical controls
• Mission Assurance Focused
• Analysis of spectrum of mission and information criticality results in agreement of priorities for protection and how to
assure continued operation in the face of cyber attacks
• Real Time Response to Inputs
• Cyber intelligence program (Multiple Sources: Both classified and unclassified, Disciplined Indications and Warning,
Good understanding of sector-specific threats)
• Cyber Operators and Development team working together (also relevant to operating through attacks)
• Incident response baked into defensive posture
• Anticipate Threats
• Malware/Attack Pattern Analysis Program with large repository of samples from which to extract unique signatures
(potential use of Honeypots to gain attack insights)
• Cooperation with larger malware/CERT community
• Operate through sophisticated attack
• Workforce culture of “cyber warfare” ensures real time response to attacks and preservation of priority missions
during attack by a “nation state” class of threat
15
Cybersecurity Resilience Maturity Framework
Maturity
Descriptor
Employment
of Security
Controls
Security
Tailored to
Mission
Participate in
Information
Sharing
(threat/vul.)
Response
to Cyber
Threats
Resilience to
Cyber Attacks
Level 5: Resilient Augment CSC
Based on Mission
Mission
Assurance
Focused
Real Time
Response to
Inputs
Anticipate
Threats
Operate Through
Sophisticated Attack
Level 4: Dynamic Augment CSC
Based on Mission
Mission Focused Real Time
Response to
Inputs
Rapid Reaction
To Threats
Able to respond to
Sophisticated Attack
Level 3: Managed CSC
Integrated and
Continuously
Monitored
Partially Mission
Focused
Respond to
Information
Inputs
Respond to
Attacks After
the Fact
Protection against
Unsophisticated
Attack
Level 2:
Performed
Foundational/
Critical Security
Controls (CSC)
Implemented
Mission Agnostic Inconsistent
Response to
Information
Inputs
Respond to
Attacks After
the Fact
Some Protection
Against
Unsophisticated
Attacks
Level 1: No
Resilience
Inconsistent
Deployment of
Security Controls
None None No Response Susceptible to
Unsophisticated
Attacks
Step 1:
Implement
CSC
Baseline
Step 2:
Address
Sophisticated
Attacks
16
Summary
• Achieving high resilience is possible today
• High levels of resilience can be achieved without additional
cost
• Resilience must be a structured journey, not a random walk
• Fundamental improvements in resiliency of HW and SW
necessary to get ahead of sophisticated attacks
17
Contact Information
John M. Gilligan
Center for Internet Security (CIS)
John.gilligan@cisecurity.org
703-503-3232
518-266-3460
18

More Related Content

PPTX
Understanding cyber resilience
PDF
Cyber Resilience
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
SOC Cyber Security
PDF
Rothke secure360 building a security operations center (soc)
PPTX
Security Operations Center (SOC) Essentials for the SME
PPTX
What is cyber resilience?
PDF
Cyber Threat Intelligence
Understanding cyber resilience
Cyber Resilience
From SIEM to SOC: Crossing the Cybersecurity Chasm
SOC Cyber Security
Rothke secure360 building a security operations center (soc)
Security Operations Center (SOC) Essentials for the SME
What is cyber resilience?
Cyber Threat Intelligence

What's hot (20)

PPTX
6 Steps for Operationalizing Threat Intelligence
PPSX
Next-Gen security operation center
PDF
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
PDF
From Cybersecurity to Cyber Resilience
PPTX
Cyber Threat Intelligence | Information to Insight
PDF
Building Security Operation Center
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPTX
Threat Hunting - Moving from the ad hoc to the formal
PPTX
Security Operation Center Fundamental
PPTX
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
PDF
SIEM and Threat Hunting
PPTX
7 Steps to Threat Modeling
PDF
Implementing Vulnerability Management
PDF
The New Pentest? Rise of the Compromise Assessment
PPTX
An introduction to SOC (Security Operation Center)
PPTX
Cyber Threat Hunting with Phirelight
PDF
Threat Intelligence & Threat research Sources
PDF
Overview of the Cyber Kill Chain [TM]
PDF
Introduction to Cyber Resilience
PPTX
What is Threat Hunting? - Panda Security
6 Steps for Operationalizing Threat Intelligence
Next-Gen security operation center
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
From Cybersecurity to Cyber Resilience
Cyber Threat Intelligence | Information to Insight
Building Security Operation Center
Security operations center-SOC Presentation-مرکز عملیات امنیت
Threat Hunting - Moving from the ad hoc to the formal
Security Operation Center Fundamental
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
SIEM and Threat Hunting
7 Steps to Threat Modeling
Implementing Vulnerability Management
The New Pentest? Rise of the Compromise Assessment
An introduction to SOC (Security Operation Center)
Cyber Threat Hunting with Phirelight
Threat Intelligence & Threat research Sources
Overview of the Cyber Kill Chain [TM]
Introduction to Cyber Resilience
What is Threat Hunting? - Panda Security
Ad

Viewers also liked (18)

PDF
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
PDF
Journey to cyber resilience
PPT
El negocio
PPTX
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
PDF
Science of Security: Cyber Ecosystem Attack Analysis Methodology
PDF
Cyber resilience itsm academy_april2015
PPTX
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
PDF
EC-Council Computer Hacking Forensic Investigator v9
PPTX
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
PDF
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
PPTX
Cyber resilience (building the cyber security governance) isaca id tech ses ...
ODP
Cyber security awareness
PPT
General Awareness On Cyber Security
PPTX
Social Media Cyber Security Awareness Briefing
PPT
Cours CyberSécurité - Concepts Clés
PDF
The Continuous People Pipeline, with Jayne Groll - an ITSM Academy Webinar
PDF
Cyberattaques : prenez de l’avance sur les cybercriminels
 
PDF
Résilience du Cloud Computing: de l’illusion à la réalité
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Journey to cyber resilience
El negocio
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Cyber resilience itsm academy_april2015
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
EC-Council Computer Hacking Forensic Investigator v9
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
Cyber resilience (building the cyber security governance) isaca id tech ses ...
Cyber security awareness
General Awareness On Cyber Security
Social Media Cyber Security Awareness Briefing
Cours CyberSécurité - Concepts Clés
The Continuous People Pipeline, with Jayne Groll - an ITSM Academy Webinar
Cyberattaques : prenez de l’avance sur les cybercriminels
 
Résilience du Cloud Computing: de l’illusion à la réalité
Ad

Similar to Is Cyber Resilience Really That Difficult? (20)

PPTX
The Economics of Cyber Security
PPTX
Security-Invest Where it Matters Most
PDF
Cisco - See Everything, Secure Everything
PPTX
Introduction to Ethical Hacking
PDF
Five Tips for Choosing Cloud-Based Email Security.pdf
PDF
Incident Response & Malware Analysis Protecting the Digital Frontier
PPTX
Navigating Cybersecurity Incidents in 2025
PPTX
Building a Robust Threat Program for Organizational Resilience
PDF
Defense In Depth Using NIST 800-30
PPTX
2016 06 03_threat_mgmt like a boss
PPTX
Vulnerability management today and tomorrow
PPT
information security management
PPT
Risk Based Security and Self Protection Powerpoint
PDF
Cervone uof t - nist framework (1)
PDF
Strategic Leadership for Managing Evolving Cybersecurity Risks
PDF
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
PPTX
Mastering Incident Threat Detection and Response: Strategies and Best Practices
PPTX
A military perspective on cyber security
PPTX
Application Threat Modeling
PPTX
Phases of Incident Response
The Economics of Cyber Security
Security-Invest Where it Matters Most
Cisco - See Everything, Secure Everything
Introduction to Ethical Hacking
Five Tips for Choosing Cloud-Based Email Security.pdf
Incident Response & Malware Analysis Protecting the Digital Frontier
Navigating Cybersecurity Incidents in 2025
Building a Robust Threat Program for Organizational Resilience
Defense In Depth Using NIST 800-30
2016 06 03_threat_mgmt like a boss
Vulnerability management today and tomorrow
information security management
Risk Based Security and Self Protection Powerpoint
Cervone uof t - nist framework (1)
Strategic Leadership for Managing Evolving Cybersecurity Risks
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Mastering Incident Threat Detection and Response: Strategies and Best Practices
A military perspective on cyber security
Application Threat Modeling
Phases of Incident Response

More from John Gilligan (13)

PPTX
Practical approaches to address government contracting problems
PPTX
Top Level Cyber Security Strategy
PPTX
Automating Enterprise IT Management by Leveraging Security Content Automation...
PPT
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
PPTX
Implementing Continuous Monitoring
PPTX
Federal Risk and Authorization Management Program: Assessment and Recommendat...
PPTX
Cyber Security: Threats and Needed Actions
PPT
Understanding Technology Stakeholders: Their Progress and Challenges
PPTX
Cybersecurity Priorities and Roadmap: Recommendations to DHS
PPTX
Cybersecurity: Challenges, Initiatives, and Best Practices
PPTX
Federal Cybersecurity: The latest challenges, initiatives and best practices
PPTX
Leveraging Federal Procurement to Improve Cyber Security
PPTX
Cyber Security: Past and Future
Practical approaches to address government contracting problems
Top Level Cyber Security Strategy
Automating Enterprise IT Management by Leveraging Security Content Automation...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Implementing Continuous Monitoring
Federal Risk and Authorization Management Program: Assessment and Recommendat...
Cyber Security: Threats and Needed Actions
Understanding Technology Stakeholders: Their Progress and Challenges
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity: Challenges, Initiatives, and Best Practices
Federal Cybersecurity: The latest challenges, initiatives and best practices
Leveraging Federal Procurement to Improve Cyber Security
Cyber Security: Past and Future

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Approach and Philosophy of On baking technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
A Presentation on Touch Screen Technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
A Presentation on Artificial Intelligence
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Tartificialntelligence_presentation.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Getting Started with Data Integration: FME Form 101
Programs and apps: productivity, graphics, security and other tools
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Approach and Philosophy of On baking technology
Assigned Numbers - 2025 - Bluetooth® Document
A Presentation on Touch Screen Technology
Encapsulation_ Review paper, used for researhc scholars
A Presentation on Artificial Intelligence
cloud_computing_Infrastucture_as_cloud_p
A comparative analysis of optical character recognition models for extracting...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25-Week II
WOOl fibre morphology and structure.pdf for textiles
A novel scalable deep ensemble learning framework for big data classification...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Unlocking AI with Model Context Protocol (MCP)
Tartificialntelligence_presentation.pptx
A comparative study of natural language inference in Swahili using monolingua...
Zenith AI: Advanced Artificial Intelligence
Web App vs Mobile App What Should You Build First.pdf
Getting Started with Data Integration: FME Form 101

Is Cyber Resilience Really That Difficult?

  • 1. May 18, 2016 John M. Gilligan Is Cyber Resilience Really That Difficult? 6th Cyber Resiliency Workshop
  • 2. Cyber Resilience: A Personal Journey • The Early Days • Chasing the Dream • The Dark Ages of Cybersecurity • Dawn of the Internet • The “Cat is Out of the Bag” • Everyone’s Challenge 2
  • 3. Personal Conclusions • Achieving original dream of resilience is a (very) long term objective • Cyber resiliency is a complex, system of systems engineering challenge • Cyber risk management requires knowledge most organizations do not possess • Market forces are not well aligned to achieve resiliency • Weak focus by IT development and operations communities hampers progress toward resilience 3
  • 4. A Useful Framework For Addressing Cyber Resilience Sophisticated Unsophisticated Low HighMISSION/FUNCTION CRITICALITY THREAT 4
  • 5. A Top Level Resilience Strategy Accept Risk (Low Risk) Deploy Targeted Advanced Security Controls/Methods Implement Comprehensive Baseline of Security Controls (“Good Hygiene”) Low High MISSION/FUNCTION CRITICALITY Sophisticated Unsophisticated THREAT 5
  • 6. Implementing Resilience Step 2: Expand control coverage/augment methods to address sophisticated threats and reduce risk footprint as appropriate Deploy Targeted Advanced Security Controls/Methods Implement Comprehensive Baseline of Security Controls Step 1: Build CSS Baseline HighLow MISSION/FUNCTION CRITICALITY Sophisticated Unsophisticated THREAT 6 Accept Risk
  • 7. Comprehensive Baseline of Security Controls (CIS Critical Security Controls – Version 6) 7
  • 8. Comprehensive Baseline of Security Controls (CIS Critical Security Controls – Version 6) Basic Hygiene: 80+% of Threats!* 8* Australian Signals Directorate Study
  • 9. Cybersecurity Resiliency Framework: Economic Considerations* Sophisticated Unsophisticated MISSION/FUNCTION CRITICALITY Investment in Cyber Operations and Security (High Return for Modest or No Investment) THREAT Low High Targeted Investment (Careful Risk-Return Analysis) No Investment *See also “The Economics of Cyber Security: Part I and Part II”, AFCEA Cyber Committee, October 2013 and April 2014. 9
  • 10. Cybersecurity Resilience Maturity Framework* Maturity Level Employment of Security Controls Security Tailored to Mission Participate in Information Sharing (threat/vul) Response to Cyber Threats Resilience to Cyber Attack s Level 5: Resilient Augment CSC Based on Mission Mission Assurance Focused Real Time Response to Inputs Anticipate Threats Operate Through Sophisticated Attack Level 4: Dynamic Augment CSC Based on Mission Mission Focused Real Time Response to Inputs Rapid Reaction To Threats Able to respond to Sophisticated Attack Level 3: Managed CSC Integrated and Continuously Monitored Partially Mission Focused Respond to Information Inputs Respond to Attacks After the Fact Protection against Unsophisticated Attack Level 2: Performed Foundational/ Critical Security Controls (CSC) Implemented Mission Agnostic Inconsistent Response to Information Inputs Respond to Attacks After the Fact Some Protection Against Unsophisticated Attacks Level 1: No Resilience Inconsistent Deployment of Security Controls None None Step 1: Implement CSC Baseline Step 2: Address Sophisticated Attacks Most Organizations Today *Reference Robert Lentz “Cyber Security Maturity Model”, Presentation 2011 10
  • 11. Characteristics • Security controls are implemented in an ad hoc or fragmented manner • Response to threats/attacks is as a result of outside stimulus (e.g., CERT notification of successful attack) • Intermittent participation in sharing of threat and vulnerability information • No discrimination of protection among missions • Unsophisticated attacks have high probability of success Maturity Level Employment of Security Controls Mission Tailoring Information Sharing (threat/vul.) Threat Response Cyber Attack Response Level 1: No Resilience Inconsistent Deployment of Security Controls None None No Response Susceptible to Unsophisticated Attacks Level 1: No Resilience 11
  • 12. Maturity Level Employment of Security Controls Mission Tailoring Information Sharing (threat/vul.) Threat Response Cyber Attack Response Level 2: Performed Foundational/ Critical Security Controls (CSC) Implemented Mission Agnostic Inconsistent Response to Information Inputs Respond to Attacks After the Fact Some Protection Against Unsophisticated Attacks Characteristics • Critical Security Controls implemented across the organization but in a delegated or fragmented approach • Organization implements critical security controls although implementation is “tailored” by sub organizations and/or implementation of critical controls is incomplete • Mission Agnostic • All missions are protected equally • Inconsistent Response to Information Inputs • Inconsistent or periodic engagement and response to malware/CERT community updates on threats/vulnerabilities • Respond to Attacks (after the fact) • Organizations deploy countermeasures as they are available and they have the opportunity to respond • Some protection against unsophisticated attack • Critical Security Controls that are implemented will be effective against most unsophisticated attacks • Overlapping and inconsistent implementation of critical security controls leave protection “gaps” that could be exploited by relatively unsophisticated attacks Level 2: Performed 12
  • 13. Maturity Level Employment of Security Controls Mission Tailoring Information Sharing (threat/vul.) Threat Response Cyber Attack Response Level 3: Managed CSC Integrated and Continuously Monitored Partially Mission Focused Respond to Information Inputs Respond to Attacks After the Fact Protection against Unsophisticated Attack Characteristics • Critical Security Controls integrated across enterprise with continuous monitoring • Risk evaluation focused on priority missions matched against past and emerging threats guides risk-benefit decision regarding fielding controls to augment foundation/critical controls • Partially Mission Focused • Clear understanding of mission critical information and systems • Protection focused on most critical mission capabilities • Respond to Information Inputs • Cooperation with larger malware/CERT community for updates on threats/vulnerabilities • Respond to Attacks (after the fact) • Deploy countermeasures as they are available • Protection against unsophisticated attack • Critical Security Controls will be effective against 80+% of attacks • Continuous monitoring and threat/vulnerability information sharing will provide ability to respond to some sophisticated attacks Level 3: Managed 13
  • 14. Maturity Level Employment of Security Controls Mission Tailoring Information Sharing (threat/vul.) Threat Response Cyber Attack Response Level 4: Dynamic Augment CSC Based on Mission Mission Focused Real Time Response to Inputs Rapid Reaction To Threats Respond to Sophisticated Attack Characteristics • Augment Critical Security Controls based on Mission • Risk evaluation focused on priority missions matched against past and emerging threats guides risk-benefit decision regarding fielding controls to augment foundation/critical controls • Mission Focused • Analysis of spectrum of mission and information criticality results in agreement of priorities for cyber protection/restoral • The architecture of the organization implements boundaries between • Real Time Response to Inputs • Cyber intelligence program (Multiple Sources, Disciplined Indications and Warning, Good understanding of sector- specific threats) • Incident response baked into defensive posture • Rapid Reaction To Threats • Cooperation with larger malware/CERT community • Deploy countermeasures as they are available • Respond to sophisticated attack • After recognizing attack, assess impact and implement response (e.g., disconnect/shut down system, block attack, etc.) • Ability to respond to most sophisticated attacks Level 4: Dynamic 14
  • 15. Level 5: Resilient Maturity Level Employment of Security Controls Mission Tailoring Information Sharing (threat/vul.) Threat Response Cyber Attack Response Level 5: Resilient Augment CSC Based on Mission Mission Assurance Focused Real Time Response to Inputs Anticipate Threats Operate Through Sophisticated Attack Characteristics • Augment Critical Security Controls based on Mission • Risk evaluation focused on priority missions matched against past and emerging threats guides risk-benefit decision regarding fielding controls to augment foundation/critical controls • Mission Assurance Focused • Analysis of spectrum of mission and information criticality results in agreement of priorities for protection and how to assure continued operation in the face of cyber attacks • Real Time Response to Inputs • Cyber intelligence program (Multiple Sources: Both classified and unclassified, Disciplined Indications and Warning, Good understanding of sector-specific threats) • Cyber Operators and Development team working together (also relevant to operating through attacks) • Incident response baked into defensive posture • Anticipate Threats • Malware/Attack Pattern Analysis Program with large repository of samples from which to extract unique signatures (potential use of Honeypots to gain attack insights) • Cooperation with larger malware/CERT community • Operate through sophisticated attack • Workforce culture of “cyber warfare” ensures real time response to attacks and preservation of priority missions during attack by a “nation state” class of threat 15
  • 16. Cybersecurity Resilience Maturity Framework Maturity Descriptor Employment of Security Controls Security Tailored to Mission Participate in Information Sharing (threat/vul.) Response to Cyber Threats Resilience to Cyber Attacks Level 5: Resilient Augment CSC Based on Mission Mission Assurance Focused Real Time Response to Inputs Anticipate Threats Operate Through Sophisticated Attack Level 4: Dynamic Augment CSC Based on Mission Mission Focused Real Time Response to Inputs Rapid Reaction To Threats Able to respond to Sophisticated Attack Level 3: Managed CSC Integrated and Continuously Monitored Partially Mission Focused Respond to Information Inputs Respond to Attacks After the Fact Protection against Unsophisticated Attack Level 2: Performed Foundational/ Critical Security Controls (CSC) Implemented Mission Agnostic Inconsistent Response to Information Inputs Respond to Attacks After the Fact Some Protection Against Unsophisticated Attacks Level 1: No Resilience Inconsistent Deployment of Security Controls None None No Response Susceptible to Unsophisticated Attacks Step 1: Implement CSC Baseline Step 2: Address Sophisticated Attacks 16
  • 17. Summary • Achieving high resilience is possible today • High levels of resilience can be achieved without additional cost • Resilience must be a structured journey, not a random walk • Fundamental improvements in resiliency of HW and SW necessary to get ahead of sophisticated attacks 17
  • 18. Contact Information John M. Gilligan Center for Internet Security (CIS) John.gilligan@cisecurity.org 703-503-3232 518-266-3460 18