Proactive Counterespionage & Business Continuity / Resiliency
•
2 likes•1,310 views
The session will discuss means in which information assets and business continuity is protected and propose an additional layer of defense with a human counterespionage focus. The proposed proactive counterespionage plan includes operational security audits, reverse open source intelligence and classification of employees who are prime targets for disruptive espionage.
- See more at: http://www.rsaconference.com/events/ad15/agenda/sessions/2219/proactive-counterespionage-as-a-part-of-business#sthash.JUipJ0BR.dpuf
1 of 20
Download to read offline
More Related Content
Proactive Counterespionage & Business Continuity / Resiliency
1. SESSION ID:
#RSAC
Lydia Kostopoulos, PhD
Proactive Counterespionage as a
Part of Business Continuity and
Resiliency
SOP-R06
Intelligence & Cybersecurity Professor / Institute of International and Civil Security (IICS)
International Engagement Coordinator / Cyber Security Forum Initiative (CSFI)
@LKCYBER
3. #RSAC
@LKCYBER
(Economy)
Business
Innovation
Espionage
National
Security
• Economic Prosperity
• National Defense
• Geopolitical Interests
• Socio-Cultural Values
• Competitive Intellectual Property
• Business Growth: Financial, Service & Product
• Innovation Capacity & Capability
• Reputation Management
• Criminal
• Industrial
• Nation-State
• Non-state Political
Cybersecurity
Scope:
Focus:
Human Factor
4. #RSAC
@LKCYBER
We set up network defenses…
Intrusion
Detection
System
Defense in Depth
Firewall
We set up data defenses…
Destruction
What about human defenses?
Encryption
Data in Use
At Rest
In Motion
Classification
Internal Use
Public
Confidential
Secret
We set up malware defenses…
Anti-Virus Spam Filter?
Data Leakage Prevention
Data Loss Prevention
Identity & Access Management Phishing
5. #RSAC
@LKCYBER
Why are human defenses important?
Roles in an organization that are instrumental in achieving the
desired goals and fulfilling aspirations set forward in the business
strategy and vision.
* Business Critical Roles can also be viewed as:
High Value Targets, Key People Terrain, (Single) Points of Failure, or Nodes of Compromise.
Should people in these roles be compromised it would constitute a
point of failure with potentially serious to detrimental repercussions
for business continuity and operations.
Business Critical Roles (BCR)
6. #RSAC
@LKCYBER
- Tangible and intangible
- Internal knowledge of organization structure and operations
- Trade secrets
- Business intentions
- Data, networks, servers, people, proprietary ideas, trade
secrets, money, internal strategy and intent
- Innovative ideas, insight and perspective
- Intellectual capacity and capability
- Motivation and aspiration
Information
Access
Intellect
What form of assets do BCR roles have?
What happens when people in Business Critical Roles are Compromised?
2030 205020402020
Internal divides, issues, problems
Org structure: official vs reality
7. #RSAC
@LKCYBER
Attacks: Human Factor & Intellectual Property (IP)
91% of cyberattacks begin with spear phishing
email – TrendMicro Research
IP Intensive Businesses in the US
• Support at least 40 million jobs
• $5 trillion to US GDP 28%
$445 billion – annual cost of cybercrime and
economic espionage to the world economy
- 2014 CSIS & McAfee report
How much does it cost the world?
What’s the most common attack vector?
11. #RSAC
@LKCYBER
Proactive Counter-Espionage Roadmap
Phase 1:
Identification of
Business Critical Roles
& Espionage Risk
Proactive
Counter-Espionage
Phase 2:
Policy Creation
Phase 3:
Communication
Protocol
Phase 4:
Operationalize
Whole of
Enterprise
Approach
12. #RSAC
@LKCYBER
Categories of Business
Interests
• Define levels of espionage risk
from low (1) to high (5).
Collaboration with Business
Strategists, Business
Intelligence and Security
Operations.
• Risk levels should be defined
as per impact to business
interests, incorporate business
intelligence and reflect
organization’s risk appetite.
Proactive Counter-Espionage Roadmap
Phase 1: Identification of Business Critical Roles & Espionage Risk
Identify Business
Critical Roles (BCR)
Levels of Espionage Risk
• Map business critical roles on
top of categories of business
interests. Use business
strategy as guidance.
• Identify people who represent
business continuity points of
failure in these goals should
they be compromised.
• Determine areas that are
business critical to identified
business continuity goals.
Reflective of Business strategy,
interests, goals, aspirations and
continuity plan.
• Define BCR roles within
categories and risk levels
specifically as they pertain to
the respective business.
• Definitions should clearly
indicate criticality of role
responsibilities and the value
the people in these roles bring
to achieving desired business
goals, as well as the risk for
business continuity should they
be compromised.
• Prepare tailored risk profiles of
business critical roles to be
delivered for situational
awareness, policy creation and
need based use by:
- Business Strategists
- Human Resources
- Business Intelligence
- Security Operations
- Information Security
Enterprise Risk Risk Profile
13. #RSAC
@LKCYBER
Proactive Counter-Espionage Roadmap
Phase 2: Policy Creation
Human Resources
Information Security
Policy Creation
Business Intelligence
Inter-Departmental
Collaborative Effort
• Establish BCR related policies to preserve, protect and
maintain operational security (OPSEC)
• Establish policies for reverse open source intelligence
(OSI) hunting and information sanitization
• Create policy for identity and access management
• SIEM policies for life-cycle of employee and role type
• Establish defined ‘need to know’ events relating to
employee
• Internal classification of high espionage
risk roles/responsibilities
• Establish hiring policies for different roles
and risk levels
14. #RSAC
@LKCYBER
Hardening Human Assets (HHA)
Be proactive not reactive
Cross departmental teamwork
Security Culture People: High Espionage Risk
OPSEC Awareness
Social Engineering Awareness
Specialized SIEM Settings
(Cross-departmental collaboration)
Espionage Threat Awareness
Data Protection Awareness
Social Media Use Awareness
Travel Security Awareness
Proactive Counter-Espionage Roadmap
Phase 2: Policy Creation - Awareness
Human Assets
Whole of
Enterprise
Approach
Hardening of Human Assets (HHA) – The process of elevating security awarenessof a human
asset in efforts to reduce and eliminate as many risks as possible.
16. #RSAC
@LKCYBER
Proactive Counter-Espionage Roadmap
Phase 4: Operationalize
TimelinePrioritize DelegateMethodPhase 4
• Determine the best method for implementing
the roadmap.
• Identify chain of command for operationalizing
the roadmap with key stakeholders.
• Assess impact of unique organizational culture,
operations and resources of the organization in
question.
• Detail a list of tasks to be done.
• Prioritize identified tasks into essential tasks,
primary and secondary tasks.
• Prioritization decided by those at the top of the
chain of command for operationalizing the
roadmap.
• Agree on a suitable timeline for
operationalizing the roadmap.
• Delegate people who will be responsible
for task completion and oversight.
Monitoring
Reporting
KPI
17. #RSAC
@LKCYBER
“The only thing constant in life is change.”
- Ancient Philosopher Heraclitus
Be agile and adapt to constantly changing circumstances!