SA Critical Information Infrastructure Protection (CIIP)
28 Slides7.54 MB
SA Critical Information Infrastructure Protection (CIIP) & Institutional Intelligence Reporting National Treasury Critical Information Infrastructure Protection (CIIP) Craig Rosewarne (Wolfpack: SA Critical Information Infrastructure Protection (CIIP)) (MBA / CISSP / CISM / CVE / ISO 27001 Lead Implementer & Lead Auditor / Certified Lead Incident Response Professional) Jonathan Crisp (BarnOwl: Institutional Intelligence Reporting) Director
Fast Facts Wolfpack Information Risk (Pty) Ltd is a proudly South African company established in 2011 Independent trusted advisors to government and private sector Ongoing commitment to national cyber security community initiatives A level 1 BBBEE contributor
DISRUPTIVE TECHNOLOGIES Cloud / Community / Apps 3
14.3 BILLION 3 TRILLION 4
THE EVOLVING THREAT 1995 – 2005 1 Decade of the Commercial Internet st 2005 – 2015 2nd Decade of the Commercial Internet Motive National Security Espionage, Political Activism Monetary Gain Revenge Curiosity Nation-state Actors / Terrorist Groups - Targeted Attacks Competitors, Hacktivists Organised Crime, Hackers and Crackers using sophisticated tools Insiders, using inside information Script-kiddies or hackers using tools, web-based “how-to’s” Adversary
6
SA NATIONAL CYBERSECURITY STAKEHOLDERS Justice, Crime Prevention and Security (JCPS) Cluster Cybersecurity Response Committee (SSA lead) State Security Agency SA Police Service (SITA) SA National Defence Force (CSIR DPSS / SITA) Justice & Corrections (SIU / NPA) Dept Telecomms & Postal Service (CSH/ NCAC) DST Home Affairs SAPO AGSA DPSA DIRCO SARS National Key Points National, Provincial & Local Government Citizens Children Industry Bodies - SABRIC SAFPS ISPA SACCI Regulators STRATEGIC Compliance violation Fines/Fees DEPARTMENT ATO revoked / INDUSTRY OPERATIONAL Financial Retailers ISPs TMT Manufacturing Academia Healthcare Professional Services Vendors Local & International Partners B2B B2C Informal Traders Customers 7
DEFENDER VS ATTACKER 8
9 CRITICAL INFORMATION INFRASTRUCTURE Telecommunications / IT Water Systems Transport Manufacturing Business Systems Retail Ports Financial Distribution Supply Chain Government Energy Health
SA 2016 CIIP REPORT 10
11 INFORMATION RISK ASSESSMENT 160 POSSIBLE 160 POSSIBLE VULNERABILITIES VULNERABILITIES WERE REVIEWED WERE REVIEWED ACROSS MAJOR RISK ACROSS MAJOR RISK DOMAINS OF THE DOMAINS OF THE ORGANISATION. ORGANISATION. Industrial Control Industrial Control Systems Systems Governance, Risk & Governance, Risk & Compliance Compliance Human Resources Human Resources Asset Management Asset Management Access Control Access Control Systems Acquisition, Development & Systems Acquisition, Development & Maintenance Maintenance IT Security Operations IT Security Operations Supplier Supplier Management Management Physical and Environmental Physical and Environmental Security Security Security Architecture & Design Security Architecture & Design Telecommunications & Networking Telecommunications & Networking Information Security Incident InformationManagement Security Incident Management Cryptography Cryptography Business Continuity & Disaster Business Continuity & Disaster Recovery Recovery 11
REPORT – HIGHLIGHTS 12
SA 2016 CIIP REPORT – HIGHLIGHTS 13
SA 2016 – THE ROAD AHEAD 14
THREAT INTELLIGENCE MONITOR ASSESS RECOMMENDATIONS - AIM TRAINING & AWARENESS HEALTH CHECK IMPROVE 15
ASSESS Information Risk Framework & ISMS Stakeholder Engagement Health Check Phase Information Risk Assessment Priority Roadmap Remediation & Monitoring Phase Simulated Threat Reviews Incident Response Business Benefits & Continual Improvement Phase
IMPROVE REMEDIATION Information Risk Framework & ISMS Stakeholder Engagement Health Check Phase Information Risk Assessment Priority Roadmap Remediation & Monitoring Phase Simulated Threat Reviews Incident Response Business Benefits & Continual Improvement Phase
TRAINING IMPROVE TRAINING & AWARENESS 1.1 Executive / Management (1 hour) 1. INFORMATION RISK BASELINE PROGRAMME 1.2 GRC / IS / IT teams (1-2 days) 1.3 User Awareness Programme (1 - 4 hours) 2. 2. SPECIALIST SPECIALIST PROGRAMMES PROGRAMMES 2.1 Governance, Risk & Compliance Programme 2.4 Vulnerability Management Programme 2.2 Information Security Programme 2.5 Security Operations Programme 2.3 Privacy & Incident Management Programme 2.6 Secure Development Programme
AWARENESS IMPROVE TRAINING & AWARENESS Ex ec Business Requirements Analysis Stakeholder Change Management Create Tailored Awareness Programme Ma na ge me nt Use rs & Thir d Par ties Phase 1: PLAN Phase 2: BUILD Phase 3: RUN
HUMAN VULNERABILITY TESTING
21 MONITOR Threat Intelligence Global & local threat feeds Continuous Monitoring Identify suspicious behaviour Asset Discovery Know your assets MONITOR Vulnerability Assessments Effectively identify vulnerabilities Threat Management Determine threat to your organisation
22 BALANCING RISK & REWARD PROACTIVE Creating stakeholder value More Predictable Business Growth Improved Governance Risk Intelligent Organisation REACTIVE Preserving stakeholder value Risk Unaware V A L U E Fighting Fires Compliance CONFIDENTIAL 20
INSTITUTIONAL INTELLIGENCE REPORTING 23
INSTITUTIONAL INTELLIGENCE REPORTING 24
INSTITUTIONAL INTELLIGENCE REPORTING 25
INSTITUTIONAL INTELLIGENCE REPORTING 26
INSTITUTIONAL INTELLIGENCE REPORTING 27
Wolfpack Information Risk (Pty) Ltd [email protected] www.wolfpackrisk.com Threat Intelligence Advisory Training Awareness FULLY INTEGRATED GOVERNANCE, RISK MANAGEMENT, COMPLIANCE AND AUDIT SOFTWARE www.barnowl.co.za