56
Crafting a Cybersecurity Strategy that Works Texas Association of Broadcasters August 2016 Chris Homer PBS Technology & Operations

Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Crafting a Cybersecurity Strategy that Works

Texas Association of Broadcasters August 2016

Chris Homer

PBS Technology & Operations

Page 2: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Cybersecurity Strategy for Broadcasters

• Summary

– Broadcast Industry Challenges

– Understanding Risk

– NIST Framework

– How to establish a Cybersecurity Strategy

Page 3: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Broadcast Industry Challenges • Broadcast Networks

– Emergency Alert Systems

– News & Weather, Production, Graphics

– Traffic & Scheduling

– Playout & Automation Systems

– STL transport & Broadcast (spokes & hubs)

Page 4: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

• EAS Equipment

– Common Alerting Protocol

• September 30 2011 FEMA

• eXtensible Markup Language (XML) standard

– May be tied to local, state & FEMA Networks

Page 5: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

News Weather Production & Graphics • News Room Computer

Systems NRCS

• Non-Linear Editing Systems NLEs

• Graphics Systems

• Wire Services, Pool Feeds, Bonded Cellular

• Closed Captioning via IP

Page 6: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Traffic & Scheduling

• Sales Tools

• Traffic Scheduling

• Schedule Import

• Programming

• BXF Export to Automation

Page 7: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Playout & Automation Systems

• Playout Servers (Channel in a Box)

• Automation Systems

• IP Playout

• Storage Area Networks (SAN/NAS)

• Library Systems (Disk, Tape, Cloud)

Page 8: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

STL or Spoke & Hub

• IP over Microwave

• Network Spoke & Hub Connectivity

Page 9: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Broadcast Industry Challenges • Networks (Enterprise or Corporate)

– Enterprise Resource Planning (ERP)

– Finance

– Sales

– Research

– Intranet/Extranet

– Human Resources/Community Service

Page 10: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Finance & Accounting Systems

• Finance

• Accounting

– Accounts Payable

– Accounts Receivable

• Purchasing

Page 11: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Broadcast Industry Challenges

– News Data

– Finance & Sales

– Traffic & Scheduling

– File Based Workflow

– Viewer Data

– Social Media Data

Page 12: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

News

• Laptops & Thumb drives

• NRCS Rundowns

• Non-Linear Editing Systems

• Wire Services

Page 13: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Finance Sales & Admin

• Human Resources/Employee Data

• ERP Financial Data

• Email

Page 14: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Traffic & Scheduling

• Contracts & Deals

• Programming Grids

• Schedules

Page 15: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

File Based Workflow

• Media

• Graphics

• Meta Data/RDS

• Marketing Content (Posters, Ads)

• Web Based Content

Page 16: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Community Services/Viewer Data

• Local Events Charities

• Nielsen Data

• Viewer Data

• Social Media Content

Page 17: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Cybersecurity Journey

• Understanding the Risks

• Cyber Attack Chain Model

• FCC CSRIC IV Report

• NIST Cybersecurity Framework

Page 18: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Understanding the Risks

• Dead Air

• Impact to Resources

• Loss of Revenue

• Embarrassment

• Potential liability

• Breach of employee, viewer or advertiser data

Page 19: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Types of Attacks 7 of 10 Type Definition

Web App Attack Attack the vulnerabilities and authentication of a web application layer such as invalidated redirects, cross site forgery, cross site scripting and others.

Point-of-Sale Remote attacks against the environments where card transactions are conducted.

Insider Misuse Internal or partner misuse of resources.

Physical Theft & Loss

Loss of information asset whereas the data is more valuable than the asset.

Crimeware Use of malware followed by ramsomeware

Cyber-espionage Access to state or corporate sensitive data.

Denial of Service Any attack to compromise network or system availability.

*2016 Data Breach Investigation Report-Verizon

Page 20: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

A Cyber Attack Chain Model Step Description

Reconnaissance & Probing

Find Target

Harvest information (email, conference listings, public lists, etc.)

Delivery & Attack Place delivery mechanism online

Use social engineering to induce target to access malware or other exploits

Installation & Exploitation

Exploit vulnerabilities on target systems to acquire access

Elevate user privileges and install additional “tools”

Compromise & Expansion

Exfiltration of data

Use compromised systems to exploit additional systems

Page 21: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Local Broadcast TV Station

Page 22: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Local Broadcast Radio Station

Page 23: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Central Broadcast TV Hub

Page 24: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Model for Hardened Station

DAM

Extra/Intra Net

Traditional IT (ERP, HR, Programming, Research)

File Ingest

Enterprise Network

Public Web Sites

Internet

NRCS

Internal

Firewall

Station Playout

STL or WAN to Hub

General Users

Traffic Scheduling

Editing Graphics

Page 25: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

FCC CSRIC IV Working Group 4

• FCC CSRIC IV Working Group 4 Report on Cybersecurity for the Telecommunication Industry

• https://transition.fcc.gov/pshs/advisory/csric4/CSRIC_IV_WG4_Final_Report_031815.pdf

• Roadmap for Telecommunication Industry

• Encourage Voluntary Action • The Communications Security, Reliability and Interoperability Council IV Working Group 4 March 2015

Page 26: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

• Segment Analysis

– Broadcasting

– Cable

– Wireless

– Wireline

– Satellite

FCC CSRIC IV Working Group 4

Page 27: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

FCC CSRIC IV Working Group 4

• Feeder Segments

– Cyber Ecosystem and Dependencies

– Top Threats and Vectors

– Framework Requirements and Barriers

– Small and Medium Business

– Measurements

Page 28: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

FCC CSRIC IV Working Group 4

• Small/Medium Business

– Identifies what an SMB needs to protect, who has responsibility for a given task, and how an SMB can protect its critical infrastructure.

– Use cases from various segments.

– Identifies highest priority NIST Cybersecurity Framework subcategories for SMBs.

Page 30: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

NIST Cybersecurity Framework

• Framework Core

– Each item designed for desired outcome

– Function

– Category

– Sub-category

– Informative Reference

Page 31: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Framework Core Functions

• Identify

• Protect

• Detect

• Respond

• Recover

Page 32: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

*Framework for Improving Critical Infrastructure Cybersecurity NIST-2014

Page 33: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

*Framework for Improving Critical Infrastructure Cybersecurity NIST-2014

Page 34: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Identify

• Asset Management

• Business Environment

• Governance

• Risk Assessment

• Risk Management Strategy

Page 35: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Protect

• Access Control

• Awareness and Training

• Data Security

• Maintenance

• Protective Technology

• Information Protection Processes/Procedures

Page 36: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Detect

• Anomalies & Events

• Detection Processes

• Security Monitoring

• SIEM

Page 37: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Respond

• Response Planning

• Communications

• Analysis

• Mitigation

• Improvements

Page 38: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Recover • Recovery Planning • Improvements • Communications

Page 39: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Framework Tiers

• Tier 1-Partial

• Tier 2-Risk Informed

• Tier 3-Repeatable

• Tier 4-Adaptive

Page 40: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Tier 1-Partial

• Lack of formal process

• Lack of awareness

• Unable to collaborate outside of organization

Page 41: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Tier 2-Risk Informed

• Formal process may exist within parts of the organization

• Some awareness but not organization wide

• May understand role but not formalized

Page 42: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Tier 3-Repeatable

• Formal process has become policy

• Organization wide approach

• Understands dependencies

Page 43: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Tier 4-Adaptive

• Continuous improvement

• Organization wide and has become part of the culture

• Has become a great partner outside the organization

Page 44: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Cyber Risk Management

• Executive

• Business Process

• Operations/Implementation

Page 45: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Executive

• Successful Implementation

– Required support at the highest level

– Buy-in from all stake holders

– Continuous improvement

– Governance

Page 46: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Business Process

• Process to include

– Risk Planning

– Recovery Planning

– Communication & Training

Page 47: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Operations/Implementation

• Operations and Engineering

– Asset Management

– Change Management

– Incident Management

– Respond & Recover

Page 48: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Steps to Establish a Cybersecurity Program

• Prioritize & Orient

• Create Current Profile

• Perform Risk Assessment

• Create Target Profile

• Perform Gap Analysis

• Create Action Plan

Page 49: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Prioritize & Orient

• Prioritize

– Determine the scope of systems and assets that support the business.

• Orient

– Identifies assets, regulatory requirements, and overall risk approach.

Page 50: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Create Current Profile

• Create Curent Profile

– Current categories/sub-categories

– e.g. Asset Management, User Control

Page 51: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Perform Risk Assessment

• Guided by Risk Management Process

• Analyze current environment

• Use pertinent and emerging data

Page 52: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Create Target Profile

• Create Target Profile

– Desired categories and sub-categories

– e.g. Security policy, monitoring service

– Customer and stakeholder requirements

Page 53: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Analyze & Prioritize Gaps

• Perform Gap Analysis

• Differences between current profile and target profile

• e.g. Lack of Governance, Process, Monitoring

Page 54: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Action Plan/Execute

• Create Action Plan

• Cost analysis

• Execute

• Repeat

Page 55: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Organizational Changes

• Governance

• Communication

• Culture

• Response

Page 56: Crafting a Cybersecurity Strategy that Works · Crafting a Cybersecurity Strategy that Works . Texas Association of Broadcasters August 2016 . Chris Homer . PBS Technology & Operations

Conclusion

• Cybersecurity is:

– A Change of mindset & culture

– Supported at the highest level in organization

– Everyone’s responsibility

– Doable through use of process & technology

– Ongoing