24
Cybersecurity for Manufacturers: Are You Ready for the 12/31/17 Deadline? Martha Daniel, Founder, President and Chief Executive Officer, Cytellix and Information Management Resources, Inc. (IMRI) AMP SoCal Webinar Series: Episode 3 June 8, 2017; 10:00 a.m. – 10:30 a.m. Moderator: Emily Tjaden Sylvester, AMP SoCal

Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Cybersecurity for Manufacturers: Are You Ready for the 12/31/17 Deadline?

Martha Daniel, Founder, President and Chief Executive Officer, Cytellix and Information Management Resources, Inc. (IMRI)

AMP SoCal Webinar Series: Episode 3June 8, 2017; 10:00 a.m. – 10:30 a.m.

Moderator:Emily Tjaden Sylvester, AMP SoCal

Page 2: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

About AMP SoCal

• The Advanced Manufacturing Partnership for Southern California (AMP SoCal) is a collaboration of more than 135 different organizations.

• Its goal is to strengthen the industrial ecosystem for aerospace and defense manufacturers.

• AMP SoCal is led by the University of Southern California (USC) Sol Price School of Public Policy - USC Center for Economic Development.

• AMP SoCal supports the aerospace and defense manufacturing industry within the 10-county Southern California region.

Page 3: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Logistics

• All audio will stream through your computer speakers.

• Please submit your questions anytime throughout the presentation in the chat box, located on the bottom of your screen.

• Webinar recording and slides are posted within one week of the event.

ampsocal.usc.edu/webinars

Page 4: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Today’s Speaker

Martha Daniel,Founder, President and Chief Executive Officer of Cytellix and its parent company, Information Management Resources, Inc. (IMRI)

• www.cytellix.com• www.imri.com

Page 5: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Cyber Security Readiness for Manufacturing by 12/31/17:

NIST SP 800-171 Compliance to meet DFARS 252.204.7012 Regulations

Cytellix, Cyber Security Division of IMRI | Aliso Viejo, CACopyright © 2017 IMRI. All rights reserved. Proprietary Information

www.cytellix.com

Presenter
Presentation Notes
Hi, I’m Spencer Cobb , Director of Strategy and Business Development with Cytellix. Cytellix is the commercial cyber security arm of IMRI based in Aliso Viejo California.
Page 6: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Today’s Agenda

Introduction

Cybersecurity Preparedness

Industry Standards driving Compliance

What should be done

Common questions

Q&A

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Page 7: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Who am I?

Martha Daniel, Founder, CEO & President of Information Management Resources, Inc. a 25 year old company that provides cybersecurity, program management, technology and engineering services to the federal government & private sector

IMRI, Delivering comprehensive IT and engineering solutions since 1992

Successfully delivered over $185 Million in technology contracts. An for over 9 years, IMRI has support Cyber Security programs for the U. S. Federal Government nationally and internationally. Supporting over 1500 networks with 7M endpoints

Cytellix, is the commercial compliance based cybersecurity division of IMRI

Focused on helping small manufacturers meet new Federal Supply chain compliance guidelines around cyber security readiness

Partnered with Manufacturing Extension Partnerships (MEP) around the U.S.

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Presenter
Presentation Notes
About me.. Please see the conference guide. I’m with Cytellix security. We help companies secure their networks. We help manufacturers meet with the new NIST 800-171 and DFARs 225.204.7012 for cyber security comp
Page 8: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Why are we Trusted LeadersFederal Market

Cybersecurity ExpertiseFor over 9 years IMRI has been providing Cybersecurity support and services to U.S government agencies:

• U.S. Cyber Command• Defense Information Systems Agency• Office - Secretary of Defense• U.S. Strategic Command• U.S. Southern Command• U.S. European Command• U.S. Northern Command• U.S. Central Command• U.S. Army Network Enterprise• U.S. Navy Naval Air systems Command• U.S. Marine Corps• Defense Threat Reduction Agency• Missile Defense Agency

Cybersecurity services are protecting over 1500 networks, 7 million devices

Commercial MarketManaged Cybersecurity Service

Providing a turnkey, affordable, comprehensive solution to help the small and medium business meet Cyber requirements that includes:

CSET Assessment management & report Scaled to meet NIST 800-171 requirementsNetwork scan and real-time assessment & reportGap Analysis & Assessment of 14 controls & reportPlan of Action & MilestonesContinuous network asset monitoring Remediation – best practices & practical implementation

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Page 9: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Quick Survey…

Raise your hand if….(Keep them up please)

You or someone you know has had their personal credit card or identity stolen

Your company or a company you know has been hacked

Your company or a company you know has been hit with ransomware

Your company or a company you know has paid ransomware…

You are likely running out of hands and your arms are getting tired.

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Presenter
Presentation Notes
*? Make each ‘choice’ fly in separately?
Page 10: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Cyber Attacks on the rise!

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Attacks are becoming common place. Hacking is a fact of life.

Presenter
Presentation Notes
Most people who keep up with current events will agree that they cyber attacks have grown more frequent.�Cyber attacks are in the headlines nearly every day. The simple fact is cyber attacks are now part of our lives.
Page 11: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Cyber Attacks on the rise!

60% of SMB cybercrime victims go out of

business within 6 months of attack (NCSA)

50% of all surveyed in 2014 reported being victims of cyber attacks. (National SBA)

70% of all targeted attacks struck small to mid-sized organizations in 2016 (SMB Group)

50% of small and midsized businesses have fallen victim to ransomware

48% of those paid a ransom (2017 Ponemon Institute)

79% percent of small businesses do not have an incident response plan. Without one, you may never be able to fully recover when a cybersecurity incident becomes a reality.

Presenter
Presentation Notes
Statistics show that Cyber Attacks are happening more frequently and large portion are aimed at small businesses. In the past few years, anywhere between 40 to 70% of cyber attacks targeted small to midsized organziations. Over half those companies attacked go out of business within 6 months.
Page 12: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Who is Attacking?

Nation States Hacktivists

Organized CrimeConfidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Page 13: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Hackers stealing IP from DoD and its suppliers

And Replicating our technology!

Manufacturer in NJ: Put out RFP for components. Provided information about its products to bidders. Later found out it was being hacked. FBI found out that a Chinese company which bid on the same RFP and lost the bid hacked the other companys’ systems and stole their IP, then reproduced their product for sale on Chinese black market.

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Page 14: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Cyber Incidents Statistics

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Presenter
Presentation Notes
Customer records, Intellectual Property and customer credit card info are the top three categories of what’s being stolen during hacking events in the general SMB space.
Page 15: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Regulatory Mandate for Cybersecurity Compliance

Safeguarding Unclassified Controlled Technical Information

Cyber Security Evaluation Tool (CSET®)

Protecting Controlled Unclassified Information in Nonfederal

Information Systems and Organizations

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Compliance12/31/17

Presenter
Presentation Notes
DFAR identifies NIST SP 800-171 under adequate security. CSET is the measurement tool from NIST to define the Cyber posture under the 14 controls identified in SP 800-171.
Page 16: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Cybersecurity for Manufacturers

All contractors must implement full compliance no later than December 31, 2017

Contractors must notify the DoD, of any security gaps, within 30-days of any contract award

Adequate security is defined as a minimum in NIST 800-171 with the 14 controls ( to protect controlled, unclassified data):

Access Control Awareness and Training Audit & Accountability Configuration Management Identification & Authentication Incident Response Maintenance

Media Protection Personnel Security Physical Protection Risk Assessment Security Assessment System & Com Protections System & Info Integrity

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Presenter
Presentation Notes
Contracts must notify DOD within 30 days of incident as well
Page 17: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

DoD Supply Chain Protection: New Cyber Security Guidelines

OUSD Announced DFARS 252.204.7012: “Compliance with safeguarding covered defense in information controls” (Oct 2016)

DFARS points to NIST SP800-171 for guidelines around Controlled Unclassified Information in Non Federal Info Systems & Orgs

DoD contractors including small businesses must adhere to two basic cybersecurity requirements

1. Must provide adequate security for information that resides in or transits through internal unclassified systems

2. Must rapidly report cyber incidents and cooperate with the DoD to respond to security incidents

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Presenter
Presentation Notes
Today, the DoD and Federal government relies on a vast array of external service providers to help carry out missions and business functions. These Because there is vast evidence of hackers attacking the DoD supply chain, Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics (OUSD(AT&L))- As legislated by Congress, the primary responsibilities of the USD(AT&L) include: Supervision and Establishing of policies for acquisition. DFARS Language: Offeror represents that it will implement the security requirements specified by National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations” (see http://dx.doi.org/10.6028/NIST.SP.800-171) that are in effect at the time the solicitation is issued or as authorized by the contracting officer not later than December 31, 2017.
Page 18: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

What Do You Need to Do?

Regulatory Needs for Compliance:

CSET completed – (DHS Self Assessment tool)

GAP analysis completed with a plan of action for remediation and priority list defined

Have a continuous improvement and awareness program in place (continuous monitoring)

Prepare for notification to your contractor should you be hacked

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Internal Strains Outsource Benefits

• Knowledge of regulation• Cybersecurity skills

• Compliance based managed cyber services

• Cybersecurity experts

• Understand the changesneeded for a secure network (DELAYS)

• Create an accuratedetailed remediationplan

• Dedicated time

• Technical expertise to understand the gaps

• Low friction to avoid disruption of business

• Assurance done right

• Consistent time invested in ongoing efforts

• Ensure dedicated resources & skills

• Drive urgency

• Managed cyber services• Cost effective• Cyber expertise (less of a

headache)• Mitigate risks

• Ability to identify: what, how, when, why & docs.

• Explanations under “duress”

• Managed documentation• Proactive• Ease of reporting• Discovery is easier

Presenter
Presentation Notes
*Only continuous
Page 19: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

What if….Manufacturer Questions

What skills are need to accomplish this? Outsource or become an expert

Are there services that provide a complete documentation and improvement program? Yes, look for a managed service provider that can take you through the entire process

What happens if the supplier doesn’t do this? You will LOSE your current contracts

You will NOT be awarded new contracts

You will be Hacked, no question (not if but when)

What happens if my cyber results are poor? It is very important to provide accurate results and plans.

Build a plan of action to show remediation steps for improvement

Prevent cyber incidents and report according to guidance – see first bullet

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Page 20: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Wrap up - DON’T BE LATE

December 31, 2017 • CSET must be complete – (In-house or outsourced)

• POAM and GAP Analysis – COMPLETED

• Remediation Plan – FIX IT PLAN – you have 30 days prior to contract award. It is required that you have an continuous ongoing monitoring of the plan to remain in compliance

• Need Assistance? Don’t wait or hesitateContact us at – CYTELLIX WWW.CYTELLIX.COM

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Page 21: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Cytellix Cybersecurity Tips and Tricks

• Never open email from unknown senders• Right click on email addresses to verify sender’s domain is

legitimate, prior to opening an email message.• When in doubt about an email and its intentions, call the sender

to verify. • Use two step verification / authentications• If it’s being offered for free, it’s never free• Use antimalware and antivirus products vs nothing• Always update security when requested by legitimate publishers• Back-up your data, use multiple places/locations.• Back up your data offline when possible• Do not download applications from unknown publishers or sites• Never share USB keys/drives• Do not open attachments in email messages from suspicious

senders – verify sender and intentions• Using mobile devices for browsing is just as risky as laptops for

discovering malware and virus’s• Check what ports are open on your network and their behaviors• Segment your network for guest and internal users• Public Wi-Fi networks are very risky for data protection on your

devices – use a VPN• Use a secure password manager for all your unique passwords• Never us the same password 2x• Physical spying takes place as much as digital spying, watch

who is looking over your shoulder.• No one is protected from being hacked, you are, will and have

been hacked!• Set strong privacy setting on your devices – you don’t want to

overshare

• Java script in your browser is insecure, disable it!• Always ask yourself questions about communications sent to

you, be suspicious is the best practice.• Use the best browser available from a security perspective, stay

aware of exploits of browsers.• Patch, patch, patch!• Pay attention to mobile app permissions and access, some will

access very private, personal and proprietary information you want to remain confidential.

• Clean up (delete) apps you don’t use• Use device passwords to lock and encrypt the data wherever

possible – losing a device is painful enough!• Never leave devices set to default• Change Wi-Fi passwords often and never repeat them• Don’t use names, birthdates, and phone numbers as passwords

– be unique and complex• Social media has risks associated with personal information –

don’t feed the bad guys information they can use against you.• Inventory your devices and their IP addresses on your network• Remove any devices that are end-of-life from their manufacturer

from your network – they are attack points• Log-out of services like banking when your done with your

business.• Don’t store UID/PW in cookies on devices, just don’t do it• IoT is pretty cool, but, make sure you manage these IoT devices

with the same care as your computer.

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Page 22: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Spencer CobbDirector, Strategy & Business Dev.Direct: (404)[email protected]

Kevin BaxterWestern Regional Sales ManagerDirect: (949) [email protected]

Trenelle LyiscottInside Sales & Marketing ManagerDirect: (949) [email protected]

Corporate Office85 Argonaut, Suite 200Aliso Viejo, CA 92656(949) 215-8889

Atlanta Office1201 Peachtree St. NE400 Colony Square, Suite 200Atlanta, GA 30361(949) 356-6900

Points of Contacts

Page 23: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

Thank You

Confidential & Proprietary © 2017 IMRI Translating business needs into technology solutions

Q & A

Cytellix is the compliance based cyber security managed service provider with a focus on small-and-medium size businesses. We specialize in comprehensive cyber assessments, network intelligence, behavioral

analytics, remediation and security services. A division of Information Management Resources, Inc. (IMRI), the Cytellix team of experts manage millions of IP addresses for organizations of every size in a wide range of

data-rich industries—including municipalities, manufacturing, finance, banking, law, education, healthcare and biotech—with best-in-class managed services.

Visit us at cytellix.com

Protecting Controlled Unclassified Information in Non-Federal Information Systems and Organizationshttp://csrc.nist.gov/publications/drafts/800-171r1/sp800_171r1_draft.pdfDownload CSET Cybersecurity Evaluation Toolhttps://ics-cert.us-cert.gov/Downloading-and-Installing-CSET

Page 24: Cybersecurity for Manufacturers: Are You Ready for the€¦ · Cyber Attacks on the rise! 60% of SMB cybercrime victims go out of. business within 6 months of attack (NCSA) 50%

NEXT WEBINAR:Clean Energy Smart Manufacturing

Innovation Institute (CESMII)Speaker: Gregg Profozich, Interim Director, CESMII CA Regional Manufacturing Center

AMP SoCal Webinar Series: Episode 4July 13, 2017; 10:00 a.m. – 10:30 a.m.

REGISTER: ampsocal.usc.edu