21
Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Embed Size (px)

Citation preview

Page 1: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Defence in Depth: What’s Next?

Kent SchrammHead, Cyber Security

Page 2: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Outline

BackgroundDefence in DepthSecuring a networkRisk vs RewardPredictive IntelligenceEducation and awareness

Page 3: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Ontario Government

60,000 plus OPS employees 2,300 locations 27 ministries IT

Corporate CIO, CTO, CPO 8 CIOs

Page 4: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Ontario GO-Net

94,000 emails accounts Thousands of devices connected to

the network Cyber Security Branch

24/7 Ops Centre, forensics, IAM, risk management, security design, compliance, penetration testing, education & awareness, engagement

Page 5: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Defence In Depth

CyberSecurity

SecurityArchitecture

TRAs

Policies &Directives

IndustryStandards

SecurityAppliances

Anti-Virus

PenetrationTests

OperationsCentre

Compliance

PatchMgmt

UserEducation

Collaboration

Page 6: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

How Cyber Security Is Viewed

Page 7: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

How Cyber Security Should Be Viewed

Business Enabler Partner

Page 8: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Translate to the C-Suite

Need to stop being technical Simplify things And…

Page 9: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Layers of Security

Securing a House

ArchitecturalStandards

Safety Practices

Access Control

Deterrent

EmergencyResponse

Page 10: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Layers of Security

Securing a Network

ArchitecturalStandards

Safety Practices

Access Control

Deterrent

EmergencyResponse

IDS

IPS

Page 11: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Risk Vs Reward

Cyber security is a business risk and must be treated just like any other business risk

Risk must be managed and balanced against potential rewards

C, I, A Example 1 Example 2

Page 12: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Value of OPS Information Holdings

Information Type Who

Cabinet confidence information Organized crime

Budget Information Nation states

Tax and health records Hactivists

Police and Justice information Organized crime

Natural Resources (Ring of Fire) Others wanting to gain economic advantage

Intellectual property Others wanting to gain economic advantage

Page 13: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Predictive Intelligence

Using intelligence to predict where you will attacked next

Understand the threat Threat = Capability + Intent

What is happening in your environment Example 1

Page 14: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Intelligence Sources

Log files Collaboration Subscription and vendor services Others?

Page 15: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security
Page 16: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Education and Awareness

Double edged sword End user

Frequency Message Medium

Page 17: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Messaging

Offer to brief business units Cyber Security Awareness Month

Page 18: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Weekly Themes

What is Cyber

Security

Cyber Security Threats

Protections and

Safeguards

Working Together to Keep us Safe

Safety Online at

Home

Page 19: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Parting Thought

The CISO is a catalyst for change. We can enable business to meet their objectives while maintaining security

We are their partners

Page 20: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

Questions/Discussion

Page 21: Defence in Depth: What’s Next? Kent Schramm Head, Cyber Security

CISOs know that to be truly secure, they must adopt a defence in depth approach to cyber security. But is this enough?  This presentation will describe the components of defence in depth and then discuss what steps the CISO should consider to take their organization’s cyber security to the next level. This includes partnering with business units on risk management, predictive intelligence and an aggressive cyber security awareness program.

23-04-18