35
Designing a Cyber Risk Strategy for the Human Operating System Session: 4232

Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Designing a Cyber Risk Strategy for the Human Operating SystemSession: 4232

Page 2: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Universal Studios Orlando parking lot example• What does this have to do with cybersecurity?

Let’s begin with a familiar story…

Page 3: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Start w/ story…wire transfer

• Humans are weakest link…3 elements….FBI…wire transfer…

Source: Centrify

Page 4: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Universal Studios Orlando parking lot example• What does this have to do with cybersecurity?

Why did the VP of Finance fall for it?

Page 5: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

• Trust

Source: Proofpoint Protecting People (Summer 2018)

Page 6: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

• Trust

• Authority

Source: Proofpoint Protecting People (Summer 2018)

Page 7: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

• Trust

• Authority

Source: Proofpoint Protecting People (Summer 2018)

• Oversharing (TMI)

Page 8: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

• Trust – 90% of attacks use some form of display name spoofing

• Authority – 48% of email fraud scams include “payment,” “request,” and/or “urgent” in the subject line

• Oversharing – 30% increase in phishing links via social media platforms

Source: Proofpoint Protecting People (Summer 2018)

“Humans are the weakest link”

Page 9: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Universal Studios Orlando parking lot example• What does this have to do with cybersecurity?

Human Operating System

(HumanOS)

Page 10: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

• Operating System – a software that controls and manages a computer’s hardware resources

Page 11: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

• Operating System – a software that controls and manages a computer’s hardware resources

• Human Operating System – the composition of how a human senses, processes, and transfers information, telling us how to work and driving our actions and behavior

Page 12: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Universal Studios Orlando parking lot example• What does this have to do with cybersecurity?

Why does the HumanOSneed to be considered in

cybersecurity?

Page 13: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Our current approach to cybersecurity…

Page 14: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Our current approach to cybersecurity…

• Operational Perspective – focus on building cyber defenses

Page 15: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Our current approach to cybersecurity…

• Operational Perspective – focus on building cyber defenses

• Attack Perspective – understanding attack target (computer system) and vector/method (e.g., RAT, ransomware, DDOS)

Page 16: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Universal Studios Orlando parking lot example• What does this have to do with cybersecurity?

How effective has this approach been?

Page 17: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Prykarpattia

Page 18: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Prykarpattia

In each of these breaches, there existed at least one human touchpoint that was used to

penetrate and exploit networks and systems. 93% of all breaches are attacks targeting

people (Verizon 2018 DBIR).

Page 19: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Universal Studios Orlando parking lot example• What does this have to do with cybersecurity?

Why is there such a disconnect?

Page 20: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

How we look at our architecture

Page 21: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Source: VMware vSphere

Page 22: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Source: VMware vSphere

Network, 62%Endpoint,

18%

Email, 8%

Web, 12%

Source: Gartner (2017)

IT Security Investments

Page 23: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Our current Defense-in-Depth strategy

Network

System

Application

Data

Page 24: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

How they look at our architecture

Page 25: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Sophie Hart

Sophie HartAction Officer for Global EVP, Equinox

I’m a supply chain exec connecting customers with

innovative products to enhance their fitness lifestyle

Page 26: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Sophie Hart

Sophie HartAction Officer for Global EVP, Equinox

I’m a supply chain exec connecting customers with

innovative products to enhance their fitness lifestyle

• Twitter:

@F1tnessD1va

• Instagram:

@ F1tnessD1va

• Pet Name:

Chloe (Siberian

husky)

• Hobbies:

Cooking south

Asian food;

SoulCycle;

Horoscope

geek

• Volunteer:

Youth mentor at

La Jolla YMCA

• Favorite

Hangout:

Grass Skirt

• Personality

Traits:

Extrovert;

Fashionista

• High School:

San Marcos

Knights

Sophie Hart: A Divulger of Too Much Info

Page 27: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Email Inbox

Traffic:

~423 emails

…And a Victim of TMIAlways on:

Phone is first and

last look

LinkedIn

Connections:

1,753 (LION)

Conferences

Attended:

20 in 2018

Speaking

Engagements:

8 in 2018

Project Teams:

leads 1

participates in 5

Mailing Lists:

fitness/fashion - 5

motivational - 2

learning - 3

Page 28: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Universal Studios Orlando parking lot example• What does this have to do with cybersecurity?

How should we reframe our approach?

Page 29: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

A modified (human-centric) Defense-in-Depth strategy

HumanOS

Page 30: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

What does Defense-in-Depth look like for the HumanOS?

• Incorporate the HumanOS into cyber risk management

initiatives

ꟷ Critical assets and most vulnerable assets

Page 31: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

What does Defense-in-Depth look like for the HumanOS?

• Incorporate the HumanOS into cyber risk management

initiatives

ꟷ Critical assets and most vulnerable assets

• Curate technical and operation controls for the HumanOS

ꟷ Human Defense

ꟷ Machine Defense

ꟷ Behavior Monitoring

Page 32: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

What does Defense-in-Depth look like for the HumanOS?

• Incorporate the HumanOS into cyber risk management

initiatives

ꟷ Critical assets and most vulnerable assets

• Curate technical and operation controls for the HumanOS

ꟷ Human Defense

ꟷ Machine Defense

ꟷ Behavior Monitoring

• Change behavior and culture

ꟷ Education and continued learning

ꟷ Communications plan

Page 33: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

• Trust

• Authority

Source: Proofpoint Protecting People (Summer 2018)

• Oversharing (TMI)

You have more influence over the HumanOS than you think

Page 34: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Source: VMware vSphere Source: Gartner (2017)

Future IT Security Investments*

HumanOS

Network

Endpoint

Web

Email

*: Percentage is for illustrative purpose only

Page 35: Designing a Cyber Risk Strategy for the Human Operating System · 2018-09-26 · people (Verizon 2018 DBIR). Universal Studios Orlando parking lot example ... Chloe (Siberian husky)

Let’s continue the conversation…

Masseh Tahiry | Risk Strategist

Caitlin Durkovich | Director

https://www.tofflerassociates.com/contact/

Building a Resilient HumanOS