61
First 90 days Cybersecurity Challenges and Threats A State Perspective October 6, 2016 State of Illinois © 2015 Confidential : For discussion only

Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

Embed Size (px)

Citation preview

Page 1: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

First 90 daysMarch 30, 2015Cybersecurity

Challenges and ThreatsA State Perspective

October 6, 2016

State of Illinois © 2015 Confidential : For discussion only

Page 2: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

2

Page 3: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

3

Page 4: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

4

Page 5: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

5

Page 6: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

6

Page 7: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

7

Page 8: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

8

Page 9: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

9

Page 10: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

10

Page 11: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 12: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 13: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 14: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

What is being attacked?

Page 15: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

EVERYTHING!

Page 16: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 17: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

“No locale, industry or organization is bulletproof when it comes to the

compromise of data”

Page 18: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 19: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

19

Page 20: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

Breaches in State Government

South Carolina Department of Revenue

• Exposed Tax Records of 70 Million People

• Costs to the state - $70 Million

Utah – Medicaid Program

• Theft of 750,000 Medicaid Records

• Costs to the state - $9 Million

California – Reported that there have been multiple data breaches at state agencies

• Costs to the state - $8.8 Million

IBM 2016 Study of breaches in the U.S.

• $7.01 million is the average total cost of a data breach (up .5 mil from 2015)

• $221 is average cost per lost or stolen record

Page 21: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 22: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 23: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

$ 86

Page 24: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

$ 86 (what’s in

YOUR database?)

Page 25: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

25

Page 26: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

26

Page 27: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 28: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 29: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 30: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

Distributed Denial of Service – Game Changer

Our Challenge

“What if an attacker injects code into devices to create a Fitbit botnet?” he says. Researchers have already shown it’s possible to wirelessly load malware onto a Fitbit in less than 10 seconds, he says, so the possibility isn’t fantastic.”

Andy Ellis – Chief Security Officer – Akami

Page 31: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

Distributed Denial of Service – Game Changer

Our Challenge

“What if an attacker injects code into devices to create a Fitbit botnet?” he says. Researchers have already shown it’s possible to wirelessly load malware onto a Fitbit in less than 10 seconds, he says, so the possibility isn’t fantastic.”

Andy Ellis – Chief Security Officer – Akami

Page 32: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 33: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

State Business Risk Life, Health and Safety

Delivering Services to our Citizens

Delivering Services to our Employees

Page 34: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

Financial Risk Lost Revenue

Breach Costs

Fraud and Theft

State Business Risk Life, Health and Safety

Delivering Services to our Citizens

Delivering Services to our Employees

Page 35: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

Financial Risk Lost Revenue

Breach Costs

Fraud and Theft

Privacy & Confidentiality Risk Personal Information –

Identify Theft

Confidential Information

State Business Risk Life, Health and Safety

Delivering Services to our Citizens

Delivering Services to our Employees

Page 36: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

Reputational/Political Risk Elected Officials

Agency Directors

Program Managers

Financial Risk Lost Revenue

Breach Costs

Fraud and Theft

Privacy & Confidentiality Risk Personal Information –

Identify Theft

Confidential Information

State Business Risk Life, Health and Safety

Delivering Services to our Citizens

Delivering Services to our Employees

Page 37: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

Elected Official?

Appointed Official?

Program Executive or Manager?

Fiduciary Responsibility?

Placed in the Public’s Trust?

Page 38: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

Elected Official?

Appointed Official?

Program Executive or Manager?

Fiduciary Responsibility?

Placed in the Public’s Trust?

Or do you just want to make sure you just keep your job?

Page 39: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

Information Security Protect information from

unauthorized disclosure

Ensure information is trustworthy

Guarantee reliable access to mission critical information

Cyber-Resiliency Ability to anticipate,

withstand and recover from adverse cyber-events.

Evolve and improve in pace with the ever-changing cyber landscape.

Page 40: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

We DO know what we DO know! (known software

vulnerabilities)

Phishing is still the biggest sport (it’s easy)

63% of breaches involved weak, default or stolen passwords (we just don’t get it – Multi-factor!)

Social Unrest = Increased Attacks

Web Applications have weaknesses (many easy to fix –

just find them!)

We all make mistakes. (human errors cost us)

Page 41: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

Data Breach Causes, Malicious or

Criminal Attack, 50%

Data Breach Causes, Negligent

Employees, 23%

Data Breach Causes, System Problems -

Both IT and Business Process

Failures, 27%

Data Breach Causes

Page 42: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

Daily Phishing, Brute Force, Calls, SQLi

Ransomware – (but getting better)

DDos Attacks – States and Law Enforcement

Administrative Errors

Indications of Increased Nation State Activity

Page 43: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

$0

$50

$100

$150

$200

$250

Co

st

Mitigating Breach Cost

Cost

Page 44: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

$0

$50

$100

$150

$200

$250

Co

st

Mitigating Breach Cost

Cost

Page 45: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

• The longer it takes to detect, the more it costs.

• 70% of attackers move from the initial victim to a secondary target within 24 hours.

• An attacker is in your environment for over 200 days before detection

• Victims MUST report incidents quickly!

Page 46: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 47: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

| 47

Page 48: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

48

• Threat Agent Risk Management Methodology (Intel 2007)• Intel Threat Agent Library, Casey, 2007• Verizon 2016 Data Breach Investigations Report• ENISA (European Union Agency for Network and

Information Security) Threat Landscape 2015 (published 2016)

• McAfee Labs 2016 Threat Predictions• Understanding the Threat Landscape in e-Government

Infrastructure for Business Enterprises, Pushpakumar 2015)• NTT 2016 Global Threat Intelligence Report• Symantec Internet Security Threat Report (ISTR) 2016

Page 49: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom
Page 50: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

©2016 State of Illinois – Department of Innovation and Technology (DoIT) Internal Confidential

“A deliberate and

defined strategy”

The Strategy

1 Vision

5 Goals

25 Objectives

90 Plans of Action

Projects and Initiatives

Page 51: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

©2016 State of Illinois – Department of Innovation and Technology (DoIT) Internal Confidential

The Strategy

• Goal 1 – A Best-in-Class Information & Cyber Security ProgramCreate a best-in-class cyber security program in line with best practices and national frameworks which

facilitates and protects the business of the State of Illinois.

Page 52: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

©2016 State of Illinois – Department of Innovation and Technology (DoIT) Internal Confidential

The Strategy

• Goal 1 – A Best-in-Class Information & Cyber Security ProgramCreate a best-in-class cyber security program in line with best practices and national frameworks which

facilitates and protects the business of the State of Illinois.

• Goal 2 – Security of State of Illinois Information and SystemsProtect the confidentiality, integrity and availability of State of Illinois information and technology assets and

ensure the State’s cyber resiliency.

Page 53: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

©2016 State of Illinois – Department of Innovation and Technology (DoIT) Internal Confidential

The Strategy

• Goal 1 – A Best-in-Class Information & Cyber Security ProgramCreate a best-in-class cyber security program in line with best practices and national frameworks which

facilitates and protects the business of the State of Illinois.

• Goal 2 – Security of State of Illinois Information and SystemsProtect the confidentiality, integrity and availability of State of Illinois information and technology assets and

ensure the State’s cyber resiliency.

• Goal 3 – A Secure Technology TransformationPrepare, plan and execute effective information and cyber security strategies in support of the State of

Illinois’ technology transformation.

Page 54: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

©2016 State of Illinois – Department of Innovation and Technology (DoIT) Internal Confidential

The Strategy

• Goal 1 – A Best-in-Class Information & Cyber Security ProgramCreate a best-in-class cyber security program in line with best practices and national frameworks which

facilitates and protects the business of the State of Illinois.

• Goal 2 – Security of State of Illinois Information and SystemsProtect the confidentiality, integrity and availability of State of Illinois information and technology assets and

ensure the State’s cyber resiliency.

• Goal 3 – A Secure Technology TransformationPrepare, plan and execute effective information and cyber security strategies in support of the State of

Illinois’ technology transformation.

• Goal 4 – Emerging Threats, Risks and OpportunitiesProactively address the emerging and ever-changing information and cyber security threat and risk landscape

while seizing opportunities to learn, improve and grow.

.

Page 55: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

©2016 State of Illinois – Department of Innovation and Technology (DoIT) Internal Confidential

The Strategy

• Goal 1 – A Best-in-Class Information & Cyber Security ProgramCreate a best-in-class cyber security program in line with best practices and national frameworks which

facilitates and protects the business of the State of Illinois.

• Goal 2 – Security of State of Illinois Information and SystemsProtect the confidentiality, integrity and availability of State of Illinois information and technology assets and

ensure the State’s cyber resiliency.

• Goal 3 – A Secure Technology TransformationPrepare, plan and execute effective information and cyber security strategies in support of the State of

Illinois’ technology transformation.

• Goal 4 – Emerging Threats, Risks and OpportunitiesProactively address the emerging and ever-changing information and cyber security threat and risk landscape

while seizing opportunities to learn, improve and grow.

• Goal 5 – A Cyber-Secure IllinoisExpand influence and cyber security improvement opportunities beyond State of Illinois government to

enhance the cyber security posture of the entire state, with an emphasis on the state’s critical infrastructure.

Page 56: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

$0

$50

$100

$150

$200

$250

Co

st

Mitigating Breach Cost

Cost

Page 57: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

©2016 State of Illinois – Department of Innovation and Technology (DoIT) Internal Confidential

Outcomes (we measure against these!)

• Illinois' cybersecurity strategies and programs are continually aligned with the business strategies of Illinois agencies, boards and commissions as well as the enterprise as whole.

• Cybersecurity programs and initiatives are developed based on a sound and consistent Risk Management Process across all state agencies.

• A culture of cyber-risk awareness at all levels of state government has been created and is continually enhanced.

• The overall cybersecurity posture of the state continues to improve through the use of a common cybersecurity framework.

• Illinois has developed and maintains a proactive approach to threat and attack detection and rapidly and effectively responds to mitigate the threats and reduce the impact to the state.

Page 58: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

©2016 State of Illinois – Department of Innovation and Technology (DoIT) Internal Confidential

Outcomes (we measure against these!)

• Cybersecurity planning is prevalent during all phases of the solution development.

• Emerging information security threats and vulnerabilities are quickly identified and ranked based on Risk. Critical vulnerabilities are rapidly addressed to reduce the likelihood of successful exploit by attackers.

• Rapid, consistent and effective security incident response capabilities reduce the impact of security incidents, and response effectiveness is continually improved.

• Effective and consistent enterprise-wide cybersecurity policies are effectively communicated, monitored for compliance and resulting in a more secure enterprise.

• Illinois' cybersecurity workforce is well-trained, continually developed and aligned with national standards.

Page 59: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

©2016 State of Illinois – Department of Innovation and Technology (DoIT) Internal Confidential

Outcomes (we measure against these!)

• State of Illinois information is protected from unauthorized disclosure.

• State of Illinois information is trustworthy.

• State of Illinois Information and Systems Are Available When Needed.

• The State of Illinois has the Ability to Withstand and Quickly Recover from Deliberate Attacks, Accidents or Naturally Occurring threats or incidents.

• The State of Illinois Maintains a Technology Infrastructure Which is Secure.

• The State of Illinois Provides Effective Mobile Capabilities in a Secure Manner.

• The State of Illinois Utilizes Cloud Resources in an Effective, Efficient and Cyber-secure Manner.

Page 60: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

©2016 State of Illinois – Department of Innovation and Technology (DoIT) Internal Confidential

Outcomes (we measure against these!)

• Enterprise Applications are Deployed and Maintained Utilizing Security Best Practices and are protected from Cyber Threats.

• The State Aggressively Utilizes Data Analytics to Improve the Lives of Citizens While Maintaining Security and Privacy.

• The Illinois Technology Transformation and Consolidation has resulted in a More Cyber-Secure State.

Page 61: Illinois DGS 16 presentation - Cyber Security Evolution - by Kirk Lonbom

| 61

Thank you!