security and technologies - future cyberskills

40
Security and Technologies - Future Cyberskills - Jeimy J. Cano M., Ph.D, CFE Associate Professor Universidad del Rosario School of Business COLOMBIA

Upload: others

Post on 24-Jan-2022

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security and Technologies - Future Cyberskills

Security and Technologies- Future Cyberskills -

Jeimy J. Cano M., Ph.D, CFEAssociate Professor

Universidad del RosarioSchool of Business

COLOMBIA

Page 2: Security and Technologies - Future Cyberskills

Agenda

Introduction

Current context

InfoSEC & CyberSEC fundamentals

InfoSEC evolution

Cybersecurity: Educative and Corporate challenges

Emergent challenges

Conclusions

2

Page 3: Security and Technologies - Future Cyberskills

Introduction

3

Page 4: Security and Technologies - Future Cyberskills

Issues of major concern

Source: https://iamcybersafe.org/wp-content/uploads/2017/06/Europe-GISWS-Report.pdf

4

Page 5: Security and Technologies - Future Cyberskills

Deficit of professionals in both InfoSec and CiberSec

Source: https://iamcybersafe.org/wp-content/uploads/2017/06/Europe-GISWS-Report.pdf

5

Page 6: Security and Technologies - Future Cyberskills

Professionals in both InfoSec and CiberSec

Source: https://iamcybersafe.org/wp-content/uploads/2017/06/Europe-GISWS-Report.pdf

Europa

LatinAmerica

6

Page 7: Security and Technologies - Future Cyberskills

Current Context

7

Page 8: Security and Technologies - Future Cyberskills

Global CEO Priorities

Source: https://www.pwc.com/gx/en/ceo-survey/2018/pwc-ceo-survey-report-2018.pdf

8

Page 9: Security and Technologies - Future Cyberskills

Sou

ce: E

ling,

M. &

Sch

nel

l, W

. (2

01

6) W

hat

do

we

kno

w a

bo

ut

cyb

er r

isk

and

cyb

er r

isk

insu

ran

ce?

The

Jou

rna

l of

Ris

k Fi

na

nce

. 17

(5).

pp

.47

4-4

91

. Do

i: h

ttp

s://

do

i.org

/10

.11

08

/JR

F-0

9-2

016

-01

22. O

nlin

e-A

pp

end

ix 3

Ciber risk definition

Cyberrisk

Key elements

Not authorized activity:

Actions intentionally or unintentionally committed in the context of the organization..

Offender:

State and non-state actors, organized crime, internal employees, digital mercenaries

Vulnerability:

Determined by the practices and standards that the organization has on information technology management, its processes and people.

Attack:

Exploiting known or unknown vulnerabilities to perform actions that disrupt, deteriorate, alter, reveal or destroy key business assets and/or services. E.g: Malware, DDos.

Consequence:

The effects are generated based on the attackers' intentions. E.g.: Disclosure of information, espionage, extortion, theft of information, sabotage, fraud..

9

Page 10: Security and Technologies - Future Cyberskills

Products/Services digitallymodified

Po

rter,M

.y

Hep

pelm

ann

,J.

(20

14

)H

ow

Smart,

con

nected

pro

du

ctsare

transfo

rmin

gco

mp

etition

.Ha

rvard

Bu

siness

Review

.No

viemb

re.p

.7

10

Page 11: Security and Technologies - Future Cyberskills

Types of attackersBased on type of access and its capabilities

Access to software or data

Those who create new vulnerabilities

Assumptions falsification

Those who only execute existing attacks with known vulnerabilities.

Those who can scan a system for new vulnerabilities and develop

code to exploit them.

Access to physical hardware

Vulnerabilities

Access to people who use or run the system

Access

Ca

pa

citi

es

Based on: DoD (2013) Resilient Military Systems and the Advanced Cyber Threat. Task Force Report. Defense Science Board. January. Recuperado de: https://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-081.pdf

11

Page 12: Security and Technologies - Future Cyberskills

Cyber insurance & its challenges

Fuente: https://www2.deloitte.com/insights/us/en/industry/financial-services/demystifying-cybersecurity-insurance.html

12

Page 13: Security and Technologies - Future Cyberskills

InfoSEC & CiberSEC Fundamentals

13

Page 14: Security and Technologies - Future Cyberskills

Understanding risk in digital context

Personal experienceAmbiguity

UncertaintyA state of indetermination between a cause and its effects.

ComplexityThe result of the limited ability to distinguish specific aspects of reality that go beyond the previous knowledge of the observers.

It is the result of legitimate interpretations based on socially accepted meanings and real facts.

The particular history of each individual interpreted in the secret chamber of his assumptions.

Risk: A situation or event where something of human value is at stake and where the outcome is uncertain

Based on: Rosa, E., Renn, O. y McCright, A. (2014) The risk society revisited. Social theory and governance. Philadelphia, Pennsylvania. USA: Temple University Press.

14

Page 15: Security and Technologies - Future Cyberskills

InfoSEC Vs CiberSEC

InfoSec Cybersec

InfosSec

Cybersec

Cybersec

InfoSec

Cybersec Infosec

I II

III

IV

15

Page 16: Security and Technologies - Future Cyberskills

Conceptual notes about cybersec

From: ISO 27032 – Information Technology- SecurityTechniques – Guidelines for cybersecurity.

Source: ALXELROD, W.C (2013) Engineering Safe and Secure Software Systems. Artech House

d

Security Safety Security+Safety

“Avoidingexternal worldaffects thesystem”

“Avoid thesystem affectsexternalworld”

“Ensure that the systemcontinues to operate,without affecting theoutside world, despitethe attacks”

System

ExternalWord

Attacks

System System

Attacks

ExternalWorld

ExternalWord

16

Page 17: Security and Technologies - Future Cyberskills

Conceptual notes about Cybersec

Source: ALXELROD, W.C (2013) Engineering Safe and Secure Software Systems. Artech House

Security Safety Security+Safety

“Avoidingexternal worldaffects thesystem”

“Avoid thesystem affectsexternalworld”

“Ensure that the systemcontinues to operate,without affecting theoutside world, despitethe attacks”

System

Externalworld

Attacks

System System

Attacks

ExternalWorld

ExternalWorld

Enterprise Cybersecurity

It is an enterprise capacity defined to defend andanticipate the digital threats inherent to theecosystem where the organization operates, inorder to protect and ensure the resilience of theoperations and the reputation of the company.

17

Page 18: Security and Technologies - Future Cyberskills

InfoSEC Evolution:From practices to capabilities

18

Page 19: Security and Technologies - Future Cyberskills

InfoSEC Evolution19

Page 20: Security and Technologies - Future Cyberskills

Definitions: Practices & Capacity

Characteristics

• Applied and tested bodies of knowledge

• Based on certainties• Verifiable and auditable• Risk: It is a threat

Characteristics

• Develops learning• Based on uncertain and

ambiguous scenarios. • Challenge previous

knowledge and develop new distinctions

• Risk: An opportunity

20

Page 21: Security and Technologies - Future Cyberskills

Evolution: security & control practices

1

2

3

4

5

6

War games

Social engineering exercises

Intelligence and Threat hunting

Infosec risk analysis

Infosec Audit

Vulnerability analysis

ANALYTICAL VISIONIdentify Breaches

ASSET VISIONIdentify points of

control

COGNITIVE VISIONSimulations &

Scenarios

12

3

4

5

6

From INFOSEC to CIBERSECTactical Strategic

Hig

hV

alu

e g

en

era

tio

nL

ow

Specializedknowledge

Collectivecapacities

21

Page 22: Security and Technologies - Future Cyberskills

INFOSEC practices & CIBERSEC capacities

Enpoint securityNetwork security

Data security

Security communication

Management vulnerabilities

Software security

IT controlsmanagement

Identitymanagement

Mobile security

Protection & assurance

CognitiveSecurity

Analytics

Fraud

Identity

Cloud

Mobile

Data &apps

Endpoint Networks

Defend & anticipate

Security domains

Practices Capacities

Cybersec Ecosystem

Ad

aptad

o d

e: Falco, C

. (20

16

) Un

leashin

g the Im

mu

ne System

: Ho

w to

Bo

ost Yo

ur Secu

rity Hygien

e. R

ecup

erado

de: h

ttps://secu

rityintelligen

ce.com

/new

s/un

leash

ing-th

e-imm

un

e-system-h

ow

-to-

bo

ost-yo

ur-secu

rity-hygien

e/

22

Page 23: Security and Technologies - Future Cyberskills

CiberSEC:Educative & Corporate challenges

23

Page 24: Security and Technologies - Future Cyberskills

Education objetives in current context

Individual

Learn

Identify key information and transform it into knowledge.

Relate learning to reality and other sciences.

Read and communicate in all the media generated by the society.

Anticipate and solve new problems, creating alternative solutions.

Thinking in an interdisciplinary and holistic way, to perceive the

dimensions of the challenges

Disconnect known concepts and rethink

them in unknown scenarios.

1

2

3

45

6

7

Adapted from: García, L., Ruiz, M. y García, B. (2009) Claves para la educación. Actores, agentes y escenarios en la sociedad actual. Madrid, España: Narcea-UNED. P.272

24

Page 25: Security and Technologies - Future Cyberskills

General concept of security

Reference object Value at risk Threat sourceRemarkable example of

risk

National security(Militar & Politicaldimension)

The NationSovereignty, territorial

integrityOther nations, terrorism Extreme groups

Society security Social groupsNational Union,

identityNations, foreign cultures,

immigrantsDisplaced by conflict

Human security Individuals, humanity Survival, quality of lifeState, globalization,

nature, terrorismNatural disasters

Enviromental security Ecosystem Sustainability Humanity Global warming

Informationsecurity

People, process & technology TrustHuman, technical and process vulnerabilities

Loss and/or leakage of information

Cibersecurity Digital ecosystem Resilience, governanceEstados, terrorismo, actores no estatales

Attacks on critical nationalinfrastructure

Adapted from: Gunter, H. (2005) Threats, challenges, vulnerabilities and risks in enviromental and human security. UNU Institute for Environment and Human Security (UNU-EHS). Publication Series ofUNU-EHS. No.1. p.19. Recuperado de: http://collections.unu.edu/eserv/UNU:1868/pdf4040.pdf

25

Page 26: Security and Technologies - Future Cyberskills

INFOSEC Professionals – Key Skills

Keep low profile

Have an escape route

Thinking like attackers

INFOSEC ProfessionalsBasic practices

Key skills

26

Page 27: Security and Technologies - Future Cyberskills

CIBERSEC Professionals – Education

Digital context fundamentals

Cybersecurity strategic fundamentals

Cybersecurity organizational & tactical fundamentals

Cybersecurity technical and operational fundamentals

Digital Ecosystems

GlobalGeopolitics

Collaboration& support National

& International

Active & Passivedefense

Digitaleconomy

Digitalresilience

Cyber riskCyber

insurance

Intelligence & Threat hunting

Wargames

ITControls

Information security practices

27

Page 28: Security and Technologies - Future Cyberskills

Key Features of the Cybersecurity Professional

CommunicationExplain complex challenges in simple terms. Analogies are useful in this exercise.

Training and experience Have adequate education and experience in the field.

FrameworksIdentify appropriate resources and tools to do the job.

InnovationAccepting mistake as a discovery and an opportunity to overcome

cognitive blindness.

Audacity Experience uncertainty and

doubts and still make the decisions that are required.

C omprehendI nformingB alancing

E xploreR einvent

C

I

BE

R

Based on: Loftus, G. (2017) Indiana Jones’s Five leadership Lessons. Forbes. Recuperado de: http://bit.ly/2BKj503

28

Page 29: Security and Technologies - Future Cyberskills

Emergent risks

29

Page 30: Security and Technologies - Future Cyberskills

Artificial Intelligence: Algorithms

Human bias Technical failures Security vulnerabilities Implementationfailures

BIASPartial, insufficient, not updated or manipulated data.

RELEVANCEIrrelevant, inconsistent or incomplete data.

PATTERNSBiases in logic, trend manipulation, inclusion of unplanned functions.

ERRORSIn the coding, in the design premises, in the execution.

USEFor that which was not designed, to dismiss other analyses, as a criterion of technical authority

INFERENCEIncorrect interpretations, partial conclusions,

ENTRANCE DATA ALGORITHMS DESIGN OUTPUT DECISIONS

INHERENT FACTORSSource: Krishna, D., Albinson, N. & Chu, Y. (2017) Managing algorithmic risks. Safeguarding the use of complex algorithms and machine learning. Deloitte. Recuperado de:https://www2.deloitte.com/content/dam/Deloitte/us/Documents/risk/us-risk-algorithmic-machine-learning-risk-management.pdf

30

Page 31: Security and Technologies - Future Cyberskills

Third Parties: Active monitoring

Source: https://www.opus.com/resource/data-risk-third-party-ecosystem-2nd-annual-study-ponemon-institute/

31

Page 32: Security and Technologies - Future Cyberskills

Fog computing: Challenges

Characteristics– FogComputing

Low latency and localization sensitivity.

Geographic distribution

Mobility in end device

Processing capacity in a high number of nodes

Wireless access

Real-time applications

Heterogeneity

Source: Mukherjee, M. et al. (2017) Security and Privacy in Fog Computing. IEEE Access. 5. 19293-19304. doi: 10.1109/ACCESS.2017.2749422

32

Page 33: Security and Technologies - Future Cyberskills

Fog computing: Challenges

Source: Mukherjee, M. et al. (2017) Security and Privacy in Fog Computing. IEEE Access. 5. 19293-19304. doi: 10.1109/ACCESS.2017.2749422

33

Page 34: Security and Technologies - Future Cyberskills

Conclusions

34

Page 35: Security and Technologies - Future Cyberskills

Digital Corporate Responsibility Principles

Principle Definition

Digital Administration

Ensuring that personal data is handledin accordance with the law and in linewith the expectations of those whoprovide it.

Digital TransparencyDemonstrate openness in companies useof personal data

Digital EmpowermentGive customers more control over theirpersonal data.

Digital EquityClarify and potentially increase thebenefits that customers receive in returnfor sharing their data.

Digital InclusionUsing personal data to multiply positiveresults in society.

35

Page 36: Security and Technologies - Future Cyberskills

Holistic View of Digital Security

Global cybersecurity

Corporate cybersecurity

INT

ER

NA

TIO

NA

L D

IGIT

AL

S

EC

UR

ITY

AU

DIT

NA

TIO

NA

L D

IGIT

AL

S

EC

UR

ITY

AU

DIT

Strategic securityDigital resilience and

defense

Digital intelligence

Simulations

Scenarios

Prototypes

Operational security

OT Security practices

Operational discipline

Tactical security

Information security culture

IT Security

Control compliance

Internal IT Audit

Vulnerability assessment

Defense in depth

Industrial cybersecurity

INFORMATION SECURITY PRACTICES

Page 37: Security and Technologies - Future Cyberskills

If a captain's highest goal were to preserve his ship, he would keep it in port forever.

Saint Thomas Aquinas

37

Page 38: Security and Technologies - Future Cyberskills

CYBERATTACKNEXT EXIT

EXIT 1A

38

Page 39: Security and Technologies - Future Cyberskills

Liels Paldies !!

39

Page 40: Security and Technologies - Future Cyberskills

Security and Technologies- Future Cyberskills -

Jeimy J. Cano M., Ph.D, CFEAssociate Professor

Universidad del RosarioSchool of Business

[email protected]

@itinsecure