Assured Information Solutions, LLC Securing the Life Blood
Download
Report
Transcript Assured Information Solutions, LLC Securing the Life Blood
Assured Information
Solutions, LLC
Securing the Life Blood of Business - INFORMATION
Christopher D. Peele
CISSP-ISSEP
Chief IA Analyst
Background
Christopher D. Peele, Chief IA Analyst
B.S., Computer Technology, M.S., Information Assurance, CISSP, ISSEP, NSA
IAM, NSA IEM
Mr. Peele has over 30 years of technology experience ranging from avionics
systems, bioelectronics systems, electronics, computer information systems,
computer systems administration project management and information assurance.
Mr. Peele spent a combination of 22 years in the US Air Force serving as active,
reserve and guardsmen status as an Avionics Communication and Navigation
Technician.
He has over 14 years experience in information security and for 10 of those years,
he has worked in the Department of Defense environment working on DIACAP
initiatives in support of the Joint, Army and Marine Corps information and combat
systems for the ATEC, NCR RNOSC, MCNOSC and MCSC.
Mr. Peele has developed, witnessed, coordinated and conducted IA Assessments in
support initial operational test and evaluation for AEC Survivability Directorate for
a number of systems. He has also implemented certification and accreditation
process in support of MCSC initiatives.
2
Securing the Critical Information
Vital to Your Small Business Survival
3
Agenda
Why should we secure information?
What mandates the protection of information?
What are the threats to information?
How is security implemented?
Who is going to implement security?
Who is responsible for security?
Areas of Concentration
4
Why should we secure information?
Organizations Most Value Asset
Intellectual Property
Mission Information
Financial Information
Personal Identifiable Information
Loss of Competitive Business or Technological
Advantages
Damage of Reputation
Loss of Revenue
Legal and Regulatory Sanctions
Small/Medium Businesses are the Low Hanging Fruit
5
What mandates the protection of information?
Federal Information Security Management Act 2002
Family Educational Rights and Privacy Act
Health Insurance Portability and Accountability Act
Sarbanes-Oxley Act 2002
Gramm–Leach–Bliley Act
Payment Card Industry Data Security Standard
Securing the Life Blood of Business
– INFORMATION 6
What are the threats to information?
External Threats
Manmade
Attack of known vulnerability by a cyber criminal.
Zero-day malware attack
Phishing, Spear Phishing and Whaling
Advanced Persistent Threats (APT)
Players: Nation State, Cyber Gangs, Hacktivists,
Individuals
Natural
Flood
Fire
Earthquake
7
What are the threats to information?
Internal Threats
Intentional
Trusted Insider
Disgruntled employee
Employee with financial problems
Employee with adverse information
Unintentional
User opening infected attachment
Misconfigured settings
Infecting work system while working remotely
Introduction of malware via personal devices
8
How is security implemented?
First, security is not a one size fits all!
Security must align with business and mission
objectives.
Deploy in layers with input from stakeholders
Implement relevant controls
Fortifying network perimeters
Instituting security policies and procedures
9
How is security implemented?
Fortifying facility security control
Implementing Security Awareness training
Limiting unauthorized access to network and facility
Monitoring and auditing network activity
Protecting mobile endpoints
Human Resources background investigations
Bottom line: Implementing Defense-in-Depth
10
Who is going to implement security?
Certified Security Professionals:
Information
Assurance Professionals
Information System Security Engineers
Cyber Security Professionals
Certifications:
CISSP,
ISSEP, ISSMP, CISM, CISA, CAP
Security+, Network+, CASP
SANS Certifications
OEM Certifications
11
Who is responsible for security?
Security is Everyone’s Responsibility!
Senior Management is Ultimately Responsible for
Security in their Organization
Lead by Example!!
TRUST BUT VERIFY!
12
Areas of Concentration
Senior Management Buy-In
Security Awareness Training
Business Continuity Plan
Configuration and Asset Management
Develop Security Policies and Processes
Enforce Security Policies
Ensure Teaming Agreements Address Security Issues
13
AIS LLC’s Capabilities
Risk Management & IS Security Engineering
IA Compliance & Continuous Monitoring
Certification and Accreditation Process Oversight
IA Assessment & Evaluation
IA Test & Evaluation (T&E)
IA Subject Matter Expertise
IA Acquisition Support
Project Management & Security Strategic Planning
14
IA Current and Past Performance
Regional Support Services (PdM MCNIS)
Marine Corps Enterprise IT Services (PdM MCES)
Developed and coordinated IA test plans and analysis in support of DISA NCES program.
CH-53K HLR Helicopter (Sikorsky/Navy)
Provided IA analysis and C&A oversight to PdM MCES during the acquisition and sustainment phases of the
MCEITS data center project.
Network Centric Enterprise Services (Joint/AEC)
Provided day-to-day IA and Cyber Security support to the USMC Regional NOSC initiative to reestablish ownership
and operational responsibility of the USMC NIPR network.
Developed program protection plan and C&A process guidebook.
Unified Command Suite (AEC)
Provided IA analysis of an operational test conducted by JITC of a multiple jurisdiction command and control system
15
QUESTIONS?
16
Contact Information
Christopher Peele, MSIA
CISSP-ISSEP, NSA IAM, NSA IEM
Chief IA Analyst
Office: 703-919-9859
[email protected]
17