Call for Participation: Contribute to CSA Security Guidance V.4 Peer Review

Closing Date: Jan 13th, 2017

The Cloud Security Alliance would like to invite you to review and comment on 12 Domains of the CSA’s Security Guidance for Critical Areas of Focus in Cloud Computing. This document acts as a practical, actionable roadmap to individuals looking to safely and securely adopt the cloud paradigm. This is your opportunity to provide feedback and identify any critical areas that we might be missing in the document’s focus.

The Domains that are going for peer review are:

To participate, please identify specific Domains which you have expertise in and follow the link to the Google Docs. You should be able to provide your comments in the document. Please do not provide editorial comments (i.e. grammar, formatting, etc), rather focus instead on the content of the document.

The peer review for the 12 Domains start today and ends one month from now, on the 13th of January. We appreciate your assistance. Thank you in advance for your time and contribution.

CSA Research Team

research@cloudsecurityalliance.org

[Cloud Security Alliance Research News]

Three Lessons From the San Francisco Muni Ransomware Attack

On Black Friday, a hacker hit San Francisco’s light rail agency with a ransomware attack. Fortunately, this story has a happy ending: the attack ended in failure. So why did it raise the hairs on the back of our collective neck? Because we fear that next time a critical infrastructure system is attacked, it could just as easily end in tragedy. But it doesn’t have to if organizations with Industrial Control Systems (ICS)  heed three key lessons from San Francisco’s ordeal.

First, let’s look at what happened: On Friday, Nov. 25, a hacker infected the San Francisco Municipal Transportation Agency’s (SMFTA) network with ransomware that encrypted data on 900 office computers, spreading through the system’s Windows operating system. As a precautionary measure, the third party that operates SMFTA’s ticketing system shut down payment kiosks to prevent the malware from spreading. Rather than stop service, SMFTA opened the gates and offered free rides for much of the weekend. The attacker demanded a 100 Bitcoin ransom, or around $73,000, to unlock the affected files. SFMTA refused to pay since it has a backup system. By Monday, most of the agency’s computers and systems were back up and running.

Here are three key lessons other ICS organizations should learn from the event, so they’re prepared to derail similar ransomware attacks as deftly:

  1. Recognize you are increasingly in cybercriminals’ cross hairs. Cyberattacks on ICS systems, which control public and private infrastructure such as electrical grids, oil pipelines and water systems, are on the rise. In 2015, the U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 20% more cyber incidents than in 2014. And for the first time since the agency started tracking reported incidents in 2009, the critical manufacturing sector experienced more incidents than the energy sector. Critical manufacturing organizations produce products like turbines, generators, primary metals, commercial ships and rail equipment that are essential to other critical infrastructure sectors.
  1. Keep your IT and OT separate. Thankfully, the San Fran Muni ransomware attack never went beyond SFMTA’s front-office systems. But, increasingly, cyber criminals are penetrating control systems through enterprise networks. An ICS-CERT report noted that while the 2015 penetration of OT systems via IT systems was low at 12 percent of reported incidents, it represented a 33 percent increase from 2014. Experts say the solution is to adopt the Purdue Model, a segmented network architecture with separate zones for enterprise, manufacturing and control systems.
  1. Invest in off-site, real-time backup. SFMTA was able to recover the encrypted data without paying the ransom because it had a good backup system. That wasn’t the case with the Lansing (Michigan) Board of Water & Light. When its corporate network suffered a ransomware attack in April, the municipal utility agency paid $25,000 in ransom to unlock its accounting system, email service and phone lines.

If San Francisco’s example isn’t enough to motivate ICS organizations to take cybersecurity seriously, then Booz Allen Hamilton’s 2016 Industrial CyberSecurity Threat Briefing should do the trick. It includes dozens of cyber threats to ICS organizations.

By Laurie Kumerow, Consultant, Code42

[Cloud Security Alliance Blog]

Telecom Organizations’ Strategy to Generate Revenue from Security Services

In this digital age, with telecom service providers’ revenue per bit falling every year, network operators are clearly being forced to consider expanding their catalogue of services to something beyond basic voice connectivity. Providers need some way to unlock the full value of their investment in the network and to expand into new and profitable applications and services.

For a decade or more, Western European and North American telecommunication companies have focused on capturing growth in the consumer market, as mobile phone usage became nearly universal and telcos sold broadband, TV and other data services to users at home and on the go.

The challenge for many telecom executives is how to identify the opportunity that lies beyond the market that historically fueled their profit pool and reshape their companies and priorities to capitalize on the situation.

To win in the expanding market for business telecom and IT services, telcos will need to prioritize the B2B opportunity and embrace newer capabilities.

Cybersecurity Ventures projects $1 trillion will be spent globally on cyber security from 2017 to 2021. Cybercrime is predicted to cost the world $6 trillion annually by 2021.

Traditionally, operators had security services in B2B such as managed firewalls, intrusion and prevention systems, email security, web gateway, security information and event management, vulnerability and penetration testing solutions, risk assessment and end-point protection.

But the digital business needs something unique that can protect their organizations from cyber-attack and data breaches.

The important areas that operators need to focus on in order to generate revenue are:

  1. Internet of Things
  2. Software-defined networking
  3. Big data and analytics
  4. Cloud
  5. Intelligent breach response management

A dozen cyber security startups have each raised $100 million or more in funding since 2014, according to Dow Jones VentureSource – a database that reports on companies globally that receive venture capital and private equity funding.

Hundreds of billions will be spent on securing PCs, mobile and IoT devices, corporate networks, and the cloud over the next five years.

The time has come for operators to generate revenue from these cyber security offerings, and it is up to the service provider to define strategy in developing the capabilities and targeting the market.

References

  1. http://cybersecurityventures.com/
  2. http://www.csoonline.com/
  3. http://bcg.com

Rasool Kareem Irfan, CISM, CEH, ISO/IEC 27001, Senior Manager – Security Practice, Tata Communications Transformation Services

[ISACA Now Blog]

2017 Cybersecurity Predictions: Recruiters Search for Cyber Talent Outside of Security

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.  

Cybersecurity is facing a shortage of qualified professionals to occupy the many openings within the sector. Earlier this year, Forbes and other sources pegged job vacancies for available cybersecurity sector jobs at 74 percent for the last five years, and that percentage number is expected to increase globally as security concerns become greater for small, medium and large businesses. In addition, new government regulations and best practices for security will put increasing pressure on the cybersecurity infrastructure of many organizations, making talent shortages that much more visible. So how will companies find this much needed talent and what does this mean for both employers and job seekers? Here are our talent hiring predictions for cybersecurity in 2017.

Sure Things

Security companies will continue to look beyond security for talent.

What we’re beginning to see is a shift toward organizations recruiting talent outside of the security space who possess the adaptable technical abilities to be successful within cybersecurity. In other words, many individuals working in cloud, SaaS, networking, virtualization and mobile technologies, even those without specific IT or network security experience, have the transferable skills to become cloud, SaaS, networking virtualization and mobile security experts. This trend will continue into 2017 and beyond.

Additionally, there is a plethora of IT and security-focused talent currently serving in the armed forces. As the search for cyber talent continues to grow, we can expect to see security companies expanding their veterans programs to aid the transition of qualified military personnel into the private sector. Not only is this a positive story for veterans programs – it’s also a powerful connector between cybersecurity jobs and field-tested cybersecurity talent.

Beyond that, we will see security organizations investing more resources into recruiting “next-generation” talent. Large research universities are beginning to incorporate security into the fabric of a well-rounded STEM education; some have defined cybersesurity curriculum and courses of study, such as New York University. This will lead to an increase of young, educated individuals having more exposure to cybersecurity prior to their entrance into the workforce.

The need for non-technical security professionals will also increase.

As 2017 approaches, more non-technical professionals will enter the world of cybersecurity. Like any other emerging industry transitioning into a stable long-term institution, there will be a need to grow the infrastructure surrounding these new technologies. Sales, finance, accounting and human resources all-stars will all be highly desirable within the security space.

Additionally, there will be greater opportunities for talented marketers and storytellers to share the importance of security in a world defined by the Internet of Things. Cyber education and the emergence of thought leadership will be paramount in creating a more cyber-aware society, conscious of the importance of data protection and threat prevention.

It will also be incumbent upon organizations to reward and retain their best cyber talent – and make sure their cyber talent continue to enhance their skills. A recent study conducted by Enterprise Security Group and the Information Systems Security Association (ISSA) cited that 63 percent of cybersecurity professionals find it difficult to keep up with the demands of their jobs and building their skills. More progressive organizations will proactively invest in continuing education for their top talent.

Security will continue to be a desirable destination for job seekers.

Moving past 2017, the overall security industry is expected to grow upwards of $170 Billion by 2020. As cybersecurity continues to weave itself into the fabric of our digitally connected society, more industries outside of tech will be seeking qualified cyber professionals to setup and maintain secure and private infrastructures, fueling the need for qualified individuals.

A prime example of this is the healthcare industry. As concerns about patient privacy continue to rise, more healthcare providers will be in need of security professionals to safeguard the abundance of sensitive data flowing through their organizations. And as we’ve seen at many healthcare organizations, complying with regulations such as HIPAA is too often at odds with investing in the right security technology.

Acknowledging these needs will help the industry stay healthy and attractive for job seekers, especially with the potential for innovation when it comes to preventing successful cyber attacks. And it’s worth noting that many cyber professionals see the nobility of their work. There is a satisfaction in knowing that their efforts to protect data and safeguard information truly help organizations leverage their technologies for the greater good of society. Cybersecurity has moved beyond merely an IT spend – it’s imperative to protecting our way of life in the digital age. Forward-thinking organizations will know to prioritize investing in their people as much as they do their technology.

Long Shots

Companies acquire other organizations to inherit talent

Many startups specializing in a single security component have entered the space with hopes of their product being integrated into the platform of a larger vendor. The space to date has not seen too many wild acquisitions, but it is possible that they may become more common in the near-future.

Strong emergence of cybersecurity academies from larger players in the sector

With these academies, we will see more IT professionals being trained and certified on the implementation of company specific security products and architectures. While this may sound like an excellent solution to the cyber skills shortage, the cost to create these academies is high for many organizations and the infrastructure needed to maintain them is often challenging to create.

What are your cybersecurity predictions for talent hiring? Share your thoughts in the comments.

and

[Palo Alto Networks Research Center]

English
Exit mobile version