CYBERSECURITY Situational awareness François Thill, Director Cybersecurity, Ministry of the economy
Agenda • The actual situation • Strategy of the ministry • Risk management – a common language • Some good practice examples 2
The actual situation … threats are mature – we are too, aren‘t we? 3
Convergence of technologies Convergence • Towards a „monoculture“ of systems • Everything is connected http://www.geneticliteracyproject.org
Vulnerabilities Vulnerabilities • „Zero - Day“ • Human vulnerabilities (I love you) Photos by Justin Baeder and Ricardo Martins
Development of the threat landscape (LU) Threat actors are mature, highly skilled, with deep pockets • 55% crime • 40% espionage • 5% activism Michael Surran : http://commons.wikimedia.org/wiki/File:Boy_with_Commodore_Vic_20_%281984%29.jpg
Subcontractors Subcontractors • Service quality of subcontractors (who will you call) Jordy Meow: Gunkanjima. A view from the school.
It is not an individual challenge Stop fighting alone – it is a societal challenge! • We need skills • We need to reduce costs and complexity • We need to work together and share Rootology: Rowboat with oars and two passengers.
Strategy of the ministry … Security for all, together ! 9
Strategy of the ministry • Democratization of security • Manage risks • Identify synergies • mutualize • cooperate • Reduction of compliance efforts Photo: Alexandre Dulaunoy
Risk management makes it possible Principle of proportionality and necessity
Risik management must Deliver reliable results
Risik management must Deliver comparable results Photo: Ionutzmovie
Risik management must Be repeatable
Risk Management – the common language Definition of scope Definition of risk appetite Definition of primary assets and criticality Identification of secondary assets Identification of asset’s vulnerabilities Identification of threats exploiting asset’s vulns Estimation and evaluation of risk Risk reduction , avoidance , extern., acceptance Risk = Impact x Threat x Vulnerability
Good practice • CASES : Risk Management • CIRCL : MISP & AIL • C3 : Room 42 and so much more
Good practice - CASES • Risk management based upon fobjective metrics Creation of comparable results •
Good practice - CIRCL • MISP – Malware Information Sharing Platform
Good practice - CIRCL • AIL – Analysis of Information Leaks
Good practice – C3 Room 42
Thank you - François Thill • www.securitymadein.lu • www.cases.lu • www.circl.lu • https://monarc.lu • CIRCL : MISP & AIL • C3 : Room 42 und soviel mehr
Recommend
More recommend