cyber security april 2016 presentation

36
Cyber Security: Challenges for the Regulator JFSC COO Mike Jeacock & JFSC Head of ICT Denis Philippe

Upload: denis-philippe

Post on 22-Jan-2018

122 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security April 2016 Presentation

Cyber Security: Challenges for the RegulatorJFSC COO Mike Jeacock & JFSC Head of ICT Denis Philippe

Page 2: Cyber Security April 2016 Presentation

› JFSC Chief Operating OfficerMike Jeacock

Page 3: Cyber Security April 2016 Presentation

› An evolving Commission

› An agile & open regulator

› Technology ›To fulfil international responsibilities

›To protect & defend our systems

› An active Cyber Programme›Ownership of risks & obligations

› Introduction

Page 4: Cyber Security April 2016 Presentation

› Subjected to approximately 3,800 network security attack attempts DAILY

› Process over 5,000 emails per day with up to 34% of inbound traffic being rejected due to identified threats

› Website screening prevents access to high risk content (< 0.1% traffic)

› What happens to the JFSC

Page 5: Cyber Security April 2016 Presentation

› Executive

32% of Boards do not receive information security updates

45% of Boards do not believe it is important

Page 6: Cyber Security April 2016 Presentation

› Fire Metaphor

FIRE

Opportunistic Threat

Indiscriminate

Exploits vulnerability

Owns everything

Page 7: Cyber Security April 2016 Presentation

› Human

› Vigilant

› More complex

› Vulnerable

50% of people take some form of confidential information with them when they leave an organisation

Page 8: Cyber Security April 2016 Presentation

› Case Studies›Sleeper

›Chinese restaurant

›Starbucks

›Me

› Human factors

Page 9: Cyber Security April 2016 Presentation

› JFSC Head of ICT Denis Philippe

Page 10: Cyber Security April 2016 Presentation

“Commission held information1, in all its forms, written, recorded electronically or printed, will be protected from accidental or intentional unauthorized access, modification, or destruction throughout its life cycle”

› 1This includes all information created or owned by the Commission as well as information collected by or provided to the Commission by external parties for the execution of the Commission’s activities

› Cyber-Security Mission Statement

Page 11: Cyber Security April 2016 Presentation

› Definitions of what we protect:

› Private & personal information ›Legal definition versus what people actually value

› What?

GapExtended

Reputational Risk

Page 12: Cyber Security April 2016 Presentation

› Why?

› Mitigate Risk – “Data is a commodity of interest to many”

› Extensive investment in providing an interconnected and online mode of stakeholder engagement is being balanced with a significant effort and investment in our security to protect the systems and data we are collecting and holding

Page 13: Cyber Security April 2016 Presentation

› How?

› The JFSC Gold Standard

› This blend of NIST and ISO allows us to speak to other regulators and registries in security terms they understand

5 Pillars based on a blend of NIST and ISO27001

Identify Protect Detect Respond Recover

Page 14: Cyber Security April 2016 Presentation

› Governance and Landscape

Page 15: Cyber Security April 2016 Presentation

› Governance Policy framework from 125 to 12

Page 16: Cyber Security April 2016 Presentation

› Understanding the landscape

› The JFSC holds diverse sets of information:

› Market sensitive information› Incorporations

›Mergers and Acquisitions

›Fund Products

› Beneficial ownership information

› Security Interest information

Manage the value equation, it is about delivering value Cyber-security should be seen as a business benefit and not just a cost

Page 17: Cyber Security April 2016 Presentation

› Protect

Page 18: Cyber Security April 2016 Presentation

› Building new systems

› Building walls is not enough

› Flexibility and collaboration are key

› Improved intelligence will improve detection

› Understand the landscape threats

Page 19: Cyber Security April 2016 Presentation

› Building an e-Enabled JFSC

Page 20: Cyber Security April 2016 Presentation

› Developing a new platform environment with security baked in from the start

› Delivering joined up services

› Delivering new Registers from a common platform (SIR, JAR)

› Move to more services online

› Increased surface area requires a different approach to security

› Building new systems – changing risks

Page 21: Cyber Security April 2016 Presentation

› Detect

Page 22: Cyber Security April 2016 Presentation

› Behavioural analytics – not magic

› Real-time visibility

› 7.6 million network / data events per day at JFSC

› Detect

“If the product doesn't give you a why, it is only an illusion of security.” Amit Yoran – President, RSA

Page 23: Cyber Security April 2016 Presentation

› Humanware

Page 24: Cyber Security April 2016 Presentation

› Focus is turning to people

› Soft targets = weak link in the chain

› Cultural evolution through training and secure behaviours

› Understanding the landscape

People Skills KnowledgeHumanware

2.0

Page 25: Cyber Security April 2016 Presentation

› 40% of daily actions are driven without thinking:› Changing gear› Tying shoe laces› Locking the front door

› Bad habits include:› Writing down passwords› Leaving screens unlocked› Clicking on emails and links without knowing what they are or where they go

› “Evidence has shown that a large number of cyber hygiene issues have become bad habits.” Bikash Barai

› Habits

Page 26: Cyber Security April 2016 Presentation

› Two areas of the brain we are interested in:

› Goal directed part (Pre-frontal cortex)›Responsible for conscious and deliberate activity

›Slower functioning

› Habit part (Basal Ganglia)›Fast›Near automatic function›Does not require thought

› Habits

Page 27: Cyber Security April 2016 Presentation

› Changing habits

Trigger Routine Reward

Page 28: Cyber Security April 2016 Presentation

› Example 1: Stop writing down passwords

Trigger:

Password expiry

Old Routine:

Write down password

New Routine:

Write down a clue

Reward:

Feeling secure

Rehearse and repeat at least 20 times

Page 29: Cyber Security April 2016 Presentation

› Example 2: Stop clicking on Phishing links

Trigger: Legitimate entity

asking for personal details

Old Routine: Share details

New Routine: Validate

legitimacy of entity

Reward:

Feeling secure

Page 30: Cyber Security April 2016 Presentation

› IP theft or sabotage for their own benefit or that of others

› Have a training and awareness plan

› Malicious

of those who steal data do so in their last month of work

of those who steal data do so two months before leaving

50%

70%

Ref: Dawn Cappelli

Page 31: Cyber Security April 2016 Presentation

› Island opportunity

Page 32: Cyber Security April 2016 Presentation

› What about the local aspect?

Is there a need to ensure that cyber-security is embedded as a pre-requisite to doing business?

Is there a place for cyber in the regulatory framework?

Who should set and monitor any local standards?

Should the standards be scalable?

Page 33: Cyber Security April 2016 Presentation

› Key discussion points

›An agreed cyber standard for financial services sector

›Apply existing international standards

›Guidelines for consumers and industry

›The need for a minimum standard

›Build a collaborative environment to discuss real-time cyber incidents and issues

Page 34: Cyber Security April 2016 Presentation

› Closing remarks

Page 35: Cyber Security April 2016 Presentation

› Things to spend time on

Communicating through collaboration

Targeting resources where they are most effective

Patching people as well as systems, Humanware 2.0

Page 36: Cyber Security April 2016 Presentation

Follow us at @JerseyFSC

Like us at Jersey Financial Services Commission

Follow us at Jersey Financial Services Commission

JFSC COO Mike [email protected]

Head of ICT Denis [email protected]