overcoming hidden risks in a shared security model

23
Overcoming Hidden Risks in a Shared Security Model

Upload: onramp

Post on 21-Jan-2018

28 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Overcoming Hidden Risks in a Shared Security Model

Overcoming Hidden Risks in a Shared Security Model

Page 2: Overcoming Hidden Risks in a Shared Security Model

Agenda

• Introduction

• Compliance and Security Landscape

• Evolution to a 3rd Party Ecosystem

• Data Risks and Challenges

• Deep Dive Into Shared Responsibilities

• Best Practices

• Q&A

Page 3: Overcoming Hidden Risks in a Shared Security Model

Speakers

Chad Kissinger

Founder

OnRamp

OnRamp is a leading HITRUST-certified data centerservices company that guides businesses throughthe complexities of data security and compliance.Our solutions help organizations in healthcare,financial services and education services meetcompliance standards.

OnRamp operates multiple enterprise-classSSAE16/AICPA SOC 2 Type 2 and SOC 3 datacenters, where we deploy hybrid computingsolutions that enable our customers to blendsecure cloud computing, managed hosting, andcolocation service to best meet their uniquerequirements. Our team’s consultative approachhelps you develop the right mix of solutions tofree your resources to focus on agility anddifferentiation in your industry.

Page 4: Overcoming Hidden Risks in a Shared Security Model

Speakers

Maria Horton

CEO

EmeSec

EmeSec uses cybersecurity and privacy practices to build competitive advantage in today’s connected world for clients.

Our intuitive, adaptive and game-changing solutions are designed to help organizations protect their reputation and growth engines while harnessing the power of security and automated technologies. The company is an accredited Third Party Assessor (3PAO) under the Federal Risk and Authorization Management Program (FedRAMP). EmeSec Incorporated is a Woman-Owned Service Disabled Veteran Owned Small Business (SDVOSB), founded in 2003. EmeSec holds certifications in ISO 9001:2015, ISO 20000-1:2011, ISO/IEC 27001:2013, ISO/IEC 17020:2012.

Page 5: Overcoming Hidden Risks in a Shared Security Model

Speakers

Michael Casey

Managing Director & Chief Payments Officer

EPMG Advisors

EPMG Advisors was founded in 2008 with the purpose of providing clients the best payments management and advisory services with boutique customer care. Our firm is driven to provide our clients with the understanding and ability to build and maintain a truly transparent payments environment.

Whether your objective is to identify new opportunities for growth or to maximize profits from existing operations, EPMG Payment Advisors can deliver the enterprise-wide solutions you require.

Page 6: Overcoming Hidden Risks in a Shared Security Model

Current Landscape

Ponemon Institute, Cost of Data Breach Study: 2017 Global Analysis

https://healthitsecurity.com/news/mobile-security-at-center-of-2.5m-ocr-hipaa-settlement

The average consolidated cost of a data breach reached $3.62 million in 2017

50%

$4M2017

The risk of non-compliance is

significant. Ignorance is not

excused.

Pennsylvania-based

CardioNet agreed to a $2.5 million

OCR HIPAA settlement stemming

from improper safeguards of PII

data.

50% of organizations don’t know who has access to their data, how they’re using it, or what safeguards are in place to mitigate a security incident.

Page 7: Overcoming Hidden Risks in a Shared Security Model

Multi-Vendor Management

Agility and Responsiveness

Retaining Talent

Patient or Customer

Engagement

Team SkillsetsCybersecurity

Managing Budgets

Evolution to 3rd Party Ecosystem

Ability to Innovate & Differentiate

Leadership offloads their IT infrastructure and computing needs in order to:

• Increase Operational Efficiency

• Rely on Subject Matter Experts

• Gain a Competitive Advantage

• Reduce Costs

C-LEVEL RESPONSIBILITIES

Page 8: Overcoming Hidden Risks in a Shared Security Model

Compliance regulations are written as though one party is responsible for compliance and security.

Regulators Leadership TalentProviders/ Suppliers

THE PLAYERS

Where is the Breakdown?

Page 9: Overcoming Hidden Risks in a Shared Security Model

Data Risks and Top Challenges with Shared Responsibilities

• Confusing Guidance

• Insufficient Policies and Processes

• Unclear Roles and Responsibilities

• No Accountability

• Lack of Due Diligence (Choosing & Monitoring 3rd Parties)

• Insufficient Technology

THE FUMBLES

Page 10: Overcoming Hidden Risks in a Shared Security Model

Guidance is Not Prescriptive

www.hhs.gov;

https://www.pcicomplianceguide.org/faq/http

s://www2.ed.gov/

NIST publications (800-145, 800-66, 800-52); FIPS 140-2

Office for Civil Rights (OCR)

HIPAA

FISMA

Cloud Council

Security Rule

Breach Notification Rule

PCI Data Security Standards (DSS)

U.S. Department of Education- FERPA (20 U.S.C. § 1232g; 34 CFR Part 99)

The Privacy Act

FedRAMP

THE PLAYBOOK: GOVERNING BODIES AND FRAMEWORKS

Guidance is vague and up for interpretation.(i.e. "reasonable and appropriate ” measures for HIPAA

Certain regulations do not require or recognize audits or certifications.(i.e. FERPA)

Page 11: Overcoming Hidden Risks in a Shared Security Model

Establishing the Right Policies and Processes

• Aren’t able to determine the number of 3rd parties with access to confidential information.

• Lack of confidence in third parties’ data safeguards, security policies and procedures.

• Rarely conduct reviews of vendor management policies and procedures to ensure they address 3rd party data risk.

• Rely on contractual agreements instead of audits and assessments to evaluate the security and privacy practices of their vendors.

Standard Policies

• Information Classification

Policy

• Risk Management Policy

• Information Systems

Security Policy

• Ongoing Management

• Clearly Defined Roles

Symptoms

Page 12: Overcoming Hidden Risks in a Shared Security Model

Why Are Companies Unable to Determine Who Has Access to Their Data?

• No accountability for 3rd party risk management

• No one department or function owns this responsibility

• Not a priority

• Lack of resources to track third parties

• Complexity in vendor relationships

• Frequent turnover in partners

Ponemon Institute, Data Risk in the Third Party Ecosystem

Page 13: Overcoming Hidden Risks in a Shared Security Model

Roles, Responsibility, & Accountability

Senior leadership and boards of directors are rarely involved in third-party risk management.

36%of CEOs play a key role in security & compliance strategy

79%

Of CEOs cited over-regulation as a top threat to their organizations’ growth.

PWC State of Compliance 2016

Only 16% of respondents indicated that they view their CEO as the compliance and champion at their organizations.

Page 14: Overcoming Hidden Risks in a Shared Security Model

Roles, Responsibility, & Accountability INTERNAL – SHARED ACROSS DEPARTMENTS

Page 15: Overcoming Hidden Risks in a Shared Security Model

Shared Responsibility Varies by Model Responsibility Colocation IaaS PaaS SaaS

DataClassification

End-point Protection

Identity & Access Management

Application Controls

Network Controls

Infrastructure

Physical Security

Customer

Customer

Customer

Customer

Provider Provider

Provider

Customer Customer Customer

Customer Customer Customer Both Parties

Both Parties

Both Parties

Both Parties

Customer

Customer

Both Parties

Provider Provider

Both Parties

Provider

Provider

Provider

Both Parties

Provider

Page 16: Overcoming Hidden Risks in a Shared Security Model

Accountability and Ownership

Organizations admit they are sharing sensitive data with third parties that might have poor security policies.

Ponemon Institute, Data Risk in the Third Party Ecosystem

Figure 2: Perceptions about vendors’ security policies and procedures

Page 17: Overcoming Hidden Risks in a Shared Security Model

Beware of These 3rd Party Risk Indicators

• Turnover of the vendor’s key personnel

• IT glitches, operational failures and stoppages

• Outdated IT systems and equipment

• History of frequent data breach incidents

• Legal actions against the vendor

• Poorly written security and privacy policies and procedures

Page 18: Overcoming Hidden Risks in a Shared Security Model

Case Studies

• Target breach due to HVAC vendor hack. Ultimately, two-factor authentication and anti-malware would have mitigated the breach.

• Hackers breach Equifax’s portal, stealing W-2 data. Only a PIN code was used to protect sensitive data.

• Uber pays hackers $100,000 to hide year-old breach of 57 million users. Hackers accessed Github.com, a third-party cloud storage website used by Uber software engineers. Employee training could have prevented passwords from being published on a public forum.

ZDNForbes.comUSA today.com

Page 19: Overcoming Hidden Risks in a Shared Security Model

Best Practices: Risk Management Life Cycle

DUE DILLIGENCE

CONTRACT

ONGOING MONITORING

TERMINATION

PLANNING

OVERSIGHT AND ACCOUNTABILITY

Page 20: Overcoming Hidden Risks in a Shared Security Model

Best Practices: Technology, People, Processes

Technology

• Data encryption in transit and at rest

• Firewalls

• Multi-factor authentication

• Cloud encryption

• Audit logs showing access to data

• Vulnerability scanning, intrusion detection/prevention

• Hardware and OS patching

• Security Audits

• Contingency Planning

People & Processes

• Audit operational and business processes

• Audit access management

• Enforce privacy policies

• Ensure cloud networks and connections are secure

• Evaluate security controls: physical infrastructure and facilities

• Data decommissioning process

• Be prepared for incidents

1 -Risk Assessment

3-Vendor Security Alignment

2 –Assign Owners

Page 21: Overcoming Hidden Risks in a Shared Security Model

Best Practices: Choosing a Vendor

Understands Your Business Goals

Credentials & Certifications

Service Level Agreements (SLAs) & Business Associate Agreements (BAAs)

Security

Availability & Scalability

Expertise in Your Industry

Page 22: Overcoming Hidden Risks in a Shared Security Model

Questions?