Category: cybersecurity

  • Navigating the National Cyber Incident Response Plan: A Summary

    The National Cyber Incident Response Plan (NCIRP) is a crucial document outlining the U.S. government’s strategy for addressing cyber incidents. It serves as a blueprint for collaboration between federal agencies, private entities, and state, local, tribal, and territorial (SLTT) governments in the face of increasingly sophisticated cyber threats.

    If you’d rather, here is a AI generated podcast summarizing the paper:

    Key Objectives of the NCIRP

    • Establish a coordinated national response to significant cyber incidents.
    • Provide a framework for the roles and responsibilities of various stakeholders in incident detection and response.
    • Outline the coordinating structures, key decision points, and priority activities throughout the cyber incident lifecycle.
    • Promote a unified approach to incident response, ensuring efficient and effective action.

    Four Lines of Effort

    The NCIRP outlines four key Lines of Effort (LOEs) to manage cyber incidents:

    • Asset Response: Led by the Cybersecurity and Infrastructure Security Agency (CISA), this LOE focuses on protecting assets, mitigating vulnerabilities, and minimizing incident impact.
    • Threat Response: Spearheaded by the Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), this LOE involves investigating, attributing, and disrupting malicious cyber activity.
    • Intelligence Support: Led by the Office of the Director of National Intelligence (ODNI) through the Cyber Threat Intelligence Integration Center (CTIIC), this LOE focuses on building situational awareness, analyzing threat trends, and identifying knowledge gaps.
    • Affected Entity Response: This LOE involves managing the impact of a cyber incident, including maintaining operational continuity, protecting privacy, and complying with regulations. The lead agency varies depending on whether the affected entity is a federal agency or a private organization.

    Cybersecurity Incident Response Phases

    The NCIRP outlines two primary phases for incident response:

    • Detection Phase: This phase involves continuous monitoring and analysis of cyber activity to identify potential incidents. Key decisions and activities in this phase include:
      • Determining the severity of the incident based on its potential impact on national security, the economy, and public health and safety.
      • Deciding if CISA should convene an incident-specific group of stakeholders through the Joint Cyber Defense Collaborative (JCDC) to coordinate asset response activities.
      • Assessing the need for a Cyber Unified Coordination Group (Cyber UCG) to enhance interagency coordination.
    • Response Phase: This phase focuses on containing, eradicating, and recovering from an incident. Key decisions and activities in this phase include:
      • Identifying key private sector stakeholders to contribute to solution development and implementation.
      • Establishing shared priorities for response efforts based on the scope and impact of the incident.
      • Determining the appropriate timing and methods for implementing response activities.
      • Evaluating resource needs and considering whether to utilize the Cyber Response and Recovery Fund (CRRF).
      • Defining the criteria for concluding the incident response phase.

    Coordinating Structures

    The NCIRP leverages existing coordinating structures to enhance incident response, including:

    • Cyber Response Group (CRG): Responsible for policy and strategy development and implementation regarding significant cyber incidents.
    • Cyber UCG: The primary operational coordination mechanism for federal agencies during significant cyber incidents.
    • Sector Risk Management Agencies (SRMAs): Provide sector-specific expertise and support to the Cyber UCG and affected entities within their respective sectors.
    • Joint Cyber Defense Collaborative (JCDC): Fosters public-private partnerships to address cyber incidents through planning, information sharing, and development of mitigation guidance.

    Preparedness and Implementation

    The NCIRP emphasizes continuous preparedness and ongoing implementation efforts to ensure national readiness for cyber incidents. CISA plays a crucial role in these efforts, leading activities such as:

    • Developing supplementary plans: CISA creates additional documents addressing specific issues and stakeholder communities to enhance national preparedness.
    • Updating the NCIRP: CISA regularly updates the NCIRP to reflect changes in the cyber threat landscape, laws, and lessons learned from past incidents.
    • Facilitating nationwide activities: CISA works with stakeholders to implement actions outlined in Annex B of the NCIRP, which focuses on preparing for cyber incidents.

    The NCIRP is a living document, constantly evolving to address the ever-changing cyber threat landscape. It serves as a vital resource for all cybersecurity enthusiasts, providing insights into the nation’s strategic approach to managing cyber incidents.

  • Weekly Cybersecurity Wrap-up 12/9/24

    Weekly Cybersecurity Wrap-up 12/9/24

    Each week I publish interesting articles and ways to improve your understanding of cybersecurity.

    Projects

    Videos

    Articles

    Podcasts

  • Key Takeaways From the FIRPA Practitioner Insights Report

    This blog post summarizes the key takeaways from the Five Eyes Insider Risk Practitioner Alliance (FIRPA) Practitioner Insights Report. The report is based on workshops with over 100 insider risk practitioners from Australia, the USA, and Canada.

    AI Generated Podcast:

    Stakeholder Engagement and Collaboration

    • Executive buy-in and cross-departmental collaboration are essential for successful insider risk management. Collaboration across departments like legal, HR, IT, and compliance is needed to create a unified approach to insider risk.
    • Challenges include communication breakdowns, competing priorities, and a lack of shared understanding across departments. Organizations need to develop a shared language and tailor communication to different stakeholder groups.

    Security Culture and Leadership

    • Leaders must champion security and set the tone for a security-conscious culture. They need to embed security practices into daily operations and create an environment where insider risk management is prioritized.
    • Challenges include silos between departments, biases in insider risk detection, and a lack of buy-in from senior leadership. Organizations should promote a no-blame culture that encourages open reporting and engagement.

    Education and Training

    • Training programs should leverage multiple modes of delivery and include real-life scenarios and simulations.
    • Challenges include cost constraints, lack of motivation, and outdated content. Organizations need to develop contextually relevant practices, invest in dynamic learning tools, and ensure training remains current and engaging.

    Tools, Techniques, and Indicators

    • Selecting the right tools and techniques is crucial, but they must be aligned with an organization’s unique risks and operational context.
    • Challenges include over-reliance on data without sufficient context, difficulty integrating new tools with existing systems, and a lack of understanding of the human factors behind insider threats. Organizations need to select tools that offer contextual accuracy and invest in training and development of internal experts.

    Information Sharing and Collaboration Between Organizations

    • Sharing insider threat information between organizations is crucial but faces challenges such as legal barriers, privacy concerns, and organizational resistance.
    • Challenges include reluctance to share sensitive data due to legal uncertainties, concerns over reputational damage, and difficulties in defining common terms for information sharing. Organizations should create a common asset list, establish legal-focused working groups, and promote the sharing of behavioral attributes from past incidents.

    Program Structure, Policy, and Governance

    • Clear governance frameworks, leadership engagement, and continuous improvement are needed to ensure that insider risk management processes are consistent and adaptable.
    • Challenges include inconsistent executive support, resistance to change, and external pressures for compliance. Organizations should establish clear program frameworks with well-defined roles and responsibilities, collaborate across departments and with external partners, and secure leadership buy-in.

    Investigative Process, Procedure, Interventions, and Improvement

    • A well-structured investigative process is essential and requires clear guidelines for escalation, well-documented procedures, and transparent decision-making.
    • Challenges include inconsistent investigative processes, lack of clarity around when to escalate incidents, and balancing thoroughness with employee privacy concerns. Organizations should establish clear guidelines for escalation, provide regular training for investigators, and use centralized tracking systems.

    Regional and Cultural Nuances

    The report identifies some regional differences in how practitioners approach insider risk.

    • American practitioners emphasized ROI and advanced technologies.
    • Australian practitioners focused more on communication strategies, relationship-building, and aligning tools with organizational culture.

    Additional Insights from Surveyed Australian Practitioners

    • Negligence is viewed as the primary insider threat.
    • Continuous education and cross-departmental collaboration are foundational elements for improving insider risk programs.
    • A common misconception is that insider risk programs are punitive.

    Conclusion

    The report highlights the importance of:

    • Securing leadership engagement
    • Fostering cross-departmental collaboration
    • Balancing advanced technologies with human-centered approaches

    Organizations need to continuously refine their practices to stay ahead of evolving threats and bolster their defense against insider risks.

  • Staying Up-to-Date in the Cybersecurity Industry

    Staying current in cybersecurity is crucial to proactively mitigate risks, ensure compliance, and make informed decisions in today’s rapidly changing digital landscape. Here are some resources to help you stay up-to-date with cybersecurity:

    Feedly

    Feedly (RSS Aggregator) is a free website that will collect news from different sources and put them all together in one place. Here are some sites to add to feedly:

    TLDR

    Information Security News to Your Inbox. TLDR is a free service that sends you a recurring emails aggregating the news in various subjects for you. They have many different newsletters on various topics including information security.

    Sign Up

    SANS Cyber Security Summits

    SANS Free Virtual Conferences. SANS summits take place often on a variety of subjects including AI, DFIR, Cloud, Threat Intelligence, etc. It is free to attend the summits online and if you miss them you can watch the recording. They also count for CPE. Their slack is also a great place to learn from others.

    BrightTALK

    Free Virtual Talks. BrightTALKs bring the speakers to you. Search for any subject and attend live or recorded talks on any subject including many Cybersecurity ones. Every month the Verizon Threat Research Advisory Center gives an update. They are a great talk to attend.

    Verizon Business Page at BrightTALK

    Podcasts

    I’ve already compiled a list of podcast on this blog here is a link to that post.

    Books

    Here are some favorites of mine:

    • Hacker and the State by Ben Buchanan. Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age
    • Countdown to Zero Day by Kim Zetter. Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
    • Dark Wire by Joseph Cox. In 2018, a powerful app for secure communications called Anom took root among organized criminals. They believed Anom allowed them to conduct business in the shadows. Except for one thing: it was secretly run by the FBI.
    • This is How They Tell Me the World Ends by Nicole Perlroth. One of the most coveted tools in a spy’s arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).

    YouTube

    There are so many YouTube channels doing a great job getting information out there. This is not an exhaustive list, but they are some of my favorites!

    Other Networks

    Blueksy – Read more about bluesky on this prior post. Here are the info sec starter packs.

    LinkedIn – Here are some good folks to follow on LinkedIn.

    Mastodon – Federated messaging service a la Twitter/X, with large infosec group on the infosec.exchange server.

  • Weekly Cybersecurity Wrap-up 12/2/24

    Weekly Cybersecurity Wrap-up 12/2/24

    Each week I publish interesting articles and ways to improve your understanding of cybersecurity.

    Projects

    Videos

    Articles

    Podcasts

  • TryHackMe | Advent of Cyber 2024 – Day 4

    Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.

  • 2024 Phishing by Industry Benchmarking Report Summary

    2024 Phishing by Industry Benchmarking Report Summary

    This post will summarize the key findings from KnowBe4’s 2024 Phishing by Industry Benchmarking Report. This report highlights the continuing severity of phishing attacks and underscores the importance of robust security awareness training as a critical defense strategy.

    AI generated podcast, if you prefer to listen to this content:

    The report uses a metric known as the Phish-prone Percentage (PPP). This measures the percentage of employees within an organization who are susceptible to falling for phishing scams. A high PPP indicates a larger number of employees who are vulnerable to these attacks, thus indicating a greater risk of a potential breach. A low PPP demonstrates that the organization’s workforce has strong security awareness and can effectively identify and thwart phishing attempts.

    Key Findings of the Report

    • Untrained employees pose a significant security risk. The report found that, on average, 34.3% of untrained users across various industries and organizational sizes would likely fail a phishing test. This means approximately one-third of employees are prone to interacting with malicious content, potentially jeopardizing their organization’s security.
    • Consistent and comprehensive security awareness training leads to dramatic improvements. The report emphasizes that consistent security awareness training, combined with regular simulated phishing tests, can substantially reduce an organization’s PPP. Organizations that implement such training programs see their average PPP drop to 18.9% within 90 days, and to 4.6% after one year or more of training. This demonstrates a dramatic improvement in employee preparedness against phishing attacks.
    • Specific industries exhibit consistently high-risk levels. For the third consecutive year, several industries in the large organization category (1,000+ employees) had PPPs exceeding 40% even after baseline assessments: Banking (42.3%), Consulting (47%), Energy & Utilities (47.8%), Financial Services (41.6%), Healthcare & Pharmaceuticals (51.4%), Insurance (48.8%), and Retail & Wholesale (42.4%). The Healthcare & Pharmaceuticals industry was among the highest risk industries in all organization sizes. These sectors are often targeted due to their handling of sensitive data and the potential for disruption of critical services.
    • Investing in the human layer of security is crucial. The report stresses that organizations must go beyond mere compliance training and adopt a proactive, comprehensive security awareness strategy that includes:
      • Continuous education.
      • Regular testing and reinforcement.
      • Cultivating a security-conscious culture where employees understand the importance of safeguarding their digital environments both at work and in their personal lives.

    Recommendations for a Strong Security Posture

    The report concludes with recommendations for security leaders, emphasizing the following key aspects:

    • Defined Mandate: Establish and clearly communicate the purpose and goals of your security awareness program.
    • Policy Alignment: Ensure your program is in line with your organizational security policies.
    • Culture Integration: Actively connect your security awareness initiatives with your overall security culture to strengthen the human layer of defense.
    • Executive Support: Secure full support from executives for your security awareness program.

    To successfully implement these recommendations, security and risk management leaders can consider the following actions:

    • Fostering a Security Culture: Cultivate a workplace environment that prioritizes security, where employees are encouraged to be vigilant and report suspicious activity.
    • Strategic Hiring: Recruit individuals with a strong security mindset who can contribute to building a security-conscious culture.
    • “Culture Carrier” Program: Establish a program where designated employees act as security champions, promoting awareness and best practices within their teams.
    • Ongoing Simulated Phishing Tests: Conduct regular phishing simulations to reinforce training and assess employee preparedness.
    • Increased Frequency: Increase the frequency of training and testing to maintain security awareness as a top priority.
    • Leadership Role Modeling: Encourage executives and leaders to demonstrate a commitment to security best practices, setting a positive example for the organization.
    • Clearly Defined Objectives: Outline specific goals for your security awareness program and track progress toward achieving them.
    • Engaging Professionals: Consider partnering with experienced security awareness training providers to leverage their expertise and resources.
    • Effective Measurement: Implement metrics to track the effectiveness of your program, measuring key indicators like PPP reduction and employee engagement.
    • Marketing-Inspired Approach: Adopt a marketing mindset to create engaging and impactful security awareness campaigns that resonate with employees.
    • Employee Motivation: Motivate employees to actively participate in security awareness initiatives by recognizing and rewarding positive security behaviors.

    By implementing these steps, organizations can build a strong human firewall and empower their employees to play an active role in protecting their organization against the evolving threat landscape.

  • TryHackMe | Advent of Cyber 2024 – Day 3

    Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.

  • TryHackMe | Advent of Cyber 2024 – Day 2

    Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.

  • Weekly Cybersecurity Wrap-up 11/25/24

    Weekly Cybersecurity Wrap-up 11/25/24

    Each week I publish interesting articles and ways to improve your understanding of cybersecurity.

    Projects

    Videos

    Articles

    Podcasts

    SEI Podcasts: The Importance of Diversity in Cybersecurity: Carol Ware

    CISO Tradecraft #208 Insider Threat (with Shawanee Delaney)