How not to panic in an IT security crisis
Every breach of your network or denial of service attack is serious, but itโs not necessarily a crisis.
A crisis is Sony Entertainmentโs servers being wiped. A crisis is Ashley Madisonโs membership being exposed.
And sooner or later, warns Chris Williams, chief cybersecurity architect of Virginia-based systems integrator Leidos Holdings, IT leaders in every organization will face a heightened security situation.
When that happens, he told infosec pros Wednesday in Toronto at the SC Congress conference, theyโd better be prepared โ and prepared to keep calm.
โUntil we embrace the new paradigms of cybersecurity, this (a crisis) is probably going to be a future trend.โ
The co-author of the textbook Disaster recovery plans meet insurance policies
Meanwhile getting good status reports will be difficult, in part becasue no one knows whatโs important. Expect middle managers to ask for irrelevant information like how many servers are back up. โOne of the challenges youโre going to have a subordinate level is reading between the lines of what is management trying to accomplish,โ he said.
Among his pieces of advice:
โWhen you think youโre over your head, the scope is more than you can handle in a day or it will cost a lot to recover thatโs point to make a preliminary report to senior management. It should include what you know, what you donโt know, what is understood about the attacker, what will be required to stabilize the situation, what required to resolve the situation, what help should be called in immediately to start the responseโ
โfigure out what management needs to know. It will help to make a chart that says what ITโs goals/milestones for recovery are and how far you are right now in achieving it;
โif you have to quickly write an RFP to hire a third party for help and are unprepared, donโt be afraid to ask them for help on the terms. A good contractor will understand your situation and say, โHereโs what you should be asking of me.โ Better that than a poorly drafted RFP;
โmoney is your friend โ in fact it may be the only resource that is easily obtained. Money can buy resources, expertise, free up your staff, buy service to get business restored;
โtake care of your people. (In fact, he says, if possible use HR or other staff while they wait for their systems to come back online.) Theyโll need backup relief, food, daycare, dry cleaning. Make sure they donโt burn out, so establish work schedules and enforce them;
โ-there will be a tension between security and IT that has to be managed. IT wants everything up. Security wants everything locked down. Manage this by โmaximum allowable riskโ doing things โquick and dirtyโ and then build from that to getting back to full operating capacity.
There are five factors in crisis operations, he said: Plan (you have to have a plan to get an organization to do something, otherwise youโll be paralized); Process (need processes for co-ordination and communication. Perhaps a war room). Prioritization (you canโt do everything at once. What goes up first: Operations, infrastructure, contingency systems, communications?) Parallelism (put all available resources to productive work); Sequencing (have to get the network up before the virtual machines).
In an interview Williams said the worse mistake organizations make in a crisis is not bringing in help. โThey chose not to get help either because they donโt know exactly what they need or subordinates are scared to ask because they know it will cost money or will take work.โ Instead they try to work through the crisis, miss goals and the recovery falters.
But he also said the CEO, CIO and CISO have to work together to keep business, IT and security recovery risks balanced. A good compromise, he added, is when all three are equally dissatisfied with how the recovery is going, because itโs likely the three areas are balanced.
Above all, he said, โThink about crisis planning now, before itโs a crisis.โ
Related Download
Sponsor: F5
The present and future of application protection
This white paper looks at how security measures must be enhanced to ensure apps are secured everywhere, the investments organizations must make, and why security needs to be more focused at the application level.
Register Now