Cyber Security Strategies
Cyber Security Strategies
The full report Cyber Security Strategies: Achieving cyber resilience is available from the ISF
website. It helps business leaders and information security professionals understand
the serious threat presented by cyberspace, and it provides practical guidance on the
organisational response needed to address this threat.
It does this by:
explaining cyberspace, cyber security, the nature of the cyber threat and the concept of
cyber resilience
describing the similarities and connections between cyber security and information
security
introducing the ISF Cyber Resilience Framework, a vision of organisational cyber resilience
outlining practical steps organisations can take to customise and implement the
framework
providing clarity that can be used to communicate the issue, challenges and plan to
stakeholders.
Input for the report was gathered from workshops and online meetings with ISF Members
around the world, interviews with ISF Member experts and other experts, Member case
studies, previous ISF research and reports including Information Security Governance and
Hacktivism, and thought leadership provided by the ISF Global Team.
The report is supported by an implementation and collaboration space on the ISF Member
website, which contains a facilitated forum for Members to discuss cyber-related issues
and solutions, along with a central pool of additional resources including an ISF Cyber
Resilience Framework Diagnostic Tool, webcast and presentations to help ISF Members
deal with this important challenge.
The ISF Cyber Security Strategies report is available free of charge to Members of the ISF.
Non-Members are able to purchase a copy of the report by contacting Steve Durbin at
[email protected].
About
Abou
Ab
outt th
ou
the
e IS
ISF
F
Founded in 1989, the Information Security Forum is an independent, not-for-profit
association of leading organisations from around the world. It is dedicated to
investigating, clarifying and resolving key issues in information security and developing
best practice methodologies, processes and solutions that meet the business needs of its
Members.
ISF Members benefit from harnessing and sharing in-depth knowledge and practical
experience drawn from within their organisations and developed through an extensive
research and work program.The ISF provides a confidential forum and framework,
which ensures that Members adopt leading-edge information security strategies and
solutions. And by working together, Members avoid the major expenditure required to
reach the same goals on their own.
Contacts
For more information on the ISFs Cyber Security Strategies report, please contact:
Michael de Crespigny
Tel: +44 (0)20 7213 1745
Fax: +44(0)20 7213 4813
Email: [email protected]
Web: www.securityforum.org
Disclaimer
This document has been published to provide general information only. It is not intended to provide advice of any kind. Neither the
Information Securityy Forum nor the Information Securityy Forum Limited accept
p anyy responsibility
p
y for the consequences
q
of anyy use
you make of the information contained in this document.
Reference: ISF 11 CSS Marketing Copyright 2011 Information Security Forum Limited.All rights reserved. Classification: Public, no restrictions
2010 was the year the Internet got scary. Get used to it.
Business leaders recognise the enormous benefits of cyberspace and know that cyberspace increases innovation,
collaboration, productivity, competitiveness and engagement with customers.Yet they are having difficulty determining
the risk versus the reward.
The benefits of cyberspace come with significant risks, and the threat of cyber attack is firmly at the top of the board
agenda. While organisations are exploiting the business benefits of cyberspace they may not realise that cyberspace
confers the same benefits to those who attack our organisations. Hacker groups, criminal organisations and espionage
units worldwide have access to powerful, evolving capabilities, which they use to identify, target, and attack. They even
have well-developed marketplaces for buying and selling the tools and expertise used to target and execute attacks.
We call this Malspace.
It is critical that organisations understand Malspace and the increased threat it poses. Organisations should develop a
business plan to exploit cyberspace that identifies threats, considers the limitations of IT and information security, and
develops cyber resilience.
Based on insights from the Information Security Forums global Membership and ISF Global Team, the ISF Cyber
Resilience Framework identifies the key capabilities that organisations should possess to increase their resilience to
the threats from cyberspace.
Cyberspace is critical to most organisations today; disconnecting is not an option. By implementing the ISF Cyber
Resilience Framework supported by the wide range of ISF tools and materials organisations can develop cyber
resilience and be better able to withstand impacts from evolving cyber threats. Only then can organisations safely
realise the benefits of cyberspace.
y
p
MALSPACE
Services
Routes of attack
Key players
Tools
D
A
T
A
L
O
S
S
Attack types
Reconnaissance
Disruption
Critical
Infrastructure
T
A
Personal
Devices
Extraction
of data
Organisations
Victims
Home
B Cyber situational
awareness
Th organisation
i ti should
h ld
The
have a process for gathering,
analysing and sharing of
cyber intelligence.
C Cyber resilience
assessment
The
Th organisation
i ti should
h ld hhave
a process for assessing and
adjusting their resilience to
the impacts from past,
present and future
cyberspace activity.
T
The
he benefits from cyberspace are immense, as are the risks
Organisations
must embrace uncertainty and develop cyber risk resilience
O
rg
rg
Malspace
is a global industry that has evolved to deliver cyber attacks
M
a
from cyber threats can have a very long and disproportionate risk tail
IImpacts
mp
Hacktivism
presents significant threats to the organisation, not just information security
H
ac
Cyber
C
yb security is more than information security
Cyberspace
vastly increases information security risk
C
yb
The
T
he complexity of cyberspace enables threats to combine quickly in unpredictable and
dangerous
ways
d
an
10
Itt iiss essential to collaborate to share intelligence and influence good practice across
ccyberspace
yb
Manipulation
New threats will appear overnight that cant be predicted or easily prevented. Traditional risk
management is insufficiently agile to deal with the potential impacts from activity in cyberspace.
Enterprise risk management must be extended to organisational risk and cyber resilience.
The ISF Cyber Resilience
Framework is a vision of
organisational resilience that
can be established to deal
with cyberspace threats
head-on building on
current information security
arrangements.
D Cyber responses
Th organisation
The
i ti should
h ld
effectively prevent, detect and
respond to cyber incidents
and minimise their impacts.
ACTIONS
1
Use the Cyber Security Strategies report to assess and determine the issues with senior
management and cyber stakeholders
Obtain support from senior management to consider the opportunities and address the
threats of cyberspace
Create a Cyber Resilience Group to lead, drive and coordinate all cyber resilience activities
Adapt the ISF Cyber Resilience Framework to your organisation and use it to create your
vision of cyber resilience; use the diagnostic tool to assess your current resilience, identify
gaps, and prioritise your plan
Implement your cyber resilience plan, using other ISF deliverables to assist
Partner and collaborate with others, including your supply chain and customers, to share
intelligence and influence adoption of good practice across cyberspace
Where next?
The full report Cyber Security Strategies: Achieving cyber resilience is available from the ISF
website. It helps business leaders and information security professionals understand
the serious threat presented by cyberspace, and it provides practical guidance on the
organisational response needed to address this threat.
It does this by:
explaining cyberspace, cyber security, the nature of the cyber threat and the concept of
cyber resilience
describing the similarities and connections between cyber security and information
security
introducing the ISF Cyber Resilience Framework, a vision of organisational cyber resilience
outlining practical steps organisations can take to customise and implement the
framework
providing clarity that can be used to communicate the issue, challenges and plan to
stakeholders.
Input for the report was gathered from workshops and online meetings with ISF Members
around the world, interviews with ISF Member experts and other experts, Member case
studies, previous ISF research and reports including Information Security Governance and
Hacktivism, and thought leadership provided by the ISF Global Team.
The report is supported by an implementation and collaboration space on the ISF Member
website, which contains a facilitated forum for Members to discuss cyber-related issues
and solutions, along with a central pool of additional resources including an ISF Cyber
Resilience Framework Diagnostic Tool, webcast and presentations to help ISF Members
deal with this important challenge.
The ISF Cyber Security Strategies report is available free of charge to Members of the ISF.
Non-Members are able to purchase a copy of the report by contacting Steve Durbin at
[email protected].
Contacts
For further information contact:
Steve Durbin
UK Tel: +44 (0)20 7213 1745
US Tel: +1 (347) 767 6772
Fax: +44(0)20 7213 4813
Email: [email protected]
Web: www.securityforum.org
Disclaimer
This document has been published to provide general information only. It is not intended to provide advice of any kind. Neither the
Information Security Forum nor the Information Security Forum Limited accept any responsibility for the consequences of any use
you make of the information contained in this document.
Reference: ISF 11 CSS Marketing Copyright 2011 Information Security Forum Limited.All rights reserved. Classification: Public, no restrictions
Business leaders recognise the enormous benefits of cyberspace and know that cyberspace increases innovation,
collaboration, productivity, competitiveness and engagement with customers.Yet they are having difficulty determining
the risk versus the reward.
The benefits of cyberspace come with significant risks, and the threat of cyber attack is firmly at the top of the board
agenda. While organisations are exploiting the business benefits of cyberspace they may not realise that cyberspace
confers the same benefits to those who attack our organisations. Hacker groups, criminal organisations and espionage
units worldwide have access to powerful, evolving capabilities, which they use to identify, target, and attack. They even
have well-developed marketplaces for buying and selling the tools and expertise used to target and execute attacks.
We call this Malspace.
It is critical that organisations understand Malspace and the increased threat it poses. Organisations should develop a
business plan to exploit cyberspace that identifies threats, considers the limitations of IT and information security, and
develops cyber resilience.
Based on insights from the Information Security Forums global Membership and ISF Global Team, the ISF Cyber
Resilience Framework identifies the key capabilities that organisations should possess to increase their resilience to
the threats from cyberspace.
Cyberspace is critical to most organisations today; disconnecting is not an option. By implementing the ISF Cyber
Resilience Framework supported by the wide range of ISF tools and materials organisations can develop cyber
resilience and be better able to withstand impacts from evolving cyber threats. Only then can organisations safely
realise the benefits of cyberspace.