iFinance CSIRT Create A Cybersecurity Incident Response Team Case Study

User Generated

ounxng

Writing

Description

Here is the iFinance CSIRT Case Study This document includes background information, the case itself, guidelines for the write-up, and the rubric that will be used to evaluate your write-up

Unformatted Attachment Preview

CASE: Create A Cybersecurity Incident Response Team Cybersecurity events can happen at any time. Notable historic security events show the shortening cycle of threats: the Melissa virus, which took several days to spread; the "Love Letter" worm, which became rampant in just a day; and the Nimda worm, which wreaked havoc in just hours. These incidents show that little time is needed to infect systems around the world, and a company must therefore have the capability to respond quickly to prevent major losses and interruptions in service. http://video.cnbc.com/gallery/?video=3000469792 "Every minute, we are seeing about half a million attack attempts that are happening in cyber space." -Derek Manky, Fortinet global security strategist For regulated businesses such as banking and health care, governments are enacting laws that require businesses to provide mechanisms for protecting consumer data and privacy. And those mechanisms can’t come quickly enough, according to security experts such as Mansky: Watch: http://video.cnbc.com/gallery/?video=3000469792 Because of rapid changes in security threats, even huge capital expenditures for hardware and software design for the security of your network will only help reduce, but not eliminate, the risks associated with a security event. A well-organized CSIRT is one of the components of an organization’s strategy, and it is a component that needs to be embedded and embraced at all levels of the organization. So what happens when the organization is breached? Every incident yields a cost for the organization. If caught early, the cost can be minimal. However, if an incident occurs and there is no clear plan and a good team to execute the plan, the costs associated with a breach can climb (for example, https://www.washingtonpost.com/news/onleadership/wp/2014/01/13/target-ceo-opens-up-about-databreach/?utm_term=.9ae38512b926) As we read earlier, a good cybersecurity plan does not attempt to catch EVERY intrusion, but instead strategically focuses on: “identifying and protecting the company’s strategically important cyber assets and figuring out in advance how to mitigate damage when attacks occur.” (https://hbr.org/2016/10/good-cybersecurity-doesnt-try-to-preventevery-attack) It is a simple fact that the number of computer and software vulnerabilities is growing and the sophistication of attacks is increasing. Organizations need to develop a comprehensive plan to secure sensitive information and ensure the survivability of their critical infrastructure. Case adapted from: https://www.cert.org/incident-management/publications/case-studies/afi-casestudy.cfm Case Background iFinance is one of the largest banks in the country with a national network of branches, products and services that span the entire financial range—from traditional consumer banking and investment services to insurance and corporate investment banking. iFinance was formed during the three decades ago through acquisitions of regional banks in the West and Midwest. Those banks had grown from the mergers of numerous smaller banks resulting in the acquisition or merger of dozens of banks. iFinance has billions in assets and operates 2,225 banking offices in 25 states, over 4000 ATMs, and provides online banking and mobile banking apps to both business and personal customers. The bank employs 25,000 tellers, staff, and management. A problem facing iFinance is that, due to these mergers and acquisitions, each of its business units has its own legacy networks and vision of how security measures would be implemented to protect its resources. As iFinance has acquired more companies and increased the number of service offerings, it has become more critical that a standard set of repeatable processes be put in place to deal with security incidents. iFinance's approach to security must be carefully coordinated across all business units to provide a coordinated, consistent, repeatable process. The top executives of iFinance recognize that, to be successful in the financial industry, they must have a clear understanding of its security risks and be able to identify solutions to eliminate or minimize any potential threats to the organization. To get started, this fall iFinance published and distributed its security architecture plan for infrastructure security on its internal website. This activity helped iFinance articulate a starting direction for its information security needs. Your Role You are a newly-hired Information Security Manager that started a few months ago. You have noticed that security incidents are occurring, and although these incidents are being addressed, they were being handled inconsistently across the iFinance organization. You recognize that a consistent incident response system needs to be implemented. Case adapted from: https://www.cert.org/incident-management/publications/case-studies/afi-casestudy.cfm Guidelines: Part 1: Submit your individual write up on the last day of the intersession (in the Inter-session Activities Assignment Area of the Bb course), prior to arriving in class. • • • Use a minimum of 3 scholarly references from peer-reviewed, academic journals (must be accessed through Ottawa’s online library), and include supporting materials and references from your web-based research of the selected organization. Your paper and all citations/references should be in APA format. The Purdue OWL website is an excellent resource for APA formatting and reference examples: https://owl.english.purdue.edu/owl/resource/560/05/ You should include the following sections in your paper: o o o o o o o o o o Mission and vision statement for the CSIRT Identify key stakeholders that the CSIRT will serve, and how you will Determine the scope and levels of service the CSIRT would provide Staffing Recommendations – identifying and procuring personnel, equipment, and infrastructure requirements for the CSIRT ▪ Identify and utilize existing information security technical staff and resources to support the CSIRT activities (when needed) ▪ Identify any needed external resources needed Develop what you believe are the top 5 key CSIRT policies and procedures (based on best practices and everything you have reviewed and learned in this course, and any additional resources needed) that should guide all other policies and processes, given iFinance’s industry, size, structure, etc. Define the CSIRT reporting structure, authority, and organizational model to ensure that the team has the access, funding, and a clear mandate Estimate the amount of additional funding needed to implement and maintain the CSIRT Communications plan to make security a priority for iFinance’s many employees in offices distributed throughout 25 states Establish a proposed timeline for implementing the CSIRT Conduct research to establish ROI ▪ Find examples of cybersecurity incidents in similar organizations ▪ To identify the total cost of an incident, consider the direct costs of manpower, equipment, and lost production time, and also other indirect costs, such as the potential cost of lost business and damage to the company's reputation and brand image. Case adapted from: https://www.cert.org/incident-management/publications/case-studies/afi-casestudy.cfm Part 1 - Case Study Write-up Rubric: 200 points total: 15 points -- 3 scholarly, peer-reviewed references 10 points – APA formatting throughout the paper 10 points – Mission & Vision Statement 10 points – Key Stakeholders 10 points – Scope of Services 10 points – Staffing Recommendations 10 points – CSIRT Organizational Structure/Reporting 50 points – Key Policies/Best Practices 15 points – Funding Request/Estimate 25 points – Communication Strategy 10 points – Proposed Timeline 25 points – ROI research/rationale Part 2 (This will occur during your Day 3 session) Armed with support from key stakeholders, knowledge of best practices currently being used in incident management, an understanding of the current and potential threats to iFinance, and a vision and plan for implementing a CSIRT, it is now time to make the business case to the Chief Technology Officer (CTO), Chief Operations Officer (COO), and the Chief Legal Counsel to finalize plans for funding and staffing an operational CSIRT. You should present a well-researched, compelling rationale that includes existing/pending government regulations, the costs of attacks (direct and indirect costs), and a proposed timeline, budget, and organizational structure for the CSIRT and how it fits into the organization. Your team will be given time to discuss each other’ write ups, and you can mash up the best aspects of your write ups into one team framework. Your team will then present your CSIRT proposal. Remember, communication and internal buy-in is key to your role as managers and executives on all projects. You are not merely presenting facts, you are “selling” your proposal in a persuasive presentation. Guidelines/Rubric 50 points • Your presentation should be 10 minutes in length, including a clear introduction and conclusion, which clear supporting arguments. • Be free from grammar and spelling errors, and avoid too much text per slide • Slides include compelling and professional graphics. • The presentation is persuasive, presenting a clear need for the CSIRT, a welldeveloped rationale for the team’s proposal as a solution to the need Case adapted from: https://www.cert.org/incident-management/publications/case-studies/afi-casestudy.cfm • Every member of the team should present in a balanced and well-coordinated presentation, and prepare for up to 10 minutes of Q&A by your classmates Case adapted from: https://www.cert.org/incident-management/publications/case-studies/afi-casestudy.cfm
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: CREATING A CSIRT FOR IFINANCE

Creating a CSIRT for Ifinance
Student’s Name
Institutional Affiliation

1

CREATING A CSIRT FOR IFINANCE

2

CSIRT is a team, which is committed to offering security to information and comprises
of a specialist who gives feedback to information security incidences and threats. According to
Grobler & Bryk (2010), the computer security incidence response team has been crucial for
detecting and mitigating the effects that the security threats can lead to the company. Cybercrime
and computer threats tend to be very complex in such a way that dealing with them is the most
important and challenging case in the departments of IT. However, in order for me to create
CSIRT team that is effective, I will require knowing the type of CSIRT that I need for the
company for it serving well, the service type that the finance provides, CSIRT size, and the
location of CSIRT. This way, the team requires knowing the expense of setting it up and the
procedure, which needs to be put into consideration for creating the CSIRT.
When computer threats occur in a company, the response team requires to be in a place
where it can be handling them before they reach an uncontrollable point. To attain this goal, the
CSIRT have a mission and a vision where they operate within the guideline for meeting the
requirements in the company. The CSIRT vision will be “to be a trusted contact, which
establishes a clean, safe, and reliable cyber security to finance.” On the other hand, the mission
will be “to build a security threat resolution for increasing competence in the firm and the
finance sector.”
Based on the main stakeholders that the CSIRT will serve, a stakeholder can be any
person who is much interested in the success of the CSIRT team and their mission. Their CSIRT
could be those who report the problem to the team; individuals who receive assistance from
CSIRT offer sponsorship or funding to the team. Apart from the positive side, they can as well
be individuals who tamper with the information through sharing it with other people and temper
with how the data is organized and information handling by the organization.

CREATING A CSIRT FOR IFINANCE

3

CSIRT will offer services at various levels in the finance organization. The services
involve, monitoring the incident levels at every level in the organization, providing early alerts of
warning and announcements, disseminating the information to the stakeholders regarding the
security problems, they will as well give a response to the incidences, providing incidence
analysis of data and participating in the network of CSIRT. During the period of creating a
CSIRT, an individual requires a set of highly trained personnel who can take care of the
incidences of all ...

Related Tags