top hr cybersecurity strategies rev10 · touchid, faceidand pin login for mobile • introduction...

24
© bswift LLC. 1 Top Strategies for Managing HR Cybersecurity Risk Webinar January 23, 2019

Upload: others

Post on 10-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 1

TopStrategiesforManagingHRCybersecurityRisk

WebinarJanuary23,2019

Page 2: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 2

Today’sPanelEdRumzisChiefTechnologyOfficeratbswift

ImanJoshuaCISOofConsumerHealth&ServicesDivisionatAetna,aCVSHealthCompany

TimTompkinsExecutiveDirectorofSecurityInnovationandChiefSecurityAdvisoratAetna,aCVSHealthCompany

Page 3: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 3

Currentrisksandtrendsindataandinformationsecurity

Bestpracticesfordefendingagainstsecuritythreats

NextGenerationSecurityandauthenticationmodels

Q&A

Whatwe’lldiscusstoday

Page 4: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 4©bswiftLLC. 4

“Youaremorelikelytoexperienceadatabreachofatleast

10,000records(28%1)thancatchthefluthiswinter(5-20%2)”

1 2018IBMSecurityandPonemon InstituteCostofDataSecurityBreachStudy2 WebMDhttps://www.webmd.com/cold-and-flu/flu-statistics

Page 5: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 5©bswiftLLC. 5

59%ofcompaniessurveyedin2018experiencedadatabreachwithinthelast12months

causedbyathirdpartyorvendor.1

1 2018Ponemon InstituteThirdPartyRiskintheOutsourcedEcosystem.

Page 6: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 6©bswiftLLC. 6

Whatarethecybersecuritychallengeswefacetoday?

Greatersysteminterconnectivity

Evolvingsecuritythreats

Databreaches

Page 7: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 7©bswiftLLC. 7

8BestPracticesFOR RA IS ING THE BAR

Page 8: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 8

Changingclassificationfrom“Confidential”to“Restricteddata”

• SocialSecuritynumbers

• Creditcardinformation

• Usernameand/orpasswordcredentials

Tighterdatarestriction

Page 9: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 9

• BuildingSecurityInMaturityModel(BSIMM)Framework

• Includecontrolsindevelopmentprocess

• Continuallytest

Advancedsoftwaresecurity

Page 10: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 10

Domain-BasedMessageAuthentication,ReportingandConformance(DMARC)

• AtrustedprogramthathelpsInternetserviceprovidersblockfraudulentemailslikespam,phishingandspoofingemails.

Over12 million fraudulentemails

Tougheremailauthentication

attemptingtoimpersonateusandouraffiliateswererejected/quarantinedin2017.1

12018Aetna,Inc.

Page 11: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 11

Moreisbetter:

• Encryption

• Anti-tamperprotection

• Authenticationandauthorization

• Mobileappsigning,andothers

Securingdevices

Page 12: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 12

ThreeT’s

• Talent

• Tools

• Technique

Communicate&educate

Page 13: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 13

Continuousriskanalysis

Increasethepace

• FormalAudits/Reviews

• 99%SecurityScorecard1

• BugBountyPrograms

• ModelDriven

• ArtificialIntelligence/MachineLearning

1ThirdpartyanalysisofbenefitsadministrationtechnologysecurityconductedbySecurityScorecard01/2019.Resultsaresubjecttochange.

Page 14: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 14

52%ofwebtrafficcomesfrom

• Webapplicationfirewalls

• Automatedbotdefenses

• Restrictednetworkaccesstoauthorizedusersonly

• NextGenerationAuthentication

Strongerauthentication

automatedprocessestryingtogetpastcorporatenetworkdefenses.1

1 LaFrance,Adrienne.TheInternetismostlybots.TheAtlantic.January31,2017.

Page 15: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 15

Cybercrimeisevolving

• Targeted,complicatedandlong-termthreats

• Establishnetworkswithotherstoidentifyemergingtrends

• ParticipateinInformationSharingandAnalysisCenters(ISAC)groups

Establishanetwork

Page 16: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 16

NextGenerationAuthentication

(NGA)

Page 17: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 17

Goodbyepasswords

Morethan

3 billionuserIDsandpasswordswerestolenin20162

81%ofhackingrelated

breachesleveragedstolenorweakpasswords1

1 2017Verizon DBIRReport;IdentityTheftResourceCenter(ITRC)andCyberScout.2 2017ShapeSecurityCredentialSpillReport

Page 18: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 18

NEXTGENERATIONAUTHENTICATION

Transparentlyandcontinuouslyauthenticatethedeviceanduser

AttributeAuthentication

ContextualAuthentication(ex.geolocation)

Risk-basedConsumer

Authentication

FIDO(FastIdentityOnline)Standardshelpassurethatsensitiveinformationdoesn’tleaveyourdevice

BiometricIntegration

Mobile

• PrimaryLogin–TouchID,FaceID

• SecondaryLogin- PIN• Associateusers

andtheirdevices

DeviceBinding

Browserandsystemfingerprinting

Web

Page 19: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 19

NEXTGENERATIONAUTHENTICATION

bswift:Anevolutionfrombinarytorisk-basedauthentication

• Usernameandpasswordlogin

Today

• TouchID,FaceID andPINloginformobile

• Introductionofrisk-basedauthenticationviaNGARiskEngine

• Enhancedsecuritycapabilitiesformobile

• Out-of-bandauthenticationforhighriskidentity&accounttransactions

• Feb2019

bswiftMobile bswiftWeb

• Browser&DeviceFingerprinting

• Introductionofrisk-basedauthenticationviaNGARiskEngine

• Out-of-bandauthentication(SMS,Email)forhighrisktransactions– ForgotPassword– Loginfromnewsystem

• AccountManager&GlobalIdentity

• Feb2019

Page 20: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 20

NEXTGENERATIONAUTHENTICATION

What’snext?

De-centralizedAuthenticationFramework

(Reducesapplicationintegrationbarriers)

Password-lessWebAuthentication

Self-serviceIdentity&Registration

ManagementforConsumers

AchievedthroughtheNGAplatform&NGARiskEngine

Omni-channelrisk-basedauthentication&identificationcapabilitiesacrossallpointsofconsumerinteraction

NGAVoice

PassiveAuthentication• Voicebiometrics• Device/connectionattributes

H-ISACPortableIDIntegration

Page 21: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 21©bswiftLLC. 21

Questions?

Page 23: Top HR Cybersecurity Strategies Rev10 · TouchID, FaceIDand PIN login for mobile • Introduction of risk-based authentication via NGA Risk Engine • Enhanced security capabilities

©bswiftLLC. 23

ContactyourbswiftorAetnarepresentativetoday!

OrcheckouttheIndustryInsights sectionofbswift.comforadditionalresourcesandinformation.

Wanttolearnmoreabouthowbswift keepsyourdatasafe?