Objective of Meeting
Summary
Outputs
Next Steps
Links
Sponsoring Forum(s)
Active Loss Prevention
Security
|
Meeting Report
Debriefing Meeting on Saving Private Data Workshop
held on
Tuesday 4th February 2003, 14.00-15.30
Objective of Meeting
This meeting was held immediately after the close of the Conference Plenary to ensure
as many of the cast were still at the Conference and so able to participate in a meeting
to capture feedback on the workshop itself, and to discuss and decide on future activities
that will leverage its outcomes, to meet the desires and expectations of the cast and
membership. The meeting was open to all Conference attendees, members and non-members. It
was co-ordinated by Ian Dobson.
Summary
Co-producer/director Jane Hill, and Walter Stahlecker, were unable to attend this
debriefing meeting. All other members of the cast were present, plus members of the
Security Forum and Active Loss Prevention Initiative who attended this Conference.
For a summary of the Saving Private Data Workshop itself, see the
report on the Conference Plenary.
All the cast said they had enjoyed doing the workshop, and the
feedback from all present was that it had been well received by the plenary audience, as
an original way to present the key issues involved in intrusion attacks, making important
points in an engaging and entertaining way. This was confirmed later in the week by a
report in the Friday closing Conference Reports-Back plenary, where Mike Lambert advised
that in the feedback forms, attendees scored the workshop as maximum 5 out of 5 except for
one person who gave it 4 out of 5.
Ian Dobson noted that The Open Group made a complete video recording
of the whole Workshop, including the question& answer sessions at the end of Act I on
Monday PM and Act II on Tuesday AM. In discussions with Jane Hill and and Bob Blakley
before this Conference, and with the support of the cast, it had been agreed that we
should produce a White Paper and Video as an initial report on the workshop, and this
should be available to all members as tutorial/training package and a basis for future
projects.
In ensuing discussion, we captured the following issues, which we
categorized as either required material for inclusion in the White Paper, or as points to
be reviewed as possible future project work once the White Paper and Video package is
available.
Produce a White Paper and Video Package based on the content of the
play. The White Paper will use the script as its core,
with annotated comments on the technical, legal and administrative/process issues that it
raises, including a list of issues on how each party could have done their analysis
better. After review of the initial draft by Bob Blakley
and Jane Hill, it will be offered to members of the Security Forum and ALPI for review
comments prior to publication.
Produce an IT Manager's check list of issues they should consider
a tick-list of key items to verify are in place in an acceptable intrusion response
plan, for inclusion in the White Paper.
Are there other scenarios that could explore, for example, a DOS
attack. This for consideration as future project when the
White Paper is published.
Bring out the perspective of Audit, Legal, Human Resources,
Executive Management, IT security, Line of Business executive, Insurer, Risk Management.
This to be reviewed as possible future project when the White Paper is published.
Lessons learned can this be turned into a guide? Possible
future project.
Integrated incident management do we want to produce a Guide
on this? Possible future project.
Gap analysis on the collaboration & communication between
communities in an IT-dependent organization, as an example of how to understand your risks
before you hit a problem. Possibly include in White Paper, otherwise consider as possible
future extension.
How do security incidents differ from other natural
disasters? What differences in response are
required? Are the liability issues different
for a natural disaster? Is a single integrated response and recovery plan possible?
The business drivers in a government and military environment are
different to those in a enterprise environment. Government bodies are more concerned with
the reputational issues and data integrity than the financial impact of an intrusion
attack. We should extend our understanding to include at least a government perspective.
The best way to do this is to play out relevant scenarios. This to be considered as
possible future project.
In the Saving Private Data workshop, all the decision-making people
needed for the incident response were immediately available and present in the company
when the incident occurred. This is unlikely
to happen in real life. We should include this situation in the White Paper, as one
significant way in which crisis management plans can make invalid assumptions.
How do IT systems breakdown under stress? Look at FEMA and other guidelines on what should
be considered and how problems of this nature can be avoided. Possible future
project.
Show a balance between incident response versus incident
investigation. This differentiation to be brought out in the White Paper.
How do you get good information during an incident? Are sensors available? How should you respond? It was
noted that a person's voice pattern changes under stressful conditions, so voice
recognition mechanisms should be avoided in incident response processes. Possible future
project.
We should assemble a bibliography there is a wealth of
publications available on this subject, though much of it is theoretical or detailed. We
should include in the White Paper a list of recommended references for security policy,
incident response, capturing evidence, etc.
Can we identify national differences - law, culture, etc? This
issue should at minimum be included in the White Paper.
Identify the role of a Security Audit, both as separate proving
exercises when validating intrusion response plans, and as part of formal company annual
audits. This issue should be brought out in the White Paper.
Outputs
Three main outputs were decisions to undertake the following actions:
Produce a Saving Private Data White Paper based on the content of
the play and incorporating the feedback captured in the debriefing comments in the Summary
above, calling on inputs from individuals as required.
Action:
Ian Dobson to produce 1st draft
Jane/Bob to review 1st draft
All to review final draft.
Produce a Saving Private Data video (on DVD), edited appropriately
to accompany the White Paper.
Action: Adam Cargill in association with Ian Dobson
Review the Saving Private Data Package of White Paper plus DVD, and
assess priorities for possible future projects in the Active Loss prevention Initiative
and in the Security Forum to leverage its value - including considering the possibilities
identified in the above Summary.
Next Steps
The Saving Private Data White Paper and DVD package will be produced and made available
by the end of February 2003.
Ian Lloyd and Ian Dobson will then co-ordinate respective ALPI and Security Forum
member reviews to arrive by mid-April 2003 at agreed priorities for defining and
delivering future projects deriving from this Intrusion Attack & Response workshop.
Links
The Web page at http://www.opengroup.org/projects/intack
provides links to all the Saving Private Data workshop materials.
|