22.12.2012 Views

The 2011 (ISC)2 Security Congress

The 2011 (ISC)2 Security Congress

The 2011 (ISC)2 Security Congress

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ISSUE NUMBER 16<br />

An (<strong>ISC</strong>) 2 Digital Publication<br />

www.isc2.org<br />

BIG DATA<br />

FORENSICS:<br />

What’s in a Tool?<br />

Incident response and<br />

data recovery require a<br />

solid plan, the right people,<br />

and specifi c tools.


Annual<br />

SECURITY CONGRESS<br />

2 0 1 2<br />

DRIVING SECURITY’S FUTURE<br />

Where Traditional and Logical <strong>Security</strong> Meet<br />

What You Can Expect:<br />

• 200+ conference sessions available throughout 25 education tracks<br />

• Keynote speakers (<strong>2011</strong> included Jeb Bush, Vicente Fox, Janet Napolitano and Burt Rutan)<br />

• Exclusive (<strong>ISC</strong>) 2 Town Hall and Member Reception<br />

• A fun evening out for the President’s Reception<br />

• Free 1/2 day credential clinics for CISSP ® , CSSLP ® , CAP ® and SSCP ®<br />

• 2-day Intensive Education Programs<br />

• Foundation Fundraising Event – watch for more details<br />

Look for a call for speakers in December and registration opening in January.<br />

SAVE THE DATE<br />

(<strong>ISC</strong>) 2 <strong>Security</strong> <strong>Congress</strong> 2012<br />

September 10-13, 2012 • Philadelphia, PA<br />

www.isc2.org/congress2012<br />

Collocated with ASIS 2012 58th Annual Seminar and Exhibits


COVER PHOTO BY CHRISTOPHER J. MORRIS/CORBIS; ABOVE PHOTO BY TIM FLACH<br />

16<br />

[ features ]<br />

8 Big Data Forensics: All<br />

data recovery tools are<br />

not created equal.<br />

Incident response and data<br />

recovery require a solid plan, the<br />

right people, and speci� c tools.<br />

BY PETER FRETTY<br />

12 Disaster Recovery Reality Check:<br />

Are You Sure You’re Ready?<br />

Disaster preparedness saves time<br />

and money if the right skills and<br />

plans are in place—and current.<br />

BY CRYSTAL BEDELL<br />

16 Delegation Done Right<br />

Relinquishing control may be<br />

di� cult at � rst, but the bene� ts for<br />

management, sta� and the overall<br />

company can be worthwhile.<br />

BY COLLEEN FRYE<br />

issue 16<br />

<strong>2011</strong> VOLUME 4<br />

[ also inside ]<br />

3 (<strong>ISC</strong>) 2 Makes a Strong Push<br />

Executive Letter From the desk of (<strong>ISC</strong>) 2 ’s<br />

Diana-Lynn Contesti.<br />

4 Moderator’s Corner<br />

Views and Reviews Highlights from (<strong>ISC</strong>) 2 ’s<br />

event moderator.<br />

6 FYI<br />

Member News Read up on what (<strong>ISC</strong>) 2 members<br />

worldwide and the organization itself are doing.<br />

18 <strong>The</strong> (<strong>ISC</strong>) 2 Safe and Secure Online program<br />

(<strong>ISC</strong>) 2 Foundation Call for volunteers.<br />

20 Spreading Cyber Safety To All<br />

Q&A Principal and an (<strong>ISC</strong>) 2 board member David Melnick<br />

discusses Safe and Secure Online outreach in his community.<br />

21 Chapter Passport<br />

A step-by-step guide to building your own local<br />

community of information security professionals.<br />

22 (<strong>ISC</strong>) 2 Professional Associations and<br />

Organizations Resource Guide<br />

Info<strong>Security</strong> Professional is published by IDG Enterprise Custom Solutions Group, 492 Old Connecticut Path, Framingham, MA 01701 (phone: 508 935-4796). <strong>The</strong> information contained in this publication<br />

represents the views and opinions of the respective authors and may not represent the views and opinions of (<strong>ISC</strong>) 2 on the issues discussed as of the date of publication. No part of this document may be<br />

reproduced, stored in or introduced into a retrieval system, or transmitted in any form by any means (electronic, mechanical, photocopying, recording or otherwise), or for any purpose, without the express written<br />

permission of (<strong>ISC</strong>) 2 . (<strong>ISC</strong>) 2 , the (<strong>ISC</strong>) 2 digital logo and all other (<strong>ISC</strong>) 2 product, service or certifi cation names are registered marks or trademarks of the International Information Systems <strong>Security</strong> Certifi cation<br />

Consortium, Incorporated, in the United States and/or other countries. <strong>The</strong> names of actual companies and products mentioned herein may be the trademarks of their respective owners. For subscription<br />

information or to change your address, please visit www.isc2.org. To order additional copies or obtain permission to reprint materials, please email infosecproeditor@isc2.org. To request advertising information,<br />

please email tgaron@isc2.org. © <strong>2011</strong> (<strong>ISC</strong>) 2 Incorporated. All rights reserved.<br />

ISSUE NUMBER 16 INFOSECURITY PROFESSIONAL 1


Malware Data From Over<br />

600 Million Systems Worldwide<br />

ONE SECURITY REPORT<br />

<strong>The</strong> <strong>Security</strong> Intelligence Report (SIR) is an analysis of the current threat landscape<br />

based on data from internet services and over 600 million systems worldwide to<br />

help you protect your organization, software, and people.<br />

View the <strong>Security</strong> Intelligence Report at www.microsoft.com/SIR<br />

| <strong>Security</strong> Intelligence Report


executive letter<br />

from the deSk of (<strong>ISC</strong>) 2 'S ChaIrperSon<br />

Calling All Members:<br />

Shape the Next Generation<br />

(<strong>ISC</strong>) 2 provIdeS multIple opportunItIeS for memberS to<br />

InCreaSe theIr knowledge, work wIth peerS and Support<br />

the next generatIon of profeSSIonalS.<br />

As <strong>2011</strong> comes to A close, so<br />

does my role as an (Isc)² Board<br />

member. I began working with (Isc)²<br />

as an exam item writing volunteer in<br />

1998, after which time, I served on<br />

a number of committees and finally,<br />

the Board of Directors.<br />

Being involved with this organization<br />

has been a highly rewarding<br />

experience for me, both personally<br />

and professionally. During my tenure,<br />

I have met very knowledgeable people<br />

who have helped me grow. I’ve seen what once used<br />

to be an unrecognized profession become one of the<br />

most in-demand career fields of the day, thanks in<br />

large part to the passion, volunteerism and innovations<br />

of (Isc)² members.<br />

With the need for qualified information security<br />

professionals at an all-time high, I challenge everyone<br />

to put your passion for our profession to work.<br />

It’s critical not only for our growth as professionals,<br />

but it’s essential to the future of society and our industry.<br />

In a recent blog, I shared the many volunteer<br />

avenues that are available to (Isc)² members. You<br />

just have to find the one(s) that best suit your interests<br />

and availability.<br />

A few months ago, we expanded our scholarship<br />

program to offer Us$140,000 — more than ever<br />

before — and introduced programs for women and<br />

undergraduate students.<br />

We formed the new (Isc)² Foundation earlier this<br />

year to sustain goodwill initiatives like the scholarship<br />

program to help fill the pipeline of information<br />

security professionals. (Isc)² members can play a<br />

critical role here, either by making a financial donation<br />

to the Foundation or volunteering their time to<br />

the safe and secure online program, which is a pub-<br />

lic service that places our members<br />

in schools to teach kids how to protect<br />

themselves online. to date, the<br />

program has reached nearly 70,000<br />

children worldwide, and the demand<br />

from schools is growing daily. If you<br />

have a passion for teaching and information<br />

security, We NeeD YoU!<br />

You can sign up here: https://cyber<br />

exchange.isc2.org/safe-secure.aspx.<br />

Another way members are<br />

changing the profession is through<br />

the (Isc)² chapter program. (Isc)² chapters provide<br />

you with a great chance to build your local<br />

network, connect with your peers to share knowledge,<br />

exchange resources, collaborate on projects,<br />

and earn cPe credits. communities like these are<br />

critical to support the current and future generation<br />

of professionals.<br />

Finally, we will soon be introducing an online<br />

resource for consumers and information security<br />

professionals around the globe. called (Isc)² security<br />

central, this portal will be a one-stop shop for a wide<br />

range of security assets tagged and contributed by<br />

(Isc)² members and anyone else who has a resource<br />

to share. Watch for details in the coming months.<br />

(Isc)² members, as the pre-eminent cyber security<br />

experts in the world, you have the opportunity to<br />

continue to shape this dynamic career field. You have<br />

made it what it is today. You can make a difference,<br />

and (Isc)² is here to help you do that. You will find<br />

more rewards than you ever imagined possible.<br />

sincerely,<br />

Diana-lynn contesti<br />

cIssP-IssAP, IssmP, csslP, sscP<br />

chair, (Isc)² Board of Directors<br />

ISSue number 16 INFosecUrItY ProFessIoNAl 3


moderator’s corner<br />

vIews ANd revIews From (IsC) 2 's eveNT moderATor<br />

Retrospective: <strong>The</strong> <strong>2011</strong><br />

(<strong>ISC</strong>) 2 <strong>Security</strong> <strong>Congress</strong><br />

SePtember marked the fIrSt (ISc) 2 <strong>Security</strong> congress,<br />

which kicked off in orlando, fla., u.S., in conjunction<br />

with the 57th annual aSIS International conference & exhibits.<br />

It was a big hit. for those of you not involved in physical security,<br />

aSIS is the premier professional association for this discipline,<br />

and their annual event rivals the rSa show for sheer number of<br />

security pros under one roof.<br />

<strong>The</strong> partnership between aSIS and (ISc) 2 enabled attendees<br />

from both events to float between sessions on both sides of<br />

the security universe. This created some very interesting discussions<br />

in all of the sessions I either attended or moderated—<br />

and were possibly upstaged by the hallway conversations generated<br />

by bringing these two groups of risk management practitioners together.<br />

While we have all talked about the possibility of a convergence between physical<br />

and information security, this event showcased some of the best interaction I have<br />

seen to date between these two groups, and sparked a number of conversations<br />

that are still going on in the coming months after the event has concluded.<br />

one of the most telling details of the cross-pollination we witnessed was when<br />

I asked for a show of hands from the aSIS members in the room during (ISc) 2 ’s<br />

sessions. more often than not, aSIS members accounted for 50 percent or more<br />

of the attendees in the room. maybe that explains why we had to keep bringing in<br />

chairs to standing-room only sessions.<br />

<strong>The</strong> best part for me was having discussions with many of my heroes in the<br />

security industry, talking and listening to people whose opinions I have read for<br />

years, and having the opportunity to discuss their opinions in meaningful ways.<br />

It seemed that anything mobile or cloud-related drew the largest crowds,<br />

indicating that these topics are still hot throughout the community. Sessions on<br />

wireless security and privacy were new, innovative and fresh.<br />

to hear <strong>Security</strong> congress speakers Spencer Wilcox and Winn Schwartau talk<br />

about the risks of mobile computing and employee privacy rights, tune into the<br />

presentation archive, Ubiquitous Computing, Pervasive Risk. (https://isc2.bright<br />

talk.com/node/902). This archive also qualifies for three cPe credits, so pass it<br />

along to your colleagues.<br />

(ISc) 2 will again co-locate <strong>Security</strong> congress with aSIS in 2012 in Philadelphia<br />

(u.S.) and expand the array of educational and social programs offered. to stay upto-date<br />

on the 2012 program, keep your eye on the (ISc) 2 <strong>Security</strong> congress 2012<br />

page (www.isc2.org/congress2012).<br />

I look forward to continuing the conversation,<br />

brandon dunlap<br />

managing director of research, brightfly<br />

bsdunlap@brightfly.com<br />

www.brightfly.com<br />

4 InfoSecurIty ProfeSSIonal Issue Number 16<br />

Management Team<br />

Elise Yacobellis<br />

Executive Publisher<br />

727-683-0782 n eyacobellis@isc2.org<br />

Timothy Garon<br />

Publisher<br />

508-529-6103 n tgaron@isc2.org<br />

Marc G. Thompson<br />

Associate Publisher<br />

703-637-4408 n mthompson@isc2.org<br />

Amanda D’Alessandro<br />

Corporate Communications Specialist<br />

727-785-0189 x242<br />

adalessandro@isc2.org<br />

Sarah Bohne<br />

Senior Communications Manager<br />

616-719-9113 n sbohne@isc2.org<br />

Judy Livers<br />

Senior Manager of Marketing Development<br />

727-785-0189 x239 n jlivers@isc2.org<br />

Sales Team<br />

Christa Collins<br />

Regional Sales Manager<br />

U.S. Southeast and Midwest<br />

352-563-5264 n ccollins@isc2.org<br />

Jennifer Hunt<br />

Events Sales Manager<br />

781-685-4667 n jhunt@isc2.org<br />

Lisa O'Connell<br />

Regional Sales Manager<br />

781-460-2105 n loconnell@isc2.org<br />

IDG Media Team<br />

Charles Lee<br />

Vice President, Custom Solutions Group<br />

Alison Lutes<br />

Project Manager<br />

Joyce Chutchian<br />

Senior Managing Editor<br />

508-628-4823<br />

jchutchian@idgenterprise.com<br />

Kim Han<br />

Art Director<br />

Lisa Stevenson<br />

Production Manager<br />

ADVERTiSER inDEx<br />

CA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . 5<br />

Ieee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . 14<br />

IsACA . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . 15<br />

(IsC) 2 . . . . . . . . . . . . . . . . Inside Front Cover;<br />

. . . . . . . . . . . Inside back Cover; back Cover<br />

microsoft . . . . . . . . . . . . . . . . . . . . . . . . . .p . 2<br />

Northeastern . . . . . . . . . . . . . . . . . . . . . . p . 19<br />

rsA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . 10<br />

For information about advertising in this<br />

publication, please contact Tim Garon at<br />

tgaron@isc2 .org .


cloud security.<br />

can you see beyond the problem?<br />

you can<br />

<strong>The</strong> #1 issue for companies migrating to the cloud is identity and access management.<br />

But for the agile business, know-ing users is always better than no-ing them.<br />

In fact, agile businesses, using our Content-Aware Identity and Access Management solutions, have<br />

been able to reduce security risk while improving productivity, access and efficiency. More effective<br />

compliance, reduced IT risk, broader, more secure customer and partner relationships.<br />

That’s what happens when no becomes know. And security turns into agility.<br />

To see how we can help make your business more agile and secure, visit ca.com/cloudsecurity<br />

Copyright © <strong>2011</strong> CA. All rights reserved.


6 InfoSecurIty ProfeSSIonal issue NuMber 16<br />

fyı<br />

(<strong>ISC</strong>) 2 Software <strong>Security</strong><br />

Certification milestone<br />

o ver 1,000 profeSSIonaLS from 44 countries<br />

now hold the certified Secure Software lifecycle<br />

Professional (cSSlP®)! for details, visit https://isc2<br />

.org/PressReleaseDetails.aspx?id=8014.<br />

Don’t forget to take the quiz<br />

and earn CPEs:<br />

http://bit.ly/rTxcLf<br />

For a list of<br />

events (<strong>ISC</strong>) 2 is<br />

either hosting or<br />

sponsoring, visit<br />

www.isc2.org/<br />

events<br />

(isc) 2 Named Finalist for<br />

sc Magazine Awards 2012<br />

(<strong>ISC</strong>) 2 ’ S C ertI f ICatI onS and eduCatI on program<br />

continues to gain recognition from industry experts.<br />

sc Magazine has named the cissP and cssLP as finalists for<br />

its best Professional certification Program award, and (isc) 2 ’s<br />

information security education and certification is a finalist for<br />

its best Professional Training Program award.<br />

<strong>The</strong> winners of the sc Magazine Awards 2012 will be<br />

announced on February 28 , 2012.<br />

(isc) 2<br />

MeMber<br />

News<br />

americas ISla<br />

Inaugural<br />

recipients<br />

(<strong>ISC</strong>) 2 InformatIon SeCurIty<br />

LeaderShIp awardS (ISLa)<br />

program expanded to central,<br />

north and South america in <strong>2011</strong>. (ISc) 2 is<br />

proud to announce the inaugural winners:<br />

Information <strong>Security</strong> Practitioner Category:<br />

manoranjan (mano) paul, CSSLP, CISSP,<br />

president and CEO, SecuRisk Solutions, U.S.<br />

Managerial Professional for an Information<br />

<strong>Security</strong> Project Category: matt Larson, vice<br />

president, DNS research, VeriSign, U.S.<br />

Senior Information <strong>Security</strong> Professional<br />

Category: diego andrés Zuluaga urrea,<br />

CISM, CGEIT, GCFA, COBIT Foundation and<br />

chief information security officer, Isagen S.A.<br />

E.S.P., Colombia<br />

Up-and-Coming Information <strong>Security</strong> Professional<br />

Category: pedro andres morales<br />

Zamudio, CISSP, CEH, GPEN, GCIH, lead<br />

auditor ISO 27001, OSCP, OSCWP, presales<br />

engineer, Ximark Technologies, Peru<br />

“expanding the ISla program to the americas<br />

was a logical step for us, given the wealth<br />

of information security innovation, leadership<br />

and talent in this region,” said W. Hord<br />

tipton, cISSP-ISSeP, caP, cISa, executive<br />

director of (ISc)². “We were pleased with the<br />

caliber of finalists for our inaugural year, and<br />

we congratulate them on their pioneering<br />

achievements.”<br />

More information on the americas ISla<br />

program is available at www.isc2.org/aisla.


eighth annual<br />

GISla recipients<br />

(<strong>ISC</strong>) 2 announCeS the wInnerS of its eighth annual U.S. Government<br />

Information <strong>Security</strong> Leadership Awards (GISLA):<br />

Category: technology Improvement<br />

Individual Award: Dr. Emma Garrison-Alexander, assistant administrator<br />

for IT at the Transportation <strong>Security</strong> Agency (TSA).<br />

Team Award: <strong>The</strong> Information Assurance Program Management<br />

Team, U.S. Army Combined Arms Center, led by Austin Pearson,<br />

CISSP, PMP, ITIL V3, Server+, information assurance program manager,<br />

supported by Mary Johnson, CISSP, GISF.<br />

Category: federal Contractor<br />

Individual Award: Mr. Shawn Wilson, senior manager of information<br />

security, VeriSign, Inc.<br />

Team Award: <strong>The</strong> NJVC Cyber Dashboard Team, led by Chris<br />

Hughes, CISSP, CCNA, GCFW, chief engineer of cybersecurity,<br />

and seven other CISSPs.<br />

Special Recognition: <strong>The</strong> Joint Information Operations Warfare<br />

Center (JIOWC) Vulnerability Assessment (JVAT) Computer<br />

Network <strong>Security</strong> (CNS) Team, led by senior systems engineer<br />

David Rohret, CEH, <strong>Security</strong>+, CHFI, ECSA/LPT, supported by<br />

three other information security professionals.<br />

Category: workforce Improvement<br />

Team Award: Cyberspace 200/300 Professional Continuing<br />

Education Team, Air Force Cyber Technical Center of Excellence,<br />

led by Dr. Harold Arata III, associate director and his 28-person team.<br />

Category: process/policy Improvement<br />

Individual Award: Mr. Davin Knolton, CISSP, PMP, CKM, CKMP,<br />

DAU CIO Cert, CIO/assistant chief of staff, G-6, U.S. Army<br />

Combined Arms Center.<br />

Team Award: Military Satellite Communications Systems<br />

Directorate Information Assurance Manager Team, U.S. Air Force,<br />

MILSATCOM Systems Directorate, led by Steven Martin, CISM,<br />

and his 18-person team.<br />

Category: Community awareness<br />

Individual Award: Mr. Henry Yu, CISSP, CISM, chief information<br />

security officer, NASA.<br />

Team Award: Cybersecurity Communications Working Group<br />

(CCWG) at the U.S. Department of Homeland <strong>Security</strong> OCISO,<br />

led by cybersecurity strategy communications manager Joel Benge.<br />

For more information about the winners, please visit:<br />

https://www.isc2.org/PressReleaseDetails.aspx?id=7985.<br />

For information about the GISLA program, visit: www.isc2.org/gisla.<br />

multi-language<br />

Exams Now<br />

Available via CBT<br />

(<strong>ISC</strong>) 2 IS expandI ng I t S<br />

C omputer-baS ed teS t I ng<br />

(cbT) program across Latin America,<br />

and now offers the cissP exam in<br />

spanish and Portuguese, and the<br />

sscP exam in Portuguese. candidates<br />

in Latin America may choose<br />

to take these exams at any of the<br />

Pearson Vue Professional or select<br />

testing centers.<br />

<strong>The</strong> cbT expansion began in April<br />

2010 with the cssLP exam, with<br />

plans to gradually transition all<br />

credentials through 2012.<br />

More information about cbT is<br />

available at: www.isc2.org/cbt.<br />

A Successful<br />

First <strong>Congress</strong><br />

If you weren’t abL e to<br />

join (isc) 2 for its first annual security<br />

congress in <strong>2011</strong>, be sure to save<br />

the date for the next year’s event:<br />

september 10 – 13, 2012 in<br />

Philadelphia, Pa., u.s.<br />

This year’s congress, held in conjunction<br />

with the 57th annual Asis international<br />

seminar and exhibits, bridged the gap<br />

between traditional security and logical<br />

security. Held in Orlando, Fla., u.s. in september,<br />

the event included (isc) 2 ’s firstever<br />

Town Hall Meeting and Americas<br />

information security Leadership Awards,<br />

as well as numerous educational sessions<br />

and top-notch keynote speakers.<br />

You can find more information about<br />

(isc) 2 security congress at<br />

www.isc2.org/congress2012.<br />

issue NuMber 16 InfoSecurIty ProfeSSIonal 7


Big Data<br />

Forensics:<br />

What’s in a Tool?<br />

In today’s ever-expanding world of big data, organizations are<br />

not only taking on considerably more responsibility for protecting information assets, but<br />

are also facing the likelihood of a continued rise in potential data incidents.<br />

According to Dov Yoran, CEO at New York City-based<br />

cyber security company ThreatGRID, security threats have<br />

evolved so extensively in recent years that it is inevitable<br />

that incidents will occur even at mid-sized businesses. “It’s<br />

imperative to have a solid incident response process, which<br />

should include data forensics capabilities and recovery methods<br />

after the breach,” Yoran says. “Additionally, it is always<br />

paramount to have a disaster recovery plan, which normally<br />

includes recovery processes, procedures and solutions.”<br />

All tools are not created equal<br />

Fortunately, an array of forensic and recovery tools exists,<br />

including data integrity tools provided with the operating<br />

system, automated data recovery tools, and specialized<br />

forensic data recovery tools. <strong>The</strong> most advanced tools allow<br />

experts to recover significantly corrupted data or structural<br />

damage, partially deleted files, and forensically reassemble<br />

short fragments of files into their original form. <strong>The</strong> tools<br />

even allow an expert to document the chain of events that<br />

led to the data destruction. This all depends on the expert<br />

using the tool having an intimate knowledge of how media<br />

data structures operate, and good working knowledge of the<br />

tool itself.<br />

However, as Yoran explains, not all data recovery tools<br />

are created equal. “Some tools are strictly for data recovery,<br />

while others have other incident response practical features<br />

such as case management,” he says. “<strong>The</strong> requirements for<br />

recovering your data set should be carefully considered. It<br />

8 INFOSECuRITY PROFESSIONAl ISSUE NUMBER 16<br />

Incident response<br />

and data recovery<br />

require a solid<br />

plan, the right<br />

people, and<br />

specific tools<br />

by Peter Fretty<br />

is often essential to budget for not just data recovery tools<br />

but data extraction and analysis tools. <strong>The</strong>se tools can aid the<br />

investigator in determining the root cause of breaches. Technologies<br />

such as sandboxing [a security tool for separating<br />

running programs] and other malware analysis tools, which<br />

can reveal compromises, should be considered as crucial as<br />

the physical disk recovery.”<br />

Some tools also fail to function in a forensically sound<br />

manner, which is necessary for producing defensible electronically<br />

stored information (ESI) in legal matters or regulatory<br />

investigations, explains Jeff Fehrman, vice president<br />

of forensics and consulting for global IT service provider,<br />

Integreon. “Defensible collection demonstrates that the<br />

appropriate procedures and chain of custody are maintained<br />

throughout the process, in order for the ESI to be admissible<br />

in court,” he says. “Even the best forensic tools in the hands of<br />

untrained users can still present some serious issues for the<br />

defensibility.”<br />

Fehrman recommends looking for tools with a track<br />

record of successful use in legal and compliance matters<br />

and that have respected certification training for users.<br />

“<strong>The</strong>re are also expert consultants in the field that have<br />

entire toolkits of software available for their use, and the<br />

experience to know which ones are best suited for specific<br />

types of storage media or environments,” he says. “Some<br />

services also allow IT personnel to essentially perform the<br />

work under an expert’s remote guidance as a cost-effective<br />

approach to ensuring defensibility without the risk of data<br />

spoliation.”<br />

photo By ChRIStophER J. MoRRIS


ISSUE NUMBER 16 INFOSECURITY PROFESSIONAL 9


Selecting the Right RecoveRy tool<br />

Selecting the best tool is often<br />

the result of conducting sufficient<br />

research and asking the<br />

appropriate questions. With<br />

this in mind, ThreatGRID’s<br />

CEO Dov Yoran suggests the<br />

following list of questions:<br />

3 What type of data does the<br />

organization need to recover?<br />

3 What types of hardware<br />

are involved?<br />

3 Will we be recovering virtual machines?<br />

3 How often will we be recovering data?<br />

3 What is the average size of datasets we will<br />

be recovering?<br />

3 How do we incorporate the recovery solution into<br />

a unified incident response process?<br />

10 InfoSecurIty ProfeSSIonal ISSUE NUMBER 16<br />

Legal must-dos<br />

<strong>The</strong>re are also legal concerns of key consideration as organizations<br />

embark on a data forensics project, explains Peter laberee<br />

of laberee law Pc. “When confidential information is<br />

kept on the cloud, it is crucial to know, where are the servers?<br />

This matters because the laws of the locality where the servers<br />

are located may control your right to access the data, even to<br />

recover lost information,” he says. laberee notes that people<br />

ask where their data is partly because of the inherent diffuseness<br />

of the cloud, plus the fact that legal and marketplace<br />

remedies vary from country to country. “Despite the global<br />

feel of the cloud, some countries’ laws will be involved when<br />

it’s time to sue to get back data or to demonstrate compliance<br />

with privacy rules.”<br />

<strong>The</strong> obligation to provide secure data goes beyond just<br />

good business. “enterprises have express legal duties relating<br />

to data security financial information and protected health<br />

information under HIPaa [the Health Insurance Portability<br />

and accountability act of 1996], for example. and, we hear<br />

much about Sarbanes-oxley [the Sarbanes-oxley act of 2002,<br />

or SoX] in the corporate finance world,” laberee says. “under


Section 404 [of SoX], reporting companies are required to<br />

assess their internal process and controls, and data security<br />

and recovery are part of this. Privacy laws are also implicated<br />

in data security concerns including Gramm-leach-Bliley [the<br />

financial Services Modernization act of 1999, or GlB], the<br />

fair and accurate credit transactions act [facta], and eu<br />

[european union] rules.”<br />

If the primary goal is to use the results in court, yoran<br />

stresses the significance of forensically sound data recovery<br />

software, including sandboxing solutions. “understanding<br />

the fundamentals of the attack and how it affected one’s system<br />

is at the core of every investigation,” he says. “Having the<br />

Is the Data Gone?<br />

Is the data really gone? In most instances, the answer<br />

is a resounding no. When a user drags and drops<br />

a file or directory into the recycle bin, or right-clicks<br />

and selects “Move to Trash” or “Delete,” that data is<br />

usually recoverable, explains Forensic Risk Alliance’s<br />

Boisclair. “Even if the user empties the trash, it may<br />

still be possible to access and view that deleted data.<br />

However, data can be securely deleted without having<br />

to physically destroy the device or media so as to<br />

render it unusable,” he says. “<strong>The</strong>re are a number of<br />

software-based solutions that feature the ability to<br />

sanitize or wipe media by erasing the data based on<br />

recognized government and industry standards.”<br />

Many data-wiping software applications developed<br />

in the U.S. adhere to the standard outlined in Department<br />

of Defense (DoD) 5220.22-M. At a high level,<br />

secure erasure involves overwriting the location on<br />

the disk where the data resided a number of times by<br />

filling the media with zeros, random bytes, or a known<br />

overwrite pattern. It is then possible to verify that the<br />

data has been permanently erased by viewing the data<br />

location on the media in an application that enables<br />

the user to access and view the ones and zeros on<br />

the physical disk—ensuring that the overwrite pattern<br />

exists and the original data does not. A primary factor<br />

in meeting industry standards is the number of times<br />

the data is overwritten.<br />

It’s important to note when using data wiping tools,<br />

care must also be taken that any such actions are performed<br />

in accordance with a company’s documented<br />

data retention/destruction policies and schedule,<br />

explains Integreon’s Fehrman. “Failure to do so could<br />

pose issues during litigation, even if performed prior to<br />

a lawsuit being filed. Enforcing data destruction policies<br />

is particularly important if a legal hold has been<br />

put in place at the start of an investigation or lawsuit,”<br />

he says. “<strong>The</strong> deliberate destruction of potential evidence<br />

can lead to serious legal sanctions.”<br />

right tools on hand to do a deep analysis can not only aid in<br />

this effort, but it’s also a requirement when considering the<br />

myriad of potential attacks and large volumes of data each<br />

organization owns. clearly these tools are most effective<br />

when used by a skilled resource on the project, so in the end a<br />

successful investigation is really the marriage between people<br />

and technology.”<br />

Seeking professional help<br />

In some instances, it makes more sense for organizations to<br />

turn to specialized partners capable of providing an array of<br />

professional services including litigation consulting, compliance<br />

and risk management, e-discovery, forensic data collection<br />

as well as forensic examination and recovery exist to<br />

assist with eSI.<br />

one reason to do so is that for digital evidence to be valid—<br />

and defensible in court—it must be preserved in either its original<br />

form or a forensically defensible representation thereof,<br />

explains Gerard Boisclair, senior manager at Providence, rI<br />

(u.S.)-based forensic risk alliance. “In accordance with the<br />

national Institute of Justice, examination is best conducted<br />

on a copy of the original evidence,” he says. “Proper forensic<br />

collection involves highly trained and certified professionals<br />

using specialized tools such as hardware and software writeblockers<br />

and forensic imaging tools. <strong>The</strong>y also provide documentation<br />

to prove data integrity and security via chain of<br />

custody, media acquisition and access control, and a series of<br />

detailed collection logs.”<br />

according to fehrman, data forensic and recovery services<br />

often vary based on the type of media or environment<br />

involved, including hard drives, backup tapes, uSB pen<br />

drives, network file shares, e-mail servers, mobile phones,<br />

Web sites, social media networks, and cloud-based environments.<br />

“related services include recovery of passwordprotected,<br />

encrypted, corrupted, or deleted information,” he<br />

says. “expert analysis or witness services are also available to<br />

ensure the defensibility of the methods used, should they ever<br />

be challenged during legal proceedings. This is why training<br />

and certification through reputable providers is so important,<br />

and when there is doubt, there is always the option to utilize<br />

forensic experts that can provide strategic advice and provide<br />

recommended best practices and methods.”<br />

regardless of the preferred route, it’s crucial to select a<br />

reputable company that practices and promotes industry<br />

standards, explains Boisclair. “Whether recovering data at a<br />

logical or physical level, it is likely that the data may be private,<br />

sensitive or confidential and may even be subject to jurisdictional<br />

requirements governing data protection,” he says.<br />

“using a reputable tool or provider may prevent the media<br />

from further, irreparable damage, and may also prevent<br />

the data from being exposed to identity theft, unauthorized<br />

download or use of confidential files as well as improper storage<br />

or disposal of media.”<br />

Peter Fretty is a freelance business and technology journalist<br />

based in Michigan.<br />

ISSUE NUMBER 16 InfoSecurIty ProfeSSIonal 11


DISASTER<br />

RECOVERY<br />

REALITY<br />

CHECK:<br />

ARE YOU<br />

REALLY<br />

READY?<br />

12 INFOSECURITY PROFESSIONAL ISSUE NUMBER 16<br />

DISASTER<br />

PREPAREDNESS<br />

saves time and<br />

money if the right<br />

skills and plans are in<br />

place—and current.<br />

BY CRYSTAL BEDELL<br />

ILLUSTRATION BY KEN ORVIDAS


When was the last time your organization updated<br />

its disaster recovery (Dr) plan or conducted a disaster recovery<br />

test? chances are you’ve spent less time and money on Dr or<br />

business continuity (Bc) efforts since the economic downturn.<br />

But a slow economy is no excuse for neglecting Dr/Bc maintenance.<br />

In fact, it’s more important than ever before, because when an incident<br />

does occur—be it an earthquake, a fire in the data center or a poor management<br />

decision—you need to be able to get your organization back up and running as<br />

soon as possible.<br />

In a 2010 study by forrester research and Disaster Recovery Journal, respondents<br />

were asked to rate their ability to recover their data center in the event of a site failure<br />

or a disaster. <strong>The</strong> vast majority said they felt “very prepared” or “prepared.” according<br />

to a report co-written by forrester analyst rachel a. Dines, “<strong>The</strong> same study<br />

found that disaster recovery spending has declined, testing has remained flat, plan<br />

maintenance occurs less frequently, and actual recovery times have increased.”<br />

Bottom line: organizations are disillusioned. allen Zuk, owner and managing<br />

principle of Sierra Management consulting based in Parsippany, n.J., u.S.a., said<br />

he sees a lot of organizations slacking off in the area of Dr. “<strong>The</strong>re’s an attitude of<br />

complacency, because nothing has happened in the last three or four years,” says<br />

Zuk, referring to a disaster or incident.<br />

This complacency can be costly. according to forrester, organizations took 18.5<br />

hours to recover from an event in 2010. consider that the average reported cost of<br />

downtime per hour was almost $145,000, and you’re looking at more than $2 million<br />

per event.<br />

Reality CheCk<br />

Getting real about your organization’s disaster preparedness doesn’t have to be<br />

costly. With a little foresight, you can actually save time and money. taking the<br />

time to set realistic goals—even if it means hiring a consultant to help, is one tip<br />

Zuk offers for cost-effective Dr testing. “Don’t try to boil the ocean every time,”<br />

he says. Instead of testing every system and application, choose two or three to test<br />

each quarter. for those unsure about which ones or how many to test, Zuk encourages<br />

clients to reach out to a consultant. “Because we’ve done this so many times, we<br />

know how long it will take. <strong>The</strong>re are no surprises. If you plan a 24-hour test and you<br />

come up with 52 apps, that’s just not going to happen. a consultant has the insight<br />

to help you plan accordingly,” Zuk says.<br />

a consultant can also help address skills gaps, which is a common problem for<br />

organizations. Perhaps the resident Dr/Bc expert is no longer with the company,<br />

and skills have not been replaced. “If we were to take technology out of the equation<br />

and focus on your Dr plan, how do you ensure continuity of operations? That takes<br />

a unique skill set. <strong>The</strong>re’s a lack of talent being applied to the problem,” says Brandon<br />

Dunlap, managing director of research at Brightfly. If the key people are not present<br />

for whatever reason when disaster strikes, and if junior staff doesn’t have the appropriate<br />

training, it’s going to become a prolonged and painful response.<br />

a consultant can help you plan and execute a series of tests, for example, reducing<br />

his or her role through each test until the organization feels confident in its ability<br />

to execute a test. “your level of dependency is diminishing, and you’re showing<br />

an improvement in your own internal staff and their ability,” says Zuk.<br />

finally, Zuk recommends taking the opportunity to learn from the results of<br />

each test and applying that knowledge to the next one. “Do a post mortem on your<br />

tests, and be truthful about it. <strong>The</strong>re’s no<br />

failure in it; it’s about what can you learn<br />

from what you did. Did you achieve your<br />

goal and, if not, let’s understand what<br />

went wrong, what didn’t work. Build in<br />

that remediation and for the next test,<br />

take that with you,” Zuk says.<br />

Cloud Computing<br />

and dR/BC<br />

any Dr/Bc discussion would be remiss<br />

if it failed to address the cost-saving role<br />

of cloud computing services. Some providers<br />

market their services specifically<br />

for Dr purposes, but cloud services also<br />

support Dr efforts. “<strong>The</strong> whole concept<br />

of cloud computing addresses disaster<br />

recovery because your services are independent<br />

of your offices,” Dunlap says.<br />

“<strong>The</strong> days of actually requiring a massive<br />

data center to run your business are dwindling.<br />

you can push everything up to the<br />

cloud for just a few bucks a month.”<br />

at that point, the Dr aspect becomes<br />

a vendor problem, says Dunlap. But you<br />

can’t move your services to the cloud<br />

and wipe your hands clean of the issue.<br />

“If the provider goes down and you don’t<br />

have access, technically, you just had a<br />

disaster.”<br />

Dunlap advises companies to review<br />

contracts with their legal department to<br />

ensure that service outages and servicelevel<br />

agreements are captured in contractual<br />

language. “If your provider goes<br />

down or loses your data, what recompense<br />

do you have? Will they start paying<br />

you $10,000 a day while you’re out of<br />

business?” Dunlap says.<br />

While many providers do not currently<br />

provide the guarantees that organizations<br />

require, Dunlap says this is<br />

something organizations can look forward<br />

to in the coming months and years<br />

as it becomes a differentiator of cloud<br />

service providers. In the meantime, have<br />

an alternative plan for Dr/Bc.<br />

BRing expeRienCe<br />

to the taBle<br />

technology is just one component of<br />

Dr/Bc. People and processes also play a<br />

significant role. “Business continuity and<br />

disaster recovery go well beyond getting<br />

your data or your apps back up. What<br />

are you going to do about the people that<br />

are displaced? What is your process for<br />

ISSUE NUMBER 16 InfoSecurIty ProfeSSIonal 13


notifying customers about the outage?”<br />

he says. � ese are examples of processes<br />

and elements that technologists o� en fail<br />

to consider.<br />

“Disaster recovery has been narrowed<br />

down to IT capabilities,” says Zuk.<br />

“� ere is less and less involvement with<br />

the business, which is discouraging. It<br />

should be involved a lot more with DR<br />

planning and testing.”<br />

Addressing people and processes<br />

doesn’t require a huge � nancial investment,<br />

but it does require you to sit down<br />

with the right people and plan for these<br />

actualities. “It takes time and it takes<br />

thought and it takes expertise. You have<br />

to sit down and talk through some of this<br />

stu� , and say ‘what if?’ � e people who<br />

have gone through this problem before<br />

or experienced a disaster are good people<br />

to bring to the table,” Dunlap says.<br />

“You can look at a manual to � gure out<br />

how to back up to tape. But are you backing<br />

up and restoring the right stu� ? What<br />

gets restored � rst? Who in the organization<br />

gets their stu� done � rst?” asks Dunlap.<br />

“� at’s a hard conversation, but they’re<br />

the ones that, as practitioners, we need to<br />

come to the table prepared to have.”<br />

MANAGING RISK<br />

IN THE BOARD ROOM<br />

<strong>The</strong>re is another risk associated with<br />

a company’s people that puts business<br />

continuity in danger. It resides in conference<br />

rooms of businesses everywhere:<br />

potential executive or corporate risk<br />

behavior. “Businesses run the risk of<br />

being knocked out by bad business decisions,<br />

but they don’t take that into consideration,”<br />

says Dunlap.<br />

According to Chris Kaufman, president<br />

of Agovia Consulting, companies<br />

lose millions of dollars every day because<br />

of poor business decisions. Managing this<br />

business risk is an essential part of business<br />

continuity, and it’s vital in today’s<br />

environment. Moreover, “It’s a low-cost<br />

way to manage risk,” Kaufman says.<br />

Kaufman cites a number of examples<br />

of risky business decisions that should be<br />

a red � ag to systems security professionals.<br />

One of these is when management<br />

pushes to release a product on time even<br />

if it’s not ready. “Nobody will remember a<br />

year from now if we’re three months late;<br />

everyone will remember if we lose 10<br />

14 INFOSECURITY PROFESSIONAL ISSUE NUMBER 16<br />

percent of our business,” says Kaufman.<br />

Another risky behavior is the purchase<br />

of systems, products and consulting services<br />

based on hype from trade shows<br />

or industry conferences; or continuing<br />

a rollout that is costing the organization<br />

millions of dollars and is clearly doomed<br />

to fail.<br />

Luckily, it doesn’t cost much to mitigate<br />

risky behavior to ensure business<br />

continuity. It’s simply a new way to<br />

approach decision making. “It’s common<br />

sense,” he says, “getting people to think<br />

along the lines of applying the decisions<br />

they’re making today to the place they<br />

want to be two, or � ve, or even 10 years<br />

from now.” In other words, think about<br />

Become an<br />

the long-term impact of the decisions<br />

you’re making.<br />

� is approach also o� ers a bene� t to<br />

CISOs. “Organizations are holistic, and<br />

to be successful, they should operate as<br />

a uni� ed entity. � ese concepts overarch<br />

and tie the various pieces of the organization<br />

together. � e ideas of risk evaluation,<br />

risk management, and business<br />

continuity have begun to mature. � is<br />

should give a natural entre to partnering<br />

with and being a part of the business, as<br />

opposed to being an order taker,” Kaufman<br />

says.<br />

Crystal Bedell is a freelance writer specializing<br />

in technology.<br />

IEEE Certified Biometrics<br />

®<br />

Professional<br />

Why CBP?<br />

<strong>The</strong> IEEE Certified Biometrics Professional ® (CBP)<br />

program has two major components: Certification and<br />

Training. Professionals and organizations can<br />

both benefit from the IEEE CBP program.<br />

Key advantages are:<br />

n Prove your knowledge<br />

n Increase your credibility<br />

n Learn a baseline of industry<br />

knowledge<br />

n Train employees<br />

n Gain a competitive advantage<br />

Learn more and register today!<br />

www.IEEEBiometricsCertification.org


Get recognized —<br />

our members do.<br />

www.isaca.org/benefits-infosec<br />

In a sea of IT professionals,<br />

ISACA members get noticed.<br />

Many IT and information systems professionals worldwide consider<br />

membership in ISACA ®<br />

essential to their career advancement.<br />

As a nonprofit, global association, ISACA connects exceptional<br />

people with exceptional knowledge to provide members with a<br />

robust offering of professional resources.


DELEGATION<br />

DONE RIGHT<br />

16 INFOSECURITY PROFESSIONAL ISSUE NUMBER 16<br />

Relinquishing control may be diffi cult<br />

at fi rst, but the benefi ts for management,<br />

staff, and the overall company<br />

can be worthwhile. BY COLLEEN FRYE<br />

WHILE HIS CO-FOUNDER (AND BEST FRIEND) WAS AWAY ON VACATION,<br />

“MANAGERS<br />

MANAGE<br />

THINGS;<br />

LEADERS<br />

DEVELOP<br />

PEOPLE.”<br />

—HEATHER ROSENFIELD<br />

PRESIDENT<br />

ROSEWOOD ASSOCIATES<br />

the co-founder of a server and storage<br />

company took the opportunity to delegate<br />

some purchasing responsibilities<br />

that his partner had refused to loosen<br />

the reins on. <strong>The</strong> employees charged<br />

with the tasks had proven purchasing<br />

experience. <strong>The</strong>ir decisions saved<br />

the company eight percent, and their<br />

research surfaced a new vendor that<br />

delivered product more quickly.<br />

“I used that opportunity to delegate<br />

that authority to them in his absence,<br />

under the ruse that I couldn’t handle<br />

it,” says Pat Taylor, founder of Atypical<br />

Business, a channel sales and marketing<br />

consultancy in Dallas and author<br />

of Sales Savvy (<strong>2011</strong>). “� ey were fearful,<br />

but I made it clear I’d take full<br />

responsibility.”<br />

Taylor’s partner was not happy,<br />

of course, but after he reviewed what<br />

transpired, he never took back the purchasing<br />

responsibilities.<br />

Like Taylor’s partner, many people<br />

� nd giving up control di� cult. Yet when<br />

delegation is done right, the employees,<br />

management and company all bene� t.<br />

Future leaders are groomed, new ideas<br />

are surfaced and executive management<br />

is freed up to focus strategically.<br />

“Managers manage things; leaders<br />

develop people,” says Heather Rosen-<br />

� eld, president of Boston-based Rosewood<br />

Associates, a licensee of the Crestcom<br />

corporate training program. � ere<br />

are emotional barriers to delegating,<br />

PHOTO BY TIM FLACH


she explains, ranging “from lack of confidence<br />

or trust in lower-level employees,<br />

to fear of being called lazy, to lack<br />

of control.”<br />

for most, delegating is a learned<br />

skill, says Seth levenson, an independent<br />

executive coach in Brookline,<br />

Mass. “you went into your profession—<br />

whether it’s technology, finance, whatever—because<br />

you liked the specialty,<br />

not because you wanted to manage<br />

people in that specialty. But the more<br />

successful and higher up you go, the<br />

more you are required to delegate.”<br />

Success, he says, is not defined by what<br />

a leader personally accomplishes, “but<br />

what they can enable the organization<br />

to accomplish, and what they can help<br />

their people to do.”<br />

Many of what John Baldoni, leadership<br />

consultant, speaker, and author of<br />

Lead with Purpose (<strong>2011</strong>), calls “super<br />

achievers” are not predisposed to delegating<br />

responsibilities and grooming<br />

staff. “<strong>The</strong> perception is I should do it<br />

myself. When you’re an individual contributor,<br />

you’re recognized and compensated<br />

for that individual contribution.<br />

That doesn’t work in management. But if<br />

you’ve always been recognized for a lot of<br />

work individually, it’s hard to let go.”<br />

Finding the Right Level<br />

of Delegation<br />

So just how much should you let go?<br />

rosenfield says the level of delegation<br />

depends on the personnel and the<br />

team, how long an individual has been<br />

with a company, and how much experience<br />

that person has. for instance, she<br />

explains, you might ask your employee<br />

to be the information-gatherer, while<br />

you make the decisions. as the individual<br />

gains experience, you might add<br />

responsibility by asking them to provide<br />

options in addition to the research.<br />

<strong>The</strong>n at a higher level of responsibility,<br />

ask them to provide a recommendation<br />

based on their research.<br />

also, she adds, a leader “should delegate<br />

results that have to be achieved<br />

rather than a task that has to happen.”<br />

levenson agrees: “let them know<br />

what you want to accomplish, but not<br />

how.”<br />

Before that, though, levenson says<br />

When to be Hands-On<br />

One of the biggest barriers to delegation is micromanagement, according<br />

to executive coach Seth Levenson. That said, he tries to steer clear of that<br />

term, “because it has a pejorative meaning. I call it hands-on, which makes<br />

it neutral and appropriate in certain situations,” he says.<br />

<strong>The</strong>re are typically three situations in which a hands-on style is both required<br />

and acceptable, according to Levenson:<br />

1. You have an employee with a performance issue.<br />

2. You’re a new manager and you want to better understand your role and<br />

the roles of your direct reports, so a hands-on style is appropriate—in<br />

the beginning.<br />

3. If your company has the spotlight on a particular project or issue,<br />

“you would be foolish not to be all over it,” he advises.<br />

a leader should ask if the direct report<br />

feels ready to handle the responsibility,<br />

and what level of advice they want to<br />

receive. and at the outset, “agree on the<br />

communication during the completion<br />

of the task—is it daily, which on highly<br />

critical tasks with a lower skill person it<br />

may be, weekly, or when certain milestones<br />

are reached.” If the communication<br />

is ongoing, he says, “there should be<br />

no surprises.”<br />

once the responsibility is outlined<br />

and parameters defined, Baldoni says<br />

you need to let everyone else know, and<br />

that you expect them to give this person<br />

their full support.<br />

“It’s also important to define scope,”<br />

Baldoni says. “It’s easy to delegate on<br />

paper, but when projects take longer or<br />

grow in scope, if I’m supervisor do I need<br />

to become more involved?” He adds that<br />

the supervisor needs to let the employee<br />

know it’s oK to ask for help.<br />

rosenfield says that defining performance<br />

standards and using metrics<br />

and regular reports are key. She also<br />

adds, “follow up and follow through.<br />

If you give someone something and let<br />

them run with it, and they come back<br />

with something that’s nothing like you<br />

expected, then you haven’t inspected<br />

along the way and followed through<br />

with them.”<br />

Some Common Missteps<br />

<strong>The</strong>re are wrong ways to delegate as well.<br />

“<strong>The</strong> most egregious error is to delegate<br />

without authority,” Baldoni says. other<br />

mistakes, he says, include giving someone<br />

a mandate but no resources to carry<br />

it out, giving someone a job but not telling<br />

their peers, or not giving someone<br />

decision-making authority but still holding<br />

them accountable if things go south.<br />

Still, if you’ve done delegation right<br />

and it’s just not working out, you may<br />

have to take action. But first, says levenson,<br />

try to understand what’s not<br />

working, and what your contribution to<br />

that may or may not be. “It’s easy to say<br />

another person can’t handle it,” he says.<br />

However, if you do need to take<br />

back responsibility, there are different<br />

ways to do so, levenson says. If the<br />

issue becomes an emergency all previous<br />

agreements are off, he says, or if you<br />

think it will never work vs. it’s just not<br />

working now, that may affect how you<br />

deal with the issue.<br />

other options are to decrease the<br />

level or scope of responsibility rather<br />

than remove it entirely, levenson says.<br />

or, he adds, “Maybe you spend more<br />

time with them, or maybe you have<br />

another direct report who’s more experienced<br />

be a peer advisor or coach to<br />

that person.”<br />

above all, says rosenfield, “you have<br />

to have balance. So many managers<br />

today are working managers. they’re<br />

not just managing people; they’re<br />

responsible for a job as well. you have to<br />

balance—my individual contribution<br />

with my team contribution.”<br />

Colleen Frye is a freelance technology editor<br />

and writer based in Massachusetts.<br />

ISSUE NUMBER 16 InfoSecurIty ProfeSSIonal 17


Giving corner<br />

Fostering goodwill, education, and research initiatives<br />

Help wanted: the (<strong>ISC</strong>) 2 Safe and Secure<br />

Online program needs volunteers<br />

Join up and help train parents, teachers and children<br />

about cybersaFety.<br />

a teen commItS SuIcIde In the u.S. after<br />

having been cyberbullied. In the u.K., a parent<br />

is arrested for roughing up a middle school boy<br />

because he was bested on an online game. celebrities<br />

and politicians are sexting. headlines like<br />

these are real-life reasons that schools everywhere<br />

are in need of the (ISc) 2 Safe and Secure online<br />

program.<br />

<strong>The</strong> (ISc) 2 Safe and Secure online program<br />

is an easy-to-use training program that helps<br />

security professionals like you get involved with<br />

a community to show parents, teachers and children<br />

ages seven to 14 how to be safe and secure<br />

online—whether it is identity theft, personal safety<br />

or securing hardware and software from malicious<br />

attacks. <strong>The</strong> program trains (ISc) 2 certified members<br />

to volunteer to deliver a cutting-edge, interactive<br />

multimedia presentation at schools in their<br />

own local community.<br />

(ISc) 2 member surveys showed members’ desire<br />

to make an impact on the world using their unique<br />

cyber security skills, especially with those most<br />

vulnerable in society….youth. educating your community<br />

about one of today’s most serious issues and<br />

helping to protect children online can be very satisfying.<br />

as u.S. volunteer lynda morrison-rader<br />

notes, “<strong>The</strong> Safe and Secure online program has<br />

given me a chance to share security best practices<br />

with children, teachers and parents. It has given<br />

them a forum to begin discussions on topics that<br />

some had not thought about, or known about.”<br />

Parents and teachers learn a lot, too. “as a parent,<br />

I value (ISc) 2 ’s Safe and Secure online so<br />

highly because it talks straight to the concerns our<br />

kids deal with every day,” notes Blair campbell,<br />

the lead volunteer mentor in canada. “It’s very<br />

empowering for them, and puts them in charge—<br />

18 InfoSecurIty ProfeSSIonal issue number 16<br />

they get to become responsible computer users and<br />

learn how to protect themselves. I see a change following<br />

each presentation, and it’s impressive.”<br />

<strong>The</strong>re are many more volunteers like lynda and<br />

Blair (see page 20) who can attest to this gratifying<br />

experience.<br />

as need for these programs rapidly increases,<br />

so does the need for more volunteers in canada,<br />

hong Kong, the u.K., and the u.S. That’s where<br />

you can help.<br />

Become a volunteer by clicking on the Safe and<br />

Secure online logo on the ISc2.org website. you<br />

can also attend one of our face-to-face orientations<br />

like the one at the rSa uSa 2012 conference in<br />

San francisco on february 29.<br />

to get started, just complete these easy steps:<br />

1. check out the Safe and Secure online section<br />

on ISc2.org and sign-up as a volunteer.<br />

2. Successfully pass a criminal background check<br />

(if you have had one done within the past year<br />

or have had security clearance this will be<br />

sufficient).<br />

3. complete the online volunteer preparation video<br />

and pass the short quiz afterwards or attend<br />

an in-person volunteer orientation (available at<br />

select industry conferences in certain locations).<br />

4. Sign a waiver.


How to Set up Safe and Secure Online in Your Country:<br />

(<strong>ISC</strong>) 2 certifi ed information security professionals are<br />

intensely focused on using their skills to help secure their<br />

own local community. In order to start a Safe and Secure<br />

Online program in your country:<br />

1. Develop a core group of (<strong>ISC</strong>) 2 volunteers to act as<br />

lead volunteer mentors and volunteer organizers in their<br />

country; (<strong>ISC</strong>) 2 Foundation staff will train them and<br />

provide support materials, however the volunteers will<br />

need to coordinate activities in their country.<br />

2. Core volunteer group works to determine if any<br />

government agencies need to give permission for SSO<br />

volunteers to be in the schools; core volunteers and<br />

(<strong>ISC</strong>) 2 Foundation staff work to gain permission.<br />

3. Core group works with (<strong>ISC</strong>) 2 Foundation staff to<br />

raise funds to support local programs. Initial launch<br />

costs approximately $40,000 for permissions, legal<br />

fees, presentation materials, student hand outs and<br />

marketing materials, and the public launch (PR and<br />

marketing to raise awareness). Ongoing maintenance<br />

costs approximately $10,000 annually for updates<br />

to the presentation and volunteer training materials,<br />

students handouts and ongoing marketing to parents<br />

and teachers. This may come from a government agency<br />

COMBAT<br />

Cyber Attacks<br />

with a<br />

Master of Science in<br />

Information Assurance<br />

<strong>The</strong> current need for trained information assurance professionals in<br />

government and industry is significant and will continue to increase.<br />

Northeastern’s MSIA program will help you become a trained IA leader.<br />

Complete your degree in as few as four semesters—<br />

100% online, on campus, or by mixing the formats.<br />

Now accepting applications.<br />

Learn more at<br />

www.northeastern.edu/online/ia<br />

1.877.634.6865<br />

or may come from one or more corporate sponsors.<br />

4. Determine if criminal background checks are available<br />

(and fi nancially accessible) in the country (without a<br />

background check process we are unable to assure the<br />

school system regarding student safety).<br />

5. Develop a legal waiver form customized to local laws.<br />

This will be done via (<strong>ISC</strong>) 2 ’s legal department.<br />

6. Work with educators and volunteers to customize the<br />

standard Safe and Secure Online presentation for<br />

the specifi c needs of a particular culture, including<br />

language translation. For instance, in some countries,<br />

cyber bullying is the predominant issue, while in others<br />

child exploitation is the premier issue. This step is led by<br />

(<strong>ISC</strong>) 2 Foundation staff with support and input from the<br />

core volunteers.<br />

7. Recruit and train volunteers, led by (<strong>ISC</strong>) 2 Foundation<br />

staff with support and input from the core volunteers.<br />

8. Plan a launch event for press, educators and (<strong>ISC</strong>) 2<br />

members.<br />

9. Launch!<br />

10. Core local volunteers are responsible for reporting key<br />

data back to (<strong>ISC</strong>) 2 Foundation staff including numbers of<br />

presentations and students reached, on a monthly basis.<br />

ISSUE NUMBER 16 INFOSECURITY PROFESSIONAL 19


20 InfoSecurIty ProfeSSIonal issue number 16<br />

Q&a<br />

experts address trending security topics<br />

Spreading Cyber Safety To All<br />

DaviD Melnick, principal, audit and enterprise risk services at<br />

deloitte, and an (isc) 2 board member, recently spoke to us about<br />

the safe and secure online outreach in his los angeles, calif.<br />

community.<br />

Q: How did you get started with (<strong>ISC</strong>) 2 ’s<br />

Safe and Secure Online program?<br />

I had the privilege of being on the<br />

(ISc) 2 Board of Directors, which was<br />

regularly briefed as (ISc) 2 started<br />

their rollout of the Safe and Secure<br />

online program in the u.S. I was<br />

immediately taken with the obvious<br />

fit for our professionals who have<br />

often expressed interest in community<br />

service.<br />

at the same time, I had been very<br />

involved in Deloitte’s IMPact Day program where<br />

the entire u.S. firm mobilizes on a single day, and<br />

approximately 50,000 professionals engage in an<br />

array of community projects. We’d go into schools<br />

and repaint buildings, landscape yards, and perform<br />

academic programs. <strong>The</strong> Safe and Secure<br />

online program was an obvious complement to<br />

Deloitte’s efforts, so I offered up the idea of leveraging<br />

Deloitte’s efforts over 1,100 cISSPs to deliver<br />

this program on IMPact Day.<br />

Q: How did you get into the school program?<br />

I started working locally in l.a. three years<br />

ago at John leighty Middle School where Deloitte<br />

had an established trusted relationship with the<br />

administration. We first presented to the principal<br />

and administration, who loved it. from there,<br />

we worked with the entire eighth-grade class with<br />

more than 600 kids on the first IMPact Day.<br />

<strong>The</strong> program provided an interactive multimedia<br />

experience to keep the kids’ interest as we covered<br />

major topic areas including ethics and cyber<br />

behavior, downloading music, understanding the<br />

laws and rules, antivirus and more.<br />

Q: What impact has this had?<br />

<strong>The</strong> program was a big success in the l.a. area.<br />

<strong>The</strong> following year, we decided to roll the pro-<br />

gram out nationally with Deloitte’s<br />

IMPact Day. We established security<br />

leaders regionally across the country<br />

to develop city- and school-level<br />

volunteer teams. It’s been a great<br />

experience for security professionals.<br />

Q: How does a new volunteer get<br />

started?<br />

(ISc) 2 can get you started. all<br />

you need to do is sign-up online,<br />

complete (or show proof of) a recent<br />

criminal background check, sign a waiver form<br />

and get introduced to the presentation materials<br />

through a one-hour online orientation followed by<br />

a short quiz. If you have a child or know a child in<br />

a school, you might be able to talk to an administrator<br />

or teacher about getting involved. once you<br />

are introduced, then you go in and deliver the presentation.<br />

<strong>The</strong> prepackaged content is very structured<br />

with music and multimedia so you can just<br />

run with it. <strong>The</strong> level of commitment is minimal,<br />

and you get cPe credit for it as well.<br />

Q: What have you learned from your experience?<br />

I was caught off guard with how vulnerable<br />

[students are], and how real this [security] problem<br />

was.<br />

also, most of these kids have never had this cyber<br />

security conversation before with an adult. <strong>The</strong> kids<br />

all are using social media and the technology, and<br />

yet, no one is talking to them about the topic.<br />

Q: Do you have any advice for (<strong>ISC</strong>) 2 members?<br />

Get involved. It’s easy to register, easy to deliver,<br />

and you will feel good when you deliver it. <strong>The</strong> first<br />

step is to go through the process with (ISc) 2 and<br />

put yourself out there. We’re all here to help, if you<br />

are interested, so get online dialogues going and<br />

things might happen.


chapter passport<br />

MEMBERS CONNECT AND COLLABORATE<br />

How to Build a Local (<strong>ISC</strong>) 2 Chapter<br />

A STEP-BY-STEP GUIDE TO BUILDING YOUR OWN LOCAL<br />

COMMUNITY OF INFORMATION SECURITY PROFESSIONALS<br />

AS ANY INFORMATION SECURITY PROFES-<br />

SIONAL WELL KNOWS, the value of peer networking<br />

cannot be overstated. (<strong>ISC</strong>)² Chapters<br />

provide members with the opportunity to network<br />

with peers, brainstorm, exchange resources, share<br />

knowledge, and let’s not forget, create new ways to<br />

earn CPE credits.<br />

4. Process legal documents: Once the application is<br />

approved, (<strong>ISC</strong>)² will send you an information<br />

packet containing legal paperwork necessary to<br />

establish your chapter.<br />

5. Receive an (<strong>ISC</strong>)² Chapter Welcome Kit: Once the<br />

paperwork has been processed and � nalized,<br />

you will receive a welcome kit containing your<br />

chapter materials. You will then be an o� cial<br />

(<strong>ISC</strong>)² Chapter!<br />

6. New chapter announcement: (<strong>ISC</strong>)² will send an<br />

email noti� cation on your behalf to announce<br />

your chapter to all local (<strong>ISC</strong>)² members within<br />

your geographic boundaries.<br />

2 � e ( I S C Chapter ) Program was launched in<br />

September <strong>2011</strong> at the (<strong>ISC</strong>) 2 <strong>Security</strong> <strong>Congress</strong><br />

in Orlando, Fla., U.S.A. Since September, we’ve<br />

received more than 30 petitions from members<br />

worldwide who are interested in starting a local<br />

chapter for a variety of reasons: to collaborate<br />

with other professionals with common interests;<br />

to create awareness of the profession throughout<br />

society; and to share information to advance the<br />

knowledge of others, just to name a few.<br />

� ose who have already formed or joined a chapter<br />

can attest to the numerous bene� ts. Here are<br />

some step-by-step guidelines for forming an (<strong>ISC</strong>) 2<br />

Chapter in your local community:<br />

1. Review the (<strong>ISC</strong>)² Chapter Guidelines online: � i s<br />

document provides details on the chapter<br />

structure and requirements needed to get your<br />

chapter started. Visit https://www.isc2.org/CHstart/default.aspx.<br />

2. Petition to form an (<strong>ISC</strong>)² Chapter: Complete and<br />

submit an (<strong>ISC</strong>)² Chapter Charter Petition form.<br />

Upon approval, (<strong>ISC</strong>) 2 For more details about the (<strong>ISC</strong>)<br />

will reserve your right to<br />

form a chapter in your requested territory.<br />

3. Submit an (<strong>ISC</strong>)² Chapter Charter Application:<br />

Complete and return the chapter application<br />

with a minimum of 15 (<strong>ISC</strong>)² members’ signatures<br />

to start the application process.<br />

2 Chapter Program,<br />

visit www.isc2.org/chapters.<br />

(<strong>ISC</strong>) 2 CHAPTERS FORMING WORLDWIDE<br />

Since the launch of the (<strong>ISC</strong>) 2 Chapter Program, we’ve<br />

received numerous petitions to start chapters worldwide.<br />

Below is a list of chartering and existing chapters. For<br />

an updated listing or contact information, visit the (<strong>ISC</strong>) 2<br />

Chapter Directory at www.isc2.org/ch-directory.<br />

AMERICAS<br />

Canada - Winnipeg, Manitoba<br />

Mexico<br />

U.S.A. - California - Los Angeles<br />

U.S.A. - D.C. - National Capitol Region<br />

U.S.A. - Florida – Orlando<br />

ASIA-PACIFIC<br />

India - Chennai<br />

India - Mumbai<br />

Indonesia<br />

Japan<br />

Korea<br />

U.S.A. - Florida - Panhandle<br />

Pakistan<br />

U.S.A. - Florida - South Florida<br />

Sri Lanka – Colombo<br />

U.S.A. - Florida - Southwest Florida<br />

U.S.A. - Florida - Tampa Bay<br />

EMEA<br />

U.S.A. - Georgia - Middle Georgia<br />

U.S.A. - Indiana - Indianapolis<br />

U.S.A. - Minnesota - Twin Cities<br />

U.S.A. - NE Florida / S Georgia<br />

U.S.A. - Nebraska – Omaha<br />

U.S.A. - New York - New York Metro<br />

U.S.A. - Ohio - Central Ohio<br />

U.S.A. - Pennsylvania - Lehigh Valley<br />

Germany<br />

Ghana<br />

Israel<br />

Kenya<br />

Romania<br />

Saudi Arabia<br />

Spain<br />

Switzerland<br />

U.S.A. - Texas - Lackland AFB<br />

Tunisia<br />

ISSUE NUMBER 16 INFOSECURITY PROFESSIONAL 21


<strong>The</strong> Information <strong>Security</strong> Associations and Organizations listed in this section represent the vast array of professional<br />

groups that support the international information security community. <strong>The</strong>se associations and organizations offer<br />

information security education, opportunities for networking, reference materials, as well as periodic meetings and<br />

publications. Many are membership organizations that provide access to special events, research and other resources<br />

for information security practitioners.<br />

Visit http://resourceguide.isc2.org for additional resource Spotlights from (<strong>ISC</strong>) 2 .<br />

Online Resources<br />

A host of helpful resources listed by region and category. Please note<br />

that most sites offer English content in whole or in part.<br />

Organizational <strong>Security</strong><br />

Resources Online<br />

NORTH AND SOUTH AMERICA<br />

Alta Associates, Inc., Executive<br />

Recruitment<br />

www.altaassociates.com<br />

Brazilian Computer Emergency<br />

Response Team (NBSO)<br />

www.nbso.nic.br/index-en.html<br />

Brazilian Computer <strong>Security</strong> and Incident<br />

Response Teams (CSIRTs)<br />

www.nbso.nic.br/contact-br.html<br />

Brazilian Honeypots Alliance<br />

Distributed Honeypots Project<br />

www.honeypots-alliance.org.br<br />

Business Software Alliance<br />

www.bsa.org<br />

Center for Internet <strong>Security</strong><br />

www.cisecurity.org<br />

Common Criteria Portal<br />

www.commoncriteriaportal.org<br />

Common Vulnerabilities and<br />

Exposures (CVE)<br />

http://cve.mitre.org<br />

CyberLawEnforcement.org<br />

www.wiredcops.org<br />

Electronic Privacy Information Center<br />

www.epic.org<br />

Executive Women’s Forum<br />

www.infosecuritywomen.com<br />

Forum of Incident Response and<br />

<strong>Security</strong> Teams (FIRST)<br />

www.fi rst.org<br />

Grupo de Trabalho em SeguranÁa<br />

(GTS) de Redes<br />

(Network <strong>Security</strong> Working Group)<br />

http://gts.nic.br<br />

High-Tech Crime Network<br />

www.htcn.org<br />

<strong>The</strong> Honeynet.BR Project<br />

www.honeynet.org.br<br />

IEEE Computer Society’s Technical<br />

Committee on <strong>Security</strong> and Privacy<br />

www.ieee-security.org<br />

Information Assurance Technical<br />

Framework Forum (IATFF)<br />

http://www.javvin.com/networksecurity/<br />

IATTF.html<br />

Information <strong>Security</strong> Forum<br />

www.securityforum.org<br />

22 INFOSECURITY PROFESSIONAL ISSUE NUMBER 16<br />

Spotlight on <strong>2011</strong><br />

Professional Associations and Organizations<br />

ISACA<br />

www.isaca.org<br />

Information Systems <strong>Security</strong><br />

Association (ISSA)<br />

www.issa.org<br />

Information Technology Association of<br />

America, Information <strong>Security</strong> (ITAA)<br />

www.itaa.org<br />

Info<strong>Security</strong> Task Force<br />

www.istf.com.br<br />

Insecure.org<br />

www.insecure.org<br />

<strong>The</strong> International Association for<br />

Cryptologic Research (IACR)<br />

www.iacr.org<br />

(<strong>ISC</strong>) 2<br />

www.isc2.org<br />

<strong>The</strong> Internet Engineering Task Force<br />

www.ietf.org<br />

Internet Storm Center, <strong>The</strong> SANS Institute<br />

http://isc.sans.edu<br />

Multi-State Information Sharing and<br />

Analysis Center (MS-ISAC)<br />

www.msisac.org<br />

Network Information Center (NIC)<br />

Brazil <strong>Security</strong> Office-<strong>Security</strong> Related<br />

Links<br />

www.nbso.nic.br/links<br />

Network Reliability and Interoperability<br />

Council<br />

www.nric.org<br />

OASIS<br />

www.oasis-open.org<br />

Organisation for Economic Cooperation<br />

and Development (OECD)<br />

Guidelines for <strong>Security</strong> of Information<br />

Systems and Networks<br />

www.oecd.org<br />

Open Vulnerability Assessment Language<br />

(OVAL)<br />

http://oval.mitre.org<br />

SANS Glossary of Terms Used in <strong>Security</strong><br />

and Intrusion Detection<br />

www.sans.org/resources/glossary.php<br />

<strong>The</strong> SANS Institute<br />

www.sans.org<br />

TechTarget <strong>Security</strong> Glossary of Terms<br />

TechWeb Tech Encyclopedia<br />

www.techweb.com/encyclopedia<br />

World Wide Web Consortium,<br />

W3C <strong>Security</strong> Resources<br />

www.w3.org/<strong>Security</strong><br />

ASIA-PACIFIC<br />

Asia PKI Consortium<br />

http://www.apkic.org<br />

Center for Information on <strong>Security</strong> Trade<br />

Control, Japan<br />

www.cistec.or.jp<br />

China PKI Forum<br />

Conformity Assessment Scheme<br />

for Information <strong>Security</strong> Management<br />

Systems (ISMS)<br />

www.isms.jipdec.jp/en<br />

CSEC: Computer <strong>Security</strong> Group<br />

Information Processing Society<br />

of Japan (IPSJ)<br />

www.sdl.hitachi.co.jp/csec/en<br />

Electronics and Telecommunications<br />

Research Institute<br />

Hong Kong PKI Forum (HKPKIF)<br />

www.hkpkiforum.org.hk<br />

Information and Communication <strong>Security</strong><br />

(Taiwan)<br />

http://ics.stpi.org.tw<br />

Information Processing Society of Japan<br />

Information Technology Standard Commission<br />

of Japan (ITSCJ)<br />

www.itscj.ipsj.or.jp/eg<br />

<strong>The</strong> Institute of Electronics, Information<br />

and Communication Engineers<br />

www.ieice.org/eng<br />

Internet Association Japan<br />

www.iajapan.org<br />

National Cyber <strong>Security</strong> Awareness<br />

Month (NCSA)<br />

www.staysafeonline.info<br />

ISEC <strong>Security</strong> Center, Information Technology<br />

Promotion Agency (IPA), Japan<br />

www.ipa.go.jp/security/jisec/jisec_e/<br />

index.html<br />

Japan Information Processing Development<br />

Corporation<br />

www.jipdec.jp/eng<br />

Japan Information Technology<br />

Services Industry Association<br />

www.jisa.or.jp/security<br />

Japan Electronics and Information<br />

Technology Industries Association<br />

Information Technology <strong>Security</strong> Center<br />

http://www.jeita.or.jp/english<br />

Korea Early Warning Information<br />

<strong>Security</strong> (EWIS) Forum<br />

Korea Institute of Science and<br />

Technology Information<br />

www.kisti.re.kr


Korean Linux Documentation<br />

Project (KLDP)<br />

http://kldp.org<br />

Macao Post eSignTrust Certification<br />

Services, Pilot Project Information<br />

http://www.esigntrust.com/en<br />

New Media Development Association<br />

(NMDA)<br />

www.nmda.or.jp/index-en.html<br />

Taiwan Information <strong>Security</strong> Center<br />

www.twisc.org<br />

<strong>The</strong> Telecommunication Technology<br />

Committee<br />

www.ttc.or.jp/e/index.html<br />

EUROPE, MIDDLE EAST, AFRICA<br />

Alliance Against IP <strong>The</strong>ft<br />

www.allianceagainstiptheft.co.uk<br />

Associazione Nazionale Specialisti per la<br />

Sicurezza in Aziende di Intermediazione<br />

Finanziaria (ANSSAIF)<br />

www.anssaif.it<br />

CERT Renater<br />

www.renater.fr/Securite/CERT_Renater.htm<br />

CERT-IST<br />

www.cert-ist.com<br />

Competence Center for Applied <strong>Security</strong><br />

Technology (CAST) Forum<br />

www.en.cast-forum.de/home<br />

Fraud Advisory Panel<br />

www.fraudadvisorypanel.org<br />

Intellect<br />

ITEK<br />

www.itek.dk<br />

tScheme<br />

www.tscheme.org<br />

Educational Resources Online<br />

NORTH AND SOUTH AMERICA<br />

SC Scholars<br />

Online learning program for application security<br />

education www.scscholars.com<br />

American Association of Community<br />

Colleges<br />

www.aacc.nche.edu<br />

Association of Universities and<br />

Colleges of Canada<br />

www.aucc.ca<br />

CERT Coordination Center OCTAVE<br />

Information, (Operationally Critical Threat,<br />

Asset and Vulnerability Evaluation)<br />

www.cert.org/octave<br />

Common Event Enumeration (CEE)<br />

A Standard Log Language for Event<br />

Interoperability in Electronic Systems<br />

http://cee.mitre.org<br />

Common Weakness Enumeration (CWE)<br />

A Community-Developed Dictionary of Software<br />

Weakness Types<br />

http://cwe.mitre.org<br />

Common Configuration Enumeration<br />

(CCE), Unique Identifi ers for Common<br />

System Confi guration Issues<br />

http://cce.mitre.org<br />

Common Attack Pattern Enumeration<br />

and Classification (CAPEC)<br />

A Community Knowledge Resource for Building<br />

<strong>Security</strong> Software<br />

http://capec.mitre.org<br />

International Association of Privacy<br />

Professionals<br />

<strong>The</strong> World’s Largest Organization Representing<br />

the Privacy Profession<br />

www.privacyassociation.org<br />

Computer Emergency Response Team<br />

(CERT) Coordination Center<br />

Carnegie Mellon University, Software<br />

Engineering Institute<br />

www.cert.org<br />

Privacy Tracker<br />

<strong>The</strong> Online Resource for U.S. and State<br />

Privacy Legislation<br />

www.privacytracker.org<br />

Making <strong>Security</strong> Measurable (MSM)<br />

A Collection of Information <strong>Security</strong> Community<br />

Standardization Activities and Initiatives<br />

http://makingsecuritymeasurable.mitre.org<br />

Insecure.Org — <strong>Security</strong> News and Updates<br />

http://insecure.org<br />

George Mason University, Center for<br />

Secure Information Systems<br />

Computer <strong>Security</strong> Related Links<br />

http://csis.gmu.edu<br />

Idaho State University, National<br />

Information Assurance Training and<br />

Education Center (NIATEC)<br />

http://niatec.info/orglinks.htm<br />

Learning Tree International<br />

www.learningtree.com<br />

National Academic Consortium for<br />

Homeland <strong>Security</strong><br />

National Information Assurance<br />

Training and Education Center<br />

http://niatec.info<br />

National Science Foundation, Federal Cyber<br />

Service: Scholarship for Service (SFS)<br />

www.nsf.gov/funding/pgm_summ.<br />

jsp?pims_id=5228&org=OCI<br />

Purdue University, <strong>The</strong> Center for<br />

Education and Research in Information<br />

Assurance and <strong>Security</strong> (CERIAS)<br />

Tools and Resources<br />

www.cerias.purdue.edu/tools_and_resources<br />

University of Dallas, Center for<br />

Information Assurance, IA Recommended<br />

Links and Information Sources<br />

University of Tulsa, Center for Information<br />

<strong>Security</strong><br />

www.cis.utulsa.edu<br />

ASIA-PACIFIC<br />

Australian Education Network<br />

University and College Guide<br />

Center for Information <strong>Security</strong> and<br />

Cryptography (C<strong>ISC</strong>)<br />

www.cs.hku.hk/cisc<br />

China Education and Research Network<br />

www.edu.cn/HomePage/english<br />

Joint University Programmes Admissions<br />

System<br />

http://web.jupas.edu.hk/jupas/jupasFront.htm<br />

EUROPE, MIDDLE EAST, AFRICA<br />

Politecnico di Milano e CEFRIEL<br />

Corso die alta formazione in Information<br />

<strong>Security</strong> Management<br />

www.securman.it<br />

For Consumers, Families<br />

and Educators<br />

NORTH AND SOUTH AMERICA<br />

Association for Computer <strong>Security</strong> Day<br />

www.computersecurityday.org<br />

Childnet International<br />

www.childnet-int.org<br />

<strong>The</strong> Cyber Citizen Partnership<br />

http://cybercitizenship.org<br />

Cyberethics for Kids<br />

www.cybercrime.gov/rules/kidinternet.htm<br />

CyberSmart! School Program<br />

www.cybersmart.org<br />

Educational Technology Clearinghouse-<br />

Internet Safety Student Sites<br />

http://etc.usf.edu/security<br />

GetNetWise-About <strong>Security</strong><br />

http://security.getnetwise.org<br />

Home Network <strong>Security</strong><br />

CERT Coordination Center<br />

www.cert.org/tech_tips/home_networks.html<br />

i-SAFE America<br />

www.isafe.org<br />

Keeping Internet Kids Safe<br />

www.kiks.org<br />

KidSafe.com<br />

www.kidsafe.com<br />

Net Family News: Online Safe Resources<br />

for Kids and Families<br />

http://netfamilynews.org<br />

NetSafe Kids<br />

www.nap.edu/netsafekids<br />

<strong>The</strong> NetSmartz Workshop<br />

www.netsmartz.org<br />

Online Safety Project: Family Guide<br />

to the Internet and Technology<br />

www.safekids.com<br />

Ready Kids<br />

http://www.ready.gov/kids<br />

Stay Safe Online, sponsored by the<br />

National Cyber <strong>Security</strong> Alliance<br />

(Public and private sector sponsors)<br />

www.staysafeonline.info<br />

U.S. Department of Education Internet<br />

Safety Page<br />

www.ed.gov/about/offi ces/list/os/<br />

technology/safety.html<br />

U.S. Secret Service Safe School Initiative<br />

National Threat Assessment Center<br />

www.secretservice.gov/ntac_ssi.shtml<br />

WiredSafety<br />

ASIA-PACIFIC<br />

China Times<br />

<strong>Security</strong> Information for Children<br />

http://news.chinatimes.com/Chinatimes/<br />

index2004/Compontent/inc-index2004-<br />

Compontent-00top-01-safe/0,4163,,00.html<br />

Cyber Ethics for Students and Youth<br />

Education and Manpower Bureau, Hong Kong<br />

http://cesy.qed.hkedcity.net<br />

e-<strong>Security</strong> Malaysia<br />

http://esecurity.org.my<br />

<strong>The</strong> Hong Kong Association of Banks<br />

http://www.hkab.org.hk/index.jsp<br />

Hong Kong Ethics Development Centre<br />

www.icac.org.hk/hkedc/eng/library2.asp<br />

Hong Kong Monetary Authority<br />

www.info.gov.hk/hkma/eng/consumer/<br />

internet_banking_index.htm<br />

ISSUE NUMBER 16 INFOSECURITY PROFESSIONAL 23


NetSafe: <strong>The</strong> Internet Safety Group<br />

www.netsafe.org.nz<br />

SingCert<br />

Young New Zealanders’ Foundation<br />

Internet Safety<br />

www.4safetytoday.com/internet-safety.php<br />

EUROPE, MIDDLE EAST, AFRICA<br />

Safe Surfing with Doug<br />

www.disney.co.uk/DisneyOnline/Safesurfi ng<br />

Bank Safe Online UK<br />

www.banksafeonline.org.uk<br />

BSI für Bürger<br />

www.bsi-fuer-buerger.de<br />

Chatdanger<br />

www.chatdanger.com<br />

Action for Children<br />

www.actionforchildren.org.uk<br />

ComReg-<strong>The</strong> Consumer Website of the<br />

Commission for Communications Regulation<br />

www.askcomreg.ie<br />

e-handelsfonden<br />

www.forbrugersikkerhed.dk<br />

makeITsecure.ie<br />

www.makeitsecure.ie<br />

secure-it.nrw<br />

www.secure-it.nrw.de<br />

think U know<br />

www.thinkuknow.co.uk<br />

Industry Portals —<br />

Resources Online<br />

NORTH AND SOUTH AMERICA<br />

Alta Associates<br />

www.altaassociates.com<br />

Help Net <strong>Security</strong><br />

http://www.net-security.org<br />

Government<strong>Security</strong>.org<br />

www.Government<strong>Security</strong>.org<br />

<strong>The</strong> Association for Computing<br />

Machinery Portal<br />

http://portal.acm.org/portal.cfm<br />

<strong>The</strong> Biometric Consortium<br />

www.biometrics.org<br />

Biometric Industry Resource Guide<br />

www.fi ndbiometrics.com<br />

Dictionary of Computer <strong>Security</strong> Terms<br />

www.itsecurity.com<br />

e<strong>Security</strong>Planet.com<br />

www.esecurityplanet.com<br />

<strong>The</strong> Ethical Hacker Network<br />

www.ethicalhacker.net<br />

Federal News Radio<br />

www.FederalNewsRadio.com<br />

Firewall.com<br />

www.fi rewall.com<br />

Identity Management Solutions Information<br />

www.insideid.com<br />

IT Toolbox-Knowledge Portal for <strong>Security</strong><br />

Professionals<br />

http://security.ittoolbox.com<br />

Linux <strong>Security</strong> Information<br />

www.linuxsecurity.com<br />

Modulo <strong>Security</strong><br />

(Portal of Information <strong>Security</strong>)<br />

www.modulo.com.br<br />

Neil’s <strong>Security</strong> and Privacy Resources<br />

www.jjtc.com/<strong>Security</strong><br />

24 INFOSECURITY PROFESSIONAL ISSUE NUMBER 16<br />

Search<strong>Security</strong>.com<br />

http://searchsecurity.techtarget.com<br />

<strong>Security</strong>Focus News and Information<br />

www.securityfocus.com<br />

<strong>Security</strong> News Portal for Information<br />

Systems <strong>Security</strong> Professionals<br />

www.securitynewsportal.com<br />

SRI International Computer Science<br />

Laboratory<br />

www.csl.sri.com<br />

InfoSysSec.com<br />

www.InfoSysSec.com<br />

<strong>Security</strong>ForumX.com<br />

www.<strong>Security</strong>ForumX.com<br />

<strong>Security</strong>ChatX.com<br />

www.<strong>Security</strong>ChatX.com<br />

Windows <strong>Security</strong>.com-Network<br />

<strong>Security</strong> Library<br />

http://www.windowsecurity.com/whitepapers<br />

<strong>The</strong> Open Web Application <strong>Security</strong> Project<br />

www.owasp.org<br />

ASIA-PACIFIC<br />

Australian <strong>Security</strong> Industry<br />

Association Limited<br />

www.asial.com.au<br />

eSafety Channel<br />

http://security.zol.com.cn<br />

InfoSec Hong Kong<br />

www.infosechk.org<br />

EUROPE, MIDDLE EAST, AFRICA<br />

Biometrie-Online<br />

http://www.biometrie-online.net<br />

ICT Ireland<br />

www.ictireland.ie<br />

ICT Switzerland<br />

www.ictswitzerland.ch/de<br />

Internet Services Providers’ Association<br />

(ISPA)<br />

www.ispa.org.uk<br />

Internet Watch Foundation<br />

www.iwf.org.uk<br />

Irish Information <strong>Security</strong> Forum<br />

www.iisf.ie<br />

Nigerian Computer Society<br />

www.nigeriancomputersociety.com<br />

.SE (<strong>The</strong> Internet Infrastructure Foundation)<br />

www.iis.se<br />

<strong>Security</strong>manager.de<br />

www.securitymanager.de<br />

Secuser.com<br />

www.secuser.com<br />

<strong>Security</strong>Vibes.com<br />

http://www.securityvibes.com/fr<br />

Government Online Resources<br />

NORTH AND SOUTH AMERICA<br />

DoD IA Policy Chart<br />

http://iac.dtic.mil/iatac/ia_policychart.html<br />

Federal Republic of Brazil<br />

www.brasil.gov.br<br />

Ministry of Communications<br />

www.mc.gov.br<br />

Ministry of Justice<br />

www.mj.gov.br<br />

Ministry of Science and Technology<br />

www.mct.gov.br<br />

National Institute of Technology<br />

www.int.gov.br<br />

Canadian <strong>Security</strong> and Intelligence Service<br />

www.csis-scrs.gc.ca<br />

Communications <strong>Security</strong> Establishment<br />

Canada’s National Cryptologic Agency<br />

www.cse-cst.gc.ca<br />

Office of the Privacy Commissioner<br />

of Canada<br />

www.privcom.gc.ca/index_e.asp<br />

Public Safety and Emergency<br />

Preparedness Canada<br />

www.psepc-sppcc.gc.ca<br />

Banco de México (Central Bank)<br />

www.banxico.gob.mx<br />

Mexican Secretariat of Communications<br />

and Transportation<br />

www.sct.gob.mx<br />

MEXOnline.com Guide to México<br />

(Government Sites)<br />

www.mexonline.com/mexagncy.htm<br />

Servicio de Administracion Tributaria (SAT)<br />

www.sat.gob.mx<br />

U.S. DEPARTMENT OF COMMERCE<br />

Computer <strong>Security</strong> Resource Center<br />

http://csrc.nist.gov<br />

<strong>The</strong> Common Criteria Evaluation and<br />

Validation Scheme (CCEVS)<br />

www.niap-ccevs.org/cc-scheme<br />

Computer <strong>Security</strong> Division, Information<br />

Technology Laboratory<br />

http://csrc.nist.gov<br />

Cyber <strong>Security</strong> Tips-Small Business<br />

Corner, Computer <strong>Security</strong> Resource<br />

Center, National Institute of Standards<br />

and Technology<br />

http://csrc.nist.gov/groups/SMA/sbc/<br />

index.html<br />

National Institute of Standards and<br />

Technology, Computer <strong>Security</strong> Portal<br />

www.nist.gov/computer-security-portal.cfm<br />

Public/Private <strong>Security</strong> Practices<br />

www.csrc.nist.gov/pcig/ppsp.html<br />

Federal Computer <strong>Security</strong> Program<br />

Managers Forum, Computer <strong>Security</strong><br />

Resource Center<br />

http://csrc.nist.gov/organizations/cspmf.html<br />

National Information Assurance Training<br />

and Education Center<br />

http://niatec.info/ViewPage.aspx?id=0<br />

Awareness, Training and Education,<br />

National Institute of Standards and<br />

Technology<br />

http://csrc.nist.gov/groups/SMA/ate/<br />

index.html<br />

U.S. DEPARTMENT OF DEFENSE<br />

Central <strong>Security</strong> Service, Information<br />

Assurance<br />

www.nsa.gov/ia<br />

Information Assurance Technical<br />

Framework Forum (IATFF), National<br />

<strong>Security</strong> Agency-sponsored public/<br />

private/academic forum<br />

www.iatf.net<br />

National IA Education & Training Program<br />

http://www.nsa.gov/ia/academic_outreach/<br />

iace_program/niaetp.shtml<br />

National <strong>Security</strong> Agency<br />

www.nsa.gov/ia<br />

Center for High Assurance Computing Systems<br />

(CHACS), Information Technology<br />

Division, Naval Research Laboratory<br />

http://www.nrl.navy.mil/chacs<br />

Defense Information Systems Agency<br />

(DISA), Information Assurance Support<br />

Environment (IASE), <strong>The</strong> DOD IA Portal<br />

http://iase.disa.mil


Department of Defense<br />

www.defenselink.mil<br />

Department of Defense Information<br />

Assurance Working Groups<br />

http://iase.disa.mil/ia-working-groups.html<br />

U.S. Marine Corps C4II Information<br />

Assurance Division<br />

<strong>The</strong> Information Assurance Technology<br />

Analysis Center (IATAC), Defense Technical<br />

Information Center (DTIC), Defense<br />

Information Systems Agency (DISA)<br />

http://iac.dtic.mil/iatac<br />

EXECUTIVE OFFICE OF THE PRESIDENT<br />

Homeland <strong>Security</strong> Information<br />

www.whitehouse.gov/issues/homeland-security<br />

National Commission on Terrorist Attacks<br />

Upon the United States<br />

www.9-11commission.gov<br />

Office of Management and Budget<br />

Guidance on FISMA<br />

www.whitehouse.gov/omb/memoranda/<br />

m03-19.pdf<br />

U.S. DEPARTMENT OF ENERGY<br />

Offi ce of the CIO, Cyber<strong>Security</strong> Page<br />

http://cio.energy.gov/cybersecurity.htm<br />

Information <strong>Security</strong> Resource Center<br />

(ISRC), Pacific Northwest, National<br />

Laboratory (PNNL)<br />

National Nuclear <strong>Security</strong> Administration<br />

www.nnsa.doe.gov<br />

U.S. DEPARTMENT OF<br />

HOMELAND SECURITY<br />

National Strategy to Secure Cyberspace<br />

www.dhs.gov/fi les/publications/editorial_<br />

0329.shtm<br />

Build <strong>Security</strong> In Home<br />

https://buildsecurityin.us-cert.gov/daisy/<br />

bsi/home.html<br />

Emergency Preparedness Guidance<br />

(Ready.gov), Specific Threats and<br />

Responses<br />

www.ready.gov<br />

Homeland <strong>Security</strong> Advanced Research<br />

Projects Agency (HSARPA)<br />

http://www.dhs.gov/fi les/grants/scitech.shtm<br />

Homeland <strong>Security</strong> Advisory System<br />

www.dhs.gov/dhspublic/display?theme=29<br />

National Infrastructure Advisory Council,<br />

Vulnerability Disclosure Framework<br />

www.dhs.gov/xlibrary/assets/vdwgreport.pdf<br />

National Infrastructure Protection Plan<br />

www.dhs.gov/dhspublic/interapp/editorial/<br />

editorial_0827.xml<br />

Protected Critical Infrastructure<br />

Information (PCII) Program<br />

http://www.dhs.gov/fi les/programs/<br />

editorial_0404.shtm<br />

State Homeland <strong>Security</strong> Contacts<br />

www.dhs.gov/xgovt/editorial_0291.shtm<br />

U.S. Department of Homeland <strong>Security</strong><br />

www.dhs.gov<br />

<strong>The</strong> U.S. Computer Emergency<br />

Readiness Team, <strong>The</strong> National<br />

Cyber <strong>Security</strong> Response System<br />

www.us-cert.gov<br />

U.S. DEPARTMENT OF JUSTICE<br />

Federal Bureau of Investigation,<br />

Cyber Crime Portal<br />

www.fbi.gov/about-us/investigate/cyber/cyber<br />

Computer Crime and Intellectual Property<br />

Section (CCIPS) of the Criminal Division,<br />

National Computer Crime Center<br />

www.cybercrime.gov<br />

InfraGard, Federal Bureau of Investigation<br />

www.infragard.net<br />

Internet Crime Complaint Center (IC3)<br />

www.ic3.gov<br />

U.S. GENERAL SERVICES<br />

ADMINISTRATION<br />

Privacy Program<br />

www.gsa.gov/portal/category/21419<br />

OTHER U.S. GOVERNMENT<br />

AGENCY RESOURCES<br />

Biometrics.gov<br />

www.biometrics.gov<br />

Central Intelligence Agency<br />

https://www.cia.gov<br />

Committee on National <strong>Security</strong> Systems<br />

www.cnss.gov<br />

Federal Chief Information Officers Council<br />

www.cio.gov<br />

Federal Trade Commission, FTC Identity<br />

<strong>The</strong>ft Guidelines<br />

www.consumer.gov/idtheft<br />

Federal Trade Commission, Online<br />

<strong>Security</strong>-Related Resources<br />

www.onguardonline.gov<br />

U.S. General Services Administration<br />

Information <strong>Security</strong> Program<br />

www.gsa.gov/portal/content/104257<br />

Interagency OPSEC Support Staff<br />

www.ioss.gov<br />

National Communications System<br />

www.ncs.gov<br />

National Coordinating Center for<br />

Telecommunications (NCC)<br />

www.ncs.gov/ncc<br />

National Science Foundation, Digital<br />

Government Research Program<br />

www.digitalgovernment.org<br />

National Science Foundation, Office of<br />

Cyberinfrastructure (OCI)<br />

www.nsf.gov/div/index.jsp?div=OCI<br />

Office of the Director of National<br />

Intelligence<br />

www.dni.gov<br />

Office of the National Counterintelligence<br />

Executive (ONCIX)<br />

ASIA-PACIFIC<br />

State Information Center<br />

www.sic.gov.cn<br />

Commerce, Industry and Technology<br />

Bureau, Anti-Spam<br />

www.antispam.gov.hk<br />

Commerce and Industry Branch<br />

Intellectual Property Protection<br />

www.citb.gov.hk/cib/ehtml/intell.html<br />

Department of Justice<br />

Bilingual Laws Information System<br />

www.legislation.gov.hk<br />

Other U.S. Government Agency Resources<br />

Office of Personnel Management, Scholarship<br />

for Service, Cyber Corps-Defending<br />

America’s Cyberspace<br />

www.sfs.opm.gov<br />

Other U.S. Government Agency Resources<br />

OnGuard Online<br />

http://onguardonline.gov/index.html<br />

Attorney-General’s Department<br />

Crime Prevention<br />

www.ag.gov.au/agd/WWW/ncphome.nsf/<br />

Page/Information_Kits<br />

Australian Federal Police<br />

Australian High Tech Crime Centre<br />

www.afp.gov.au/policing/e-crime.aspx<br />

Australian Government Information<br />

Management Office (AGIMO)<br />

www.agimo.gov.au/infrastructure<br />

Australian National Audit Office<br />

www.anao.gov.au<br />

Australian National <strong>Security</strong><br />

www.ag.gov.au/agd/www/National<strong>Security</strong>.nsf<br />

Department of Defence<br />

Information <strong>Security</strong> Page, Defence Signals<br />

Directorate www.dsd.gov.au/infosec/index.htm#<br />

Department of Defence<br />

Cyber <strong>Security</strong> Operations Centre, Defence<br />

Signals Directorate<br />

www.dsd.gov.au/infosec/csoc.htm<br />

Department of Finance and Administration<br />

www.fi nance.gov.au<br />

Department of Foreign Affairs and Trade<br />

www.dfat.gov.au<br />

National Archives of Australia<br />

www.naa.gov.au<br />

<strong>The</strong> Office of the Federal Privacy<br />

Commissioner<br />

www.privacy.gov.au<br />

OnSecure<br />

Online <strong>Security</strong> Resources and Incident Reporting<br />

System for Australian Government Agencies<br />

www.onsecure.gov.au<br />

Protective <strong>Security</strong> Coordination Centre<br />

http://www.ag.gov.au/www/agd/agd.nsf/<br />

Page/<strong>Security</strong>training_PSCCTrainingCentre<br />

China Information Technology <strong>Security</strong><br />

Certification Center<br />

www.itsec.gov.cn/webportal/portal.po<br />

<strong>The</strong> Ministry of Industry and Information<br />

Technology of the People’s Republic of<br />

China<br />

www.mii.gov.cn<br />

<strong>The</strong> Ministry of Public <strong>Security</strong> of the<br />

People’s Republic of China<br />

www.mps.gov.cn<br />

National Information <strong>Security</strong> Standard<br />

Technical Committee (China)<br />

www.tc260.org.cn<br />

Standardization Administration of China<br />

www.sac.gov.cn<br />

State Council of the People’s Republic of<br />

China<br />

China Legislative Information Network System<br />

http://english.people.com.cn/data/organs/<br />

statecouncil.shtml<br />

Digital 21 Strategy<br />

www.info.gov.hk/digital21<br />

Hong Kong Monetary Authority<br />

www.info.gov.hk/hkma/index.htm<br />

<strong>The</strong> Independent Commission Against<br />

Corruption (ICAC)<br />

Corruption Prevention Department,<br />

Information Systems <strong>Security</strong> Checklist<br />

www.icac.org.hk<br />

Office of Government Chief Information<br />

Officer<br />

www.ogcio.gov.hk<br />

<strong>Security</strong> Bureau<br />

www.sb.gov.hk<br />

<strong>Security</strong> Bureau<br />

Hong Kong Police Force, Commercial Crime<br />

Bureau-Technology Crime Division<br />

www.info.gov.hk/police/hkp-home/english/tcd<br />

Government PKI<br />

Independent Administrative Agency<br />

National Institute of Advanced Industrial<br />

Science and Technology- SecureIT<br />

http://www.aist.go.jp/index_en.html<br />

ISSUE NUMBER 16 INFOSECURITY PROFESSIONAL 25


National Institute of Information and<br />

Communications Technology<br />

http://www.nict.go.jp/index.html<br />

National Institute of Technology and<br />

Evaluation, International Accreditation Japan<br />

http://www.iajapan.nite.go.jp/iajapan/en/<br />

index.html<br />

Office of IT <strong>Security</strong> Policy<br />

www.meti.go.jp/policy/netsecurity/index.html<br />

Agency for Defense Development (Korea)<br />

www.add.re.kr<br />

Cyber Terror Response Center (CTRC)<br />

www.ctrc.go.kr<br />

Defense <strong>Security</strong> Command<br />

www.dsc.or.kr<br />

Korean National Police Agency (KNPA)<br />

www.police.go.kr/eng<br />

Ministry of Government Administration<br />

and Home Affairs, National Emergency<br />

Management Agency (NEMA)<br />

www.nema.go.kr/eng<br />

Ministry of National Defense<br />

www.mnd.go.kr<br />

Ministry of Science, Technology and<br />

Innovation<br />

www.mosti.gov.my<br />

Ministry of Science, Technology and<br />

Innovation, Cyber<strong>Security</strong> Malaysia<br />

(formerly known as NISER)<br />

www.cybersecurity.org.my/en<br />

Prime Minister’s Department<br />

Chief Government <strong>Security</strong> Offi ce<br />

www.cgso.jpm.my<br />

Centre for Critical Infrastructure Protection<br />

www.ccip.govt.nz<br />

<strong>The</strong> Department of Internal Affairs<br />

Internet Safety<br />

www.dia.govt.nz/diawebsite.nsf<br />

Government Communications <strong>Security</strong><br />

Bureau<br />

www.gcsb.govt.nz<br />

New Zealand Customs Service<br />

www.customs.govt.nz<br />

New Zealand Police, eCrime Lab<br />

www.police.govt.nz/ecrime<br />

<strong>The</strong> Privacy Commissioner<br />

www.privacy.org.nz<br />

Trust and <strong>Security</strong><br />

www.e.govt.nz/policy/trust-security<br />

National Computer Center<br />

www.ncc.gov.ph<br />

Philippines National Police, Computer Crimes<br />

www.pnp.gov.ph<br />

Agency for Science, Technology and<br />

Research (A*STAR)<br />

Institute for Infocomm Research, Cryptography<br />

& <strong>Security</strong> Department (CAS)<br />

www.i2r.a-star.edu.sg/icsd<br />

Centre for Strategic Infocomm Technologies<br />

www.csit.gov.sg<br />

Defence and <strong>Security</strong> eCitizen<br />

http://ds.ecitizen.gov.sg<br />

Defence Science and Technology Agency<br />

(DSTA)<br />

www.dsta.gov.sg<br />

Defence Science Organisation National<br />

Laboratories (DSO)<br />

www.dso.org.sg<br />

Infocomm Development Authority (IDA)<br />

www.ida.gov.sg<br />

Intellectual Property Office of Singapore<br />

(IPOS)<br />

www.ipos.gov.sg<br />

26 INFOSECURITY PROFESSIONAL ISSUE NUMBER 16<br />

Internal <strong>Security</strong> Department<br />

Information <strong>Security</strong> Department<br />

www.mha.gov.sg/isd/is.htm<br />

Ministry of Home Affairs<br />

www.mha.gov.sg/index.aspx<br />

Ministry of Information, Communications<br />

and the Arts (MICA)<br />

www.mica.gov.sg<br />

Singapore Police Force (SPF)<br />

www.spf.gov.sg<br />

EUROPE, MIDDLE EAST, AFRICA<br />

Ministry of Science, Technology and<br />

Innovation<br />

http://vtu.dk/<br />

CERTA<br />

www.certa.ssi.gouv.fr<br />

Serveur thématique sur la sécurité des<br />

systèmes d’information<br />

www.ssi.gouv.fr/fr/index.html<br />

BSI-Bundesamt für Sicherheit in der<br />

Informationstechnik<br />

(Federal Offi ce for Information <strong>Security</strong>)<br />

www.bsi.de<br />

Bundesministerium für Bildung und<br />

Forschung, IT-Sicherheit<br />

www.bmbf.de/de/73.php<br />

Bund.de IT-Sicherheit<br />

www.bund.de<br />

Data Protection Commissioner<br />

www.dataprotection.ie<br />

National Centre for Technology in Education<br />

www.ncte.ie<br />

Centro Nazionale per I’Informatica nella<br />

Pubblica Amministrazione (CNIPA)<br />

www.cnipa.gov.it<br />

Garante per la Protezione dei Dati Personali<br />

www.garanteprivacy.it<br />

Istituto Superiore delle Comunicazioni<br />

e delle Tecnologie dell’Informazione<br />

(<strong>ISC</strong>OM)<br />

www.isticom.it<br />

Ministero delle Comunicazione<br />

www.comunicazioni.it<br />

Ministro per le Riforme e le Innovazioni<br />

nella P.A.<br />

www.innovazione.gov.it<br />

National Information Technology<br />

Development Agency (NITDA)<br />

www.nitda.gov.ng<br />

Federal <strong>Security</strong> Service<br />

www.fsb.ru<br />

State Information Technology Agency<br />

www.sita.co.za<br />

Centre for the Protection of National<br />

Infrastructure (CPNI)<br />

www.cpni.gov.uk<br />

Centre for the Protection of National<br />

Infrastructure (CPNI)<br />

Warning, Advice and Reporting Point (WARP)<br />

www.warp.gov.uk<br />

Information Commissioner’s Office<br />

www.informationcommissioner.gov.uk<br />

<strong>The</strong> Information Warfare Site<br />

Computer and Information <strong>Security</strong><br />

www.iwar.org.uk/comsec/index.htm<br />

Publications<br />

<strong>The</strong> professional publications included in this section focus on current and emerging<br />

information security trends, tools and leadership, as well as the overall information<br />

security and technology markets. Listings include the print and online editions, a well<br />

as newsletters and professional journals. Collectively, these media resources provide<br />

a wealth of information about information security issues, strategies, case studies<br />

and technologies.<br />

NORTH AND SOUTH AMERICA<br />

(IN)SECURE Magazine<br />

http://www.net-security.org/insecuremag.php<br />

(<strong>ISC</strong>)² Journal<br />

www.isc2.org/journal<br />

Access Control and <strong>Security</strong> Systems<br />

www.securitysolutions.com<br />

ACM Transactions on Computer Systems<br />

www.acm.org/tocs<br />

ACM Transactions on Information and<br />

System <strong>Security</strong> (TISSEC)<br />

www.acm.org/pubs/tissec<br />

ACM Transactions on Information Systems<br />

www.acm.org/pubs/tois<br />

b:Secure<br />

Information <strong>Security</strong> News Website<br />

www.bsecure.com.mx<br />

Baguete<br />

IT News Website<br />

www.baguete.com.br<br />

Biometric Digest<br />

www.biodigest.com<br />

Biometric Technology Today<br />

http://www.elsevierscitech.com/nl/btt/<br />

home.asp<br />

Biometrics<br />

A Journal of the International Biometric Society<br />

http://www.biometrics.tibs.org<br />

Canadian <strong>Security</strong> Magazine<br />

www.canadiansecuritymag.com<br />

CIO (Brazil)<br />

Magazine and Website for IT and IS Managers<br />

http://cio.uol.com.br<br />

CIO Canada<br />

http://www.itworldcanada.com/publication/cio<br />

CIO Insight<br />

www.cioinsight.com<br />

CIO Magazine<br />

www.cio.com<br />

Cipher<br />

Electronic Newsletter of the Technical<br />

Committee on <strong>Security</strong> and Privacy, IEEE<br />

www.ieee-security.org/cipher.html<br />

CLEI Electronic Journal<br />

[Latin American Center for Informatics Studies]<br />

www.clei.cl/cleiej<br />

CM Bulletin<br />

[Published by National Classifi cation<br />

Management Society]<br />

www.classmgmt.com/publications


Communications and Networking<br />

www.itbusiness.ca/it/client/en/Comm_<br />

Network/Home.asp<br />

Computer Fraud and <strong>Security</strong><br />

http://www.elsevierscitech.com/nl/cfs/<br />

home.asp<br />

Computer Law and <strong>Security</strong> Review<br />

www.elsevier.com/locate/clsr<br />

Computer <strong>Security</strong> Alert<br />

[For CSI Members only]<br />

www.gocsi.com<br />

Computer World<br />

IT Technical Magazine and Website<br />

http://computerworld.uol.com.br<br />

Computers and <strong>Security</strong><br />

www.elsevier.com/locate/cose<br />

ComputerUser.com<br />

www.computeruser.com<br />

ComputerWorld<br />

www.computerworld.com<br />

ComputerWorld Canada<br />

http://www.itworldcanada.com/publication/<br />

computerworld<br />

Computing Canada<br />

www.itbusiness.ca/it/client/en/<br />

ComputerCanada/Home.asp<br />

Contingency Planning and Recovery<br />

Journal (CPR-J)<br />

www.masp.com/publications/CPR-J.html<br />

Crypto-Gram<br />

www.counterpane.com/crypto-gram.html<br />

Cryptologia<br />

www.dean.usma.edu/math/pubs/cryptologia<br />

CSO Magazine<br />

www.csoonline.com<br />

Decision and Risk Report<br />

IT, IS and Management Magazines and Websites<br />

http://www.decisionreport.com.br/publique/<br />

cgi/cgilua.exe/sys/start.htm?tpl=home<br />

Disaster Recovery Journal<br />

www.drj.com<br />

Edge<br />

www.itbusiness.ca/it/client/en/EDGE/<br />

Home.asp<br />

EDP Audit, Control and <strong>Security</strong> (EDPACS)<br />

www.auerbach-publications.com/ejournals/<br />

product_info/product_detail.asp?id=146<br />

Evidencia Digital Magazine<br />

www.guiatecnico.com.br/EvidenciaDigital<br />

eWeek<br />

www.eweek.com<br />

Federal Computer Week<br />

www.fcw.com<br />

Federal Times<br />

www.federaltimes.com<br />

Government Computer News<br />

www.gcn.com<br />

Government Executive<br />

www.govexec.com<br />

Government <strong>Security</strong> News<br />

www.gsnmagazine.com<br />

Government Technology<br />

http://www.govtech.com<br />

Homeland Defense Journal<br />

http://homelanddefense.epubxpress.com<br />

HSToday Magazine<br />

www.HSToday.us<br />

IEEE Communications Society<br />

www.comsoc.org<br />

IEEE Computer Society<br />

www.computer.org/computer<br />

IEEE Internet Computing<br />

www.computer.org/internet<br />

IEEE <strong>Security</strong> & Privacy<br />

www.computer.org/security<br />

Information Management and Computer<br />

<strong>Security</strong><br />

www.emeraldinsight.com/imcs.htm<br />

Information <strong>Security</strong><br />

http://searchsecurity.techtarget.com<br />

Information <strong>Security</strong> Management<br />

Handbook<br />

2009 CD-ROM Edition<br />

http://www.crcpress.com/product/<br />

isbn/9781420090987<br />

Information <strong>Security</strong> Technical Report<br />

http://www.elsevier.com/wps/fi nd/journal<br />

description.cws_home/31185/description<br />

Information <strong>Security</strong> Today<br />

www.infosectoday.com<br />

Information Technology Argentina<br />

IT News Website<br />

http://www.infotechnology.com/interior/<br />

index.php<br />

Information Week<br />

www.informationweek.com<br />

Information Week Brasil<br />

IT and IS News Website<br />

www.informationweek.com.br<br />

Information Week Chile<br />

IT News Website and Magazine<br />

www.infoweek.biz/la<br />

Information Week México<br />

IT and IS News Website<br />

www.informationweek.com.mx<br />

Infosecurity Magazine Online<br />

www.infosecurity-magazine.com<br />

Info<strong>Security</strong> Professional<br />

[for (<strong>ISC</strong>) 2 Members Only]<br />

www.isc2.org/infosecurity_professional/<br />

default.aspx<br />

InfoWorld<br />

www.infoworld.com<br />

International Journal of Information<br />

Technology and Decision Making<br />

www.worldscinet.com/ijitdm/ijitdm.shtml<br />

ISACA Journal<br />

Bimonthly<br />

www.isaca.org<br />

ISSA Journal<br />

www.issa.org/current-ij-toc.html<br />

IT Business Report<br />

www.itbusiness.ca/it/client/en/<br />

BusinessReport/Home.asp<br />

IT Web<br />

Information Technology News Website<br />

www.itweb.com.br<br />

ITworld.com<br />

www.itworld.com<br />

Journal of Cryptology<br />

www.iacr.org/jofc/jofc.html<br />

Journal of Information Technology<br />

www.palgrave-journals.com/jit<br />

Journal of Information, Law & Technology<br />

http://elj.warwick.ac.uk/jilt<br />

Journal of Management Information<br />

Systems<br />

http://www.jmis-web.org<br />

Linux Magazine<br />

IT magazine for professionals<br />

http://www.linuxmagazine.com.br/<br />

Linux<strong>Security</strong>.com<br />

www.linuxsecurity.com<br />

Magazine Scitum<br />

IT and IS Online Magazine<br />

www.magazcitum.com.mx<br />

National Defense<br />

www.nationaldefensemagazine.org<br />

Network Computing<br />

www.networkcomputing.com<br />

Network <strong>Security</strong><br />

http://www.elsevierscitech.com/nl/ns/<br />

home.asp<br />

Network World<br />

www.networkworld.com<br />

NetworkWorld Canada<br />

NewsFactor Magazine Online<br />

www.newsfactor.com<br />

PC Magazine<br />

www.pcmag.com<br />

PCWorld<br />

www.pcworld.com<br />

Privacy and <strong>Security</strong> Law Report<br />

www.bna.com/products/corplaw/pvln.htm<br />

Privacy Journal<br />

www.privacyjournal.net<br />

Public CIO<br />

www.public-cio.com<br />

Revista Gerencia<br />

IT News Magazine and Website for Managers<br />

www.gerencia.cl<br />

Revista IT Now<br />

IT and IS News Magazine and Website<br />

http://www.revistaitnow.com<br />

Revista <strong>Security</strong><br />

SC Magazine<br />

www.scmagazine.com<br />

Secure Enterprise<br />

http://www.networkcomputing.com/se/<br />

SecureID News<br />

www.secureidnews.com<br />

<strong>Security</strong><br />

www.securitymagazine.com<br />

<strong>Security</strong> Director News<br />

www.securitydirectornews.com<br />

<strong>Security</strong> Management<br />

www.securitymanagement.com<br />

<strong>Security</strong> News Portal<br />

www.securitynewsportal.com<br />

<strong>Security</strong> Port Newsletters<br />

www.security-port.com/securitynewsletters.htm<br />

<strong>Security</strong> Products and Technology News<br />

www.sptnews.ca<br />

<strong>Security</strong>InfoWatch.com<br />

www.securityinfowatch.com<br />

SIAM Journal on Computing<br />

www.siam.org/journals/sicomp.php<br />

Technology in Government<br />

www.itbusiness.ca/it/client/en/TechGovernment/Home.asp<br />

TechWeb: <strong>The</strong> Business Technology<br />

Network<br />

www.techweb.com<br />

<strong>The</strong> IAPP Privacy Advisor<br />

<strong>The</strong> Monthly Newsletter for Global Data<br />

Protection Professionals<br />

https://www.privacyassociation.org/<br />

publications/privacy_advisor<br />

<strong>The</strong> IAPP Privacy Tracker<br />

A Suite of Publications for Tracking U.S. and<br />

State Privacy Legislation<br />

www.privacytracker.org<br />

<strong>The</strong> Journal of Computer <strong>Security</strong><br />

http://jcs.stanford.edu<br />

ISSUE NUMBER 16 INFOSECURITY PROFESSIONAL 27


Virus Bulletin<br />

www.virusbtn.com<br />

Windows IT Pro<br />

www.winnetmag.com/Windows<strong>Security</strong><br />

WServer News<br />

www.wservernews.com<br />

ZDNet: Tech News and White Papers<br />

for IT Professionals<br />

www.zdnet.com<br />

ASIA-PACIFIC<br />

BenefIT (India)<br />

www.benefi tmag.com<br />

Boannews<br />

www.boannews.com<br />

China Computerworld<br />

www.ccw.com.cn<br />

China Information <strong>Security</strong><br />

www.cismag.com.cn<br />

China Network World<br />

www.cnw.com.cn/security<br />

CIO Asia<br />

www.mis-asia.com/magazines/cio_asia<br />

CIO Australia<br />

www.cio.com.au<br />

CIO Government Australia<br />

www.cio.com.au/index.php/secid;21<br />

CIO Japan<br />

www.ciojp.com<br />

CIO New Zealand<br />

http://cio.co.nz<br />

CNET Taiwan<br />

http://taiwan.cnet.com/enterprise<br />

Computerworld Australia<br />

www.computerworld.com.au<br />

Computerworld Hong Kong<br />

www.cw.com.hk<br />

Computerworld Japan<br />

www.computerworld.jp<br />

Computerworld Malaysia<br />

www.mis-asia.com/magazines/<br />

computerworld_malaysia<br />

Computerworld Philippines<br />

www.computerworld.com.ph<br />

Computerworld Singapore<br />

www.mis-asia.com/magazines/<br />

computerworld_singapore<br />

CSO (Australia)<br />

www.csoonline.com.au<br />

CSO InfoSec Magazine (China)<br />

http://cso.ccw.com.cn<br />

Dataquest (India)<br />

www.dqindia.com<br />

DigitalDaily<br />

http://www.ddaily.co.kr/main/index.php<br />

DigiTimes (Taiwan)<br />

www.digitimes.com.tw<br />

Electronics For You (India)<br />

www.efymag.com<br />

Express Computer (India)<br />

www.express-computer.com<br />

Information Age (Australia)<br />

www.infoage.idg.com.au<br />

Information <strong>Security</strong> Magazine (Taiwan)<br />

www.informationsecurity.com.tw<br />

Information Technology Magazine (India)<br />

www.itmagz.com<br />

28 INFOSECURITY PROFESSIONAL ISSUE NUMBER 16<br />

Information Week China<br />

www.informationweek.com.cn<br />

IT Daily (Korea)<br />

www.itdaily.kr<br />

IT Home Online (Taiwan)<br />

www.ithome.com.tw<br />

MIS Asia<br />

www.mis-asia.com<br />

NetWork & Computer <strong>Security</strong> (China)<br />

www.nsc.org.cn<br />

Network Computing India<br />

Network Magazine India<br />

www.networkmagazineindia.com<br />

Network Times (Korea)<br />

www.datanet.co.kr<br />

Nikkei BP Government Technology<br />

http://bpstore.nikkeibp.co.jp/mag/ngt.html<br />

Nikkei Communications<br />

http://itpro.nikkeibp.co.jp/NCC/index.html<br />

Nikkei Computer<br />

http://itpro.nikkeibp.co.jp/NC/index.html<br />

Nikkei IT Professional<br />

http://itpro.nikkeibp.co.jp/NIP/index.html<br />

Nikkei Network<br />

http://itpro.nikkeibp.co.jp/NNW/index.html<br />

Nikkei Software<br />

http://itpro.nikkeibp.co.jp/NSW/index.html<br />

Nikkei Solution Business<br />

http://itpro.nikkeibp.co.jp/WAT/index.html<br />

Nikkei System Kouchiku<br />

http://itpro.nikkeibp.co.jp/SYS/index.html<br />

PC Quest (India)<br />

www.pcquest.com<br />

PC World Australia<br />

www.pcworld.idg.com.au<br />

PC World China<br />

www.pcworld.com.cn<br />

PC World New Zealand<br />

http://pcworld.co.nz<br />

PC World Philippines<br />

www.pcworld.com.ph<br />

PC World Vietnam<br />

www.pcworld.com.vn<br />

SC Magazine Australia<br />

www.securecomputing.net.au<br />

<strong>Security</strong> World Magazine<br />

www.securityworldmag.co.kr<br />

ZDNet Asia<br />

http://www.zdnetasia.com<br />

ZDNet Australia<br />

www.zdnet.com.au<br />

ZDNet China<br />

www.zdnet.com.cn<br />

ZDNet Korea<br />

www.zdnet.co.kr<br />

EUROPE, MIDDLE EAST, AFRICA<br />

Biometric Technology Today<br />

www.biometrics-today.com<br />

BugTraq<br />

http://bugtraq.ru<br />

ComOn<br />

www.comon.dk<br />

Computerworld Denmark<br />

www.computerworld.dk<br />

Computerworld Romania<br />

www.computerworld.ro<br />

Digital Investigation<br />

<strong>The</strong> International Journal of Digital<br />

Forensics & Incident Response<br />

www.elsevier.com/wps/fi nd/journaldescription.<br />

cws_home/702130/description#description<br />

Direction Informatique<br />

Government Business<br />

www.governmentbusinessuk.com<br />

Government Technology<br />

http://www.governmenttechnology.co.uk<br />

heise online<br />

www.heise.de<br />

ICT <strong>Security</strong><br />

www.tecnaeditrice.com<br />

Information <strong>Security</strong> Bulletin<br />

www.chi-publishing.com<br />

Information<strong>Security</strong><br />

www.itsec.ru<br />

Infosecurity<br />

www.infosecurity-magazine.com<br />

InfoWeek Online<br />

www.infoweek.ch<br />

IT SecCity<br />

www.itseccity.de/index.html<br />

it-daily<br />

http://www.it-daily.net<br />

IT-Sicherheit<br />

www.datakontext-press.de/it-sicherheit/<br />

sich_hauptframe.htm<br />

ITviikko<br />

www.itviikko.fi<br />

ITWeb Brainstorm<br />

www.brainstormmag.co.za<br />

iTWeb-<strong>The</strong> Technology News Site<br />

iWeek<br />

www.iweek.co.za<br />

kes online<br />

www.kes.info/index.html<br />

La revue Sécurité Informatique<br />

Les Nouvelles.net<br />

www.lesnouvelles.net/index.html<br />

Mag.Securs<br />

www.mag-securs.com<br />

Market Watch<br />

www.marketwatch.ro<br />

Network <strong>Security</strong><br />

www.elsevier.com/wps/product/<br />

cws_home/30358<br />

Réseaux-Télécoms<br />

www.reseaux-telecoms.com/CSO<br />

Search <strong>Security</strong><br />

www.searchsecurity.de<br />

<strong>Security</strong> Lab (by Positive Technologies)<br />

www.securitylab.ru<br />

<strong>Security</strong>Manager.de<br />

www.securitymanager.de<br />

SiC-Seguridad en Inform·tica y<br />

Comunicaciones<br />

www.revistasic.com<br />

<strong>The</strong> Information <strong>Security</strong> Journal<br />

www.kes.info<br />

ZATAZ Magazine<br />

www.zataz.com


Slam the door on would-be attackers by<br />

learning best practices for securing each phase<br />

of the software lifecycle. Watch these 10-15<br />

minute webcasts, which will show you what<br />

security measures need to take place at the<br />

beginning in the requirements phase, how security<br />

must be built in the design phase, and how to test<br />

if the application is resilient enough to withstand<br />

attacks in the testing phase.<br />

Is your software<br />

open to attacks?<br />

FREE<br />

CSSLP ®<br />

Webcast Series:<br />

Securing each phase<br />

of the SDLC<br />

www.isc2.org/csslppreview.aspx<br />

Also, this series will feature a webcast on the value<br />

of the CSSLP and how to study for the exam. Connect with us:<br />

www.isc2intersec.com<br />

www.twitter.com/isc2<br />

www.facebook.com/csslp


Want to be the best at what you do?<br />

Just Concentrate.<br />

Take your career to the next level with a CISSP ® Concentration.<br />

CISSPs with two years of professional experience in one of the<br />

functional areas of architecture, engineering or management<br />

may seek a CISSP Concentration to open up new opportunities<br />

for them, including more demanding roles in larger enterprises,<br />

more education opportunities and specialized certifications to<br />

recognize their talents. Consider continuing your career path<br />

with a CISSP-ISSAP, ® CISSP-ISSEP ® or CISSP-ISSMP ® .<br />

Visit www.isc2.org/concentrations for more information.<br />

Connect with us!<br />

www.isc2intersec.com<br />

https://twitter.com/isc2<br />

www.facebook.com/isc2fb

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!