Mary E. Galligan Director Deloitte & Touche LLP August 4, 2015

Size: px
Start display at page:

Download "Mary E. Galligan Director Deloitte & Touche LLP August 4, 2015"

Transcription

1 A Crisis Response Framework: Strategies for Effective Leadership Mary E. Galligan Director Deloitte & Touche LLP August 4, 2015

2 Managing a crisis

3 A crisis is a major catastrophic event, or a series of escalating events, that threatens an organization s strategic objectives, reputation, or viability. Crises typically exceed existing mitigation techniques and risk management programs such as Business Continuity, Disaster Recovery, Health and Safety plans, or Emergency Response.

4 Crisis management in today s world. Papal Audience 2005 vs. 2013

5 Crisis response framework

6 Crisis Management Program coverage Important to include cyber risks and other non-traditional crisis risks Insider Threat Data privacy Agency data Breach Cyber risks are an important crisis risk to invest in covering Cyber attack Lost Laptops Loss of critical data Lack of Data Integrity Crisis Management Program Coverage Tornado Crime Ineffective Crisis Messaging Pandemic Earthquake Flood Fire Theft Terrorism Today s Crisis Management Program Labor Issues/ Strikes Ebola Important to have a big umbrella Active shooter Extended Government closure Inability to provide services Citizen Trust Important to expand crisis risk coverage beyond people, place and technology Sudden increase In costs Safeguarding citizens Citizen information leakage

7 Comprehensive crisis management program Eleven elements needed to establish and sustain a program Governance Organizational Structure Thresholds Roles & Responsibilities Leaders Management Plans Current Response Plans Crisis Leadership Skills Logistics Technology Training and development Using tools to support the organization s overall crisis management response

8 Operating principals during a crisis

9 Operating principles for managing a crisis. 4 5 Drive towards actionable intelligence 3 Be ready for the unexpected 2 Actively communicate 1 Continually frame the crisis Lead decisively

10 Leaders set the tone

11 1. Lead decisively Act taking no action is making a decision Always keep in mind your goals and objectives Focus on what you can control; accept what you cannot Avoid analysis paralysis you will never have all the information Establish a clear, ongoing decision-making process Prioritize decisions based on their crisis impact Manage incidents locally, and crises as enterprise-wide In a crisis, don't hide behind anything or anybody. They're going to find you anyway. - Paul Bear Bryant

12

13 2. Continually frame the crisis Quickly diagnose the crisis with the available information Think ahead anticipate how the crisis might progress Reassess everyday do not fall in love with the plan Do not let the incidents distract you from the crisis It's a crisis if everybody calls it a crisis. - Morgan Downey, Lasalle Global (quote from Credit Crisis of 2007)

14 Communicating in the age of social media Crash of Asiana Flight 214 at SFO 7/6/13 Timeline of Events 6 July 2013 The first tweet, posted within 30 seconds of impact am: Plane makes impact at SFO 11.28am: First photo from a Google employee boarding another flight hits Twitter (within 30 secs!) 11.30am: Emergency slides deployed 11.45am: First photo from a passenger posted on Path, Facebook and Twitter, re-tweeted by 32,603 users 11.56am: Norwegian journalists asks for permission to use photo from first tweets. Several media requests follow 1.20pm: Boeing issues statement via Twitter 2.04pm: SFO Fire Department speaks to the press for first time 3.00pm: NTSB holds press conference, and keeps updating Twitter with photos 3.39pm: Asiana Airlines first statement released 3.40pm: White House releases statement 8.43pm: First Asiana Press release (6.43am Korea time)

15 3. Actively communicate Own the story, don t let the media tell it for you Be candid communicate with honesty and personal commitment Convey consistent messages internally and externally Back your words with actions Control the narrative communicate on a regular cadence Choose wisely who speaks they will be the face of the organization We get far more credit than we deserve when things go right and too much blame when they don t. - Mel Karmizan, Former Viacom President

16

17 4. Be ready for the unexpected Know that individuals may act differently under extreme pressure Realize that normal organizational roles may not apply to a crisis Avoid relying on a single person for successful navigation in a crisis Anticipate when and how external parties may steer the crisis Recognize your limitations a crisis can test everyone s breaking point Prepare to work with limited (or no) technology / information If anything can go wrong, it will - Capt. Edward A. Murphy ( Murphy s Law )

18

19 5. Drive towards actionable intelligence Beware of confusing data and intelligence Focus on who needs to know what and by when Cast a wide net important information can come from anywhere Qualify your sources misinformation is as prevalent as information Recognize you will never have all the information Ramp up your ability to process data do not let it bury you Record what you knew at the time of the decision True genius resides in the capacity for evaluation of uncertain, hazardous, and conflicting information. - Winston Churchill

20 Chaos framework

21 Question and answer

22 Contact info Mary E. Galligan Director, Cyber Risk Services Deloitte & Touche LLP

23 This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation.

24 About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ( DTTL ), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as Deloitte Global ) does not provide services to clients. Please see for a detailed description of DTTL and its member firms. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. 36 USC Member of Deloitte Touche Tohmatsu Limited

Extending Security Analytics to support Operational Efficiency. John A. Greco Deloitte & Touche LLP Cyber Risk Services

Extending Security Analytics to support Operational Efficiency. John A. Greco Deloitte & Touche LLP Cyber Risk Services Extending Security Analytics to support Operational Efficiency John A. Greco Deloitte & Touche LLP Cyber Risk Services Extending security analytics to support operational efficiency Key components of the

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Asset Management in the Cloud How to identify and manage Cloud based assets and services. September 19, 2014

Asset Management in the Cloud How to identify and manage Cloud based assets and services. September 19, 2014 Asset Management in the Cloud How to identify and manage Cloud based assets and services September 19, 2014 Contents Overview 4 Standard asset management process 6 Asset identification 9 Asset management

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

Disaster Recovery Plan (DRP) / Business Continuity Plan (BCP)

Disaster Recovery Plan (DRP) / Business Continuity Plan (BCP) Preface Computer systems are the core tool of today s business and are vital to every business from the smallest to giant organizations. Money transactions, customer service are just simple examples. Despite

More information

Information Life Cycle Management (ILM)

Information Life Cycle Management (ILM) Information Life Cycle Management (ILM) Finding business value in Information Life Cycle Management (ILM): Proactive information management through ILM can reduce cost and risk while creating tangible

More information

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are

More information

Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015

Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015 Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report November 23, 2015 Table of contents Background Exercise objectives Quantum Dawn 3 (QD3) cyberattack scenario

More information

Service Organization Control (SOC) Reports

Service Organization Control (SOC) Reports Service Organization Control (SOC) Reports Transitioning from SAS 70 to SSAE 16 Deloitte & Touche LLP Agenda Overview SAS 70/SSAE 16 Historical Perspective The New Framework Under SSAE 16 (SOC 1) Impact

More information

The digital grapevine Social media and the role of Internal Audit

The digital grapevine Social media and the role of Internal Audit The digital grapevine Social media and the role of Internal Audit Preface Organizations today are embracing new digital technologies to leapfrog or keep pace with growing competition in the marketplace.

More information

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Managing Cyber Threats Risk Management & Insurance Solutions Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Overview Recent Trends and Loss Exposures Risk Management Strategies

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis

More information

Table of Contents... 1

Table of Contents... 1 ... 1 Chapter 1 Introduction... 4 1.1 Executive Summary... 4 1.2 Goals and Objectives... 5 1.3 Senior Management and Board of Directors Responsibilities... 5 1.4 Business Continuity Planning Processes...

More information

U.S. CFO Program The Four Faces of the CFO. 2010 Deloitte Touche Tohmatsu

U.S. CFO Program The Four Faces of the CFO. 2010 Deloitte Touche Tohmatsu U.S. CFO Program The Four Faces of the CFO 2010 Deloitte Touche Tohmatsu CFOs Play Four Critical Roles in Companies Catalyze behaviors across the organization to execute strategic and financial objectives

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

ERP Administrative Challenges Brian Jensen

ERP Administrative Challenges Brian Jensen ERP Administrative Challenges Brian Jensen Deloitte & Touche LLP February 2011 ERP Administrative Challenges Enterprise resource planning (ERP) implementations over the last two decades have generated

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Revenue Cycle in Post- Acute Care Deloitte & Touche LLP Victor Shutack, Senior Manager June 2015

Revenue Cycle in Post- Acute Care Deloitte & Touche LLP Victor Shutack, Senior Manager June 2015 6/9/2015 Revenue Cycle in Post- Acute Care Deloitte & Touche LLP Victor Shutack, Senior Manager June 2015 Discussion topics Changing healthcare environment Understanding the home health care environment

More information

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,

More information

Big data The three-minute guide

Big data The three-minute guide Big data The three-minute guide Don t squint. Select the full-screen option to view at full size. Big Data The three-minute guide 1 2 What is big data? It s about insight Big data generally refers to datasets

More information

National Association of State Comptrollers. Architecting a New State Operating Model for the Future. March 12, 2015

National Association of State Comptrollers. Architecting a New State Operating Model for the Future. March 12, 2015 National Association of State Comptrollers Architecting a New State Operating Model for the Future March 12, 2015 The world around us is changing at a dizzying pace. 2 National Association of State Comptrollers

More information

Auto insurance telematics The three-minute guide

Auto insurance telematics The three-minute guide Auto insurance telematics The three-minute guide Auto insurance telematics The three-minute guide 1 Why it matters now Telematics is upending the auto insurance world After considerable industry buzz,

More information

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125. When Disaster Strikes Are You Prepared?

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125. When Disaster Strikes Are You Prepared? RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 125 When Disaster Strikes Are You Prepared? Copyright Materials This presentation is protected by US and International Copyright laws.

More information

Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks

Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks Cyber security: everybody s imperative A guide for the C-suite and boards on guarding against cyber risks Secure Enhance risk-prioritized controls to protect against known and emerging threats, and comply

More information

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance

More information

www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014

www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 www.pwc.com Business Resiliency Business Continuity Management - January 14, 2014 Agenda Key Definitions Risks Business Continuity Management Program BCM Capability Assessment Process BCM Value Proposition

More information

Temple university. Auditing a business continuity management BCM. November, 2015

Temple university. Auditing a business continuity management BCM. November, 2015 Temple university Auditing a business continuity management BCM November, 2015 Auditing BCM Agenda 1. Introduction 2. Definitions 3. Standards 4. BCM key elements IT Governance class - IT audit program

More information

Crisis Communications: Preparation & Response. Sara M. Antol, Esq. Robert E. Butter, APR

Crisis Communications: Preparation & Response. Sara M. Antol, Esq. Robert E. Butter, APR Crisis Communications: Preparation & Response Sara M. Antol, Esq. Robert E. Butter, APR Courts of Law & Public Opinion Today s Discussion One Painful Example of a Crisis and Response Phases of Crisis Management

More information

Fraud Risk Management providing insight into fraud prevention, detection and response

Fraud Risk Management providing insight into fraud prevention, detection and response Fraud Risk Management providing insight into fraud prevention, detection and response For private circulation only www.deloitte.com/in Fraud follows opportunity and attacks weakness. Know where you are

More information

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations September 2015 Copyright 2015 Deloitte Development LLC. All rights reserved. This presentation

More information

Business Continuity Planning for Risk Reduction

Business Continuity Planning for Risk Reduction Business Continuity Planning for Risk Reduction Ion PLUMB ionplumb@yahoo.com Andreea ZAMFIR zamfir_andreea_ileana@yahoo.com Delia TUDOR tudordelia@yahoo.com Faculty of Management Academy of Economic Studies

More information

Quantum Dawn 2 A simulation to exercise cyber resilience and crisis management capabilities. October 21, 2013

Quantum Dawn 2 A simulation to exercise cyber resilience and crisis management capabilities. October 21, 2013 Quantum Dawn 2 A simulation to exercise cyber resilience and crisis management capabilities October 21, 2013 Table of contents Background 2 Exercise objectives 3 QD2 cyber-attack scenario 4 QD2 yielded

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

Payroll Leakage What it is and how to fix it

Payroll Leakage What it is and how to fix it Payroll Leakage What it is and how to fix it Payroll leakage is unintended or unexpected spending or lost revenue related to labor activity. The leakage can result from loose configuration of workforce

More information

Security Risk Management Strategy in a Mobile and Consumerised World

Security Risk Management Strategy in a Mobile and Consumerised World Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key

More information

Does Providing Tax Services Impair Auditor Independence? Evidence from Assessing Tax Accrual Quality

Does Providing Tax Services Impair Auditor Independence? Evidence from Assessing Tax Accrual Quality Does Providing Tax Services Impair Auditor Independence? Evidence from Assessing Tax Accrual Quality By Choudhary, Koester, and Pawlewicz A Practitioner s Perspective Russ Hamilton Deloitte Tax LLP Agenda

More information

Using Hedge Accounting to Better Reflect Risk Mitigation Strategies. Jeff Craft Jason Weaver Deloitte & Touche LLP

Using Hedge Accounting to Better Reflect Risk Mitigation Strategies. Jeff Craft Jason Weaver Deloitte & Touche LLP Using Hedge Accounting to Better Reflect Risk Mitigation Strategies Jeff Craft Jason Weaver Deloitte & Touche LLP Agenda Benefits / Requirements / Challenges of Hedge Accounting Risk Management / What

More information

Federal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK

Federal Financial Institutions Examination Council FFIEC BCP. Business Continuity Planning FEBRUARY 2015 IT EXAMINATION H ANDBOOK Federal Financial Institutions Examination Council FFIEC Business Continuity Planning BCP FEBRUARY 2015 IT EXAMINATION H ANDBOOK Table of Contents Introduction 1 Board and Senior Management Responsibilities

More information

Developing Your Strategic Plan

Developing Your Strategic Plan Training Module: Developing Your Strategic Plan This training contains general information only and Deloitte is not, by means of this training session, rendering accounting, business, financial, investment,

More information

Emergency Preparedness for Design Firms. RLI Design Professionals Design Professionals Learning Event DPLE 244 September 16, 2015

Emergency Preparedness for Design Firms. RLI Design Professionals Design Professionals Learning Event DPLE 244 September 16, 2015 Emergency Preparedness for Design Firms RLI Design Professionals Design Professionals Learning Event DPLE 244 September 16, 2015 RLI Design Professionals is a Registered Provider with The American Institute

More information

Deloitte Risk Services B.V. Cyber & Privacy Advisory. Deloitte Cyber & Privacy Risk Services Data Breach Management

Deloitte Risk Services B.V. Cyber & Privacy Advisory. Deloitte Cyber & Privacy Risk Services Data Breach Management Deloitte Risk Services B.V. Cyber & Privacy Advisory Deloitte Cyber & Privacy Risk Services Data Breach Management 2 Index Cover pages & Index 1-3 Data breach management 4 Challenges and opportunities

More information

Sustainability Analytics The three-minute guide

Sustainability Analytics The three-minute guide Sustainability Analytics The three-minute guide Sustainability Analytics The three-minute guide 1 Why it matters now Sustainability isn t just good for your corporate image and conscience. It s good for

More information

Federal Financial Institutions Examination Council FFIEC. Business Continuity Planning BCP MARCH 2003 MARCH 2008 IT EXAMINATION

Federal Financial Institutions Examination Council FFIEC. Business Continuity Planning BCP MARCH 2003 MARCH 2008 IT EXAMINATION Federal Financial Institutions Examination Council FFIEC Business Continuity Planning MARCH 2003 MARCH 2008 BCP IT EXAMINATION H ANDBOOK TABLE OF CONTENTS INTRODUCTION... 1 BOARD AND SENIOR MANAGEMENT

More information

Stetson University College of Law Crisis Communications Plan

Stetson University College of Law Crisis Communications Plan Introduction and Guiding Principles Stetson University College of Law Crisis Communications Plan Stetson University College of Law s Crisis Communications Plan summarizes the roles, responsibilities, and

More information

Running head: CRISIS COMMUNICATION INCLUDING SOCIAL MEDIA 1

Running head: CRISIS COMMUNICATION INCLUDING SOCIAL MEDIA 1 Running head: CRISIS COMMUNICATION INCLUDING SOCIAL MEDIA 1 Crisis Communications Plans Including Social Media: A Comparative Analysis of Joplin, Missouri s and Moore, Oklahoma s Tornado Crises from a

More information

SYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY. Symantec 2010 SMB Information Protection Survey. Global Data

SYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY. Symantec 2010 SMB Information Protection Survey. Global Data SYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY Symantec 2010 SMB Information Protection Survey Global Data June 2010 CONTENTS Executive Summary...3 Methodology...4 Finding 1: SMBs serious about information

More information

Emergency Preparedness Tips and Actions for the Workplace

Emergency Preparedness Tips and Actions for the Workplace Emergency Preparedness Tips and Actions for the Workplace Is Your Business Disaster Ready? Disaster and emergencies can happen anytime and anywhere in Minnesota. 52 Presidential Disaster Declarations between

More information

Bridging the data gap in the insurance industry. Cyber crisis management: Readiness, response, and recovery

Bridging the data gap in the insurance industry. Cyber crisis management: Readiness, response, and recovery Bridging the data gap in the insurance industry Cyber crisis management: Readiness, response, and recovery Readiness, response, and recovery Hacked devices, crashed websites, breached networks, denials

More information

Security Risk Assessment Tool

Security Risk Assessment Tool Security Risk Assessment Tool Version: (Draft) 24 April 2014 This tool was developed by the ACT Safety & Security Community of Practice (SSCP) for use by ACT Alliance members and partners. 1. Purpose of

More information

Minimizing the threat landscape through integration of Software Asset Management and Security

Minimizing the threat landscape through integration of Software Asset Management and Security Minimizing the threat landscape through integration of Software Asset Management and Security The point of intersection As companies evolve and grow, the cost and complexity of their software assets increases

More information

Managing Information Resources and IT Security

Managing Information Resources and IT Security Managing Information Resources and IT Security Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic

More information

CFO Insights Cybersecurity: Five essential truths

CFO Insights Cybersecurity: Five essential truths CFO Insights Cybersecurity: Five essential truths Cyber risks, it seems, are everywhere. Retailers breached. Intellectual property stolen. Data hacked almost on a daily basis. It s enough to rattle even

More information

Emergency Preparedness Mississippi Arts Commission 2011

Emergency Preparedness Mississippi Arts Commission 2011 Emergency Preparedness Mississippi Arts Commission 2011 Step One: Prepare for the Worst For personal safety, identify what storm shelter is available to you and prepare an evacuation plan. Choose two meeting

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

Framing the future of corporate governance Deloitte Governance Framework

Framing the future of corporate governance Deloitte Governance Framework Framing the future of corporate governance Deloitte Governance Framework For those interested in the topic of corporate governance, these are dynamic times. The events of the past decade have led to the

More information

CFOs and CIOs: How can you mitigate concerns when moving to the cloud?

CFOs and CIOs: How can you mitigate concerns when moving to the cloud? CFOs and CIOs: How can you mitigate concerns when moving to the cloud? Contents Review: How do you know when to reach for the clouds? 3 Identify business objectives and use of technology to meet objectives

More information

Loyalty data security Are hospitality and travel companies managing the risks of their rewards programs?

Loyalty data security Are hospitality and travel companies managing the risks of their rewards programs? Loyalty data security Are hospitality and travel companies managing the risks of their rewards programs? Companies that can persuade their customers to share personalized information about their interests,

More information

Managing the Public Face of the Bed Bug Crisis. Connecticut Library Consortium Dec. 5, 2012

Managing the Public Face of the Bed Bug Crisis. Connecticut Library Consortium Dec. 5, 2012 Managing the Public Face of the Bed Bug Crisis Connecticut Library Consortium Dec. 5, 2012 Information breeds confidence. Silence brings fear. CJ, The West Wing CJ West Wing What is a Crisis? Any event

More information

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Exercising Your Enterprise Cyber Response Crisis Management Capabilities Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.

More information

Integrating Pandemic Readiness into Your Organization's Resiliency Model.

Integrating Pandemic Readiness into Your Organization's Resiliency Model. Integrating Pandemic Readiness into Your Organization's Resiliency Model. David M. Sarabacha Senior Manager MBCP, MBCI, CISSP, CISA, CISM Deloitte & Touche LLP Agenda TOPIC SCHEDULE Session Overview Introduction

More information

Social Media and Disasters:

Social Media and Disasters: Social Media and Disasters: Best Practices and Lessons Learned Disaster Preparedness Summit, August 21, 2013 Presented by: Suzanne Bernier, CEM, CBCP, MBCI SB Crisis Consulting Toronto, Canada Outline

More information

Building a strong business continuity plan

Building a strong business continuity plan Building a strong business continuity plan Protect your clients and firm with a well-planned business continuity plan A solid business continuity plan (BCP) is about more than simply staying in compliance.

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Nonprofit Organizations Committee Legal Quick Hit:

Nonprofit Organizations Committee Legal Quick Hit: Nonprofit Organizations Committee Legal Quick Hit: Privacy and Data Security for Your Nonprofit: Understanding Your Client s Legal Obligations and Minimizing Legal Risk MODERATOR: JEFFREY S. TENENBAUM,

More information

Assessing the strength of your security operating model

Assessing the strength of your security operating model www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems

More information

CRISIS MANAGEMENT PLAN

CRISIS MANAGEMENT PLAN CRISIS MANAGEMENT PLAN Table of Contents Introduction... 3 Purpose... 3 Objectives... 3 Types & Levels of a Crisis... 4 Plan Activation... 6 Crisis Management Team (CMT) Structure... 6 CMT Responsibilities...

More information

Conducting due diligence and managing cybersecurity in medical technology investments

Conducting due diligence and managing cybersecurity in medical technology investments Conducting due diligence and managing cybersecurity in medical technology investments 2015 McDermott Will & Emery LLP. McDermott operates its practice through separate legal entities in each of the countries

More information

Evergreen Solutions Lowering the cost of EHR ownership

Evergreen Solutions Lowering the cost of EHR ownership Evergreen Solutions Lowering the cost of EHR ownership As used in this document, Deloitte means Deloitte LLP and its subsidiaries. Please see www.deloitte.com/us/about for a detailed description of the

More information

Tax analytics The three-minute guide

Tax analytics The three-minute guide Tax analytics The three-minute guide Tax analytics The three-minute guide 1 Why it matters now The data revolution in tax is underway Think for a moment about the vast amount of data being generated by

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Key Cyber Risks at the ERP Level

Key Cyber Risks at the ERP Level Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche

More information

Business Continuity and Disaster Recovery Planning

Business Continuity and Disaster Recovery Planning Business Continuity and Disaster Recovery Planning Jennifer Brandt, CISA A p r i l 16, 2015 HISTORY OF STINNETT & ASSOCIATES Stinnett & Associates (Stinnett) is a professional advisory firm offering services

More information

Analytics for Shared Services The three-minute guide

Analytics for Shared Services The three-minute guide Analytics for Shared Services The three-minute guide Don t squint. Select the full-screen option to view at full size. Analytics for Shared Services The three-minute guide 1 2 Why it matters now You may

More information

Cybersecurity Issues for Community Banks

Cybersecurity Issues for Community Banks Eastern Massachusetts Compliance Network Cybersecurity Issues for Community Banks Copyright 2014 by K&L Gates LLP. All rights reserved. Sean P. Mahoney sean.mahoney@klgates.com K&L Gates LLP State Street

More information

Social Media Assessment. Khalid Wasti Deloitte & Touche LLP December 11, 2012

Social Media Assessment. Khalid Wasti Deloitte & Touche LLP December 11, 2012 Social Media Assessment Khalid Wasti Deloitte & Touche LLP December 11, 2012 http://www.youtube.com/watch?v=0euel3n7fds Contents Overview of social media Social media opportunities Social media risks Regulatory

More information

STAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES WHISTLEBLOWING AFTER DODD-FRANK: A NEW WORLD

STAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES WHISTLEBLOWING AFTER DODD-FRANK: A NEW WORLD STAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES WHISTLEBLOWING AFTER DODD-FRANK: A NEW WORLD The Dodd-Frank Wall Street Reform and Consumer Protection Act created incentives for whistleblowers to report

More information

NIMS ICS 100.HCb. Instructions

NIMS ICS 100.HCb. Instructions NIMS ICS 100.HCb Instructions This packet contains the NIMS 100 Study Guide and the Test Questions for the NIMS 100 final exam. Please review the Study Guide. Next, take the paper test - record your answers

More information

How To Buy Insurance Online From An Insurer

How To Buy Insurance Online From An Insurer Casualty Actuarial Society Annual Meeting Brace Yourselves For Direct Sales To Small-Business Insurance Consumers! Sam Friedman, Insurance Research Leader, Deloitte Center for Financial Services Donna

More information

Remarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the

Remarks by. Carolyn G. DuChene Deputy Comptroller Operational Risk. at the Remarks by Carolyn G. DuChene Deputy Comptroller Operational Risk at the Bank Safety and Soundness Advisor Community Bank Enterprise Risk Management Seminar Washington, D.C. October 22, 2012 Good afternoon,

More information

Mobility Trends. Deloitte Tax Management Consulting. December 2014. Todd Dannenfelser. Niketu Bhatt. Deloitte Tax LLP

Mobility Trends. Deloitte Tax Management Consulting. December 2014. Todd Dannenfelser. Niketu Bhatt. Deloitte Tax LLP Mobility Trends Deloitte Tax Management Consulting December 2014 Todd Dannenfelser Niketu Bhatt Deloitte Tax LLP Agenda Introduction Workforce Mobility Trends Responsive UI Portals, Tools & Apps Connected

More information

Desktop Scenario Self Assessment Exercise Page 1

Desktop Scenario Self Assessment Exercise Page 1 Page 1 Neil Jarvis Head of IT Security & IT Risk DHL Page 2 From reputation to data loss - how important is business continuity? Neil Jarvis Head of IT Security (EMEA) DHL Logistics IT Security Taking

More information

Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION

Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION 1 Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION Background 2 Technology has become the central component of business operations Businesses have become more vulnerable to risks associated

More information

SHS Annual Information Security Training

SHS Annual Information Security Training SHS Annual Information Security Training Information Security: What is It? The mission of the SHS Information Security Program is to Protect Valuable SHS Resources Information Security is Everyone s Responsibility

More information

Turning information into insight

Turning information into insight Turning information into insight Maureen Errity, Director, Center for Corporate Governance, Deloitte LLP John Lucker, Principal, Deloitte Consulting LLP NACD Power Breakfast October 15, 2013 Did you know?

More information

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses.

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. 1. An Introduction This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. This presentation was prepared by the South Central Economic

More information

M&A analytics The three-minute guide

M&A analytics The three-minute guide M&A analytics The three-minute guide M&A analytics The three-minute guide 1 Why it matters now Smarter decisions An M&A deal can be one of the biggest decisions a company makes, so it pays to do it right.

More information

Why Crisis Response and Business Continuity Plans Fail

Why Crisis Response and Business Continuity Plans Fail Why Crisis Response and Business Continuity Plans Fail 10 Lessons Learned from Real-World Experience Many organizations invest considerable time, money and effort in developing Crisis Response and Business

More information

Pricing Analytics The three-minute guide

Pricing Analytics The three-minute guide Pricing Analytics The three-minute guide Pricing Analytics The three-minute guide 1 What is pricing analytics? Where it all comes together Advanced analytics aimed at customer and business outcomes are

More information

Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP

Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII

More information

EGUIDE STAYING ALIVE: THE DEFINITIVE GUIDE TO BUSINESS CONTINUITY & DISASTER RECOVERY FOR SMALL BUSINESSES

EGUIDE STAYING ALIVE: THE DEFINITIVE GUIDE TO BUSINESS CONTINUITY & DISASTER RECOVERY FOR SMALL BUSINESSES Created for Jamie Stewart Staying Alive: The Definitive Guide to Business Continuity and Disaster Recovery for Small Businesses Introduction As a small business owner, you owe it to yourself, your employees,

More information

The best practice guide for businesses and human resources

The best practice guide for businesses and human resources Emergency response and business continuity plan: The best practice guide for businesses and human resources How to develop and implement an emergency response and business continuity plan to deal with

More information

Virtual world, real risks. When social media becomes a liability

Virtual world, real risks. When social media becomes a liability Virtual world, real risks When social media becomes a liability When social media becomes a liability Since setting up its Facebook fan page, Starbucks has amassed a captive audience of 25 million fans

More information

DFW International Airport Social Media Strategy Executive Overview

DFW International Airport Social Media Strategy Executive Overview DFW International Airport Social Media Strategy Executive Overview Corporate Communications Updated April 7, 2015 What is Social Media? A conversation Engagement with audiences Information sharing Crisis/emergency

More information

Intel Business Continuity Practices

Intel Business Continuity Practices Intel Business Continuity Practices As a global corporation with locations and suppliers all over the world, Intel requires every designated Intel organization to embed business continuity as a core business

More information

What is an Exercise? Agenda. Types of Exercises. Tabletop Exercises for Executives. Defining the Tabletop Exercise. Types of Tabletop Exercises

What is an Exercise? Agenda. Types of Exercises. Tabletop Exercises for Executives. Defining the Tabletop Exercise. Types of Tabletop Exercises Tabletop Exercises for Executives Kathy Lee Patterson, CBCP, PMP Independence Blue Cross Defining the Tabletop Exercise Types of Tabletop Exercises Advantages to conducting Exercises Agenda 12 Step Approach

More information

Crisis Management Guide

Crisis Management Guide Crisis Management Guide The Crisis Management Guide has been designed to help your company effectively respond to a crisis situation. Crises, large and small can be minimized if a thorough Crisis Management

More information

Prepared by Rod Davis, ABCP, MCSA November, 2011

Prepared by Rod Davis, ABCP, MCSA November, 2011 Prepared by Rod Davis, ABCP, MCSA November, 2011 Disaster an event, which causes the loss of an essential service, or part of it, for a length of time which imperils mission achievement. (Andrew Hiles,

More information

THE DELOITTE CFO SURVEY 2015 Q1 RESULTS GETTING BACK TO NORMAL

THE DELOITTE CFO SURVEY 2015 Q1 RESULTS GETTING BACK TO NORMAL THE DELOITTE CFO SURVEY 2015 Q1 RESULTS GETTING BACK TO NORMAL 2 Contents Key points from the 2015 Q1 Survey 4 General economic environment 5 Market conditions and the economy 6 Cash flow and risk 9 M&A

More information

Constructing a successful business continuity plan

Constructing a successful business continuity plan Constructing a successful business continuity plan By Alan Berman Alan Berman Being prepared is the cornerstone of having a business continuity plan regardless of the size of a company. Ultimately, getting

More information

INCIDENT RESPONSE REPUTATION MANAGEMENT CRISIS COMMUNICATIONS

INCIDENT RESPONSE REPUTATION MANAGEMENT CRISIS COMMUNICATIONS INCIDENT RESPONSE REPUTATION MANAGEMENT CRISIS COMMUNICATIONS MANAGING CRISIS AND SUSTAINING THE BRAND An introduction Professor Rebecca L. Cooney, MSC CRISIS PLANNING Process of an organization communication

More information