Cyber-reputation: risk turbocharged
|
|
|
- Patrick Tyler
- 9 years ago
- Views:
Transcription
1 The GlobalEthicist MATEJ MODERC Cyber-reputation: risk turbocharged By Andrea Bonime-Blanc Companies that suffer a cyber-attack can find the biggest damage is to their reputation. They need to protect themselves from this risk of risks The Economist Intelligence Unit published a prescient report in 2007: Reputation: The Risk of Risks, which was if not the first, then certainly the most prominent and thoughtful treatment of the issue of reputation risk at that time. Today, almost 10 years later, we find ourselves in the unenviable position of not only living through the age of reputation risk but also through the age of cyber-risk. These two risks reputation and cyber are often strategically important risks to any given organisation whether a corporation, government agency, non-profit group or university. And the combination of the two cyber-reputation risk is a new and powerful strategic issue. In this article I will make this case and issue a call to arms to all leaders whether corporate executives, boards of directors, heads of non-profits or of government agencies. Leaders need to be sensitised to the fact that in addition to reputation risk and cyber-risk individually, the combination of the two is today s strategic risk of risks, turbocharged. Cyberreputation risk is a new and powerful strategic issue COLUMNIST: ANDREA BONIME-BLANC What is reputation risk and why do stakeholders matter? Reputation risk as it relates to organisations is unlike almost any other risk it is pervasive and cuts across many other kinds of risk. In The Reputation 51
2 The stakeholder universe Owners/shareholders Consumers/purchasers Partners Communities Governments Social media Reputation stakeholders Media Regulators Employees Prospective employees Third parties/supply chain Non-governmental organisations Risk Handbook, I offer the following definition: Reputation risk is an amplifier risk that layers on or attaches to other risks especially ESG risks adding negative or positive implications to the materiality, duration or expansion of the other risks on the affected organisation, person, product or service. The role of stakeholders in the reputation risk equation is critical: knowing who your stakeholders are, understanding their expectations of your organisation and how to prioritise them has everything to do with effective reputation risk management. Critical actors in managing cyber risk are the board and C-suite What is cyber risk? What is cyber-risk governance? Cyber-risk can be defined in a variety of ways, but the simplest and most to-thepoint I have seen which interestingly includes a reference to reputation is the following from the Institute of Risk Management: Cyber risk means any risk of financial loss, disruption or damage to the reputation of an organisation from some sort of failure of its information technology systems. In turn, cyber-risk governance involves those at the top of the organisation asking whether the proper approach to triangulating this risk exists. The Conference Board Report Emerging Practices in Cyber-Risk Governance says: Cyber-risk governance is a framework adopted within an organisation to deal with the new and evolving risks relating to cyber space both within the organisation and as the organisation interfaces with the outside world. In this framework, the critical actors are the board, the C-suite or executive team, and frontline top management in charge of executing cyber-risk management. One of the key take-aways of the report is the following: Cyber risk should be considered at the top of many companies risk prioritisation, whether they have suffered from a major or material cyber attack (yet) or not. When a company doesn t have the right overall cyber-risk governance programme in place, the potential reputation risk consequences can amplify the company s 52
3 exposure to both tangible and further intangible consequences that may be difficult, costly and lengthy to repair. The penny is beginning to drop There is a growing body of evidence that executives and board members are beginning to accept that reputation risk and cyber-risk are two of the top strategic risks of our time; that these risks separately or, even worse, together can have a strategically significant impact on the wellbeing, longevity and profitability of an organisation and its stakeholders. In October 2015, Marsh Risk Consulting released an important new survey of global corporate executives showing that the two top global risks concerning C-suites and risk executives today were cyber and reputation risk, but especially the reputation risk associated with cyber breaches: 79% of respondents selected reputational damage from a sensitive data breach as the most likely and high-impact risk, the survey said. The chart on page 55 provides a snapshot of the reputation risk impact on four companies that suffered major public cyber-security attacks over the past few years. The RepRisk Index reflects big data analytics gathered daily from global media sources with respect to each company and its risk exposure, analysed and prioritised along a 100-point system where exposure above 50 generally represents a high or very high reputation risk exposure, according to a strict methodology developed by and proprietary to RepRisk. It can be gleaned from this data that each company retained significantly higher reputation risk consequences over time after its cyber-event compared with its peer group of companies (the grey bar in the chart). Sony Pictures HQ in Los Angeles. Its cyber hack cost it dear What works and what doesn t While this article is not intended to rattle cages or scare directors and executives, it is a call to arms on both reputation risk and cyber-risk governance, two of today s most important strategic risks. And strategic risk is first and foremost the responsibility of boards of directors/trustees and chief executive officers, presidents, heads of agencies and their C-suites. 53 Boards now see that reputation and cyber-risk are two of the top strategic risks of our time DAN ALTO
4 What you need to know 1. Effective cyber-risk governance requires a triangular framework, including the board, the C-suite and key functional executives. 2. Cyber-risk is a strategic risk closely related to another strategic risk: reputation risk. 3. Effective cyber-risk governance requires knowledge of who your cyber-risk actors and stakeholders Know what your crown jewels are and how to protect them are. 4. Successful cyber-risk governance requires a deep understanding of the organisation s crown jewels ie what are the highest value cyber-targets in the organisation intellectual property, personal information, financial account, etc? 5. A private sector/government agency partnership may be necessary in some industries, such as banking and critical infrastructure. 6. Effective cyber-risk governance requires a cross-disciplinary approach and segmental/ divisional approach where all divisions or business units collaborate on a cyber-defence strategy. 7. Cyber-risk should be an essential part of an organisation s resilience planning. It should be incorporated in any crisis management business continuity and disaster recovery planning system. 8. Organisations that are able to manage their cyber-risk successfully may find embedded opportunities for cost savings, process improvement and even new revenue streams. EDSTOCK The book describes five models of cyber-risk governance only three of which are successful. Success depends on meeting whether leadership is providing the necessary resources, budget and care required on this issue and whether the organisation has low/medium/high cyber-risk exposure depending on its footprint, focus, sector, etc. The Irresponsible Model is one in which leadership in a medium- to high-risk setting is not tackling the issue. The Complacent Model is one in which leadership in a lower-risk environment is not properly addressing the issue. Those that are more successful are the Vigilant Model, for leaders in a low-risk environment, Integrated Model, where leaders are working in a higher risk environment with a decentralised business model, and the Command and Control Model, where leaders in a higher-risk environment are working with a centralised business model. Finally, and more focused on the combined threat of cyber-reputation 54
5 Reputation risk effects at the four companies examined Peak RRI 50 July 2015 RRI 40 Scan the horizon of strategic nonfinancial risk regularly July 2015 RRI of peer companies Target JP Morgan Chase Sony Anthem risk, here are additional guidelines that leaders (boards and executives) of any type of organisation (corporate, NGO, governmental or educational) should consider to understand and tackle the combined threats and effects of cyber-reputation risk that new turbocharged risk of risks of our time. Have at least one independent member of the board with deep and broad risk expertise and if you re deep into technology, maybe even a technology executive. Don t just think about financial risks scan the horizon of strategic non-financial risk regularly and understand what it means to your business/ sector. Require your CEO/leader to spend time on non-financial risk and integrating this properly into the organisation s strategy. Measure the effect of these steps. Have access to the right technology gurus for your organisation: - Start with the chief technology officer, chief information security officer or chief information officer - Make sure your C-suite and board also have technology savvy players - Get the right outside experts to help you, regularly - Benchmark what others are doing both within and outside of your sector Reputation risk is not public relations it s risk management that requires the participation of public relations and a number of other key players and experts. Consider appointing a chief risk and reputation officer. Cyber-reputation risk management is a team sport not an individual one. Gather the key decision-makers and experts together and do it regularly before, during and after a cyber-reputation risk incident. This is the only way that your organisation can hope to build the long-term resilience muscle it will need to manage this turbocharged strategic risk, which is going nowhere any time soon. n Dr Andrea Bonime- Blanc is chief executive of GEC Risk Advisory, a global strategic governance, risk & reputation consultancy and GlobalEthicist 55
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
Understanding Reputation Risk
2016 Understanding Reputation Risk PART IV: MEASURING REPUTATION VALUE LEONARD J. PONZI, PH.D. MANAGING PARTNER, REPUTATIONINC ANDREA BONIME-BLANC, JD/PH.D. CHIEF EXECUTIVE OFFICER, GEC RISK ADVISORY LLC
Business Continuity Management Systems. Protecting for tomorrow by building resilience today
Business Continuity Management Systems Protecting for tomorrow by building resilience today Vital statistics 31% 40% of UK businesses have been affected by bad weather related transport problems, power
10Minutes. on the stark realities of cybersecurity. The Cyber Savvy CEO. A changed business environment demands a new approach:
10Minutes on the stark realities of cybersecurity The Cyber Savvy CEO Highlights Business leaders must recognise the exposure and business impact that comes from operating within an interconnected global
Need to protect your business from potential disruption? Prepare for the unexpected with ISO 22301.
Need to protect your business from potential disruption? Prepare for the unexpected with. Why BSI? Keep your business running with and BSI. Our knowledge can transform your organization. For more than
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
OECD PROJECT ON CYBER RISK INSURANCE
OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years.
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world
THE NEW INTERNATIONALS Updating perceptions of SMEs in an increasingly globalised world Contents Introduction 5 Born Global 6 International Futures 7 Supporting UK SMEs 8 UK Regions 9 Conclusion 10 About
www.pwc.com Surviving Contact with Reality Crisis exercises as a key element of cyber incident and crisis management response.
www.pwc.com Surviving Contact with Reality Crisis exercises as a key element of cyber incident and crisis management response. What Happened to the Dinosaurs Avoiding the Extinction- Level Event Corporations
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Industrial Cyber Security Risk Industrial Attacks Continue to Increase in Frequency & Sophistication Today, industrial organizations
IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski
IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 [email protected] Managing
How GCs And Boards Can Brace For The Cybersecurity Storm - Law360
Page 1 of 6 Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] How GCs And Boards Can Brace For The Cybersecurity
CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts
CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What
Whanganui Reputation Management Strategy
Whanganui Reputation Management Strategy 1 P age Whanganui District Council Strategy Originator: Charlotte Almond, Group Manager Strategy and Development Contact person for enquiries: Charlotte Almond,
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
Assumption of Breach: A New Approach to Cyber Security
Assumption of Breach: A New Approach to Cyber Security An Atrion White Paper 2016 Atrion, Inc. All Rights Reserved. Assumption of Breach: A New Approach to Cyber Security A Look at the Threat Landscape
Partnership for Cyber Resilience
Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage
Business Continuity Policy. Version 1.0
Business Continuity Policy Version.0 January 206 Contents Contents Version control Foreword Policy. Scope.2 Aim and objectives.3 Methods and standards.4 Responsibilities.5 Governance.6 Training and exercises
REPORT. Next steps in cyber security
REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15
CYBER-RISK MANAGEMENT WHY HACKERS COULD CAUSE THE NEXT GLOBAL CRISIS RAJ BECTOR CLAUS HERBOLZHEIMER SANDRO MELIS ROBERT PARISI
CYBER-RISK MANAGEMENT WHY HACKERS COULD CAUSE THE NEXT GLOBAL CRISIS RAJ BECTOR CLAUS HERBOLZHEIMER SANDRO MELIS ROBERT PARISI In recent months, cyber terrorists have accessed the records of 21.5 million
PwC s Advanced Threat and Vulnerability Management Services
www.pwc.ch PwC s Advanced Threat and Vulnerability Management Services Our comprehensive approach PwC s security assessment services A joint business relationship provides clients with access to High-Tech
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack
Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609) 655 1707
Ensure Absolute Protection with Our Backup and Data Recovery Services ds-inc.com (609) 655 1707 Ensure Absolute Protection with Our Backup and Data Recovery Services STAY PROTECTED WITH OUR BACKUP AND
The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session
The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session Robert Smith Systemwide IT Policy Director Compliance & Audit Educational Series 5/5/2016 1 Today s reality There are two kinds
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
Singapore Exchange Sustainability Reporting Guide. Guide to Sustainability Reporting for Listed Companies
Guide to Sustainability Reporting for Listed Companies Contents 1. Policy Statement... 03 2. Purpose of the Guide... 07 3. Why Should Listed Companies Report?... 08 4. Who Should Report?... 09 5. How Should
Risk Management Policy
1 Purpose Risk management relates to the culture, processes and structures directed towards the effective management of potential opportunities and adverse effects within the University s environment.
Change Management. Seven Steps to Successful Change Management
Change Management Seven Steps to Successful Change Management Horst Abraham June 2016 Ross School of Business - University of Michigan Executive Education 1 Identify Your Change Target With a colleague
Responsible Investment Framework. Guardians of New Zealand Superannuation
Responsible Investment Framework Guardians of New Zealand Superannuation June 2016 PG 2 Overview Policy and Framework Standards Activities and Procedures PG 3 Policy and Framework Our responsibilities
FTI Consulting insurance services
INSURANCE SERVICES FTI Consulting insurance services The insurance industry is operating in a complex and dynamic global environment. Low interest rates, the demand on capital and ever-changing regulation
Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers
Technology and Cyber Resilience Benchmarking Report 2012. December 2013
Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities
Portfolio Carbon Initiative
Portfolio Carbon Initiative Acting as market makers, capital providers, and advisers, financial institutions (FIs) are important actors in the shift to a low-carbon economy. As providers of debt and equity,
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Supporting information technology risk management
IBM Global Technology Services Thought Leadership White Paper October 2011 Supporting information technology risk management It takes an entire organization 2 Supporting information technology risk management
Business Continuity Management
Business Continuity Management Policy Statement & Strategy July 2009 Basildon District Council Business Continuity Management Policy Statement The Council is committed to ensuring robust and effective
The Compliance Universe
The Compliance Universe Principle 6.1 The board should ensure that the company complies with applicable laws and considers adherence to non-binding rules, codes and standards This practice note is intended
Risk Management & Business Continuity Manual 2011-2014
ANNEX C Risk Management & Business Continuity Manual 2011-2014 Produced by the Risk Produced and by the Business Risk and Business Continuity Continuity Team Team February 2011 April 2011 Draft V.10 Page
Building Blocks of a Cyber Resilience Program. Monika Josi [email protected]
Building Blocks of a Cyber Resilience Program Monika Josi [email protected] About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
Manulife Financial s Workplace Solutions for Mental Health
Manulife Financial s Workplace Solutions for Mental Health GROUP BENEFITS Mental Health in the Workplace Mental illness affects the lives of millions of Canadians each year and is emerging as a dominant
Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud
Securing Internet Payments across Europe Guidelines for Detecting and Preventing Fraud Table of Contents Executive Summary Protecting Internet Payments: A Top Priority for All Stakeholders European Central
Who s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
Cybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
Cyril Roux: Cybersecurity and cyber risk
Cyril Roux: Cybersecurity and cyber risk Address by Mr Cyril Roux, Deputy Governor (Financial Regulation) of the Central Bank of Ireland, to the Society of Actuaries in Ireland Risk Management Conference
impact ACTIONABLE INSIGHT FOR BUSINESS LEADERS / CYBER RISK / MARCH 2016 BOLSTERING INSURERS CYBER DEFENCES
BOLSTERING INSURERS CYBER DEFENCES 02 At a time of unprecedented cyber attacks on insurers and an expanding cyber insurance market, US insurance supervisors have taken the lead in addressing insurers cyber
Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security
Enterprise Security Governance Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security Governance and Organisational Model Risk Mgmt & Reporting Digital Risk & Security
Cyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
ACE European Risk Briefing 2012
#5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids
CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM
IIA South Event 16 th June 2015 Cyber, Social Media and IT Risks 1 st and 2 nd Line Perspective David Canham (BA) Hons, MIRM Agenda This evening we ll cover the following: Who, why and what? Traditional
Cyber security: Are consumer companies up to the challenge?
Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies
NNIT Cybersecurity. A new threat landscape requires a new approach
NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities
Overview TECHIS60851. Manage information security business resilience activities
Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,
Risk Management Strategy and Policy. The policy provides the framework for the management and control of risk within the GOC
Annex 1 TITLE VERSION Version 2 Risk Management Strategy and Policy SUMMARY The policy provides the framework for the management and control of risk within the GOC DATE CREATED January 2013 REVIEW DATE
WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service
WHITE PAPER Managed Security Five Reasons to Adopt a Managed Security Service Introduction Cyber security presents many organizations with a painful dilemma. On the one hand, they re increasingly vulnerable
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
PRIORITIZING CYBERSECURITY
April 2016 PRIORITIZING CYBERSECURITY Five Investor Questions for Portfolio Company Boards Foreword As the frequency and severity of cyber attacks against global businesses continue to escalate, both companies
Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh
Navigating Cyber Risk Exposure and Insurance Stephen Wares EMEA Cyber Risk Practice Leader Marsh Presentation Format Four Key Questions How important is cyber risk and how should we view the cyber threat?
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
Tackling the growing risk of cyber crime
Financial Institutions Customer Industry Community Tackling the growing risk of cyber crime Discussion points for financial institutions Contents Introduction 3 The scale of cyber risk 4 Zurich survey
Data Security: Fight Insider Threats & Protect Your Sensitive Data
Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand
The new rules of customer engagement Russia/CIS results
The new rules of customer engagement Russia/CIS results October 2015 The Decisioning Vision 2020 study Sectors we interviewed: 60 Telecoms organisations including: Mobile Operators Fixed Line Operators
Bridging the data gap in the insurance industry. Cyber crisis management: Readiness, response, and recovery
Bridging the data gap in the insurance industry Cyber crisis management: Readiness, response, and recovery Readiness, response, and recovery Hacked devices, crashed websites, breached networks, denials
