Cyberattackers and. your intellectual. property: Valuing. and guarding prized. business assets
|
|
- Isabel Sparks
- 7 years ago
- Views:
Transcription
1 Deloitte Transactions & Business Analytics LLP Cyberattackers and your intellectual property: Valuing and guarding prized business assets The Dbriefs Transactions & Business Events series Hector Calzada, Managing Director, Deloitte Transactions & Business Analytics LLP John Gelinne, Managing Director, Deloitte & Touche LLP Emily Mossburg, Principal, Deloitte & Touche LLP September 28, 2016
2 Agenda The landscape for intellectual property (IP) cyber theft A preparedness gap What does an IP theft cyberattack cost? Looking at a fictitious scenario Considerations for mitigating the risk of cyber IP theft Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 2
3 The IP cyber theft landscape 44% of executives named loss of IP or strategic proprietary information as one of their top three cyber risk concerns.* Trends fueling IP cyber theft Digitization of everything Connection of everyone and everything to the internet Expanding ecosystems even R&D is outsourced New technologies, such as 3D printing, continue to introduce new forms and vehicles for IP theft The issue receives growing law enforcement and policy attention. In a competitive economic landscape, stealing IP is easier and faster than creating it * Deloitte Regional Cybersecurity Survey, 2015 Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 3
4 Many types of IP and theft across many industries Automotive Employee steals trade secrets to foreign competitor for personal gain Industrial products Former employee steals formulas, raw materials information, sales and cost data, product research, marketing data and other proprietary information before gaining employment at a competitor Financial services Programmer steals software code owned by a third party Life sciences Scientists charged with stealing biomedical information from their employer for resale overseas Media and entertainment Cybercriminals plead guilty to conspiracy for stealing unreleased software, source code, and copyrighted materials Energy & resources Foreign nationals indicted for stealing design specifications, financial information, attorneyclient privileged communications and other IP from energy product manufacturers Information gathered from Federal government Foreign nationals hacked systems to steal manufacturing plans Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 4
5 Polling question #1: Has your organization suffered an intellectual property cybertheft incident (electronic theft of trade secrets, drawings and plans, or proprietary know-how) within the past 12 months? Yes No Don t know Not applicable Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 5
6 Are organizations adequately addressing the risk of IP theft? Cyber programs tend to be shaped around common data breaches Security controls, detection capabilities, and incident response plans are formed largely around risks associated with volumes of sensitive data records Organizations expect a set of well-known impacts Financial Regulatory Reputational Commonly associated costs Customer breach notification Post-breach customer protection Regulatory compliance costs Public relations costs Attorney fees and litigation Cybersecurity improvements Cost of lost customers Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 6
7 What is the broader impact of an attack aimed at undermining competitive advantage? Supply chain tampering Disruption of critical services Theft of strategic information Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 7
8 Polling question #2: Which category of potential adversary do you think would be most likely to attempt theft of your organization s IP? Employees or other insiders Third parties with which your organization engages regularly Nation-states Activist groups not sponsored by nation-states Competitors Don t know / not applicable Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 8
9 A narrow lens on cyberattacks can leave organizations unprepared for the broader potential costs Direct costs associated with data breaches Many are intangible and require our Valuation skills In our scenarios, costs beneath the surface account for over 95% of the financial impact. Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 9
10 and unprepared for the duration of recovery efforts Analyze and take immediate steps to stop compromises in progress Incident triage Reduce and address the direct consequences of the incident Impact management Repair damage to the business and prevent occurrence of future incidents Business recovery In our scenarios, less than 10% of the total costs are incurred during triage. Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 10
11 Polling question #3: Do you expect the number of IP cyber theft incidents (successful or attempted cyber theft of trade secrets, drawings and plans, or proprietary know-how) to change in the coming 12 months? Yes I expect the number will increase Yes I expect the number will decrease No I do not expect it to change Don t know Not applicable Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 11
12 Illustrating a case of IP cyber theft A fictitious technology company $40B Revenue 60,000 employees Growth rests on innovative products to support management of Internet of Things (IoT) environments Hundreds of contracts across many industries, including some very large government contracts Pay $3.75M annually for $150M in cyber insurance Relatively mature incident response capabilities Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 12
13 Anatomy of the attack they face In six months, the company plans to launch a new version of a core product. A federal agency notifies the company that its infrastructure has been breached by a foreign nationstate.! Day One Day 10 Day 40 An investigation shows that IP tied to 15 out of 30 product lines was stolen. Revenue associated with these products is expected to be 25% of the total revenue over the next five years. A tech blog reveals that the foreign entity is reverseengineering the product that is due to be launched. Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 13
14 Recovering from the rippling effects Incident response timeline and distribution of impacts Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 14
15 Polling question #4: If your organization was to suffer theft of IP (trade secrets, drawings and plans, or proprietary know-how), which do you think would be the largest challenges? Assessing what IP had been stolen, or the impact of IP loss Seeking recovery of the IP as soon as possible Modification of existing IP to minimize loss of competitive advantage Preparing for litigation as a result of IP theft Managing investor and customer/client relationships Don t know / Not applicable Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 15
16 Estimating financial impact of an attack Deriving cost and duration data Leveraged experience helping companies recover from major cyberattacks Developed fictitious profiles and scenarios based on industry knowledge Used publicly available information on similar companies as benchmark data to derive factors used in direct cost and valuation equations Calculating direct costs Relatively simple to approximate based on publicly available information Leveraged existing studies Customer protection programs PR costs Legal costs Customer notification Regulatory fines Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 16
17 Estimating the financial impact of an attack Calculating intangible impacts Applying professional judgement, accepted financial modeling methods and reasonable assumptions in the absence of detailed, actual data Financial impact is associated with a specific point in time With-and-without/But-for methodology Relief-from-royalty methodology Reliance on assumptions Loss of IP Increased cost to raise debt Lost contracts Devaluation of trade name Lost value of customer relationships Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 17
18 What does it cost? Total potential impact >$3B Many costs associated with PIItype data breaches do not factor in Greatest impacts are intangible costs The value of lost IP is not the major cost, but the theft of IP has rippling impacts Known costs Hidden costs Cost Factors Cost (millions) % Total Customer breach notification Post-breach customer protection Regulatory compliance Public relations $ % Attorney fees and litigation $ % Cybersecurity improvements $ % Lost value of customer relationships Increased cost to raise debt Insurance premium increases $ % Loss of intellectual property $ % Devaluation of trade name $ % Operational disruption $1, % Value of lost contract revenue $1, % Total $3, % Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 18
19 Polling question #5: How would you describe your organization s current effort to secure its IP (whether trade secrets, drawings and plans, or proprietary know-how)? Leading access to IP is very limited, on a need-to-know basis only Building we re working to strengthen our security protocols and systems around IP Lacking we do not have a defined program to protect and monitor access to IP Don t know / Not applicable Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 19
20 Improving the management of IP cyber risk: no need to start from scratch Creators of IP researchers and scientists understand what s at stake Technology leaders understand what s needed More attention needs to be paid to insider threat programs Most organizations still don t have a good data inventory & classification a daunting but essential effort Protection Trading/ cross-licensing Cyber risk Culture Product pipeline Sensing/ blocking IP monetization Industry reputation M&A activity Internal structure Integrate cyber awareness throughout the IP management lifecycle Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 20
21 There s a big disconnect with the business Cybersecurity programs continue to focus on the threats, vulnerabilities and probability. Often, not enough attention is paid to the true damages a particular type of cyberattack can cause. By looking realistically at the potential costs, business leaders can right-size investments to better protect their most valuable assets. How likely is this type of attack? What are the threats? What is the business impact? Where are our vulnerabilities? Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 21
22 Question and answer Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 22
23 Join us October 19 at 2 p.m. ET as our Transactions & Business Events series presents: Elevating risk: A new paradigm for risk management leadership Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 23
24 Eligible viewers may now download CPE certificates. Click the CPE icon in the dock at the bottom of your screen. CPE Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 24
25 Contact information Hector Calzada Managing Director Deloitte Transactions & Business Analytics John Gelinne Managing Director Deloitte & Touche LLP Connect with me on LinkedIn Connect with me on LinkedIn Emily Mossburg Principal Deloitte & Touche Connect with me on LinkedIn Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 25
26 This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation. Copyright 2016 Deloitte Development LLC. All rights reserved. Cyberattackers and your intellectual property: Valuing and 26
27 About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ( DTTL ), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as Deloitte Global ) does not provide services to clients. Please see for a detailed description of DTTL and its member firms. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. Copyright 2016 Deloitte Development LLC. All rights reserved. 36 USC
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
More informationInto the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
More informationCyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
More informationManaging cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
More informationService Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard
Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,
More informationWhere insights lead Cybersecurity and the role of internal audit: An urgent call to action
Where insights lead Cybersecurity and the role of internal audit: An urgent call to action The threat from cyberattacks is significant and continuously evolving. One estimate suggests that cybercrime could
More informationConducting due diligence and managing cybersecurity in medical technology investments
Conducting due diligence and managing cybersecurity in medical technology investments 2015 McDermott Will & Emery LLP. McDermott operates its practice through separate legal entities in each of the countries
More informationKey Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
More informationAnalytics for Shared Services The three-minute guide
Analytics for Shared Services The three-minute guide Don t squint. Select the full-screen option to view at full size. Analytics for Shared Services The three-minute guide 1 2 Why it matters now You may
More informationStanding together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015
Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report November 23, 2015 Table of contents Background Exercise objectives Quantum Dawn 3 (QD3) cyberattack scenario
More informationSustainability Analytics The three-minute guide
Sustainability Analytics The three-minute guide Sustainability Analytics The three-minute guide 1 Why it matters now Sustainability isn t just good for your corporate image and conscience. It s good for
More informationExtending Security Analytics to support Operational Efficiency. John A. Greco Deloitte & Touche LLP Cyber Risk Services
Extending Security Analytics to support Operational Efficiency John A. Greco Deloitte & Touche LLP Cyber Risk Services Extending security analytics to support operational efficiency Key components of the
More informationBlind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.
Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are
More informationThe Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
More informationCYBERSECURITY INVESTIGATIONS
CYBERSECURITY INVESTIGATIONS Planning & Best Practices May 4, 2016 Lanny Morrow, EnCE Managing Consultant lmorrow@bkd.com Cy Sturdivant, CISA Managing Consultant csturdivant@bkd.com Michal Ploskonka, CPA
More informationRisk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
More informationCybersecurity: A View from the Boardroom
An Executive Brief from Cisco Cybersecurity: A View from the Boardroom In the modern economy, every company runs on IT. That makes security the business of every person in the organization, from the chief
More informationASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
More informationThreat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations
Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations September 2015 Copyright 2015 Deloitte Development LLC. All rights reserved. This presentation
More informationBest Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP
Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII
More informationPREPARE YOUR INCIDENT RESPONSE TEAM
PREPARE YOUR INCIDENT RESPONSE TEAM JUNE 2015 Michael Harrington, Fidelis Cybersecurity It s a big problem... The ongoing cyber-thefts from The scale of international theft the In networks 2013, the of
More informationCYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
More informationCyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationQuantum Dawn 2 A simulation to exercise cyber resilience and crisis management capabilities. October 21, 2013
Quantum Dawn 2 A simulation to exercise cyber resilience and crisis management capabilities October 21, 2013 Table of contents Background 2 Exercise objectives 3 QD2 cyber-attack scenario 4 QD2 yielded
More informationCyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
More informationWho s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
More informationCulture of Purpose Building business confidence; driving growth 2014 core beliefs & culture survey
Culture of Purpose Building business confidence; driving growth 2014 core beliefs & culture survey Executive summary Our research indicates that focusing on purpose rather than profits builds business
More informationMinimizing the threat landscape through integration of Software Asset Management and Security
Minimizing the threat landscape through integration of Software Asset Management and Security The point of intersection As companies evolve and grow, the cost and complexity of their software assets increases
More informationWRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
More informationU.S. CFO Program The Four Faces of the CFO. 2010 Deloitte Touche Tohmatsu
U.S. CFO Program The Four Faces of the CFO 2010 Deloitte Touche Tohmatsu CFOs Play Four Critical Roles in Companies Catalyze behaviors across the organization to execute strategic and financial objectives
More informationWho Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
More informationBridging the data gap in the insurance industry. Cyber crisis management: Readiness, response, and recovery
Bridging the data gap in the insurance industry Cyber crisis management: Readiness, response, and recovery Readiness, response, and recovery Hacked devices, crashed websites, breached networks, denials
More informationPanel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices
Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers
More informationDefending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014
www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday
More informationCyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
More informationPrivilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
More informationCybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
More informationClick to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
More informationwww.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
More informationCybersecurity: Learn Critical Strategies to Protecting Your Enterprise November 6, 2013 1:00PM EST
Cybersecurity: Learn Critical Strategies to Protecting Your Enterprise November 6, 2013 1:00PM EST November 6, 2013 Copyright 2013 Trusted Computing Group 1 November 6, 2013 Copyright 2013 Trusted Computing
More informationYour Network Has Been Compromised. Is It Time To Reevaluate Your Traditional Cybersecurity Paradigms?
SOLUTION BRIEF Identity and Access Management Solutions from CA Technologies for Government Agencies Your Network Has Been Compromised. Is It Time To Reevaluate Your Traditional Cybersecurity Paradigms?
More informationExercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
More informationPersonal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach
Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach Don MacPherson January 2012 Discussion Items 1. Threats and risks to personal information
More informationISO27032 Guidelines for Cyber Security
ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance
More informationData Breaches and Trade Secrets: What to Do When Your Client Gets Hacked
Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked R. Mark Halligan, FisherBroyles, LLP Andreas Kaltsounis, Stroz Friedberg Amy L. Carlson, Stoel Rives LLP Moderated by David A. Bateman,
More informationAssessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
More informationTax analytics The three-minute guide
Tax analytics The three-minute guide Tax analytics The three-minute guide 1 Why it matters now The data revolution in tax is underway Think for a moment about the vast amount of data being generated by
More informationHow GCs And Boards Can Brace For The Cybersecurity Storm - Law360
Page 1 of 6 Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com How GCs And Boards Can Brace For The Cybersecurity
More informationDemystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
More informationDepartment of Homeland Security
Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions
More informationJust because you can doesn t mean you should
Just because you can doesn t mean you should Content marketing survival tips Jonathan Copulsky Chief Content Officer, Deloitte LLP Chief Marketing Officer, Deloitte Consulting LLP January 21, 2016 Today
More informationAuto insurance telematics The three-minute guide
Auto insurance telematics The three-minute guide Auto insurance telematics The three-minute guide 1 Why it matters now Telematics is upending the auto insurance world After considerable industry buzz,
More informationAccenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
More informationRemarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity
More informationDoes Providing Tax Services Impair Auditor Independence? Evidence from Assessing Tax Accrual Quality
Does Providing Tax Services Impair Auditor Independence? Evidence from Assessing Tax Accrual Quality By Choudhary, Koester, and Pawlewicz A Practitioner s Perspective Russ Hamilton Deloitte Tax LLP Agenda
More informationReducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
More informationwww.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
More informationDetermining Data Equity: Capture and Calculate Valuation at Risk
Matthew Mikell- IBM Market Manager mgmikell@us.ibm.com IOT North America April 15, 2015 Determining Data Equity: Capture and Calculate Valuation at Risk Agenda Foundations of Capturing Equity Closing Gaps
More informationDATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH
DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH Andy Watson Grant Thornton LLP. All rights reserved. CYBERSECURITY 2 SURVEY OF CHIEF AUDIT EXECUTIVES (CAEs) GRANT THORNTON'S 2014 CAE SURVEY Data privacy and
More informationTen Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
More informationBSA GLOBAL CYBERSECURITY FRAMEWORK
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
More informationERP Administrative Challenges Brian Jensen
ERP Administrative Challenges Brian Jensen Deloitte & Touche LLP February 2011 ERP Administrative Challenges Enterprise resource planning (ERP) implementations over the last two decades have generated
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationSupply Chain Analytics The three-minute guide
Supply Chain Analytics The three-minute guide Supply Chain Analytics The three-minute guide 1 Why it matters now Globalization and complexity have put supply chains in the spotlight like never before Supply
More informationSmall businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
More informationWHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
More informationAlways Worry About Cyber Security. Always. Track 4 Session 8
Always Worry About Cyber Security. Always. Track 4 Session 8 Mark Stevens SVP, Global Services and Support Digital Guardian MStevens@DigitalGuardian.com 781-902-7818 www.digitalguardian.com 2 Abstract
More informationThird Party Security: Are your vendors compromising the security of your Agency?
Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010 Agenda
More informationHow To Protect Your Business From A Cyber Attack
Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It
More informationBig data The three-minute guide
Big data The three-minute guide Don t squint. Select the full-screen option to view at full size. Big Data The three-minute guide 1 2 What is big data? It s about insight Big data generally refers to datasets
More informationCybercrime and Regulatory Priorities for Cybersecurity
NRS Technology and Communication Compliance Forum Cybercrime and Regulatory Priorities for Cybersecurity Copyright 2014 by K&L Gates LLP. All rights reserved. Sean P. Mahoney sean.mahoney@klgates.com K&L
More informationCyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
More informationGALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More information1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
More informationCybersecurity..Is your PE Firm Ready? October 30, 2014
Cybersecurity..Is your PE Firm Ready? October 30, 2014 The Panel Melinda Scott, Founding Partner, Scott Goldring Eric Feldman, Chief Information Officer, The Riverside Company Joe Campbell, CTO, PEF Services
More informationMary E. Galligan Director Deloitte & Touche LLP August 4, 2015
A Crisis Response Framework: Strategies for Effective Leadership Mary E. Galligan Director Deloitte & Touche LLP August 4, 2015 Managing a crisis A crisis is a major catastrophic event, or a series of
More informationINTELLECTUAL PROPERTY STRATEGY
OCEAN TOMO INTELLECTUAL PROPERTY STRATEGY At Ocean Tomo we begin each intellectual property (IP) Strategy Advisory Services engagement with a thorough understanding of relevant industry activity as well
More informationIT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski
IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 eric.vyverberg@protiviti.com Managing
More informationCybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
More informationCyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
More informationSupply Chain Analytics The three-minute guide
Supply Chain Analytics The three-minute guide Don t squint. Select the full-screen option to view at full size. Supply Chain Analytics The three-minute guide 1 2 Why it matters now Globalization and complexity
More information$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP
David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Global Cyber Crime is the fastest growing economic crime Cyber Crime is more lucrative than trafficking drugs!
More informationTHE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies
More informationJanuary IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
More informationCyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
More informationPrivilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
More informationExperience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
More informationTHE EVOLUTION OF CYBERSECURITY
THE EVOLUTION OF CYBERSECURITY Identifying Best Practices June 2, 2015 Cerone F. Cy Sturdivant Managing Consultant Nashville, TN 1 TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when
More informationBladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture
BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance
More informationPosted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am
1 of 7 5/8/2014 7:34 PM Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am Editor s Note: David A. Katz is a partner at Wachtell, Lipton, Rosen & Katz specializing
More informationCybersecurity and the Threat to Your Company
Why is BIG Data Important? March 2012 1 Cybersecurity and the Threat to Your Company A Navint Partners White Paper September 2014 www.navint.com Cyber Security and the threat to your company September
More informationInformation Life Cycle Management (ILM)
Information Life Cycle Management (ILM) Finding business value in Information Life Cycle Management (ILM): Proactive information management through ILM can reduce cost and risk while creating tangible
More informationCFO Insights Cybersecurity: Five essential truths
CFO Insights Cybersecurity: Five essential truths Cyber risks, it seems, are everywhere. Retailers breached. Intellectual property stolen. Data hacked almost on a daily basis. It s enough to rattle even
More informationPROMOTION // TECHNOLOGY. The Economics Of Cyber Security
PROMOTION // TECHNOLOGY The Economics Of Cyber Security Written by Peter Mills Malicious cyber activity, from hacking and identity fraud to intellectual property theft, is a growing problem within the
More informationNational Market System (NMS) plan
SEC Rule 613: Consolidated Audit Trail National Market System (NMS) plan Considerations for broker-dealers Contents What is SEC Rule 613? 3 Why was Rule 613 proposed? 3 What does CAT mean to broker-dealers?
More information12/11/15. Evolving Cybersecurity Risks. Agenda. The current cyber risk landscape Overview. Results on EY s Global Information Security Survey
Evolving Cybersecurity Risks Results on EY s Global Information Security Survey Agenda Market insights: What are we seeing? Factoring cybersecurity into your planning and risk appetite Marketplace response
More informationDeveloping Your Strategic Plan
Training Module: Developing Your Strategic Plan This training contains general information only and Deloitte is not, by means of this training session, rendering accounting, business, financial, investment,
More informationALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage
ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November
More information