International Information Integrity Institute. I-4: An overview of the I-4 Programme

Size: px
Start display at page:

Download "International Information Integrity Institute. I-4: An overview of the I-4 Programme"

Transcription

1 International Information Integrity Institute I-4: An overview of the I-4 Programme July - August 2014

2 2 I-4: An Overview International Information Integrity Institute A service provided by KPMG Contents 1 What is I Overview of I-4 member services 4 3 The benefits of I-4 membership 5 4 I-4 differentiators 6 Appendices i Eighteen months of I-4 activities 9 ii The I-4 team 17

3 3 I-4: An Overview 1 What is I-4 What is I-4 Keeping members at the forefront of information security Founded in 1986 by Donn Parker of the Stanford Research Institute International the International Information Integrity Institute (I-4) was the first knowledge and experience sharing forum for senior information security leaders. Acquired by KPMG in December 2009, I-4 is the leading forum for senior information security leaders involved in implementing sophisticated risk management and security operations, many of whom hold the highest ranking positions within some of the most influential global organisations. I-4 brings together some of the leading minds in the world of information security and risk to help its members stay one step ahead of the big issues. It is at the forefront of the information security industry, pushing the boundaries on thought leadership, collaboration and innovation. The fundamental ethos of the I-4 concept is trust, collaboration, participation, contribution and the willingness to share not only the extensive experience of its membership community but also their valuable intellectual property. For example, a financial services member which joined in 2011 has made available to the wider membership their extensive library of highly regarded awareness and education material, including online, audio and written content. I-4 is a global forum with a difference, enabling members to tap into the latest thinking and anticipate emerging trends before they can impact their organizations. Members are able to separate the facts from the scare stories and get more from their investment in security. Today s security leaders face an ever-widening range of challenges that are very much part of the top table agenda. I-4 membership helps its members give the Board and senior management greater assurance that valuable data is protected in a cost-effective way. The topics were relevant, tangible and provided great insight, which coupled with the numerous networking opportunities made this an excellent Forum. I-4 Member, Forum 81, March 2014

4 4 I-4: An Overview 2 Overview of I-4 member services Forums These three-day conferences take place three times a year, one each on the west and east coasts of the US, and a third in Europe. The emphasis is very much upon learning, sharing knowledge and solving real problems by interacting with other members, relevant guests and external specialist contributors. The March 2012 Forum was the highest rated in I-4 s twenty five year history, with one highly experienced CISO Member who attended saying, Great Forum, I picked up half a dozen things to follow up when I get back in the office. Webinars Members may not always have the time to attend events in person, so I-4 s monthly webinars offer an ideal way to keep abreast of important security issues. The content of two recent webinars covering social media security and social engineering attacks have been adopted by a number of members to feed directly into their education and awareness programmes. Ad hoc member teleconferences These are convened at short notice and are facilitated teleconference workshops designed to explore breaking news to help members understand and deal with new and emerging issues. The December 2013 member call that followed on from the incident sharing discussion in that month s Threat and Intell call being the most recent example. Member queries If a member organization is struggling to overcome a particular challenge, it can readily tap into the collective power of the I-4 membership. Responses to query are analysed, collated and then published to the member raising the query and to the broader membership all members thereby quickly benefiting from the collective knowledge and experience of the group. Regional meetings Held several times a year, one-day regional and half day executive events allow members to focus on one or two specific issues in considerably greater detail, in some cases following up queries and discussions raised in Forums. The open sharing of information face-to-face during Forums is just invaluable, particularly as our organisation has considerably complex issues, therefore having a resource where experiences are shared in a trusted environment is very useful indeed. I-4 Member, May 2014

5 5 I-4: An Overview 3 Benefits of I-4 membership I-4 event content I-4 runs at least one event each month and strives to deliver value and benefit to its members by equipping them with the insights and knowledge to address new and emerging issuesrecent I-4 events, in Forums and through other channels, have included in-depth analyses of: an exploration the implications of recent certificate authority compromises; dealing with the complexity of the international legal and regulatory landscape; mobile security (devices, data and apps); situational awareness; what makes for effective information security awareness; targeted persistent attacks; cyber espionage; securing the end-point; working in potentially hostile territories; and intelligence led security. See the I-4 website ( for a look at everything that has been going on recently. I-4 Projects Member events and projects delivered by the I-4 Team, such as developing a good practice guide to defending against, detecting and recovering from an APT attack, allow I-4 members to share and collaborate and build shared solutions to shared problems. The I-4 Threat and Intelligence Exchange Launched in April 2012, this service provides members with the opportunity to openly discuss threat and intell information currently on their agenda and explore threats, incidents and other intelligence that people are seeing and would like to explore with other members. This monthly interactive, facilitated, teleconference underlines the fact that I-4 is all about the sharing of real experience and knowledge and getting on to the front foot with the ever changing challenges facing the world of information security. I-4 collaboration groups Members form collaborative working groups to develop queries posted on the I-4 website, or following sessions or discussions at Forums, meetings or Webinars. A group may deal with a problem facing a member organization, or alternatively may investigate a more general area of concern. It may even choose to focus on issues affecting a particular industry, sector or region. The I-4 website All I-4 content, including readily reusable awareness and education material, Forum presentations, recorded webinars, results of member queries and monthly Newsletters are all made available to I-4 members in the private section of the website. It can be a lonely job sometimes and having peers that you feel you can lean on from time to time at the CISO roundtable or broader I-4 meetings are very useful. The I-4 Member Query service is also very useful in asking a couple of key questions and gaining some very quick feedback that you can benchmark against the rest of the membership. I-4 Member, June 2013

6 6 I-4: An Overview 4 I-4 differentiators A highly experienced team Five of the I-4 Team members have backgrounds as CISOs and CSOs of complex global organizations and many years experience in senior security roles. Each of them brings a different perspective to I-4. This is a much greater depth than the competing programmes this means that I-4 provides a close match to the needs of senior security leaders in the following ways: Program content and deliverables are of a high standard and focused on meeting the needs of senior executives We are able to attract membership and participation from higher calibre individuals, giving attendance at I-4 events a greater value The experienced perspective means that our horizon scanning is conducted through the lens of pragmatic experience keeping it grounded to implementable improvements in the short and medium term, while at the same time identifying future issues in advance and equipping the members with front foot knowledge Trust and intimacy One of the firm foundations of the I-4 Program is an operating model and culture that encourages trust between the members. While this is backed by an NDA, the degree of trust that I-4 operates under is unprecedented compared to its competitors. This means that participants are much more willing and able to tell it like it is. Some recent examples of this are: A member talking through their post incident response and remediation following an almost catastrophic near-miss attack on what were previously considered low-risk websites A member presenting the history of their approach to pitching the investment case for increased spending on security, what had worked, what had not worked and why An investment bank discussing their approach to using cloud services for security and how cloud related risks were managed in an inherently conservative technology group During I-4 meetings the relationship building is as important as the content itself we strive to create an environment where business friendships are made and built. Most members should leave a meeting having made at least two good connections with peers that will help to solve common problems in the short and long-term. The Forum content was spot on. Every topic was relevant and timely and the speakers were engaging. I-4 Member, Forum 80, October 2013

7 7 I-4: An Overview 4 I-4 differentiators (cont.) Focus on larger more complex organisations Many of the other providers services are targeted at a wide range of customers, meaning that the content delivered trends towards the lowest common denominator. Because I-4 focuses on the needs of senior executives at large and complex organizations the output covers the issues that challenge these organisations we see the basics as being covered by other knowledge sharing organizations and so do not cover them regularly or in great depth. The current membership ranges from some of the world s largest technology and services companies to global financial institutions and industrials and telecoms. While a small number of these also participate in other organizations the biggest players are increasingly choosing to go with I-4 as their sole choice. Backing by KPMG In addition to establishing a highly experienced team, KPMG is investing heavily in I-4: Taking the quality of content and deliverables to a higher level than provided by our competitors Driving the growth in the number and quality of membership Using KPMG specialists to contribute content and experience and do heavy lifting on behalf of members I-4 services comparison There are currently a number of information security membership organizations which have either complementary or competing services to that of I-4. The following table provides a high level overview of how I-4 compares to other organization in key service areas. While this is not intended to be a definitive or truly scientific comparison it nonetheless helps illustrate why I-4 should be considered the first choice for all leading players. Service Description I-4 Gartner IREC ISF RSA SANS Thought leadership think tank One-on-one interactions with members facilitates trust and personal growth Encourages active participation Annual meetings * Proven knowledge sharing with top executives Exposure to latest technology and theory Executive management training Targeted technical training No-cost regional conferences All discussions under NDA creating an environment of trust and sharing * I-4 runs three day Forum events three times a year, along with a programme of one day Regional Meetings

8 Appendices

9 9 I-4: An Overview i Since January 2013, I-4 has delivered: Forums Forum 78 San Diego Forum 78 was held from Monday 4 th March Wednesday 6 th March 2013 and Members rated the Forum highly overall. Highlights from Forum 78 included: A keynote presentation about the importance of rigour and discipline in tackling the dual challenges of rapid change and stability of systems. Four case studies focused on providing real learnings across a range of topics and sectors. Participants given an update on the latest developments in the attacker s domain where one criminal website describes their services as accessible, affordable and scalable, suggesting that cybercrime is now big business. Forum 79 Edinburgh Forum 79 took place from Monday 24 th June Wednesday 26 th June and proved very popular among the I-4 membership. Highlights from Forum 79 included: A diverse set of case studies Linked together through all being both real and recent Decision support What s on your dashboard; examining what I-4 Members are doing with metrics and management information to support their information security decision making Far from the Purely Academic Security research is increasingly having an immediate impact on security tasks we need to do now. We hear on a range of topics with near term application. Smart metering An increasingly hot topic that is likely to become relevant to us all as consumers and to many of us as security leaders with its many technical and legal challenges. The London 2012 Games: The challenges and many successes of delivering a cyber-secure large scale event. Forum 80 Houston The I-4 Forum 80 took place in Houston from Monday 21 st Wednesday 23 rd October. Highlights from Forum 80 included: Case Studies the real world a series of Member case study presentations across a range of topics and sectors, including securing big data, the SOC journey from in-house to outsource to highly effective in-house again, and how to manage the enterprise in the world of social media Data Analytics can information security benefit? exploring if the Big Data analytics platform can be used to consolidate structured and unstructured security data SCADA & Control System Security demonstrating the huge importance and reliance on these systems beyond the traditional boundaries of the process and utility sectors. Forum 81 Phoenix Eighteen months of I-4 activities The I-4 Forum 81 took place in Phoenix from Monday 10 th Wednesday 12 th March. Highlights from Forum 81 included: Case Studies four diverse member case studies ranging from records management to life after a significant APT attack Data Scientist: Actionable Insights from Big Data investigating the possibility of using Data Science capabilities for security, including the skills required to obtain the most value from this concept. Seeing your Way Clearly Through the Cloud sharing current experiences of cloud security and the latest developments in this field, particularly the emerging sources of cloud assurance information. Business and Operational Resilience keynote session, which emphasised how operational resilience requires a well established enterprise-wide operational risk management capability and that this function needs to converge risk management views (e.g. physical, Information security, IT ops management).

10 10 I-4: An Overview i Forums (Cont.) Forum 82 Geneva The I-4 Forum 82 took place in Geneva from Monday 23 rd Wednesday 25 th June. Highlights from Forum 82 included: An opening keynote presentation that shared experiences of reporting directly to the CEO of the company and how their mission has evolved to provide the best security when it comes to innovation, transparency and effectiveness. Engaging the Board and Executive Risk appetite and informed decision making. Entire session dedicated to sharing techniques that have been used to good effect when making Executive aware of the risks associated with information security and providing them with the key information they need to make decisions. Attracting, Finding, Developing and Retaining: Where has all the talent gone? Four key lessons learnt during this session were: talent is there but demand is outstripping demand; qualifications and certifications remain key considerations; succession planning is vital; and support diversity and the next generation. Awareness and Behaviours: winning the arms race. Highly interactive session focused on the latest techniques organisations have used to attempt a change in behaviour among staff about securing information. The need to eliminate the underlying reason for poor practices is a high priority, however measuring the effectiveness of awareness messages remains a challenge. European Regional Meetings 25 th September The theme for the one day event was Disruptive Technologies: What enterprise IT and information security look like in the new world order and was hosted by the BAE Systems Detica in London. With future looking views from finance, oil and gas, high technology and telecommunications. Webinars Eighteen months of I-4 activities The Insider Threat...An Insidious Information Security Reality Participants were presented with a series of real-life documented cases of insider actions that have compromised a variety of organisations and which have led to perhaps the largest amount of intellectual property loss in modern history. A business based perspective on information security This presentation focussed on the business perspective of information security controls and processes and why they are so important for the business. Innovative solutions were also shared that could deliver control requirements to the business. Mobile, smart device security and the Cloud A member organisation shared their knowledge of mobile and smart devices in relation to the Cloud with particular emphasis on the key challenges of securing consumerised devices accessing cloud services, the security of mobile apps from cloud providers and the legal and regulatory challenges around BYOD. Software assurance A representative from the U.S. Department of Homeland Security provided a very useful and in-depth analysis of software assurance techniques and tools that could help quantify and improve the security and reliability of systems. Finding the Needle in a Needle Stack: Surveillance Analytics A member organisation presented an overview of how to set up an effective end-to-end approach for analytics and placed a great deal of emphasis on gaining operational benefit from the output this approach produces. Examples were shared about how the approach could work in practice, particularly insider threats and APT, which was of great interest to members who joined the webinar.

11 11 I-4: An Overview i Webinars (Cont.) Enhancing decision-making through the Cyber Security Cartographies project (CySeCa) A variety of ways in which both people and technology protect important data were presented and attendees were particularly interested to learn about the range of techniques available to better inform security managers about the strength of data protection across their cyber estate. Keeping Up With the Next Generation of Security Risk With a consideration of the more sophisticated malware attacks against critical infrastructure and mobile devices, the webinar explored how IT and security risk affects the IT infrastructure, cyber security and the business overall. KPMG Cyber Index FTSE 350 This I-4 webinar provided an opportunity to share and discuss the research performed by KPMG across the UK s FTSE 350 constituent companies (over January to June 2013), with the aim of performing the same initial steps that hackers and organised criminals would perform when profiling a target organisation for attack or infiltration. Information Security and Business Continuity Management This I-4 webinar presented a Member s perspective on the two disciplines, supported by real-world examples, outlining where the two are different but also overlap in terms of the activities which they cover. Why SCADA Security is NOT like Computer Centre Security This webinar presentation provided a recap of the current situation about the threats posed to control systems and what can be done to change the way we manage these systems to make them even more robust. Security Strategy from a Government perspective This webinar provided I-4 Members with a clear insight into the UK Government s Cyber Security Strategy from a representative of the UK Cabinet Office. The webinar focused on initiatives of the UK Government undertaken to strengthen the UK s resilience to cyber-attack, the impact of the Cyber Security Strategy on the private sector, particularly financial services, and the cultivation of safe and stable international cyberspace. Threat Management Response & Process in the I-4 community An I-4 Member provided insights into the process they followed to manage threats, including how they respond to threats from a variety of sources and why they are continuously developing and improving their threat management process. I-4 Members then shared knowledge and experience about what works well and what could be improved about threat management, particularly how intelligence collaboration could be exploited further in the I-4 community. The evolution of cybercrime Eighteen months of I-4 activities Overview of the cyber threats facing financial services organisations today and the nature of the actors by which they are being targeted. Consumer Insights, Privacy and Overtime: The Good, the Bad and the Ugly of the Internet of Things for Business. An understanding of how the Internet of Things impacts businesses in ways that may not have been anticipated, which included a discussion about the advantages offered by the Internet of Things and how any benefits should be weighed up against compliance requirements and legal and regulatory issues.

12 12 I-4: An Overview i Member Queries Social Media Access to social media, the restrictions that have been enforced and the coverage of acceptable use of social media in policy gained a number of varied responses. Remote Printing Restrictions over employees printing remotely, including those controls over contractors and third parties printing material was explored in this Member query. Card data security One multinational financial services organisation was looking to understand how similar entities were addressing core security best practices relative to card data security vs. PCI DSS itself and how they are separating or intertwining the two topics. Information classification and handling An I-4 Member was interested in finding out whether there is a better way of approaching information classification and handling, specifically if other organisations have successfully implemented their policies with evidence of good practices being adopted. Clear desk/document destruction Clear desk/document destruction routines were being refreshed by one organisation and while this programme was being finalised, they wanted the chance to benchmark their policies, approach, audit approach and consequence models against other Member organisations. Layered anti-virus defence Anti-malware defence mechanisms were being reassessed by one Member who was keen to understand what the industry standard was regarding layered anti-virus defence on the infrastructure. Backup media encryption The risk associated with backup media (tapes, etc.) as it is transported to and from offsite storage facilities was being reassessed by one Member who wanted to find out how other organisations were approaching the same issue. Security Framework Alignment Questions were asked in relation to whether aligning the information security policy to a standard framework has benefited in minimizing and mitigating risks in other organisations. Security Auditing This query was seeking to understand whether information security audits are performed by external entities and if using a security framework helps in these assessments. Procurement practices and processes One Member organisation was reviewing their IT in an Operational Technology environment to better understand and mitigate any security risks, as part of this work they were looking to review their procurement practices and processes against other Members. Measuring policy compliance Eighteen months of I-4 activities This query was initiated by a Member organisation who was looking to survey the I-4 membership about what they have based their policies on and how they have measured compliance against policy in their organisations. Mail and SharePoint PII Security The current legislative trends around encrypting PII and the desire to protect sensitive information from accidental mishandling, insider theft, third party theft and mishandling led one organisation to explore what protections including encryption other companies are applying in their unstructured environment.

13 13 I-4: An Overview i Member Queries (Cont.) Implementing a SIEM An I-4 Member was building a business case for implementing an internal SEIM as part of their Security Operations Centre and wanted to know the approach taken by other I-4 members. Cyber security legislation One Member organisation was looking to find out more about the changing legislative landscape from a Cyber perspective in order to better understand the risks and impact associated with cyber security. Monitoring and logging This query came from a Member organisation seeking to understand how their peer organisations monitor user and system activities and the logging techniques they undertake. Third Party Suppliers Awareness about how Member organisations undertake due diligence reviews of potential third party suppliers prior to contracts being signed and how they gain assurance that their suppliers are meeting their information security obligations during the contract term. Information Security Awareness A quick benchmark about the different types of information security awareness and training that organisations deliver to their customers and third party suppliers. Information Classification Guidance on how large, complex organisations classify their information, and in particular whether they have any special handling requirements for customer information. Social Media Good practice that has been adopted across the membership to help address the risks and opportunities presented by social media. Application security Survey of I-4 Members about the techniques that are currently being used to secure applications Information Security Policy One Member organisation wanted to find out how other organisations measure policy effectiveness, which they define as the degree of correspondence of employee behaviour compared to policy requirements Patching Completion Criteria This Member was making improvements to vulnerability remediation / patching processes and wanted to survey the membership about their approaches. Business continuity planning An increase in customer demand for business continuity information, plans, test results, and audits were experienced by an I-4 Member organisation. They wanted to understand how other Member companies reply to these requests while safeguarding confidential information and handling the volume of requests. Most Confidential data on Smartphones A Member organisation was looking to move to an alternative, Smartphone based solution and were keen to understand what solutions other companies have deployed, or are deploying, to protect such data on mobile devices. Cloud messaging services Eighteen months of I-4 activities Members were asked whether the use of Cloud messaging services was routinely accepted or whether these services were actively blocked.

14 14 I-4: An Overview i Member Queries (Cont.) Architecture Standards Survey of Members about their architecture standards, including how they are used to help manage information security more effectively. End User Computing One Member organisation wanted to gain awareness of End User Computing, particularly focused on how assurance is gained and where governance is carried out. Cyber Security Awareness Innovative solutions towards ensuring the effectiveness of cyber security awareness were probed in this query, which included whether any new approaches were being designed and undertaken. Managing obsolete software An I-4 Member was interested in hearing about any approaches other Members may be considering, particularly when Win XP goes out of support in April Consequence management To effectively change behaviours and desired actions, one Member organisation was implementing consequences against their established data security behaviours and wanted to ask other I-4 Members whether they had put in place a similar initiative to increase compliance in data security. Compliance Monitoring Member query initiated to discover how I-4 Members monitor security controls and ensure systems are patched in a timely manner. Internet facing services Financial services organisation looking to understand how their peers approach the subject of managing external vulnerabilities and Internet facing services. Maturity models This Member query formed part of one Member organisation's research into exploring the applicability of maturity models for assessing and managing cyber security activities. Using live data This query helped one organisation to understand whether other large, complex organisations use live data in their testing processes, and if so what steps they take to protect the data. Project Reports Eighteen months of I-4 activities Advanced Persistent Threats: Stage Two Stage Two of the Advanced Persistent Threat (APT) project focused on identifying and reporting on what good should look like for APT defence. Emphasis was placed on detective monitoring, the use of forensic information and what needs to be done to reach a position of strength. Information Security Awareness This project gathered Member experiences in the aspects of designing and running user awareness programmes: understanding what makes a good user awareness programme; obtaining business sponsorship and funding; developing the messages and the communication methods; and gaining assurance that objectives are met. Existing I-4 resources on awareness were revisited to update the key messages and make this material more accessible for Members to use within their own organisations. Creating a future direction for Mobile Security Results from the I-4 mobile security survey are outlined in this report, which captures how large, global organisations view their capability for managing mobile devices. Launch of the Threat and Intell Exchange At the March 2012 Forum, there was much discussion as to how those of us in information security can better share information about attacks, threat intelligence etc and how I-4 can help with this. As a result, in April 2012 we held the first in a brand new teleconference service that I-4 and run every month (or ad hoc to pick up breaking incident news) to provide Members with the opportunity to discretely and openly discuss threat and intell information currently on their agenda.

15 15 I-4: An Overview ii The I-4 team Since December 2009 I-4 has been owned and operated by KPMG LLP, who continue to invest in and develop the Programme to meet the changing needs of its members. Individuals from KPMG LLP serve upon the I-4 leadership team, which can also call on highly experienced specialists from KPMG member firms around the world, as well as external security analysts and seasoned industry practitioners and leaders. Mark Waghorne: Head of the I-4 Programme Mark has been working in information technology, systems, and security for over 25 years, specializing as an information security practitioner since the late 1980s and focusing on security management since the mid 1990s. Before joining KPMG seven years ago, Mark was Global Head of Information Security for Standard Chartered Bank with responsibility for all aspects of information security across all the Group s lines of business and geographic operations. Since then, he has helped a range of clients implement security management organizations and processes. His experience covers a wide range of sectors including financial services, energy, industrial products, telecommunications, construction, and infrastructure, and Mark has filled interim head of information security positions in the finance, civil engineering, and mobile telecommunications sectors. Mark was an active member in I-4 for a number of years while at Standard Chartered and has led the I-4 Program since its acquisition by KPMG in December Malcolm Marshall: I-4 Sponsoring Partner Malcolm is global leader for KPMG s market leading Information Protection and Business Resilience services. He has over twenty years experience in advising clients in information risk management. Clients include several of the world s largest corporations and Central Government departments. Recent work includes security improvement programmes, data breach investigations, identity and access management projects, privacy advisory and security compliance programmes. The interaction between likeminded individuals, particularly those with considerable experience in information security is typically not found anywhere else. The validation of thought processes can be achieved face to face at Forums, which is particularly valuable and helps you to look at issues in a variety of different ways. Outside of Forums, monthly webinars and Member queries tackle issues that are very relevant and give you a point of contact to discuss further with individuals across different industry sectors. I-4 Member, May 2013

16 16 I-4: An Overview ii The I-4 team Greg Bell: I-4 Sponsoring Partner US, East Greg has in-depth experience in IT risk management and business ennoblement. He s managed complex projects implementing, administrating, and securing complex client-server and heterogeneous network technologies. Greg previously worked for Eaton Corporation and the Coca-Cola Company and is a frequent speaker and author on information security, privacy, and risk management. Paul Dorey: Senior I-4 Advisor An acknowledged thought leader in security, Paul has over 25 years of experience as a security and risk executive at Morgan Grenfell/Deutsche Bank, Barclays Bank, and BP. He has received several awards including Chief Security Officer of the Year, IT Security Executive of the Year, and IT Security Hall of Fame. His involvement with I- 4 goes back to the late 1980s including a period on the Membership Advisory Committee (MAC). He is a Visiting Professor in Information Security at Royal Holloway, University of London and is a director and cofounder of Security Faculty. In addition to his speaking and lecturing activities he helps companies and government departments in building their information security strategies, risk governance and metrics including acting in interim CISO roles and supporting CISOs in developing their functions. Marissa Goulding: I-4 Events Manager Marissa is the I-4 Events Manager and has been with the programme for more than fifteen years. Regardless of the question or help needed, for participants in I-4 events she is the point of contact and coordination for speakers, session chairs and of course I-4 members. Marissa s knowledge of I-4 and how to make an event run effectively are central to I-4 Forums and other meetings delivering real value to the I-4 Membership. Charles King: Senior I-4 Advisor Charles is a highly experienced information security practitioner, his career began with cryptography and electronics in the U.S. Navy. After his career in the Navy, Charles moved into industry notably filling C-Suite roles at State Street Corporation and SunGard Financial Systems. In all these positions he brought a business-oriented approach to both information security and for software sales and the delivery of financial services. For over thirty years, he has led and executed high profile programs including organizational transformation, vulnerability assessment, and governance framework alignment. His information security approach balances the strategic with the practical. As a member of The King Group, Charles currently supports global advisory clients, system integrators, information security firms, and public sector clients with thought leadership and strategic messaging. Shahed Latif: I-4 Sponsoring Partner US, West Shahed is an acknowledged world authority on cloud computing and co-author of Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. He has worked for KPMG for 25 years and was an initial member of the firm s North American Information Protection practice. He has extensive contacts in information protection across the west coast, with excellent relationships with the major technology vendors and customers. In addition, Shahed has worked closely with some of the largest enterprises develop their information security vision, strategy, and roadmaps.

17 17 I-4: An Overview ii The I-4 team David Morgan: Senior I-4 Advisor David is a recognized and respected thought leader in the security and risk management industry with over 20 years experience focusing on information security, fraud prevention, business continuity and physical/personal security. Prior to moving into training & development and consultancy, David held a number of Board level executive roles including Lloyds TSB (Chief Security Officer), ING Group (Global Head of Information Risk Management & CISO) and Barclays (Group IT Risk & Security Director). He has a proven track record in delivering strategic and organisational change within large complex organisations. David is extremely passionate about people development, is a certified Insights practitioner, and has run numerous leadership development groups and security master classes for large multinational companies. In addition he has provided strategic consulting services and interim management to a variety of blue chip organizations in Financial Services, Energy, Telecoms and High Tech sectors. He was an active I-4 member for many years, having attended his first meeting in David is also a Director and co-founder of Security Faculty. Gerry O Neill: Senior I-4 Advisor Gerry is an information security professional with over 27 years of experience in the field of Information Security, Risk Management, Audit and Governance, holding senior positions in a number of major consultancies, and in financial services and government. Gerry was a hands-on I-4 member during his time as Head of Group IT Risk at Barclays PLC, and subsequently, in 2003, he joined the I-4 Team as Senior European Representative. He is also a recent Chief Executive Officer of the Institute for Information Security Professionals (IISP). Among other recent initiatives, he was a member of the Steering Committee for the CAMM initiative (Common Assurance Maturity Model), and is Former (and Founding) Vice-president of the Cloud Security Alliance UK & Ireland Chapter. Martin Tully: I-4 Content Manager Martin is an experienced security consultant, having worked previously in another major professional services firm. Martin has a strong background in working across most industry sectors in the development of the best practice guidance and methodologies. Martin is currently responsible for producing the I-4 newsletter, facilitating webinars and managing responses to Member queries. He also contributes towards the delivery of I-4 research projects such as the Advanced Persistent Threat project and Security Awareness. Martin holds a Bachelors degree from Royal Holloway University of London. Natalia Stepan: I-4 Projects Assistant Natalia joined the KPMG Information Protection team in October She completed her Bachelor s in Philosophy, Politics and Economics at the University of Oxford in 2012 and her Master s in Local Economic Development at the London School of Economics in Before joining I-4, Natalia worked on a project in the Data Analytics department. She is currently assisting on all aspects of I-4 including content, research and supporting current and potential members. Natalia is a first port of call for any member support queries.

18 Malcolm Marshall +44 (0) Mark Waghorne +44 (0) Greg Bell Shahed Latif John Hermans I-4 is a membership service provided by member firms of KPMG International, a Swiss entity. All rights reserved KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International, a Swiss entity. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss entity.

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Cyber Security: from threat to opportunity

Cyber Security: from threat to opportunity IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known

More information

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015 Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many

More information

Managing cyber risks with insurance

Managing cyber risks with insurance www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive

More information

BT Quick Starts for Retail Banking Customers

BT Quick Starts for Retail Banking Customers BT Quick Starts for Retail Banking Customers An overview of BT s Quick Start services The retail banking industry continues to be heavily influenced by national and international issues including tax regimes,

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

Increase insight. Reduce risk. Feel confident.

Increase insight. Reduce risk. Feel confident. Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach

Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach Don MacPherson January 2012 Discussion Items 1. Threats and risks to personal information

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

Key Cyber Risks at the ERP Level

Key Cyber Risks at the ERP Level Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

How To Transform It Risk Management

How To Transform It Risk Management The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not

More information

ISO27032 Guidelines for Cyber Security

ISO27032 Guidelines for Cyber Security ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

Enterprise effectiveness of digital certificates: Are they ready for prime-time? Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1

More information

KEY TRENDS AND DRIVERS OF SECURITY

KEY TRENDS AND DRIVERS OF SECURITY CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

HEALTH CARE AND CYBER SECURITY:

HEALTH CARE AND CYBER SECURITY: HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations

More information

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

London Business Interruption Association Technology new risks and opportunities for the Insurance industry London Business Interruption Association Technology new risks and opportunities for the Insurance industry Kiran Nagaraj Senior Manager, KPMG LLP February 2014 Agenda Introduction The world we live in

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Managed Security Services. Leverage our experienced security operations team to improve your cyber security posture

Managed Security Services. Leverage our experienced security operations team to improve your cyber security posture Managed Security Services Leverage our experienced security operations team to improve your cyber security posture Our approach to Managed Security Services Enterprises spend millions on technology to

More information

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai

More information

Developing National Frameworks & Engaging the Private Sector

Developing National Frameworks & Engaging the Private Sector www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012

More information

CYBER SECURITY PROTECTING YOUR BUSINESS James Hatch Director, Cyber Services BAE Systems Applied Intelligence 1 CYBER SECURITY AT BAE SYSTEMS Professional Services Technical Services Prepare Protect Cyber

More information

Assessing the strength of your security operating model

Assessing the strength of your security operating model www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems

More information

Cybersecurity: What CFO s Need to Know

Cybersecurity: What CFO s Need to Know Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Defending against modern cyber threats

Defending against modern cyber threats Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

developing your potential Cyber Security Training

developing your potential Cyber Security Training developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company

More information

Cyber Security. The changing landscape. Financial Sector. March 4-5, 2014

Cyber Security. The changing landscape. Financial Sector. March 4-5, 2014 Cyber Security Discussioni The changing landscape 2nd Information Security Workshop for Financial Sector March 4-5, 2014 Agenda Agenda How vulnerable is the banking sector Closer look at the security threat

More information

Cyber security: Are consumer companies up to the challenge?

Cyber security: Are consumer companies up to the challenge? Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

About Our 2015 WTA Cyber Security Speakers and Sessions

About Our 2015 WTA Cyber Security Speakers and Sessions About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose

More information

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?

More information

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

Chartis RiskTech Quadrant for Model Risk Management Systems 2014

Chartis RiskTech Quadrant for Model Risk Management Systems 2014 Chartis RiskTech Quadrant for Model Risk Management Systems 2014 The RiskTech Quadrant is copyrighted June 2014 by Chartis Research Ltd. and is reused with permission. No part of the RiskTech Quadrant

More information

A Primer on Cyber Threat Intelligence

A Primer on Cyber Threat Intelligence A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly

More information

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION In the ever-evolving technological landscape which we all inhabit, our lives are dominated by

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint Under control 2015 Hot topics for IT internal audit in financial services An Internal Audit viewpoint Introduction Welcome to our fourth annual review of the IT hot topics for IT internal audit in financial

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT) INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

Developments in cybercrime and cybersecurity

Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity As customers and clients increasingly go online to do their banking with convenience, privacy and security their

More information

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP

C DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP C DIG CSCSS / DEFENCE INTELLIGENCE GROUP COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE C DIG CSCSS / DEFENCE INTELLIGENCE GROUP

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

The internet and digital technologies play an integral part

The internet and digital technologies play an integral part The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet

More information

CONSULTING SERVICES. Experience in Action

CONSULTING SERVICES. Experience in Action CONSULTING SERVICES Experience in Action EYES ON THE FUTURE - FEET ON THE GROUND Right now, the workspace and its associated ICT infrastructure are undergoing their most radical transformation ever. Social,

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

How To Transform Insurance Through Digital Transformation

How To Transform Insurance Through Digital Transformation Digital transformation can help you tame the perfect storm. The digital future for insurance. Following the 2008 financial crisis, the insurance sector has faced tighter regulation, which has made it harder

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis

More information