BarnOwl. SA#Cyber# Opportunity &# Threat Landscape. Craig#Rosewarne# (Wolfpack#Information#Risk)
|
|
|
- Lesley Montgomery
- 10 years ago
- Views:
Transcription
1 BarnOwl SA#Cyber# Opportunity &# Threat Landscape Craig#Rosewarne# (Wolfpack#Information#Risk)
2
3 393#(Q1#2015) 1215#(2014) 1004 (2013)
4
5 The#Internet#of#Things Cloud#Technology 3D#Printing Advanced#Robotics Autonomous#Vehicles
6 Humans(will(become(hybrids(in(the(2030s.( That(means(our(brains(will(be(able(to( connect(directly(to(the(cloud(via(nanobots,( and(those(computers(will(augment(our( existing(intelligence. (Ray%Kurzweil%. Director%of%engineering%at%Google)
7 THREAT#CLASSES Insiders Administrators Hackers 7
8
9 Office'of'Personnel'
10 Where#to#start?
11 1.#UNDERSTAND#W BUILDING#A#RISK#AWARE#ORGANISATION 1.'ANALYSE THE'THREAT#/#OPPORTUNITY# 2.'ASSESS'YOUR' WEAKNESS#/#STRENGTH GLOBAL COUNTRY INDUSTRIES ORGANISATION PEOPLE PROCESS TECHNOLOGY 3. IMPROVE YOUR CAPABILITY
12 2.#ESTABLISH#ORDER#W INFORMATION#RISK#FRAMEWORK# GOVERNANCE BUSINESS#(Strategic# What) Executive' Board Committee Organisational' Objectives Governance,' Risk'&' Compliance Business' &' Threat' Intelligence Enterprise' Architecture Programmes'/' Projects' Assurance'Functions'' HR'/'Audit'/'Security'/' BCM'/'Fraud Enterprise' Risk'Committee Compliance'Committee INFORMATION#RISK#MANAGEMENT#(Tactical##W How) IR'Steering' Committee Governance'&' Risk' Legal'&' Compliance Security' Architecture'&' Design Asset' Human' Resource' &' Supplier'Mngt Physical'Risk Programme'/'Project' Office'Committee Access'Control Telecoms' &' Networking' Software' Development' &'Acquisition Cryptography Operations' Security Incident'Mngt,' BCM'&' DR Performance'Metrics'&' Incentives IT' Governance'Council IT#&#OPERATIONS#MANAGEMENT#(Monitor#interdependencies) HR'/'Communications'/' Training' Procurement'/'Supplier' Change'' Committee' IT'Operations Infrastructure' Security Change' Capacity' Application' Security IT'Service' Continuity' IT'Incident' Release' Configuration' Problem' IT' Vulnerability' Service'Desk Facilities' Performance' Event' HR'Processes Third'Party' Information' &' Asset' Physical' Security Service'Level' Systems' 12
13 3.#REMEDIATE#W ENSURE#RISK#APPROACH#IS#INTEGRATED RISK MANAGEMENT (ISO 31000) GOVERNANCE (KING3 / ISO / COBIT) INFORMATION & CYBER SECURITY (ISO 27001/2/5 / ISO / SANS 20CC) CRISIS MANAGEMENT BCM /DR (ISO 22301) INCIDENT MANAGEMENT (ISO 27035) IT OPERATIONS ITIL / ISO 20000
14 4.#CONTINUOUS#IMPROVEMENT# TEST,#AUTOMATE#&#CERTIFY Cyber.Threat.Assessment.Dashboard Cyber.Threat.Overall.Rating Assessment.Uncertainty.Percentage 3,00 Bank.Name Demo 7 Assessment.Level 1 Maturity of Cyber Domains Cyber Resilience Maturity Level Software&Development&and Application&Security Cyber&Security&Governance&and Risk& 5,00 4,00 Legal,&Regulations&and Compliance 5 4 Cryptography 3,00 2,00 Business&Continuity&and Disaster&Recovery&Planning 3 1,00 Operations&Security 0,00 Asset& 2 Access&Control Human&Resource&and&Supplier Security 1 Telecommunications&and Network&Security Security&Architecture&and Design Physical&(Environmental) Security 0 Evolve Anticipate Withstand Recover Cyber.Domain Maturity. Uncertainty.(%) Category Maturity Cyber.Security.Governance.and.Risk. 2,09 15 Evolve 1 Legal,.Regulations.and.Compliance 3,00 0 Anticipate 3 Business.Continuity.and.Disaster.Recovery.Planning 4,00 0 Withstand 3 Asset. 3,00 0 Recover 4 Human.Resource.and.Supplier.Security. 2,00 0 Physical.(Environmental).Security. 1,33 0 Security.Architecture.and.Design 3,16 60 Telecommunications.and.Network.Security 3,02 2 Access.Control. 5,00 0 Operations.Security 2,72 4 Cryptography 3,00 0 Software.Development.and.Application.Security 3,
15 5.#SKILL#UP# BUILD#CAPABILITY AWARENESS5 PROGRAMME Personnel'Sourcing Graduate' Development Industry%&%Organisational%Skills%Requirements% Research'&' Threat' Intelligence' Reports Governance,' Risk' '&' Compliance' Curriculum Awareness' Programme' Maturity' Improvement Information' Security' Curriculum Awareness' Content' Development' Forensics' Curriculum Simulation,' Animated' Video'&' Cartoon' Solutions Audit' Curriculum Phishing' &'Social' Engineering' Assessments CONTINUOUS#SKILLS#ASSESSMENT#/##BLENDED#LEARNING#MODEL# Software' Security' Curriculum STRUCTURED5TRAINING5PROGRAMMES 1 FOUNDATION 2 MANAGEMENT 3 TEHNICAL 4 CONTINUOUS 15
16 SUGGESTED#APPROACH 1. INDEPENDENT ASSESSMENT Roadmap 2. SHARED REMEDIATION 3. REALISTIC THREAT TESTING Workshop Assessment IR FRAMEWORK ISMS
17 COMMUNITY#INITIATIVES 9500+#CYBER# SECURITY#COMMUNITY
18 GLOBAL#THREAT#&#OPPORTUNITY# ECOSYSTEM
19 SA#NATIONAL#CYBERSECURITY#STAKEHOLDERS#&# STRUCTURES International*Bodies* *Justice,* Crime*Prevention*and*Security* Cluster*(JCPS)*; Cybersecurity Response*Committee*(SSA*lead) Corporate*reputation*is*at*stake Embarrassing*headlines STRATEGIC Remediation*costs Industry*Bodies*; SABRIC* * SAFPS* *ISPA* *SACCI* * Regulators State*Security*Agency* *SA*Police* Service*(SITA) *SA*National* Defence*Force*(CSIR*DPSS*/*SITA)* * Justice*&*Corrections*(SIU*/*NPA)* * Dept Telecomms &*Postal*Service* (DOC*/*NCAC)* *Dept Science*&* Tech* *Home*Affairs* *SAPO* * AGSA* *DPSA* SAFPB National*Key*Points* *National,* Provincial*&*Local*Government* * Citizens* *Children Compliance*violation Fines/Fees TACTICAL ATO*revoked OPERATIONAL Financial *Retailers* *ISPs* * TMT *Manufacturing* Academia* *Healthcare* *Professional* Services* *Vendors Local*&*International*Partners * B2B* *B2C* *Informal*Traders* * Customers 19
20 NATIONAL#FOCUS#AREAS 1. AWARENESS 2. SKILLS 3. CIIP 4. CYBER CRIME 5. LEGAL
21 NATIONAL#AWARENESS#PORTAL
22 CYBER#SECURITY#AWARENESS#MONTH##
23 GOVERNMENT#CYBER#ACADEMY#PROGRAMME Technical'and'Soft'skills' assessment'to'determine' Current' State Skills'&' Competency Assessment Each'Area'Receives' Feedback'+'Group'' Analysis'Report'Generated Baseline'Foundation' Training'Programme'for' Existing'sectors'or'' Graduate'Intakes Establish' Training' Baseline Determine'Technical'and' 'Training' Requirements Technical' Training' Curricula Beginner'/'Intermediate'/'Advanced ' Training' Curricula Key'Matrix'of'Security' Specialists' Elite Core' Incident'Response' Team Determine#Programme# Requirements Foundation#skills Domain#Specialist# skills Expert#skills# 23
24 SKILLS#TRANSFER Over'35'Information'Security'&'Cyber' Security'Courses 100 s'of'distance Learning'Courses Foundation' 'Intermediate' Advanced Graduate'Development' Programme Tailored Curricula 24
25 CRITICAL#INFORMATION#INFRASTRUCTURE#PROTECTION#W PARTICIPATING#INDUSTRIES Water#Systems Information#Technology Energy Transport Government#Facilities Financial#Services Health Ports Electricity Critical#Manufacturing# Telecommunication Other#Industry#Stakeholders 25
26 2015#CIIP#SA#PROJECT#KEY#DELIVERABLES! Establish#a#task#force#to'help'drive'national'efforts'to'enhance'cybersecurity'and'improve' Critical'Information'Infrastructure'Protection'in'South'Africa! Help'empower'and'raise'the'importance'of'proper'information'and'cyber#security# practices#within'government'and'private'sector! Develop'a'public#national#cybersecurity#research#report#to'coordinate'the'actions'of'the' task'force.'! Develop'a'CIIP#framework#covering'differing'CIIP'maturity'levels! Establish'a'secure#collaboration#platform#to'allow'for'interaction'by'CIIP'stakeholders! Provide'advanced'security#&#incident#response#training#and'a targeted#awareness# programme#for'key'ciip'stakeholders'! Present'findings'of'report'at'Cybercon Africa#
27 CYBERCRIME New#Improved#Cybercrime#Unit#in#SAPS Cybercrime#Task#Force 27
28 The$Goal$ A$Safer$Country$for$all PROACTIVE Creating'stakeholder'value REACTIVE Preserving'stakeholder' value Assured'Economic'Growth Secured'National'Services Improved'Collaboration Fighting'Crime Data'Breaches Compliance V A L U E 28
29 Wolfpack#Information#Risk#(Pty)#Ltd Craig#Rosewarne Threat'Intelligence 'Advisory' 'Training' Awareness
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
2015 Information Security Awareness Catalogue
Contents 2015 Catalogue Wolfpack Engagement Model 4 Campaign Drivers 6 Offerings 8 Approach 9 Engaging Content 10 Stakeholder Change Management 12 Bundles 13 Content 14 Grey Wolf -Track compliance with
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Building Blocks of a Cyber Resilience Program. Monika Josi [email protected]
Building Blocks of a Cyber Resilience Program Monika Josi [email protected] About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
ISO27032 Guidelines for Cyber Security
ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance
Smart Security. Smart Compliance.
Smart Security. Smart Compliance. SRM are dedicated to helping our clients stay safe in the information environment. With a wide range of knowledge and practical experience, our consultants are ready to
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
The 2012/3 SA Cyber Threat Barometer. Craig Rosewarne
The 2012/3 SA Cyber Threat Barometer Craig Rosewarne An improved cyber security framework for South Africa Research - Initiatives South Africa (Pty) Ltd Stakeholder Risk Management / Alignment to business
What Directors need to know about Cybersecurity?
What Directors need to know about Cybersecurity? W HAT I S C YBERSECURITY? PRESENTED BY: UTAH BANKERS ASSOCIATION AND JON WALDMAN PARTNER, SENIOR IS CONSULTANT - SBS 1 Contact Information Jon Waldman Partner,
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
defense through discovery
defense through discovery about krypton krypton is an advisory and consulting services firm, specialized in the domain of information technology (it) and it-related security krypton is a partnership amongst
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
Bradford J. Willke, CISSP
Engineering National Cybersecurity and Critical Information Infrastructure Protection Bradford J. Willke, CISSP 16 October 2007 ITU Regional Workshop Buenos Aires, Argentina Overview Purpose: This session
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Deloitte Cyber Risk Services Providing trust in a digital world
Deloitte Cyber Risk Services Providing trust in a digital world June 2015 Deloitte Cyber Risk Services Providing trust in a digital world Our aim Your organization, whether functioning in the public or
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Protecting critical infrastructure from Cyber-attack
Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale
Why you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Assessing the Effectiveness of a Cybersecurity Program
Assessing the Effectiveness of a Cybersecurity Program Lynn D. Shiang Delta Risk LLC, A Chertoff Group Company Objectives Understand control frameworks, assessment structures and scoping of detailed reviews
our enterprise security Empowering business
our enterprise security Empowering business Introduction Communication is changing the way we live and work. Ericsson plays a key role in this evolution, using innovation to empower people, business and
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
Agile Information Security Management in Software R&D
Agile Information Security Management in Software R&D Rational and WebSphere User Group Finland Seminar 29.01.2008 Reijo Savola Network and Information Security Research Coordinator VTT Technical Research
Where insights lead Cybersecurity and the role of internal audit: An urgent call to action
Where insights lead Cybersecurity and the role of internal audit: An urgent call to action The threat from cyberattacks is significant and continuously evolving. One estimate suggests that cybercrime could
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Cyber Security key emerging risk Q3 2015
Cyber Security key emerging risk Q3 2015 The study is based on interviews with CIO:s, CISO:s and Head of Security in August and September 2015. November 2015 www.pwc.se Companies falling behind are more
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
Cloud Infrastructure Security Management
www.netconsulting.co.uk Cloud Infrastructure Security Management Visualise your cloud network, identify security gaps and reduce the risks of cyber attacks. Being able to see, understand and control your
January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
NIST Cybersecurity Framework & A Tale of Two Criticalities
NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager [email protected] Presented
Department of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
Building a More Secure and Prosperous Texas through Expanded Cybersecurity
Building a More Secure and Prosperous Texas through Expanded Cybersecurity Bob Butler Chairman, Texas Cybersecurity, Education and Economic Development Council April 2013 About the Texas Cybersecurity
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide
National Cybersecurity Management System: Framework, Maturity Model and Implementation Guide Taieb DEBBAGH, PhD, CISA Secretary General Ministry of Industry, Trade and New Technologies, Morocco ITU Regional
National Initiative for Cybersecurity Education
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
Cyber Security solutions
Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside
RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY
RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY NATIONAL SECURITY COUNCIL SECRETARIAT Salient Features of the JWG Report on Engagement with Private Sector on
GEARS Cyber-Security Services
Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments
An enterprise grade information security & forensic technical team
An enterprise grade information security & forensic technical team 1-647-892-3363 About Us Pyramid Cyber Security & Forensic (P) Limited is an ISO 9001-2008 and ISO 27001-2005 certified boutique Digital
CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management
CYBERBOK Security Essential Body of Knowledge: A Competency and Functional Framework for Security Workforce Development aligned with ISO 31000* risk management principles and guidelines. *Note : ISO 31000
Qatar Computer Emergency Team
Cyber Security Division Qatar Computer Emergency Team An initiative Introduction Qatar aims to fully exploit information and communications technology to become one of the most successful knowledge-based
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
Cybercrime Security Risks and Challenges Facing Business
Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact
REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY
REPUBLIC OF MAURITIUS 5555555555555555555555555555555555555555555555555555555555 5555555555555555555555555555555555555555555555555555555555 NATIONAL CYBER SECURITY STRATEGY 2014-2019 The time has come
BT Assure Threat Intelligence
BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters At all times, organisations are vulnerable to all kinds of cyber attacks
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
A Cyber Security Integrator s perspective and approach
A Cyber Security Integrator s perspective and approach Presentation to Saudi Arabian Monetary Agency March 2014 What is a Cyber Integrator? Security system requirements - Finance Building a specific response
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies
Developing National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction
Contents Acknowledgments Introduction 1. Governance Overview How Do We Do It? What Do We 1 Get Out of It? 1.1 What Is It? 1 1.2 Back to Basics 2 1.3 Origins of Governance 3 1.4 Governance Definition 5
Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected]
Promoting a Cybersecurity Culture: Tunisian Experience ITU Regional Cybersecurity Forum for Eastern and Southern Africa Lusaka, Zambia, 25-28 August 2008 Helmi Rais CERT-TCC Team Manager National Agency
Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare
CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
Cyber Security: from threat to opportunity
IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI
How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI CGI Cyber Protection & Resilience Solutions Optimized risk management and protection
Assessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
Professional Services Overview
Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded
OUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
Cyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
Benchmark of controls over IT activities. 2011 Report. ABC Ltd
www.pwc.com/cy Benchmark of controls over IT activities 2011 Report ABC Ltd... 2012 Scope and approach We wish to provide you with our IT Benchmarking report over IT activities at ABC Ltd (the Company)
SITA Service Management Strategy Implementation. Presented by: SITA Service Management Centre
SITA Service Management Strategy Implementation Presented by: SITA Service Management Centre Contents What is a Service? What is Service Management? SITA Service Management Strategy Methodology Service
Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a
Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a focus on cyber security Introduction and Executive summary From September
Cyber Security in Austria
Cyber Security in Austria The Austrian Cyber Security Strategy Andreas Reichard 18 th May, 2015 Roadmap Austrian Cyber Security Strategy 1/2 MRV MRV 11/2011 03/2012 06/2012 09/2012 10/2012 03/2013 Fed.
Defending against modern cyber threats
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
CFIR - Finance IT 2015 Cyber security September 2015
www.pwc.dk Cyber security Audit. Tax. Consulting. Our global team and credentials Our team helps organisations understand dynamic cyber challenges, adapt and respond to risks inherent to their business
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 [email protected] 1 Who we are ENISA was
Executive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
Introduction to Cybersecurity Overview. October 2014
Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,
London Business Interruption Association Technology new risks and opportunities for the Insurance industry
London Business Interruption Association Technology new risks and opportunities for the Insurance industry Kiran Nagaraj Senior Manager, KPMG LLP February 2014 Agenda Introduction The world we live in
