The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost/Benefit Analysis
|
|
|
- Donald Townsend
- 10 years ago
- Views:
Transcription
1 The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost/Benefit Analysis Paul A. Ferrillo March 2015
2 The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost Benefit Analysis Until the President s Cybersecurity Summit at Stanford University last month, the public profile of the NIST cybersecurity framework was not enormous. Cyber is scary for directors. Not a lot of public adopters. Cyber is not intuitive like FASB rules, which have been around for years. CISO s and CIO s tend to be silo driven Common refrain from CISO s, We are doing it my way, and its worked for the last few years without a problem. 1
3 The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost Benefit Analysis continued We have had a different experience rolling the Framework out to boards of directors, i.e. the ultimate decision-makers/fiduciaries of a public or private company. Our top down approach is based upon logic, reason, current events and a cost/benefit analysis. Most of all, it is based on the concept of fiduciary duty and the concept of enterprise risk management. The board s job is cyber security risk oversight. Because boards need more and better laser pointed guidance, they need the NIST cybersecurity framework. 2
4 The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost Benefit Analysis continued Adoption of NIST as an industry best practice means: Showing you are paying attention to cybersecurity in general. Showing the regulators you are paying attention. Showing your customers you are paying attention. Showing your shareholder/investors and the financial markets that you are paying attention. Showing the plaintiffs bar that you are paying attention to cybersecurity by having NIST-based discussions NIST is one stop shopping if embraced by regulators seeking to restore customer confidence, investor protection and market stability in the face of cyber terrorism, hacktivism and cyber crime. 3
5 The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost Benefit Analysis continued What is the new core curriculum of cybersecurity? The fiasco of having to pay potentially limitless costs to remediate a cyber breach versus the preventive costs associated with improving the company s cybersecurity posture. By any stretch of the imagination, this equation should generate a high positive number indicating the NIST cybersecurity framework is a net positive investment. 4
6 The NIST Cybersecurity Framework Key Principles for Boards of Directors Perception at companies does not equal reality Ninety percent of companies believe they are not vulnerable to hackers, despite over half experiencing a "security incident" over the last 12 months. Out of the total respondents participating in the survey, 88 percent claimed they were somewhat or very confident that they were safeguarded from external cyber threats. This number increased to 92 percent when only questioning technology sector respondents. Over 60 percent of total participants assessed their ability to alleviate newly developed threats as either average or high. [Deloitte 2013 study] 5
7 The NIST Cybersecurity Framework Key Principles for Boards of Directors continued The truth OTA s analysis of nearly 500 breaches reported in the first half of 2014 revealed upwards of 90% could have been avoided had simple controls and security best practices been implemented. As the dependency on outsourcing and the cloud has increased, businesses are increasingly relying on service providers to keep their data secure and abide by their privacy policies, further highlighting the need to develop comprehensive security controls and practices. [Online Trust Alliance 2015 report] [emphasis added] 6
8 The NIST Cybersecurity Framework Rollout and Implementation Strategies Today, there is a new normal: A Cybercrime Economy that if allowed to proceed unimpeded will cost companies hundreds of millions of dollars [and U.S. economy hundreds of billions of dollars] to repair and remediate cybersecurity breaches, let alone repair the loss of reputation, investor confidence and goodwill. 7
9 The NIST Cybersecurity Framework Rollout and Implementation Strategies continued We are concerned that within the next decade, or perhaps sooner, we will experience an Armageddon-type cyber event that causes a significant disruption in the financial system for a period of time, said Benjamin Lawsky, head of the NY Dept. of Financial Services on Wednesday March 6, 2014 in a speech at Columbia Law School. 8
10 The NIST Cybersecurity Framework Rollout and Implementation Strategies continued The fiduciary duties of corporate directors include enterprise risk management, and that covers cyber security oversight. Questions that should be asked: What is our risk from a cyber perspective? What is our risk appetite? How can we mitigate our risk, or transfer it to a third party through insurance? and What can we do better to protect our most valuable IP assets? Basic questions to ask and answer. It s a director s duty to ask and answer them regardless. The self-evident conclusion -- Lost opportunity cost to implement NIST-based cyber security discussions = ZERO. 9
11 The NIST Cybersecurity Framework Rollout and Implementation Strategies continued C-Suite and CISO discussions implementing cyber security spending decisions: Steps towards improving cybersecurity posture less susceptible to getting lost in budgetary process, if approved by the board in advance; Most companies not starting from scratch incremental improvements versus major improvements = cost/benefit analysis per se. For companies starting from scratch = cost to implement will be higher but yet if you can t implement good cybersecurity, why bother? Good cybersecurity must be part of the DNA of the Company. It is the ultimate team sport. 10
12 The NIST Cybersecurity Framework Rollout and Implementation Strategies continued Elements of Risk and Cost to be Considered if nothing is done to improve my security posture: Clean up forensic and business continuity costs Lost customers Lost reputation/lost opportunity cost and loss of goodwill Lost investors/loss of investment opportunities Regulatory scrutiny/investigations/proceedings Customer and Bank class actions alleging failure to meet minimum cybersecurity standards offered by NIST compliance (See e.g. Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis, Indiana U. 2015) Loss of Enterprise Value = Shareholder class and derivative actions alleging oversight failure Loss of future investors/withdrawal of capital post-breach 11
13 The NIST Cybersecurity Framework Rollout and Implementation Strategies continued Proposed budgetary cost of improvements to begin addressing cybersecurity posture -- calculated at a minimum of $500,000 (implementing NIST framework (including internal company hours)), plus cost of instituting a companywide anti-spear phishing program, plus basic cost of 128 bit encryption technology. So what are the potential costs to the company of not making the suggested improvements to their company s cybersecurity posture? Bottom Line: Its cheaper to make these minimum cybersecurity improvements through adopting NIST then waiting for something bad to happen to the Company. 12
14 The NIST Cybersecurity Framework The Carnage of a Major Cyber Attack Target Cost to clean up as of last quarter $283 million (before insurance recovery), not including 140 class action suits Est. $1 billion in costs when all cleaned up. Home Depot cost to clean up as of last quarter $43 million, not including 44 class actions. Sony Pictures est. $35 million to date. Anthem estimated to be well in excess of $100 million to clean up, plus approximately 40 class action lawsuits to date. More generally, loss of $195 per record stolen in U.S. (Ponemon cost of data breach report) 13
15 The NIST Cybersecurity Framework The Carnage of a Major Cyber Attack continued Infrastructure Losses corrupted servers and hard drives Las Vegas Sands (est. $100 million in losses) and Sony. Loss of reputation foot traffic Target 43% decrease in profits in 4Q 2013 Q net earnings down 16% measurable brand damage post-attack. Loss of market capitalization if investors get angry $10 billion market capitalization loss upon market reflection of breach, causing both securities class action and derivative action. Same sort of analysis should hold true for other industry segments e.g. PE, HF. 14
16 The NIST Cybersecurity Framework Rollout and Implementation Strategies Whether you are a big company or small company its cheaper to do something rather than stick you head in the sand. The costs to smaller companies can be equally and potentially catastrophic because their balance sheets cannot sustain a large clean up cost or a run on the bank. Customers or investors just pull out and shop or invest somewhere else; Unless the company was prepared enough to buy cyber insurance. 15
17 The NIST Cybersecurity Framework Rollout and Implementation Strategies continued But the cyber insurance market has dramatically changed over the last eight months post JPM, Home Depot, Sony Pictures and Anthem breaches; Underwriting and pricing has gotten much tougher. Many companies (e.g. AIG) have now started using the Framework as a benchmark upon which to assess the cybersecurity posture of a potential insured, using the same discussions we ourselves might have with a board, creating additional synergy and purpose to adopting the Framework. Several cyber insurers have either pulled out, or pulled back from market or market segments given claims experiences in last six months. 16
18 The NIST Cybersecurity Framework Rollout and Implementation Strategies continued If the insurer does not get good answers to its NIST-based questions: Higher premiums up to 4x recently Higher retentions/deductibles Or maybe even no coverage offered at all if the insurer is not satisfied that the company is paying attention to cybersecurity detail. 17
19 The NIST Cybersecurity Framework Not a Silver Bullet, But a Protector of Enterprise Value ERM and cybersecurity are board oversight fiduciary duties. Period. No changing that fact. Adoption of the Framework fosters and encourages discussions allowing directors and officers to fulfill their fiduciary duties regarding cybersecurity oversight by, among other things, aligning risk with Company resources. Adoption of the Framework may improve a company s cost-effective access to the cyberinsurance market, which Corporate America desperately needs today. Today, there really is no excuse to do nothing. 18
20 THE AMERICAN DREAM IS STILL ALIVE OUT THERE, AND HARD WORK WILL GET YOU THERE. YOU DON T NECESSARILY NEED TO HAVE AN IVY LEAGUE EDUCATION OR TO HAVE MILLIONS OF DOLLARS STARTUP MONEY. IT CAN BE DONE WITH AN IDEA, HARD WORK AND DETERMINATION. BILL RANCIC 19
21 The NIST Cybersecurity Framework Not a Silver Bullet, But a Protector of Enterprise Value continued For any questions or comments, contact: Paul A. Ferrillo, Esq. Weil Gotshal & Manges LLP [email protected] 20
www.pwc.com Developing a robust cyber security governance framework 16 April 2015
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
Rogers Insurance Client Presentation
Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada [email protected]
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
OECD PROJECT ON CYBER RISK INSURANCE
OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years.
Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next:
11 Cyber Risk Managemet Next? What Board Members, Shareholders, Government, Auditors and Others Will be Asking from the CIO Next: 1. Why the Conversation has shifted. 2. How Boards are reacting. 3. What
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
Cybersecurity. Considerations for the audit committee
Cybersecurity Considerations for the audit committee Insights on November 2012 governance, risk and compliance Fighting to close the gap Ernst & Young s 2012 Global Information Security Survey 2012 Global
October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations
A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014
A Wake-Up Call? Fight Back Against Cybercrime Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 1 Coalfire Background Leading Information Security Consulting Firm Offices: Atlanta,
Adopting a Cybersecurity Framework for Governance and Risk Management
The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance
Cyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response
Cybersecurity and Hospitals What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response This resources was prepared exclusively for American Hospital Association members by Mary
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
How GCs And Boards Can Brace For The Cybersecurity Storm - Law360
Page 1 of 6 Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] How GCs And Boards Can Brace For The Cybersecurity
The promise and pitfalls of cyber insurance January 2016
www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped
the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group
the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group 54 Banking PersPective Quarter 2, 2014 Responsibility for the oversight of information security and
THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED
THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED THE CYBER SECURITY PLAYBOOK 2 03 Introduction 04 Changing Roles, Changing Threat
Exercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY
Penetration Testing: What You Need to Know Now GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY PENETRATION TESTING: GUIDE TO IMPROVING INFORMATION SECURITY Contact
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Managing Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?
EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? ABOUT JLT SPECIALTY JLT Specialty Insurance Services is the U.S. platform of JLT Group, the leading specialty business adivsory
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
BECAUSE CYBERSECURITY RISKS ARE ENTERPRISE RISKS. www.blankrome.com/cybersecurity
Working together, Blank Rome LLP and Good Harbor Security Risk Management LLC, haved teamed to provide a comprehensive solution for protecting your company s property and reputation from the unprecedented
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
Cyber Governance Preparing for the Inevitable Perimeter Breach
SAP Brief SAP Extensions SAP Regulation Management by Greenlight, Cyber Governance Edition Objectives Cyber Governance Preparing for the Inevitable Perimeter Breach Augment your preventive cybersecurity
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through email trust
THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX How to create a thriving business through email trust FORWARD Today the role of the CISO is evolving rapidly. Gone are the days of the CISO as primarily
3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.
Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
Developing National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
Data Security in Development & Testing
Data Security in Development & Testing Sponsored by Micro Focus Independently conducted by Ponemon Institute LLC Publication Date: July 31, 2009 Ponemon Institute Research Report Data Security in Development
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
Cybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
Cyber Risks and Insurance Solutions Malaysia, November 2013
Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
Cyber Security Management
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
Developing a Corporate Governance Framework
Developing a Corporate Governance Framework About ERM About The Speaker Karen Livingstone Practice Director at ERM Risk Management, Governance, Regulatory Compliance CPA, CISA, CIA, CRMA designations 20+
Testing the Security of your Applications
Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
Getting real about cyber threats: where are you headed?
Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a
The Value of Automated Penetration Testing White Paper
The Value of Automated Penetration Testing White Paper Overview As an information security and the security manager of the company, I am well aware of the difficulties of enterprises and organizations
The economics of IT risk and reputation
Global Technology Services Research Report Risk Management The economics of IT risk and reputation What business continuity and IT security really mean to your organization Findings from the IBM Global
New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector
New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial
Redefining Incident Response
Redefining Incident Response How to Close the Gap Between Cyber-Attack Identification and Remediation WHITE PAPER - How to Close the Gap Between Cyber-Attack Identification and Remediation 1 Table of Contents
DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?
HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES
Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM
IIA South Event 16 th June 2015 Cyber, Social Media and IT Risks 1 st and 2 nd Line Perspective David Canham (BA) Hons, MIRM Agenda This evening we ll cover the following: Who, why and what? Traditional
Defining the Gap: The Cybersecurity Governance Study
Defining the Gap: The Cybersecurity Governance Study Sponsored by Fidelis Cybersecurity Independently conducted by Ponemon Institute LLC Publication Date: June 2015 Ponemon Institute Research Report Defining
Cyber Insurance as one element of the Cyber risk management strategy
Cyber Insurance as one element of the Cyber risk management strategy Stéphane Hurtaud Partner Governance, Risk & Compliance Thierry Flamand Partner Insurance Leader Laurent de la Vaissière Director Governance,
PREPARE YOUR INCIDENT RESPONSE TEAM
PREPARE YOUR INCIDENT RESPONSE TEAM JUNE 2015 Michael Harrington, Fidelis Cybersecurity It s a big problem... The ongoing cyber-thefts from The scale of international theft the In networks 2013, the of
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]
Personal Security Practices of the CAO
Personal Security Practices of the CAO 1. Do you forward your government email to your personal email account? 2. When is the last time you changed your Enterprise password? Within the last 60 days Within
NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
CYBERSECURITY RISK MANAGEMENT
CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS
Achieving Cyber Resilience. By Garin Pace, Anthony Shapella and Greg Vernaci
Achieving Cyber Resilience By Garin Pace, Anthony Shapella and Greg Vernaci Cyber security has become the single most important risk to company Boards of Directors around the world. This is not a surprise
Data Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
