Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection. kpmg.com/my
|
|
|
- Vivien Baker
- 10 years ago
- Views:
Transcription
1 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection kpmg.com/my
2 1 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection Contents 3 Cyber-attacks A global risk 9 Remain resilient through cyber security standards compliance 15 Conclusion 19 Acknowledgment 20 Endnotes 21 Thought Leaderships
3 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection 2 FOREWORD The usage of technology in today s world is inevitable. Whether it is making reservations on our smart phones, or checking s, or checking in for flights, usage of technology is present. Further, the globalization phenomenon we see today means we are living in a world where almost everything is interconnected to one another. Governments, businesses and societies around the world are relying more and more on technology and the Internet in their daily lives. Whilst its benefits cannot be questioned, unfortunately the increase of our reliance on technology implies that we are at higher risk of attack and breaches cyber-attacks. Companies are being hacked causing millions of individuals to be victims of stolen identity and information. Governments worldwide are also facing the increasing threats of cyber-attacks. Successful attacks put prosperity of economies and the well-being of societies at risk. Consequently, governments are putting measures in place in hope of having a resilient, healthy and secure cyberspace. Nonetheless, even with these efforts, cyber security continues to dominate headlines in the wrong way. Responding to this current scenario, current trends of governments protecting their critical infrastructures is the implementation of cyber security standards to their critical sectors. The objective of this paper is to provide an overview of the various approaches that countries are taking with regard to the implementation of cyber security standards. Further, the paper discusses the benefits of the implementation of cyber security standards to organizations as well as nations as a whole. Aligned with our strategic growth areas, we are in view that efforts in protecting organizations critical assets for a healthy cyberspace is paramount. We hope this Thought Leadership provides you the overview of the subject discussed and look forward to discussing your questions or issues. Muazzam Mohamed Executive Director Management Consulting Chief Information Officer KPMG in Malaysia
4 3 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection Cyber-attacks A global risk As we begin 2015, there are no signs of cyber threats and attacks on organizations worldwide easing. Whether targeted to government entities or private corporations, the threats from cyber adversaries continue to grow in scale and sophistication globally. Public and private organizations in various sectors worldwide now openly acknowledge that cyber threats are one of the most common and high impact risks they face. Dealing with cyber threats is becoming a complex challenge due to the evolving cyber security landscape. Organizations today face not only common and known cyber threats, but new and emerging ones where targeted and large scale attacks can impact not only the organizations but may potentially lead to the adverse impact on nations critical infrastructures. Cyber-attacks on critical sectors. The recent cyber-attack against an American entertainment subsidiary of Japanese multimedia conglomerate in 2014 has not only affected the company, but also the nation s security as a whole. Apart from releasing confidential data, the hackers had also sent threatening messages if their demands were not met 1. The Financial sector has also become a regular target. The malware attack in 2013 in South Korea has resulted in the malfunction of 48,000 personal computers and servers, disrupting work at banks and television broadcasters in the country 2. In 2012, a virus attack known as Shamoon on Saudi Arabia s leading Oil & Gas company had damaged approximately 30,000 computers resulting in the disruption of oil and gas flow to the local and international markets 3. Global technology companies have had their fair share of experiencing cyber-attacks in recent years as well. These companies were hacked, resulting in exposed proprietary information and sensitive communications that was then used to target major corporations.
5 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection 4 The Global Risk 2014 by World Economic Forum (WEF) highlights that dependency on technology by economies and societies is inevitable 4. The reliance and dependence on information data and systems have resulted in higher occurrence of cyber-attacks and their effects more impactful. It further underlines this point as cyber-attacks is listed in the top 5 global risks in terms of likelihood: Top 5 Global Risks in Terms of Likelihood 1st 2nd 3rd 4th 5th Income disparity Extreme weather events Unemployment and underemployment Climate change Cyber-attack Malaysia too has had its fair share or weathering cyber security attacks. According to Malaysia Computer Emergency Response Team (MyCERT), cyber incidents reported to the agency have substantially increased over the past decade; from 342 cases in the year 1998 to 11,918 5 in Malaysia Computer Emergency Response Team (MyCERT) Incident Statistics from Incidents Reported Source: MyCERT Incident Statistics as of December 2014.
6 5 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection The number of incidents as a percentage of total case reported in 2014 are stated below: Fraud, 38%; Spam, 31%; and Intrusion attempt, 11%. CYBER INCIDENTS REPORTED Fraud Spam Intrusion Attempt Others Fraud Spam Intrusion Attempt Others 20% 38% 11% 31% Source: MyCERT Incident Statistics as of December Similar with many other countries, critical infrastructure in Malaysia are owned by both the public and private sectors - estimated to be valued at USD3.8 trillion 6. In Malaysia, known cyber-attacks have amounted to a total loss of USD286 million* in the first six months of 2013, compared with USD314 million* in the previous year 7. * Conversion rates used throughout the publication taken from Oanda as on 31 December 2014: US$/ RM
7 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection 6 Global cost of cybercrime. From a global standpoint, a recent publication by McAfee estimated the annual cost of cybercrime to the global economy is more than USD400 billion 8. Facing the brunt of these losses are the 4 largest economies in the world; the United States of America (USA), China, Japan, and Germany with an accumulative figure reaching USD200 billion. The financial loss on the global economy is only expected to rise as reliance on technology in the cyberspace increases. Consequently, governments worldwide are realizing that cyber threats can not only disrupt critical infrastructure networks, but also potentially escalate to the level of a national security threat. Dealing with cyber threats and attacks is no longer just about being aware or vigilant but it s about being resilient. Governments around the world are putting measures in place to enhance resiliency in weathering the cyber threats and attacks. Whilst the global community have undertaken actions and steps in mitigating these cyber threats, it is important to ensure the critical infrastructure remains resilient to withstand cyber-attacks. The term resiliency can have many definitions, but generally it is the capability to prepare, protect, respond and recover from threats and hazards. Dealing with cyber threats and attacks is no longer just about being aware or vigilant but it s about being resilient.
8 7 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection The cyber security standards may support the capabilities of preparing, protecting, responding and recovering from cyber-attacks.
9 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection 8 How do countries or organizations remain resilient? The implementation of cyber security standards is by no means a silver bullet in critical infrastructure protection. However, its implementation can establish a set of controls that contribute and build better resiliency. The cyber security standards may support the capabilities of preparing, protecting, responding and recovering from cyber-attacks. Some of the common cyber security-related standards being implemented globally include the following (not exhaustive): ISO/IEC 27032:2012 Information technology -- Security techniques -- Guidelines for cyber security ISO/IEC Information technology -- Security techniques -- Information security management systems -- Requirements ISO Societal security -- Business continuity management systems --- Requirements ISO/IEC Information technology -- Security techniques -- Evaluation criteria for IT security ISO/IEC Information technology -- Security techniques -- Information security incident management ISO/IEC Information technology -- Security techniques -- Information security risk management FIPS 140-1: Security Requirements for Cryptographic Modules FIPS 186-3: Digital Signature Standard The implementation and compliance with cyber security standards may enable the principles and better practices in cyber security management be applied in improving the security and resilience of critical infrastructures.
10 9 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection Remain resilient through cyber security standards compliance Countries take different approaches towards implementing cyber security standards in the efforts of protecting their critical infrastructures. Some countries implement cyber security standards through mandatory requirements, whilst others provide guidelines and frameworks. The subsequent discussion highlights observations on the many approaches certain countries take. Some countries implement cyber security standards through mandatory requirements, whilst others provide guidelines and frameworks.
11 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection 10 United Kingdom (UK). The UK government recognizes that the Internet has become increasingly important to its economy and society. In 2010, the UK had one of the largest Internet-based economies, valued at USD188 billion* 9. Due to the high reliance on Internet, as well as the country s Cyber Security Strategy 2010 s vision which is...to derive huge economic and social value from a vibrant, resilient and secure cyberspace... 10, it is vital that the country s basic infrastructure be protected. The UK government has enforced compliance to the Network Interoperability Consultative Committee (NICC) Minimum Security Standards (ND 1643) through the Communications Act 2003 to the Communications Sector. In addition, one of the strategic priorities outlined in the UK s Cyber Security Strategy is to reduce vulnerabilities in the country s government systems and critical infrastructure. For this reason, the UK has developed the cyber security and information assurance standards Information Assurance Maturity Model (IAMM). IAMM was developed by incorporating the requirements from the Security Policy Framework (SPF) which is mandated to government agencies. SPF recognizes and has aligned its principles to the ISO/IEC and the Business Continuity Management (BCM) standards (BS 25999/ISO 22301). The UK s priorities for action is to model the best practice on cyber security in the government systems which will set standard for suppliers to government to raise the bar on cyber security requirement. On the flipside, the UK government also takes the approach of voluntary standards implementation. The application of standards is promoted through the establishment of national-level certification schemes for the following standards such as the ISO/IEC 15408, ISO/IEC 27001, ISO/IEC 20000, BS and ISO * Conversion rates taken from Oanda as on 31 December 2014: US$/ GBP UK s priorities for action is to model the best practice on cyber security in the government systems...
12 11 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection Australia. Australia s cyber security standards compliance implementation is supported by the country s Cyber Security Strategy The Strategy highlighted on the need for a consistent and integrated framework of policies, procedures and standards to protect its government s systems, as well as the other interconnected systems 11. In realizing this, one of the measures that the country has undertaken is the development and enforcement of the Protective Security Policy Framework (PSPF) to the government agencies through a Directive by the Attorney-General Department (AGD). PSPF which is mapped to the ISO/ IEC AS/NZ has 33 mandatory requirements and is developed to protect the government s people, information and assets. The Australian government takes the lead-by-example approach whereby it enforces standards to government agencies to encourage and create market demand for good security practices and more secure services and products to be made available to the public. In addition, the Australian government has enforced the ISO/IEC for procurement of products with security functions in the Government Sector. This is in line with the priority outlined in the Cyber Security Strategy 2009 which is to establish minimum security standards in the government for a more centralized approach for ICT products and services procurement and management. Standards that are implemented voluntarily and adopted by critical infrastructure organizations in Australia are the American National Standard Institute/International Society of Automation (ANSI/ISA)-99 Industrial Automation and Control Systems Security and ISO27799 Health Informatics - Information security management in health using ISO/IEC The Australian government takes the lead-by-example approach whereby it enforces standards to government agencies to encourage and create market demand for good security practices and more secure services and products to be made available to the public.
13 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection 12 United States of America (USA). Over the decade, the country has weathered constant cyber security attacks and acknowledges the inevitable increase of threats to critical infrastructure and federal operations information systems. The country has developed various national strategies on cyber security. The Comprehensive National Cybersecurity Initiative (CNCI) will evolve to become the key element of a broader updated national USA cyber security strategy. The CNCI consists of various initiatives designed to help secure the country in the cyber space 12. Furthermore, it has specific strategies for each of its critical sectors which not only covers physical security, but also cyber and human security. The government has mandated the compliance with cyber security standards through related legislations to certain sectors; Energy, Dams and Government. The standards mandated to the Energy and Dams sectors are the Reliability Standards Critical Infrastructure Protection (CIP) through the Code of Laws of the United States of America (U.S.C) Title 16 Conservation, Section 824o Electric Reliability (16 U.S.C 824o). The standard is mandated to ensure a secure electronic information exchange to support the reliability of the bulk power system and to assist in preventing unauthorized access to the sectors critical assets. The standards mandated for the Government Sector is the Federal Information Processing Standards (FIPS) through Federal Information Security Management Act 2002 (FISMA). Other standards in the critical sectors are ISO 27799, ISO/IEC Information technology -- Security techniques -- Information security management for inter-sector and inter-organizational communications as well as ISO/IEC Information technology -- Security techniques -- Information security management guidelines for telecommunications organizations based on ISO/IEC for Telecommunications and ISO/ IEC TR Information technology -- Security techniques -- Information security management guidelines for financial services for Financial Services. Notwithstanding, the government promotes the application of cyber security standards via establishment of national-level certification schemes for the following standards such as ISO/IEC 27001, ISO/IEC 27005, ISO/IEC 27006, ISO/IEC 20000, and ISO The government has mandated the compliance with cyber security standards through related legislations to certain sectors...
14 13 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection South Korea: Being one of the most connected countries in the world, the South Korean government realizes that as it continues to embark on information technology initiatives for the nation, the risks of cyber-attacks will also increase. A report by the Ministry of Strategy and Finance states that there is a high concern over the potential damages to Korea s main national information communication infrastructures caused by cyberattacks 13. The government has put equal importance of cyber security and information through its Long Term Comprehensive Plan for information security for the protection of its critical information infrastructure. The Communications Sector complies with the ISO/IEC under the Act on Promotion of Information and Communications Network Utilization and Information Protection 2005 to ensure reliability and trust of the information communication network 13. Its purpose is focused on promotion of the use of information and communication networks as well as protection of user s personal information. In order to ensure compliance, the government conducts Information security management system (ISMS) Compliance Information Security Checks on the mandated organizations. Additionally, to promote the usage of the standard to the industry, the government provides incentives such as discounts, eligibility criteria and evaluation points in bids for government projects. Other standards that are implemented voluntarily by the industry in South Korea include ISO/IEC and ISO/IEC The government also provides incentives for the ISO/IEC scheme to reduce economic burden to the smaller companies. The Communications Sector complies with the ISO/ IEC under the Act on Promotion of Information and Communications Network Utilization and Information Protection 2005 to ensure reliability and trust of the information communication network.
15 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection 14 Malaysia. Cyber security standards compliance implementation in Malaysia is supported by the country s National Cyber Security Policy (NCSP). The NCSP aims to strengthen the nation s critical national information infrastructure and facilitate the country s drive towards Vision 2020 as part of the country s strategy towards attaining a developed nation status by the year The country has identified the ISO/IEC as the baseline standard for information security and has enforced it to its critical sectors through a Directive. There are also Directives by the government that outline requirements in implementing the ISO/IEC or equivalent to reduce the risks of cyber security incidents. The Government, Financial Services as well as Information and Communication Sectors comply with various cyber security standards and guidelines. These are made mandatory through enabling provisions in the Electronic Government Activities Act 2007, the Financial Services Act 2013 and the Communication and Multimedia Act 1998 respectively. In addition, there are specific sectors that comply with other cyber security-related industry standards. For example, the Banking & Finance Sector complies with Payment Card Industry Data Security Standard (PCI-DSS), Public Key Infrastructure (PKI) Standards and Europay-Mastercard-Visa (EMV) Standard. The Transportation Sector which includes sub-sectors Aviation, Maritime, and Land complies with cyber security-related international regulations and standards such as standards by International Air Transport Association (IATA) and International Civil Aviation Organization. Notwithstanding, the government promotes the application of cyber security standards via establishment of national-level certification schemes such as the Malaysia Common Criteria Evaluation and Certification Scheme (MyCC Scheme) that evaluates and certifies the security functionality within technology products against ISO/IEC standard and ISMS Audit and Certification Scheme based on the ISO 27001:2005 standards to ensure and achieve continual improvement in the management of information security. The country has identified the ISO/IEC as the baseline standard for information security and has enforced it to its critical sectors through a Directive.
16 15 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection Conclusion As the global community rely and depend more on technology, it is inevitable the threats from cyber adversaries continue to grow. The evolving cyber landscape opens the possibility for large scale cyber-attacks that may have an adverse impact on nations critical infrastructures.the wider adoption and implementation of cyber security standards is argued to contribute to and build better resiliency of nations critical infrastructures. This can bring about higher success of a country s cyber security strategy in withstanding the cyber threats which no longer observe national borders. As a result, this is able to link the global community in a common defense and better collaboration and capability to respond for improved cyber resiliency globally. Analysis on how compliance with cyber security standards improve critical infrastructure protection The different approaches that countries take to cyber security standard compliance shows that cyber security standards whether implemented mandatorily or voluntarily is a measure to enhance the protection of the critical infrastructure. Enforcing cyber security standards compliance may bring about positive outcome to the overall cyber security management of a country, and not just the organizations implementing them. The benefits of cyber security standards compliance are summarized below: Provide a baseline requirement; Establish a consistent and iterative approach to manage cyber security; Enhance integration and interoperability; Drive the development and creation of market demands; Acknowledge the global nature of cyber security risks in addition to the ecosystem s local risks; and Encourage and promote international cooperation. Baseline. The enforcement of cyber security standards may provide a baseline requirement for the critical infrastructure organizations to manage cyber security risks and protect their critical assets. It provides a common language that may contribute in achieving a consistent approach to manage cyber security in the critical infrastructure organizations. Various countries have enforced cyber security standards to the organizations in their critical sectors. In the USA, the UK and Australia, it is observed that standards such as FIPS, SPF and PSPF respectively have been enforced to the Government Sector to protect the government s information and information systems. In addition, the UK and South Korea have enforced standards to their Communications Sector to ensure the reliability of the sector s services.
17 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection 16 Consistency. The implementation of cyber security standards may help establish a consistent approach to identify, assess and monitor the cyber security posture of the critical infrastructure. In the UK, the IAMM is the tool used to assess the compliance with the mandatory requirements of the SPF for the Government Sector. South Korea has developed its own National Information Security Index to measure the country s level of preparedness for information security in the country and the threat index used in measuring the scope of damages caused by cyber threats. Integration and Interoperability. As the reliance on technology and interconnectivity between sectors have increased, the critical infrastructure sectors may be more vulnerable to potential cyber risks and threats. The enforcement of cyber security standards that are technology neutral and evolves with technology advances may be able to enhance integration and interoperability between the critical sectors. This in turn contributes to the improvement of the overall security and resilience of the country s critical infrastructure. The Australian government in its Cyber Security Strategy 2009 highlighted the need for a consistent and integrated framework, procedures and technical standards to ensure the protection of its government systems as well as interconnected systems.
18 17 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection Market Demands. The enforcement of cyber security standards compliance may also drive the development and creation of market demands for effective products, services and practices. As the demand increases, there may be an increase in the market competition for the suppliers which may promote faster and better distribution of secure technologies and practices. This may allow the critical infrastructure organizations to realize the benefits of implementing cyber security standards. Many countries have established certification schemes to promote the usage of cyber security standards to the industry. Whilst there are countries that enforce these schemes, such as the USA and Australia which enforce the ISO/IEC for government procurement, there are countries that encourage the implementation of these standards by providing incentives. For example, South Korea provides incentives to the industry to implement the ISO/IEC and ISO/IEC A study by McAfee shows that there is an 8.7% increase globally for cyber security products since 2011 to 2013, which is from USD53 billion to USD58 billion 14. In addition, the business demand for cyber security products for the same period has increased by 14.7%, whilst consumer demand has increased by 10.7%. The report indicated that the increase is contributed by the growing awareness of cyber security risks in the industry. Acknowledgment of Global Risks. Generally, internationally-accepted cyber security standards are developed by industry experts. These standards have usually taken into consideration the global risks that are commonly faced by the industries in which by enforcing cyber security standards compliance, organizations may acknowledge the global nature of cyber security risks in addition to their ecosystem s local risks. Observations suggest that countries have implemented international cyber security standards to assist in the protection of their critical assets. For example, the UK s communication providers implement the ND 1643 based on a requirement from the Communications Act 2003 to form a baseline for the security and integrity of network interconnections. This standard is in line with the Electronic Communications Framework by the European Commission. In Australia, the Generic SCADA Risk Management Framework for Australian Critical infrastructure has adopted the ANSI/ISA- 99 Industry Automation and Control System Security that is developed by the American National Standard Institute. International Cooperation. The enforcement of cyber security standards may encourage and promote international cooperation in strengthening critical infrastructure protection as countries that implement cyber security standards may be able to contribute in international fora on standards. Forum of Incident Response and Security Teams (FIRST) is an international platform for information exchange and cooperation on incident response and cyber security vulnerabilities between government, commercial and academic sectors. One of FIRST s global initiatives includes efforts on cyber security-related standards for ISO and International Telecommunication Union (ITU). Amongst the standards that FIRST are currently working on include the ISO Guidelines for Cyber Security and ISO Information Security Incident Management 15. The World Trustmark Alliance is an international platform to discuss issues and standards concerning e-commerce transactions and dispute resolutions for cross-border transactions.
19 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection 18...cyber security standards compliance may also drive the development and creation of market demands for effective products, services and practices.
20 19 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection Acknowledgment We would like to thank the following people for their valuable contribution to this report: Rozana Rusli Executive Director, Management Consulting, KPMG in Malaysia Shahrul Kamal Kamaruddin Assistant Manager, Management Consulting, KPMG in Malaysia Najlaa Fadzli Assistant Manager, Management Consulting, KPMG in Malaysia
21 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection 20 Endnotes 1 Sony cyber-attack: North Korea calls US sanctions hostile. BBC 4 January Web. 5 January South Korea blames North for bank and TV cyber-attacks. BBC 10 April Web. 16 January Saudi Aramco says most damage from computer attack fixed. BBC 26 August Web. 16 January Global Risks 2014, Ninth Edition. World Economic Forum, MyCERT. MyCERT Incident Statistics as of October November Malaysia. Performance Management & Delivery Unit (PEMANDU). Accelerating the growth of local cyber security industry by securing Malaysia s Critical National Information Infrastructure based on international cyber security safety standards. n.d. Document. 7 BAE to make Malaysia hub for security solutions. Business Times McAfee - Center for Strategic and International Studies. Net Losses: Estimating the Global Cost of Cybercrime BBC, UK is the most Internet-based major economy, 19 March HM Government, The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world, November Australian Government. Cyber Security Strategy The White House. Foreign Policy - The Comprehensive National Cybersecurity Initiative Ministry of Strategy and Finance Modularization of Korea s Development Experience: Information Security Activities in Korea McAfee - Center for Strategic and International Studies. Net Losses: Estimating the Global Cost of Cybercrime FIRST. Standardization Efforts. n.d. March 2014.
22 21 Cyber Security Standards Compliance: A Vital Measure to Critical Infrastructure Protection Thought Leaderships Cyber security: It s not just about technology As cyber security is an important concern for every organization, this whitepaper provides insights on the common cyber security mistakes made by organizations. Global Boardroom Insights - The Cyber Security Challenge Key elements of effective cyber risk oversight and governance are explored in this edition of KPMG Global Boardroom Insights. The paper provides insights from various professionals from the industry on cyber security challenges. Cyber security: Are consumer companies up to the challenge? This report discusses the outcome of a webcast survey that was conducted by KPMG on consumer companies. The survey, Cyber security: It s not just about technology focused on assessing and effectively managing cyber risk. Cyber threat intelligence and the lessons from law enforcement This report provides the cyber intelligence principles and processes that will help organizations manage cyber threat proactively and minimize risk to customers, shareholders and employees. A Nuanced Perspective on Cybercrime: Shifting viewpoints call for action This whitepaper on cybercrime is based on a survey and interviews amongst Dutch organizations. It provides an overview of the cybercrime landscape and actions to be undertaken. Top 5 reasons incident response is failing This report identifies the five reasons that represent the top failures of the incident response function. Cybercrime Survey Report 2014 This report discusses the outcome of a cybercrime survey that was conducted by KPMG in India. The survey provides a summary on the complexity of cybercrime and the measures that organizations should take to mitigate such crime, while creating awareness on what one should do to prevent such attacks.
23
24 kpmg.com/my Contact Us Muazzam Mohamed Executive Director Management Consulting Chief Information Officer KPMG in Malaysia Phone: +60 (3) Dani Michaux Executive Director Management Consulting KPMG in Malaysia Phone: +60 (3) The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavour to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advise an thorough examination of the particular situation KPMG, a partnership established under Malaysian law and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. Printed in Malaysia. The KPMG name, logo and cutting through complexity are registered trademarks or trademarks of KPMG International. All rights reserved.
Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative
Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
Cyber security trends & strategy for business (digital?)
Cyber security trends & strategy for business (digital?) Presentation by Anwer Yusoff Head, Industry & Business Development C y b e r S e c u r i t y M a l a y s i a NATIONAL CYBERSECURITY TECHNICAL SPECIALIST
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
Energy Cybersecurity Regulatory Brief
Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider
A Guide to the Cyber Essentials Scheme
A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: [email protected] Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane
Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts
CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Audit summary of Security of Infrastructure Control Systems for Water and Transport
V I C T O R I A Victorian Auditor-General Audit summary of Security of Infrastructure Control Systems for Water and Transport Tabled in Parliament 6 October 2010 Background Infrastructure critical to the
Cybercrime Security Risks and Challenges Facing Business
Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
CYBERSECURITY INDEX OF INDICES
Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving
Business Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
The Danish Cyber and Information Security Strategy
February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives
Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
How To Protect Your Information Security From Cyber Threats
2015 Australian Government Information Security Manual PRINCIPLES 2015 Australian Government Information Security Manual PRINCIPLES Commonwealth of Australia 2015 All material presented in this publication
Who s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity
Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Capabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
Cyber Security solutions
Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Cyber Security Risks for Banking Institutions.
Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions
HKCS RESPONSE COMMONLY ACCEPTED AUDIT OR ASSESSMENT MECHANISM TO CERTIFY INFORMATION SECURITY STANDARDS
Hong Kong Computer Society Room 1915, 19/F, China Merchants Tower, Shun Tak Centre, 168 Connaught Road Central, Hong Kong Tel: 2834 2228 Fax: 2834 3003 URL: http://www.hkcs.org.hk Email: [email protected]
Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au
Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
Cyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015
Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine
ISO27032 Guidelines for Cyber Security
ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance
Cyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 1 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V2 Company Name: The Boeing Company December 10, 2012 1 Interim Techlogy Performance Report 1
Which cybersecurity standard is most relevant for a water utility?
Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:
Technology and Cyber Resilience Benchmarking Report 2012. December 2013
Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities
How GCs And Boards Can Brace For The Cybersecurity Storm - Law360
Page 1 of 6 Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] How GCs And Boards Can Brace For The Cybersecurity
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
Developing a National Strategy for Cybersecurity FOUNDATIONS FOR SECURITY, GROWTH, AND INNOVATION. Cristin Flynn Goodwin J.
Developing a National Strategy for Cybersecurity FOUNDATIONS FOR SECURITY, GROWTH, AND INNOVATION Cristin Flynn Goodwin J. Paul Nicholas October 2013 Contents Executive Summary... 3 What Is a National
How To Protect Your Business From A Cyber Attack
Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Australian Government Cyber Security Review
Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
CYBERSPACE SECURITY CONTINUUM
CYBERSPACE SECURITY CONTINUUM A People, Processes, and Technology Approach to Meeting Cyber Security Challenges in the 21 st Century 1 InterAgency Board 1550 Crystal Drive Suite 601, Arlington VA 22202
National Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
National Approach to Information Assurance 2014-2017
Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version
NEW ZEALAND S CYBER SECURITY STRATEGY
Appendix 1 NEW ZEALAND S CYBER SECURITY STRATEGY June 2011 New Zealand Government 7 June 2011 ISBN: 978-0-478-38200-6 www.med.govt.nz/cyberstrategy MED11 Foreword from the Minister The Internet and digital
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
CYBERSECURITY HOT TOPICS
1 CYBERSECURITY HOT TOPICS Secure Banking Solutions 2 Presenter Chad Knutson VP SBS Institute Senior Information Security Consultant Masters in Information Assurance CISSP, CISA, CRISC www.protectmybank.com
IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security
IBM Internet Security Systems October 2007 FISMA Compliance A Holistic Approach to FISMA and Information Security Page 1 Contents 1 Executive Summary 1 FISMA Overview 3 Agency Challenges 4 The IBM ISS
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
London Business Interruption Association Technology new risks and opportunities for the Insurance industry
London Business Interruption Association Technology new risks and opportunities for the Insurance industry Kiran Nagaraj Senior Manager, KPMG LLP February 2014 Agenda Introduction The world we live in
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing
Partnership for Cyber Resilience
Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage
Compliance Guide: ASD ISM OVERVIEW
Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Some 4 500 organizations implement ISO/IEC 27001. Information security INTERNATIONAL
Some 4 500 organizations implement ISO/IEC 27001 for information security The author reports on global progress in the implementation of the international information security management system standard
Global Cybersecurity Index Good Practices
AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
HEALTH CARE AND CYBER SECURITY:
HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers
