Cyber security: a failure of imagination by CEOs
|
|
|
- Clement Patrick
- 10 years ago
- Views:
Transcription
1 Cyber security: a failure of imagination by CEOs KPMG in Canada kpmg.ca/ceocyberoutlook
2 Global CEOs walk a fine line between risk and reward A senior executive at an oil and gas company clicks on an with a picture of his daughter scoring a goal in last week s soccer game. Two years later, the executive learns that photo was embedded with malware that allowed an attacker to log every keystroke on his desktop, including every he sent. The cyberspies took screen shots periodically and they turned on his video camera and microphone, giving them eyes and ears to what was happening in the C-suite. The company had bid in a number of closed auctions for oil rights but always seemed to come in just under the winning bid. A maker of home monitors advertises a brilliant new feature for customers: control your thermostat, your lights and your security system with your smartphone! However, the technology is so easy to use that a group of local thieves hacks the system to engineer a series of break-ins. A simple change to the system s security and log-in procedures could have prevented the hack. A retailer learns the hard way that an international hacking network has been quietly siphoning every credit and debit card sale processed at its stores for months. The C-suite and board learn about the breach from government investigators, and the news is publicized before they have a chance to contain the breach or deal with the aftermath. Sales plummet, class-action suits follow and the CEO resigns. Better prevention might have helped in all these cases, but it would not have been enough. While it s important to build better security into the products and the processes, gaining more visibility into who is attacking and having a plan for mitigating threats when they are detected are just as important. Technology is enabling companies to connect with their customers in ways no one could have imagined a decade ago through: smart devices, the customized marketing and products and automated services that have streamlined back offices as well as offered more immediate and personalized services to customers. We can now do most of our banking transactions through a computer that we carry in our back pocket. But innovation almost always runs ahead of security. And the bad actors are innovating as well. One of the most innovative marketplaces in the world is the dark net, which supports organized crime as well as basement hackers. Every day there are new tools, new attack services and new cash-out strategies being developed and shared. Everything is changing: the compromise points, the risks and the consequences. What keeps CEOs awake at night Keeping data safe is no longer an afterthought at most organizations whether it s customer data, IP or the more mundane data necessary to run the company. KPMG International recently surveyed over 1,200 chief executives from many of the world s largest and most complex companies and discovered what keeps them awake at night: Two-thirds are concerned about the relevance of their products and services, three-quarters are struggling to keep up with new technologies and nearly all are worried about the loyalty of their customers. 1 Cyber security is closely tied to customer loyalty and trust as well as innovation. A breach can seriously undermine consumer confidence and damage brand reputation. In fact, building cyber security into products and processes can be a competitive advantage, says Malcolm Marshall, Global Head of Cyber Security at KPMG. Some organizations are turning security into a selling point with touch identification, he explains. Banks, for example, are starting to replace clunky security processes with touch ID. If you are able to authenticate your staff and your customers to very high levels of certainty, it means you re able to provide much more tailored levels of service, he explains. 1 See survey methodology at the end of this report. 2 Cyber security: a failure of imagination by CEOs
3 86% of CEOs are concerned about the loyalty of their customers 66% of CEOs are concerned about the relevance of their products and services 72% of CEOs are struggling to keep up with new technologies Source: 2015 KPMG CEO Outlook, May Every company is a cyber company One of the biggest mistakes an organization can make is regarding cyber security as something that is purely the domain of the CIO. The CIO has a very important role, but as more businesses use digital as their route to the customer, they are not always engaging with cyber security experts, says Marshall. Many senior executives don t appreciate the level of technology that is embedded in their products, he says. Nor have many C-suite executives thought through the creatively devious ways that cyber criminals might exploit their products or services. Cyber crime is not as well understood as conventional crime. Ultimately, it s a question of product integrity and reputation and that is a board-level concern. Institutional investors, for example, are less likely to invest in a company that has had a major public cyber breach. That can impact share price as well as the ability to raise capital. Collectively, we sleepwalked into a position of vulnerability and failed to learn lessons of embedding security into products right out of the gate. Malcolm Marshall Global Head of Cyber Security at KPMG The bottom line: Every company is now a cyber security company and every company needs to keep an eye on security. Cyber security: a failure of imagination by CEOs 3
4 Cyber security: a strategic risk C-suite and board members traditionally have viewed cyber security as a tactical problem, not a strategic issue. But over the past decade, there is a realization that cyber security can pose an enterprise-wide risk. In the survey, nearly a third of CEOs list cyber security as the issue that has the biggest impact on their company today. One out of five indicated that information security is the risk they are most concerned about. Operational and compliance risk were listed as the top risks. But cyber risk, if uncontrolled, becomes an operational issue and a regulatory issue very fast. Amongst public breaches the issue then becomes: I can t focus on my 29% of CEOs list cyber security as the issue that has the biggest impact on their company today Source: 2015 KPMG CEO Outlook, May operations because I m distracted by a cyber event, says Greg Bell, Cyber Security Leader for KPMG in the US. Or, I have to stop part of my operations 20% of CEOs indicated that information security is the risk they are most concerned about while I try to redress or remediate the cyber issue, and then I m dealt with a number of complicated regulatory impacts and lawsuits, he adds. Developing a framework for cyber risk Reputational, regulatory and legal risks are a concern for all firms. For organizations with a physical infrastructure, the risks multiply. An attack can tamper with controls, destroy an organization s equipment, cripple operations and create liquidity risk. The attacks on state-run oil and gas companies in recent years have been a wake-up call to every organization in the energy and industrial sectors. Without the lines of credit and government guarantees of a state behind them, many would face liquidity problems within days if they were under similar attacks. Many organizations already have a framework for assessing enterprise risk, yet cyber risk is still treated differently than other risks, explains Marshall. That is a mistake, he says. Take third-party risk, for example. Many organizations particularly banks have long thought about third-party risk. Some of them have now gone to multiple suppliers, so if one of their suppliers fails, they have resilience. But a deeper look might reveal that the risk gets reconsolidated at the next layer because all of their diversified suppliers are reliant on a single supplier a phenomenon known as fourth-party risk. This discovery is common in assessing liquidity risk, but the process can be equally revealing for cyber resiliency. For instance, what if all of your suppliers rely on the same cloud provider? Every organization should have a framework for analyzing cyber security and that framework should ideally be integrated into an organization s existing enterprise risk framework says Marshall. There are several frameworks organizations can use: The Framework for Improving Critical Infrastructure Cybersecurity published by NIST in the US, Cyber Essentials in the UK or the international standard ISO27001, which is the most common framework adopted globally. The choice of framework matters far less than how it s integrated and implemented, says Marshall. The key is that it becomes part of the mainstream of risk management within the organization. Understand your enemy A first step in this direction is understanding who might attack a particular enterprise, what they would attack and why they would attack. In short, understand your enemy (see sidebar on security intelligence). A framework can also help organizations understand which assets are most in need of protection and which could cause the most damage if they were compromised. This helps focus investment and protection on the areas that would have the greatest impact on an organization, says Marshall. Intellectual property is a crown jewel for most tech companies, for example. But what happens when a global business handles product design in one country, software development in another country and parts of hardware design in a third with suppliers located all over the world? The board at one such company identified IP as a going-concern risk. They determined that if somebody gained access to their IP, learned their plans for new product release or was 4 Cyber security: a failure of imagination by CEOs
5 able to copy their IP it could threaten the existence of the firm. The firm s weak point proved to be a facility that manufactured the most profitable product at the highest volume. A white-hat hacker hired by a consultant of the firm was able to gain access in about 30 seconds to all of the systems on the shop floor. The hacker had full control from a cyber security standpoint to everything, including the IP. Moreover, a moderately talented hacker could control every server, from the quality assurance programs to the manufacturing process. The CIO was not surprised by this discovery. He had tried to work with the manufacturing teams previously, but they were concerned that security controls would impede operations. Aside from the potential for IP theft, the vulnerabilities meant that there was no integrity in the quality assurance program for the firm s most profitable product. In a class-action suit, a firm that has lost control of its quality assurance would have a hard time mounting a defense. Another risk that is often overlooked comes in the form of mergers and acquisitions (M&A). Some organizations are learning the hard way that buying a company that has not built security into its products can be costly. In one recent case, the cost of remediating cyber security weaknesses was equivalent to 25 percent of the acquisition price. Due diligence by the acquiring firm did not uncover the weakness because there was no understanding of how critical cyber security was for a product meant to be used in vehicles. Are you ready? Half of CEOs surveyed say they are fully prepared for a future cyber event. Yet the survey revealed that only half of CEOs had appointed a cyber security executive or team and less than half had changed internal processes, such as data sharing. More surprising was that only a third of organizations reported changes to external processes such as data sharing or transaction processing. Cyber criminals are circumventing the more robust security at large organizations by infiltrating their smaller suppliers and service providers with malware. The malware can then ride in on an invoice or sensor monitor. Some of the most spectacular and well-publicized breaches in recent years were introduced by third-party vendors. Given the growing complexity of supplychain management and the trend to having more connected equipment and processes, cyber security is something that extends across the entire supply chain and your vendors and sellers supply chains as well. It is also an opportunity to turn cyber security into a competitive advantage. A robust and demonstrable security protocol can be a selling point for any company that connects to its clients on an open network, as the example in the last section demonstrates. Yet the survey revealed that respondents in several scenarios are either not planning or have delayed planning of important security measures. Plans to appoint a cyber security executive/team Plans to change internal processes (data sharing, device use) Have taken preemptive steps 50% Have taken preemptive steps 45% Planning to take steps in the next 3 years 29% Planning to do so in the next 3 years 44% Not planning to do so 21% Not planning to do so 11% Plans to upgrade current technology Plans to change external processes (data gathering, transaction processing, data sharing) Have upgraded current tech only/ have taken preemptive steps 37% Have taken preemptive steps 34% Planning to do so in the next 3 years 49% Planning to do so in the next 3 years 53% Not planning to do so 14% Not planning to do so 13% Source: 2015 KPMG CEO Outlook, May Cyber security: a failure of imagination by CEOs 5
6 Significant investment made in the US There was a wide geographic disparity in the data for preparedness. How prepared you feel depends on where you are based. In the US, 87 percent of CEOs say their companies are fully prepared. Mandatory disclosure rules for compromised consumer data, a number of widely publicized breaches and an active government cyber agenda have raised awareness beyond what is seen in other regions. The US is a favorite target for cyber criminals and the attacks tend to make bigger headlines in North America. Consequently, many organizations have indeed invested heavily in preventing an attack, says Bell. But until recently, there has been too much attention focused on prevention and not enough on protection and response. CEOs are starting to ask: How do we detect more quickly if we have a cyber incident, and how do we respond effectively? says Bell. That preparedness makes the difference between those organizations that recover quickly from an incident and those that suffer a lingering impact. The root cause is often a failure of imagination. A failure to imagine the sophistication and persistence of their attackers. Malcolm Marshall Global Head of Cyber Security at KPMG Caution in Europe In Europe, less than a third say they are prepared for a cyber event. Many European organizations are in a state of flux. The Snowden revelation gave many European CEOs reason to rethink and realign their cyber strategy and security measures, says Uwe Bernd- Striebeck, Cyber Security Leader for KPMG in Germany. We see quite a number of European companies moving to domestic security providers and replacing US security tools and applications by European ones, or planning to do so in the near future. 3% Many firms in the region are still at the beginning or middle of their cyber security journey, says Bernd-Striebeck. They are looking for effective and costefficient security solutions that provide the best protection and put them into a position to handle cyber incidents adequately. Even if they have invested in security, European CEOs are less likely to declare themselves fully prepared on cyber security because they tend to be more cautious than CEOs in the US, he says. 66% 31% 13% Europe 87% US 1% 32% ASPAC 67% 1% 49% Global 50% Fully prepared Somewhat prepared/not where we need to be Unsure Source: 2015 KPMG CEO Outlook, May Cyber security: a failure of imagination by CEOs
7 Asia: responding to the threat landscape In the Asia-Pacific region, the attributes that have accelerated preparedness in the United States are not as visible or progressed, says Dani Michaux, Cyber Security Leader for KPMG in Asia. Only 32 percent of CEOs reported their organizations are fully prepared on the cyber front. Governments are starting to review and provide more active leadership at an individual country level, privacy laws are being reviewed and businesses are now responding to the increasing threat landscape. For organizations based in the Asia- Pacific region, there is a wide range of maturity levels and appreciations of cyber risk, from those just beginning to acknowledge and understand cyber risk, to those who are fully engaged with high awareness amongst the board and CEO about the importance of cyber security to protect and grow their business. Beijing s goal of replacing US technology along with strict regulations around security products and services in China has had a huge sway on Asia s largest cyber security market. Many Australian CEOs and boards understand the importance of cyber security, however, often their understanding is not yet at a level that can drive action, explains Gordon Archibald, Cyber Security Leader for KPMG in Australia. Part of this is due to the lack of visibility and clarity of what needs to be done. This falls with management who may sometimes struggle with building impetus to clearly define the problem what am I trying to protect, what are my risks and how well protected are those assets? he explains. They are aware of the threat but they don t always see the potential impact to the business and emerging technology. Who you have is as important as what you know Together these issues are creating a perfect storm on the talent side and a mounting skills gap is likely to worsen in the coming years. In the survey, CEOs who said they were not prepared for a future cyber event are more likely to be increasing their headcount over the next 3 years, and half of them expect a skills gap to emerge over the same period. One of the biggest challenges is the sheer scale of the skills shortage. Global estimates suggest that over 23 percent of cyber security posts take more than 6 months to fill, with a further 10 percent remaining unfilled. The US Bureau of Labor Statistics estimates there are almost 300,000 unfilled jobs in cyber security in the country as of August This skills shortage is most acute for cyber security professionals who blend broader business, management, risk or social sciences skills along with technical savvy. Finding good IT talent is a challenge for most organizations, says Marshall, and it s a particular challenge for any project that involves embedding technology into the customer experience. Everyone understands that you need good security people at the back end, he says. But to design new products, embed new technologies and launch into new markets with a high level of confidence, you need good security people at the vanguard, working with designers and marketers. You need talented people who can make sure the customer experience is enjoyable rather than a security nightmare, he says. Cyber security: a failure of imagination by CEOs 7
8 The business-savvy cyber executive There is also a question of who is ultimately responsible for cyber security within the organization. In the survey, four out of ten CEOs say they expect the role of the CIO will become more important in the years ahead, but many CIOs are neither part of the C-suite inner circle nor are they respected as business partners. There is also an inherent danger that if a CIO is the only senior executive with responsibility for security, the rest of the organization surrenders responsibility to the IT function rather than making sure security is built into behavior and processes. Security needs a broader remit, says Marshall. We would recommend that someone at the board level and a C-level executive, who is not the CIO, be given a wide responsibility to look at how cyber is integrated in the business from a risk point-of-view and also from an opportunity perspective, he says. This will also send a message to everyone: security is not just an IT issue. In many well-run companies there is a Chief Information Security Officer (CISO). Today that role typically reports to the CIO. But as companies recognize that cyber security is a business risk that impacts the whole enterprise, this is starting to change. A few CISOs now report to other C-level officers, such as the COO, the CFO, the general counsel or even the CEO in a few cases. Any company that recognizes the cyber risks in M&A and product design will also recognize that the responsibility should go all the way to the C-suite. Of course, the reporting structure is only one part of a robust security profile. So much depends on the individuals who fill those roles. It s almost too important to leave under a subject-matter expert, says Marshall. If you have a strong leader somebody who can inspire and lead talented subject matter experts you don t need to have a security expert as your CISO. 40% said that the CIO would become more important to their organization over the next 3 years Source: 2015 KPMG CEO Outlook, May The CISO should be able to have a meaningful conversation with the C-suite and the board, says Bell. Too many CISOs end up trying to explain these nuanced tech risks and it sounds like so much technobabble to a business audience. If you have a cyber leader in your organization that can talk to you about business risk as an implication of a cyber issue, that s a much more effective conversation, says Bell. The right tools Organizations need to invest in the right tools, as well as the right people. They need visibility first and foremost, to know if they are being attacked. Without visibility it s impossible to identify holes in the security arsenal and weaknesses in infrastructure. There are organizations that have been compromised for years before they discover the damage. One way companies can expand their expertise is by bringing in security intelligence to pinpoint problems, identify anomalies and highlight unusual or suspicious activity. Intelligence can help in two ways. First, an early-warning-asa-service can reduce the vulnerability threat window: the time between the detection and the remediation of an attack. Intelligence can also provide a broader picture of global threats than any one organization could gather on its own. Security is an ecosystem; organizations need to know what is going on externally, as well as internally. KPMG Capital recently took an equity stake in Norse Corporation, a leader in live attack intelligence solutions that help companies preemptively block cyber attacks, track emerging threats and detect compromises. Norse has been monitoring bad actors on the internet for five years, says Sam Glines, co-founder and CEO at Norse. Intelligence can provide information about the attacks, the attackers and their methods before they hit your network or your partners networks and compromise your devices, he explains. Marshall continues, Clients face highly sophisticated cyber threats. Working with Norse enables KPMG firms to keep track of the rapidly changing threat landscape to ensure we can provide early warning and deep insights into the tactics employed by attackers, as well as practical actions to counter them. 8 Cyber security: a failure of imagination by CEOs
9 Who is attacking your network? The cyber analysts at Norse Intelligence Service have set out to help answer that question by building a global network of sensors disguised to look like irresistible targets and waiting to see who comes looking to crack them. We wander the worst neighborhoods of the internet, looking for trouble, just asking to be attacked, says Glines. To the bad guys, we look like a telephone company, an ATM or a nuclear power plant. It s like parking a Ferrari on the street, leaving the windows down and the keys in the ignition and waiting to see who tries to steal it. This has given Norse great insight into who the attackers are, where their IP addresses originate, how they operate and what they usually go after. That intelligence can help Norse clients assess the risk level and threat context in their own networks. It works like this: Norse sensors and automated crawlers can discover early signs of network compromise on a client s system and provide real time alerts about suspicious activity. If an intrusion is detected, the intelligence can give clients some clues as to who might be behind the attack Does it look like a nation state? A hacktivist network? A competitor? and what the attackers have tried to access or damage in the past. We re saying let s go out and gather that intelligence for you and enrich your system. So by the time they come after you you re already prepared, you know who they are, how they re coming after you and what they re coming after you with, says Glines. You have to be at least as aggressive and entrepreneurial as your digital adversaries in order to defeat them. Top 10 source and target of cyber attacks by volume SOURCE OF ATTACKS China US Saudi Arabia Germany Russian Federation Netherlands France Brazil Turkey Taiwan TARGET OF ATTACKS US United Arab Emirates Saudi Arabia Germany France Russian Federation Philippines Liechtenstein Hong Kong Singapore Source: Norse Intelligence Network, This is a global network of millions of IPs across more than 50 countries that s emulating thousands of different types of devices ranging from enterprise servers and mobile devices to industrial SCADA equipment and healthcare systems. This network is under constant attack at a rate of over 30,000 attacks a second. Geo-specific statistics associated with targeted and targeting countries are based on the attack data. Cyber security: a failure of imagination by CEOs 9
10 Sharing threat intelligence Organizations can expand their own intelligence by sharing information about their own security threats with peers and competitors. While this is a sound idea in theory, sharing information with competitors is not something many organizations are willing to do yet. Most organizations are reluctant to share their weaknesses publicly and many never divulge their breaches, unless forced to do so by law. Financial institutions are an exception: the financial infrastructure is so interconnected that institutions are more likely to act on the idea that they will all sink or swim if there is an attack. But many other industries don t yet have a culture of sharing. Another way companies are dealing with this is to create collaborative networks offering rewards to white-hat hackers, for example. White-hats are computer hackers who use their powers for good, not evil, by helping organizations find weaknesses in their architecture. Executives who employ them are often surprised at how quickly an accomplished hacker can infiltrate their systems, often within a matter of minutes. There is no such thing as complete security coverage. Organizations need to develop a proactive and predictive approach to cyber security, instead of relying too heavily on reactive technologies such as firewalls or intrusion prevention. Constantly testing for weak spots is one way to stay ahead of bad actors. Understanding the threat landscape and knowing your enemy with security intelligence is another. What you can t prevent, you should try to detect. And what you can t detect, you should be prepared to respond to quickly. The four golden rules of cyber security Get the basics right. Over 75 percent of attacks exploit failures to put in place basic controls. Look after your crown jewels. You have to prioritize where you spend your money to defend yourself, so build a fortress around your most critical assets. Do your homework on your enemies. Invest in understanding who might attack you, why and how, so that you can anticipate the most likely scenarios and defend those assets that are most likely to get attacked. Treat cyber risk as an opportunity to look closely at your business. Security and resilience can affect nearly every part of an organization. Strategies to protect IT security and business resiliency should align with an organization s broader goals from protecting intellectual property to maximizing productivity to finding new ways to delight customers. The most innovative companies have recognized that cyber security is a customer experience and revenue opportunity, not just a risk that needs to be managed. They are finding ways to turn cyber preparedness into a competitive advantage rather than a cost, building security into new products and services at the design stage and realizing that cyber security is not an IT issue: it must work across the entire organization and the ecosystem. 10 Cyber security: a failure of imagination by CEOs
11 Methodology The survey data published in this report are based on a survey of 1,276 chief executives from Australia, China, France, Germany, India, Italy, Japan, Spain, UK and the US. Nine key industries are represented, including automotive, banking, insurance, investment management, healthcare, technology, retail/ consumer markets and energy/utilities. Three hundred forty-seven CEOs came from companies with revenues between US$500 million and US$999 million, 626 from companies with revenues from US$1 billion to US$ 9.9 billion, and 303 from companies with revenues of US$10 billion or more. The survey was conducted between 22 April and 26 May Contributors Malcolm Marshall Global Head of Cyber Security Greg Bell Cyber Security Leader in the US Dani Michaux Cyber Security Leader in the ASPAC region Uwe Bernd-Striebeck Cyber Security Leader in Germany Gordon Archibald Cyber Security Leader in Australia Samuel Glines Co-founder and CEO, Norse Corporation Cyber security: a failure of imagination by CEOs 11
12 Contact us Kevvie Fowler Partner, Cyber Security & National Cyber Forensics Leader T: E: Paul Hanley Partner, National Cyber Security Services Leader T: E: kpmg.ca The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. firms affiliated with KPMG International Cooperative ( KPMG International ), a Swiss entity. All rights reserved The KPMG name and logo are registered trademarks or trademarks of KPMG International.
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack
Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity
Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many
RETHINKING CYBER SECURITY
RETHINKING CYBER SECURITY Introduction Advanced Persistent Threats (APTs) and advanced malware have been plaguing IT professionals for over a decade. During that time, the traditional cyber security vendor
Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014
www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations
Cyber Security Risks for Banking Institutions.
Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.
Cyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
The Path Ahead for Security Leaders
The Path Ahead for Security Leaders Executive Summary What You Will Learn If you asked security leaders five years ago what their primary focus was, you would likely get a resounding: securing our operations.
Cyber Security Management
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes
Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly
Cyber security: Are consumer companies up to the challenge?
Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
www.pwc.com Developing a robust cyber security governance framework 16 April 2015
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
Gaining the upper hand in today s cyber security battle
IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper
Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3
GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party
HEALTH CARE AND CYBER SECURITY:
HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers
Accenture Risk Management. Industry Report. Life Sciences
Accenture Risk Management Industry Report Life Sciences Risk management as a source of competitive advantage and high performance in the life sciences industry Risk management that enables long-term competitive
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
Cyber Security: Confronting the Threat
09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco public information. (1110R) 1 In the past
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
How To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au
Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations
FIVE PRACTICAL STEPS
WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
Assessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Security and Privacy Trends 2014
2014 Agenda Today s cyber threats 3 You could be under cyber attack now! Improve 6 Awareness of cyber threats propels improvements Expand 11 Leading practices to combat cyber threats Innovate 20 To survive,
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
20+ At risk and unready in an interconnected world
At risk and unready in an interconnected world Key findings from The Global State of Information Security Survey 2015 Cyber attacks against power and utilities organizations have transitioned from theoretical
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
A Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 [email protected] www.coresecurity.com blog.coresecurity.com Preempting
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
Best Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
Corporate Security in 2016.
Corporate Security in 2016. A QA Report Study Highlights According to ThreatMetrix, businesses in the UK are at greater risk of cybercrime than any other country in the world. In a recent survey carried
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Cyber Security: from threat to opportunity
IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known
Building Value from Visibility
A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies Building Value from Visibility 2012 Enterprise Internet of Things Adoption Outlook October 2012 Table Of Contents Executive
Developing National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
Sponsored by. A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Aggressive and Persistent: Using Frameworks to Defend Against Cyber Attacks
A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Aggressive and Persistent: Using Frameworks to Defend Against Cyber Attacks Sponsored by Copyright 2014 Harvard Business School Publishing. All rights
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
CGI Cyber Risk Advisory and Management Services for Insurers
CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their
Exposing the Cybersecurity Cracks: A Global Perspective
Exposing the Cybersecurity Cracks: A Global Perspective Part I: Deficient, Disconnected & in the Dark Sponsored by Websense, Inc. Independently conducted by Ponemon Institute LLC Publication Date: April
Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle
Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies
Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan
Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM
IIA South Event 16 th June 2015 Cyber, Social Media and IT Risks 1 st and 2 nd Line Perspective David Canham (BA) Hons, MIRM Agenda This evening we ll cover the following: Who, why and what? Traditional
Managing the Unpredictable Human Element of Cybersecurity
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
www.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
INFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE
promontory.com INFOCUS JUNE 3, 2015 BY EARL CRANE Five Questions to Guide Cybersecurity Risk Management The quick transformation of cybersecurity risk management from obscure specialty to top-of-thehouse
Breaking down silos of protection: An integrated approach to managing application security
IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks July 2014 Cyber Threat Intelligence and Incident Coordination Center: Protecting
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Four steps to improving cloud security and compliance
white paper Four steps to improving cloud security and compliance Despite the widespread proliferation of cloud computing, IT decision makers still express major concerns about security, compliance, and
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
The Advanced Cyber Attack Landscape
The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational
THE HUMAN COMPONENT OF CYBER SECURITY
cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the
Evaluating DMARC Effectiveness for the Financial Services Industry
Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC
Cybersecurity on a Global Scale
Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared
Managing SSL Certificates with Ease
WHITE PAPER: MANAGING SSL CERTIFICATES WITH EASE White Paper Managing SSL Certificates with Ease Best Practices for Maintaining the Security of Sensitive Enterprise Transactions Managing SSL Certificates
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
