July 2013 Leading business advisers. Irish Information Security and Cybercrime Survey 2013.

Size: px
Start display at page:

Download "July 2013 Leading business advisers. Irish Information Security and Cybercrime Survey 2013."

Transcription

1 July 2013 Leading business advisers Irish Information Security and Cybercrime Survey 2013.

2 Contents Executive summary 3 Key observations 4 About the survey 5 Key findings the numbers 6 Snapshot view 7 1. Information security Understanding the information security function Effectiveness of this function Plans for expansion Challenges faced Mobile devices and emerging technologies Motivation for information security Incidents Occurrences The causes of an information security breach The cost A proactive approach Overall assessment 20 Protecting your organisation 21 2

3 Executive summary Welcome to the second Deloitte Ireland annual survey of CISOs and Information Security Managers in Ireland, conducted in association with EMC. Now in its second year, this survey has all the hallmark areas which the inaugural survey focused upon but has also explored additional areas including cloud computing, BYOD and regulatory compliance. Laws and regulations, coupled with the growing need to protect personal, intellectual and proprietary information as well as the reputation of an organisation have reinforced and enhanced the need for investment in information security. Unfortunately, information security is still a long way from integrating with the strategy and objectives of an organisation as evidenced by the increase in the average cost of a large cybercrime incident at 135,000 per incident, as well as the increase in the number of respondents who feel that appropriate measures are not in place to detect incidents of cybercrime in their organisation. In terms of remediation and clean-up costs associated with the incidents experienced by respondents organisations, the average cost stood at 29,954 per incident. A new addition to the 2013 survey was to quantify the financial impact and total cost of cybercrime to businesses in Ireland. On average, instances of cybercrime cost 2. of annual turnover. Of most concern perhaps is the 1 of respondents who stated that cybercrime costs more than 10% of their annual turnover. These figures clearly illustrate the impact on Irish organisations as a result of cybercrime, and, more importantly, the lack of proactive planning and defending against such threats. Of the respondents who experienced serious incidents, 14% reported losses above 250,000 per incident. 6 of respondents indicated that their organisation had not looked at cyber insurance or risk transfer as a mechanism to cover against cyber attacks, business interruptions or data theft/loss. These findings reinforce the need to proactively identify incidents and to keep up with technology advancements as only 40% of serious incidents were identified proactively. Furthermore, it emphasises that organisations need to strengthen their procedural controls and obtain signed acceptance and adherence to the organisation s security policies as the survey indicated that only 5 are currently doing so. Whilst this represents an increase from last year, it is still far below industry best practices and could expose organisations to various internal incidents, as well as potential legal implications should they look to prosecute, or dismiss employees or third party personnel. A well-received addition to this year s survey was the topic of cloud computing. While 60% of respondents indicated that their organisation uses cloud based services in some form, 39% of the respondents believe that privacy and data protection was the single biggest risk associated with the cloud, and continued to be a barrier for the use of cloud based services and solutions. A proactive approach to cybercrime is important for organisations to ensure undetected incidents do not cause exponentially greater damage over a sustained or extended period of time. 4 of respondents believe their organisation proactively identified just over 40% of serious incidents, an alarming drop from 58% in Additionally 44% of respondents regard their information security policy as proactive while 4 consider their policies reactive. We hope you find this report insightful in benchmarking your organisation s effort against the ever increasing threat of cybercrime. Colm McDonnell, Partner, Enterprise Risk Services, Deloitte 3

4 Key observations Organisational strategic awareness and alignment Information security is best integrated into the culture of an organisation if the board and senior management are aware of their responsibilities and actively support the process. The survey findings indicated that only 42% of respondents felt that information security is very well understood by the board with 33% of the respondents stating that information security efforts were well aligned with the organisation s overall strategy. Organisational drivers for information security 42% of respondents indicated that satisfying regulatory requirements was the main driver for investment in information security from senior stakeholders. Response to cybercrime and information security breaches Preparation, and identification of, in addition to responding to incidents are of particular concern to respondents. Results show that only 44% of respondents believe that their organisation proactively identifies incidents and over 40% of the serious incidents encountered were identified proactively. The most common method of breaching security in an organisation is due to hacking, as identified by 19% of respondents. The survey findings also indicate that 21% of respondents feel that keeping up with technology advancements is the top security initiative for 2013 while only stated that regulatory and legislative compliance is a top initiative for Protecting the reputation of the organisation came second, with 28% of survey respondents indicating that brand/reputation protection was the main driver for investment in information security. Interestingly, none of the respondents indicated investing in information security to gain an edge over competitors. Mobile and smart devices Of particular interest was the approach taken towards smartphones and bring your own device (BYOD), where 50% of organisations stated they only support corporate provided devices, with 29% supporting both corporate and employee purchased devices. Given the escalating malware and attacks targeting smartphone devices, of concern was the 31% of organisations that had no additional security measures deployed on mobile devices (such as encryption, mobile device management solutions, etc.), despite corporate information being stored/ processed on the mobile devices. 40% of respondents stated that their organisation had experienced at least one security breach that they know of in the past 12 months. Resourcing and internal challenges The demand for information security professionals continues to grow, with 44% of respondents stating that they are either currently recruiting or plan on taking on additional information security staff over the next one to two years. 42% of respondents felt that current funding for security was adequate, with a further 44% stating that funding was limited, thus impacting on their ability to prevent cyber attacks, or breaches of security. Just 16% of respondents saw up-skilling existing security personnel as a top initiative. 4

5 About the survey Deloitte, in association with EMC, presents the second annual Irish Information Security and Cybercrime Survey. This survey was conducted in the second quarter of Respondents included information security leaders of multinationals, Irish organisations and subsidiaries. These organisations operate across a range of industries including financial services, public sector, manufacturing, IT, semi-state and insurance. 1. Primary function of the organisation surveyed Figure 1 - Primary function of the organisation surveyed 2. Size of organisation surveyed, in terms of turnove (or annual budget for public sector organisations) Figure 2 - Size of organisation surveyed, in terms of turnover (or annual budget for public sector organisations) Financial services 2% 2% 9% 2% 21% 11% 9% IT (hardware/software) Education Government Telecoms/ISP Manufacturing Semi-state Professional services/consultancy Healthcare Pharmaceuticals Food products/beverages Transport Insurance 44% 21% 12% 11% < 5 million 5-25 million million million million 501 million - 1 billion or more Legal firm Other 5

6 Key findings the numbers 67 % of respondents have not looked into cyber insurance. 135k is the average cost per organisation for a security incident over the past year. 2.7 % Cybercrime costs Irish organisations on average 2. of their annual turnover. of respondents rate their organisations overall readiness to deal with 49 % cybercrime incidents as fair or poor. 63 % of respondents believe their organisation is only partially equipped, or do not consider their organisation to have adequate measures to deal with cybercrime. 57 % of respondents stated that no further actions were taken following an investigation of internal or external incidents. 30 of respondents believe that evolving % technical threats present the biggest challenges in information security. 29,954 was the average clean-up and remediation cost to organisations following an incident. 76 are of the view that existing policies only partially % address or fail to address recent business and technology changes (BYOD, cloud). 33 % believe measures to detect incidents of cybercrime are either not appropriate or not adequate. Biggest driver The biggest driver for information security investment/sponsorship is meeting regulatory requirements. 6

7 Snapshot view The table below illustrates changes in key statistics from last year s report. Survey 2012 Survey 2013 Percentage of respondents that detected or are aware of breaches in the past 12 46% 40% -6% months Respondents planning on recruiting additional personnel for the information security 24% 44% +20% function Respondents who feel that appropriate measures are not in place to detect incidents of 3% 23% +20% cybercrime in their organisation Percentage of serious security incidents identified proactively 58% 40% -18% Increase/ Decrease (%) Security breaches are becoming more common, and information security leaders feel that the resources that they are currently working with are not sufficient to deal with the rise of cybercrime threats. 7

8 1. Information security 1.1 Understanding the information security function Our results show that there is a good level of understanding of information security risks at executive and board level. 42% of those surveyed believed that the executives and boards of their organisations understood these risks and impacts very well or better. 14% of respondents highlighted that they believe that these risks are not well understood. This relatively high level of awareness of the associated risks could be attributed to recent increases in cybercrime, as well as numerous high profile cases. With this level of understanding in mind, organisations should ideally have their information security efforts aligned with the organisation s overall risk management programmes. However, the results show there is room for improvement when it comes to aligning the information security risk and the overall business risk. Just 33% of respondents said that their information security efforts were well aligned with the organisation s overall risk assessment or risk management programme. Although 46% of respondents believe that the security efforts and overall risk assessment were somewhat aligned - just under half of organisations are seeing some success in this department - the majority of organisations should be better aligned with business risk in order to reduce duplication of efforts and costs. 3. How well do you feel Information Security is understood by executives Figure 3 - How and well the do Board? you feel information security is understood 4. To what Figure levels 4 - To are what Information levels are information Security efforts security linked efforts with linked the by executives and the board? organisations with the overall organisation s risk assessment overall risk or strategy risk management or risk programmes? programmes? 5 yo 9% Well aligned 33% 39% 42% Excellent Very well Average Not so well Not at all Somewhat aligned Not effectively aligned 19% Not aligned 2% 46% 8

9 1.2 Effectiveness of the information security function A large majority (6) of the information security professionals surveyed believe that their organisations information security activities are good or very effective. 21% consider their security activities as average and predominantly reactive. While most respondents consider their respective organisations to be adequately protected, merely consider themselves to be very effective. A similar picture was painted when respondents were asked to describe their security monitoring strategy. A smaller, but still notable proportion of respondents (44%), stated that their security monitoring strategy is proactive, with a further 4 feeling that their strategy is reactive. This highlights how respondents are relatively satisfied with their security monitoring strategies, but there appears to be room for the information security function to be more proactive than at present.. In terms Figure of Information 5 - terms of Security information effectiveness security effectiveness - how effective - how do you feel ur information security activities are? effective do you feel your information security activities are? Figure 6 - Would you describe your security monitoring strategy as mostly proactive or reactive? 6. Would you describe your security monitoring strategy as mostly proactive or reactive? Very effective Good 58% 44% 4 9% Average and predominantly reactive 21% Somewhat effective 14% Proactive Reactive No security monitoring strategy 9

10 1.3 Plans for expansion When asked about future plans for additional staff in the information security function, 44% of respondents stated that they are either currently recruiting or plan on taking on additional information security staff over the next one to two years. 16% said they did not know if they would be making any additions to the function. 1.4 Challenges faced Evolving technical threats and attacks were cited by 30% of respondents as the biggest challenge in information security. 24% cited employees and their activities and a further 21% indicated that their organisation is not in a position to perform an adequate review of risks prior to the introduction of new technologies. When compared to results from last year s survey, the significance of employee activities as a security challenge has reduced considerably, from 50% of respondents to 24%. Respondents are more concerned about keeping pace with threats that are presented by new technologies. 8. In your Figure opinion, 8 - In your what opinion, major what barriers/challenges major barriers/challenges does your does organisation 7. Do you plan to take on additional personnel to join face the in ensuring your organisation information face in security? ensuring information security? organisation's Information Security team/function? Figure 7 - Do you plan to take on additional personnel to join the organisation s information security team/function?. 16% 16% Evolving technical threats Employees 30% 24% 40% 19% Yes Most likely Current recruiting No Unknown Lack of funding 13% Lack of understanding at board level 12% Adequate review of risks prior to introduction of new technologies 21% 9% 10

11 The reduced significance of employees as a security challenge could be linked to the improved levels of policy education among users. 5 of respondents said that all users in their organisation had provided signed acceptance and adherence to the organisation s security policies, up from 46% last year. While the percentage of organisations that have had employees sign full acceptance of security policies should be higher than 5, it appears that steps have been taken to address the significant threats that employee activities present. When asked about the funding received by the information security function to combat threats, 14% believed that there was insufficient or no funding available. 44% stated there was limited funding available. Figure 9 - Have users provided signed acceptance and adherence to these policies? 9. Have users provided signed acceptance and adherence to these policies? Figure 10 - How would you rate the funding made available for information security to combat emerging threats and risks to confidentiality, integrity and availability? 10. How would you rate the funding made available for Information Security to combat emerging threats and risks to confidentiality, integrity and availability?. 26% Yes 14% 44% 42% No 5 Some, but not all Insufficient funding Limited funding Adequate funding 19% 11

12 2. Mobile devices and emerging technologies Respondents were also asked to what extent mobile devices are supported in their organisations. Remote access to company information via mobile devices brings additional challenges and risks. 79% of respondents said their organisation supports the use of corporate provided mobile devices only, with 31% also permitting the use of employee purchased mobile devices bring your own device (BYOD). These stats were broadly in line with 2012 statistics, illustrating a continued interest and introduction of BYOD within organisations. Coinciding with the increased demand for network support of mobile devices, many organisations are implementing additional security procedures for mobile devices. 50% of respondents said that their organisation had implemented specialist technologies to increase mobile security with 1 saying that additional in-house mechanisms had been implemented. It is worth noting that 31% of organisations surveyed had no additional security measures; despite corporate information being stored/processed on the mobile devices. 11. To what extent is your enterprise supporting mobile 12. devices? Figure 11 - To what extent is your enterprise supporting mobile Are Figure mobile 12 devices - Are mobile utilising devices additional utilising additional security security measures to protect devices? organisational measures information? to protect organisational information? 2% 9% 29% 50% Corporate provided devices only Both corporate and employee purchased Currently piloting a support programme for employee devices Employee purchased/ owned devices only Unofficially supporting employee owned devices on an ad-hoc basis Do not know Specialist technologies to increase mobile security are being used 50% No additional technologies are used to secure mobile devices Current security measures on mobile devices are sufficient 2% Proprietary or in-house mechanisms such as access control/restrictions are used 1 31% 12

13 This year respondents were asked to what level cloud services are currently being used within their organisations. For more than half of respondents (53.), cloud services appear to have been adopted, albeit mainly on a departmental or specified business units basis. A quarter of respondents (25.) stated that while they are not currently using cloud based services, they plan to do so in the next 12 months. Somewhat surprisingly only stated that cloud services are widely used throughout their organisation, and a further 14% stated that they have no plans for cloud services to be used in the short to medium term. In addition to gauging cloud adoption, our survey looked at the single biggest risk for use of cloud services. Unsurprisingly two fifths of respondents cited privacy and data protection as the number one concern, while a further fifth stated unauthorised data access/disclosure. Of interest, only 9% of respondents cited lack of clarity or reporting, with a further citing the technical security of the cloud environment. In terms of reporting breaches/ clarity/disclosure by the cloud provider, only of respondents cited this as their main concern, perhaps illustrating a perceived level of trust in cloud providers. Figure 13 - Is your organisation actively using cloud based services? 11. Which of the following do you consider as the SINGLE biggest risk for use of cloud services by YOUR organisation? Figure 14 - Which of the following do you consider as the single biggest risk for use of cloud services by your organisation? No we also have no plans for use of cloud services in the short to medium term 14% Not at present - but we plan to use cloud services within the next 12 months Yes but currently only a departmental level 53. Yes cloud services are widely used throughout our organisation 25. Privacy and data protection concerns 39. Data disclosure/unauthorised access to organisational information The risk of cyber attack resulting in the unavailability of services 9.3% Vendor lock-in, or the inability to easily move to an alternate provider % Lack of clarity around governance and reporting 9.3% Clarity and reporting of incidents/breaches/disclosure by cloud providers Technical security concerns related to the cloud environment 9.3% 13

14 3. Motivation for information security When asked about the motivation behind investment in advanced security technologies and information security in general, one rationale stood out from the others. 4 of respondents said that their primary motivation for the use of advanced security technologies is compliance and reporting. However, when the respondents were asked about their organisation s top security initiative for this year, only chose information security, regulatory and legislative compliance, perhaps indicating a shift from traditional motivations. 21% of respondents said that security related to technological advancements was the top security initiative. The second highest initiative was data protection at 19%. This seems to paint the picture that organisations are becoming more concerned with addressing emerging issues caused by new technologies, rather than simply focusing on regulatory compliance and reporting.. What is your primary motivation for adopting or utilising advanced curity technologies within your enterprise? 14. What Figure is your 16 - What organisation's your organisation s top security top security initiative initiative for 2013? for Figure 15 - What is your primary motivation for adopting or utilising advanced security technologies within your enterprise? 2013? Compliance and reporting Incident investigation Log management Event correlation 14 2% 4 Demonstrate effectiveness of security programme 19% Not currently looking at advanced technologies 24% Information security regulatory and legislative compliance Data protection Information security training 10% Security related to technology advancements 21% Identity and access management 10% Cyber-threat programme 12% Bring your own device 9% 19% Data loss prevention solution 12%

15 4. Incidents This conflicts with the rationale for investment in information security, with 42% of respondents saying that the main reason for investment in information security from senior stakeholders was meeting/satisfying regulatory requirements. There would appear to be a disconnect between traditional motivations for investment in information security and the planned information security initiatives over the short to medium term. Interestingly, none of the respondents indicated that having a competitive edge was a driver for investment in information security. 4.1 Occurrences 40% of respondents stated that their organisation had experienced at least one security breach, which they know of, in the past 12 months. Over a quarter (28%) are unsure of how many security breaches their organisation experienced in the past 12 months. Of the incidents which have been identified by these organisations, 34% have been identified by existing technologies (including reporting and alerts) in the organisation. Figure 17 - Which of the following is considered the main driver 15. Which for information of the following security is investment/sponsorship considered the main driver from for senior information security stakeholders? investment/sponsorship from senior stakeholders? Figure 18 - How often did your organisation experience an 16. How often did your organisation experience an information security information security breach in the past 12 months? breach in the past 12 months? 28% 42% Brand/reputation protection 23% Minimise damages and losses Meet regulatory requirements 0% Competitive edge over competitors Customer and partner confidence % 10% More than 20 Do not know 21% 30% 28% No method of identifying these attacks 2% 15

16 When asked what steps were taken by the organisation following an instance of cybercrime, it is interesting to learn that 26% of respondents said that no follow up actions were taken in light of these incidents. 41% of organisations decided to revise policies/procedures in the wake of instances of cybercrime, while 14% said that incidents lead to their organisation investing in new technologies. 4.2 The causes of an information security breach The most common method of breaching security in respondents organisations was hacking, with 19% citing this as the main cause of security breaches in their organisation. Other common methods of attack included Denial of Service (DoS), Distributed Denial of Service (DDoS) and malware. 4.3 The cost 31% of respondents said that the direct financial impact on the business as a result of their largest incident was more than 100, % reported losses above 250,000. The survey found that the average cost to organisations of the largest cybercrime incident stood at 135,000. This figure is significantly higher than the average figure from 2012, which stood at 41,875 per incident.. What Figure was 19 the - What main was method/mechanism the main method/mechanism used by attackers? used by attackers? Hacking DoS/DDoS Malware 16 14% 19% 12% Physical attack Social engineering 9% Privilege misuse 0% We have not suffered any breaches 34% Other Figure 20 - What was the direct financial impact on your business for the largest incident to occur? 18. What was the direct financial impact on your business for the largest incident to occur? We have not had any significant incidents 4 Over 250,000 14% 200, , , , , ,999 50,000-99,999 2% 20,000-49,999 10% ,999 Under 5000

17 In terms of remediation and clean-up costs associated with the largest incidents experienced by respondents organisations, the average cost to organisations stood at 29, % of respondents indicated that the remediation/clean-up costs for the largest incident their organisation experienced was 50,000 or more. Following demand from our 2012 survey, we included a mechanism for organisations to benchmark the overall cost of cybercrime. Worringly, the cost of cybercrime to organisations is at 2. of annual turnover. Particularly alarming was that 1 of respondents stated that cybercrime costs more than 10% of their annual turnover. 56% of respondents were impacted by 1% or less of turnover, which still represents a sizeable loss for many organisations, and should form a driver for security and risk related activities moving forward. Figure 21 - How much does cybercrime cost your organisation each 15. Xxxx year? Figure 20. Has 22 - your Has your organisation looked at cyber insurance as a as a mechanism mechanism to cover against attacks, business interruptions, to cover against cyber-attacks, business data theft, data data theft, data loss, etc.? loss, etc.? 1 2% 14% No 10% or more of turnover -9% of turnover 3%-4% of turnover 20% 56% 12% 6 Yes We currently have cyber insurance We do not feel that cyber insurance is necessary for our organisation 2%-3% of turnover 1% or less of turnover 17

18 4.4 A proactive approach It s more important than ever that organisations take a proactive approach to protecting themselves from cybercrime. In this year s survey, 4 of respondents believe that their organisation proactively identified just over 40% of the serious incidents which they encountered, compared to 58% from last year. This is a significant decrease, as breaches that go undetected for extended periods of time can cause exponentially greater levels of damage. The risk remains that a large amount of incidents are not being identified prior to impacting on the business. 33% of respondents believed that less than 10% of incidents encountered by their organisation were proactively identified. This mind-set of proactively identifying and handling security incidents and cybercrime is broadly reflected in the prioritisation of cybercrime risk in the organisation. 33% of respondents believe that the risk of cybercrime was prioritised in their organisation, while 39% said that no special steps had been taken to address the threat of cybercrime. of organisations said that they did not view cybercrime as a major risk to their organisation. This reflects the overall awareness of the risk of cybercrime today, and shows that organisations need to become more active in educating themselves about cybercrime threats, how they can prevent and respond to these threats and adopt a proactive approach. Figure 23 - In your estimation, what percentage of serious security Figure 24 - Does your organisation identify cybercrime as a major 22. Does your organisation identify cybercrime as a major risk to the 1. In your incidents estimation, are identified what proactively percentage within of serious your organisation? security incidents are risk to the organisation? entified proactively within your organisation? organisation? More than 50% 33%. 40%-49% 2-39% 12% 10%-24% Less than 10% 1 33% 21% 28% 11% 33% Preventing cybercrime is a priority Yes, but no special steps have been taken Cybercrime is one of many threats Somewhat No 18

19 Most of the organisations surveyed believe that they are in a decent position to deal with cybercrime incidents as they occur. 51% stated that they are in a good or excellent position to deal with cybercrime incidents, while a further 3 say they have a fair level of readiness to deal with incidents. 14% admit that they are in a poor position to handle security incidents. Just over one third (3) have specialist systems and mechanisms in place to detect incidents of cybercrime, 30% of respondents stated that they only partially have appropriate mechanisms in place. 33% of respondents feel that their organisation does not have adequate measures and systems to detect incidents of cybercrime. With cybercrime incidents increasing internationally, these results illustrate the potential challenges facing Irish organisations in the coming years when dealing with cybercrime. Figure 25 - What is your as to of Figure 26 - Are in to 23. What is your assessment as to the overall readiness of your 24. organisation to deal with cybercrime incidents? incidents of Are appropriate measures and systems in operation to detect your organisation to deal with cybercrime incidents? detect incidents of cybercrime? cybercrime. 14% 14% Poor 3 Yes - we have specialist systems 46% Fair Good 19% Partially - no specialist systems Current measures are not adequate 3 Excellent Definitely not 30% 19

20 5. Overall assessment Organisations appear to be relying on internal policies, procedures and resources as the primary mechanism to combat the threat of cybercrime, rather than outsourcing to specialists or acquiring new specialist resources. The top priorities for improving cybercrime readiness in 2013 are introducing new technical controls or systems (20%), up-skilling existing information security personnel (16%) and introducing new procedures and security standards (1). Linking with specialist resources and expert providers is on the agenda for only 6% of respondents. For 2013, the top security initiative for organisations was to introduce new procedures and security standards internally, with one quarter of respondents citing this as their top initiative, along with improving current technical controls at 16%. Taking into account last year s findings, there appears to be a preference within organisations to improve existing internal awareness and policies along with developing new internal initiatives. While the ability to deal with threats using internal resources is a very positive attribute, it should also be noted that organisations will need to rely on external specialists and as well as investing in new technical systems to combat cybercrime. In an environment where organisations are always playing catch up against cyber criminals and the threats they pose, these specialist systems and experts are important tools in the continuing fight against cybercrime. Figure 27 - What resources has your organisation relied on to Figure respond to What incidents resources occurring has in your 2012? organisation relied on to respond to incidents occurring in 2012? 3 18% 14% 20% 9% 2% Internal resources External specialists Legal advice/assistance Current third party providers Law enforcement personnel Other 20

21 Protecting your organisation Cybercrime costs. It costs time, money, resources and, most importantly, it costs reputation. Survey findings show that there are varying degrees of readiness and preparation within Irish organisations in terms of defending against cyber attacks. In order to reduce the risk of cyber attacks, a planned, proactive and sustained approach is of critical importance. Four key priorities are critical: Prepare Defence Communication Co-ordination Capability Aware External intelligence Internal intelligence Consolidation Respond Strategic Communication Risk assessment Technical Defend Employee Targeting Assets and risks Detection Prepare Preparing for a cyber attack is a business issue, successful attacks directly impact earnings and assets. Although the technical defences must be built by the IT guys, a breach of those defences can have far reaching business consequences. Identifying the business risks and deciding how and when cyber issues should be escalated are the starting points in developing an effective, coordinated business response. Ensure the right governance structure is in place to enhance and maintain preventative and detective security capabilities. Implement training and awareness controls and investigate potential alliances based on technology. Ensure consistency in practices of information sharing and incident handling across all departments by effective communication and co-ordination. Aware When threats were relatively slow in developing, organisations could build an effective defense based upon classic detect-and-respond security principles. The speed with which new attacks are now developed, and the complexity of the internet environment, mean that this approach is no longer adequate. Organisations now need to both use dynamic, real-time cyber threat intelligence and to monitor their own vulnerabilities regularly if they are to maintain an effective defence. Train and educate users on the use of suitable technical controls so that they are aware of known exploits and attacks. Leverage the wealth of threat intelligence that is available to ensure greater awareness of the internal and external threats to your organisation. Regularly engage and consult with cyber security leaders to ensure up-todate cyber threat intelligence. 21

22 Respond When a breach occurs the response must be fast, thorough and decisive. Immediate action is required on several fronts. The nature of the breach must be established and the losses and damage understood. Further attacks must be prevented by urgent action, while a longer-term solution is found. Media and external stakeholders must be dealt with. Legal action may be required. A bad breach response can cause great damage to reputation and shareholder value. It may also heighten the risk of further attacks. Outline a clear set of guidelines defining the strategy which should be taken upon combating a breach in security. Ensure you have the ability to rapidly respond to an incident in order to limit any adverse impact on your organisation. Analyse the anatomy of the cyber attack to determine the root cause and recommend remedial activities and other associated responses. Learn more At Deloitte, we are committed to supporting CIOs and Information Security Managers against the omnipresent threat of cybercrime attacks. We provide timely and valuable thought leadership to assist them in their role of preventing attacks. See below for some of our most recent publications: 2012 Deloitte NASCIO Cybersecurity Study 2013 TMT Global Security Study IT risks and security challenges Deloitte article series from Wall Street Journal 2012 Deloitte Ireland CIO Survey Defend In order to adequately defend your organisation against successful cyber attacks, continual investment and enhancement of current processes and security components are required. Security is a point in time assessment, which needs to be managed and continually developed in order to stay current and up to date with emerging threats and attacks. Continue to invest in enhancing and maintaining controls that protect your digital assets against cybercrime. Consistently improve the information sharing processes, and where possible automate the controls and practices to deal with the changing cyber security threat landscape. Constantly set targets and test systems to ensure ongoing defense. Learn from prior incidents or events, and ensure that lessons learned continue to drive new practices to further enhance the security capabilities of your organisation. Identifying the business risks and deciding how and when cyber issues should be escalated are the starting points in developing an effective, coordinated business response. 22

23 Information security is still a long way from integrating with the strategy and objectives of an organisation as evidenced by the increase in the average cost of a large cybercrime incident at 135,000 per incident. Colm McDonnell, Partner, Enterprise Risk Services, Deloitte

24 Contacts For more information on the Deloitte Irish Information Security and Cybercrime Survey, in association with EMC, please contact: Colm McDonnell Partner, Enterprise Risk Services, Deloitte T: E: cmcdonnell@deloitte.ie Jason Ward Director for Ireland, Scotland and UK North, EMC T: E: SalesIreland@emc.com For more details please contact: Dublin Deloitte & Touche Deloitte & Touche House Earlsfort Terrace Dublin 2 T: F: Jared Carstensen Manager Enterprise Risk Services, Deloitte T: E: jcarstensen@deloitte.ie Cork Deloitte & Touche No.6 Lapp s Quay Cork T: F: Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte has in the region of 200,000 professionals, all committed to becoming the standard of excellence. This publication contains general information only, and none of Deloitte Touche Tohmatsu Limited, Deloitte Global Services Limited, Deloitte Global Services Holdings Limited, the Deloitte Touche Tohmatsu Verein, any of their member firms, or any of the foregoing s affiliates (collectively the Deloitte Network ) are, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your finances or your business. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained by any person who relies on this publication Deloitte & Touche. All rights reserved About EMC EMC Corporation, the IT multinational that employs over 3,000 people in Ireland, is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyse their most valuable asset - information - in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at Limerick Deloitte & Touche Deloitte & Touche House Charlotte Quay Limerick T: F: in association with Best Workplaces 2012 Ireland

March 2015. Internal audit insights High impact areas of focus

March 2015. Internal audit insights High impact areas of focus March 2015 Internal audit insights High impact areas of focus Introduction Internal audit is widely, if not universally, viewed as a key pillar in effective governance with expectations of internal audit

More information

Corporate Secretarial Services Your guide to corporate compliance

Corporate Secretarial Services Your guide to corporate compliance Corporate Secretarial Services Your guide to corporate compliance 2 Corporate Secretarial Services assists clients to manage and mitigate risks of corporate non-compliance. Innovative techniques coupled

More information

Corporate Security in 2016.

Corporate Security in 2016. Corporate Security in 2016. A QA Report Study Highlights According to ThreatMetrix, businesses in the UK are at greater risk of cybercrime than any other country in the world. In a recent survey carried

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

UCITS V Depositaries:

UCITS V Depositaries: UCITS V Depositaries: ESMA s technical advice to the Commission on: - Insolvency protection when delegating safekeeping functions - Depositary independence UCITS V aims to improve investor protection by

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a

Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a focus on cyber security Introduction and Executive summary From September

More information

Auditing Outsourcing Arrangements

Auditing Outsourcing Arrangements Auditing Outsourcing Arrangements Eileen Healy Enterprise Risk Services Director 16 April 2015 Contact Details: - Email: - ehealy@deloitte.ie Mobile: - 086 164 3082 Session Objectives To provide an understanding

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

How To Understand The Business Case For An Analytics Firm

How To Understand The Business Case For An Analytics Firm Deloitte Analytics Uncommon insights Contents The dangers of data mismanagement...2 Making the business case...3 How we can help: Deep industry business knowledge...4 ii Deloitte Analytics Uncommon insights

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

State of Security Survey GLOBAL FINDINGS

State of Security Survey GLOBAL FINDINGS 2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Global IT Security Risks: 2012

Global IT Security Risks: 2012 Global IT Security Risks: 2012 Kaspersky Lab is a leading developer of secure content and threat management solutions and was recently named a Leader in the Gartner Magic Quadrant for Endpoint Protection

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Global Information Security Survey 2002

Global Information Security Survey 2002 M ARCH 2002 Global Information Security Survey 2002!@# Issues at a glance Only 40% of organisations are confident they would detect a systems attack 40% of organisations do not investigate information

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What

More information

Healthcare Security: Improving Network Defenses While Serving Patients

Healthcare Security: Improving Network Defenses While Serving Patients White Paper Healthcare Security: Improving Network Defenses While Serving Patients What You Will Learn Safeguarding the privacy of patient information is critical for healthcare providers. However, Cisco

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT) INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

Leading business advisers. Consolidation of Transfer Agency Platforms The opportunity to reduce inefficiency while improving service to clients

Leading business advisers. Consolidation of Transfer Agency Platforms The opportunity to reduce inefficiency while improving service to clients Leading business advisers Consolidation of Transfer Agency Platforms The opportunity to reduce inefficiency while improving service to clients Introduction The requirement for consolidation of Transfer

More information

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Cyber Security Issues - Brief Business Report

Cyber Security Issues - Brief Business Report Cyber Security: Are You Prepared? This briefing provides a high-level overview of the cyber security issues that businesses should be aware of. You should talk to a lawyer and an IT specialist for a complete

More information

DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES

DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5500 companies in 26 countries around the world

More information

Security and Privacy Trends 2014

Security and Privacy Trends 2014 2014 Agenda Today s cyber threats 3 You could be under cyber attack now! Improve 6 Awareness of cyber threats propels improvements Expand 11 Leading practices to combat cyber threats Innovate 20 To survive,

More information

Managing cyber risks with insurance

Managing cyber risks with insurance www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive

More information

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial

More information

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not

More information

ISO27032 Guidelines for Cyber Security

ISO27032 Guidelines for Cyber Security ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for

More information

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations

More information

Technology and Cyber Resilience Benchmarking Report 2012. December 2013

Technology and Cyber Resilience Benchmarking Report 2012. December 2013 Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities

More information

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015 Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are

More information

Secure by design: taking a strategic approach to cybersecurity

Secure by design: taking a strategic approach to cybersecurity Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk

More information

Cybercrime Security Risks and Challenges Facing Business

Cybercrime Security Risks and Challenges Facing Business Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Malware isn t The only Threat on Your Endpoints

Malware isn t The only Threat on Your Endpoints Malware isn t The only Threat on Your Endpoints Key Themes The cyber-threat landscape has Overview Cybersecurity has gained a much higher profile over the changed, and so have the past few years, thanks

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

The Recover Report. It s business. But it s personal.

The Recover Report. It s business. But it s personal. The Recover Report It s business. But it s personal. Executive summary The Recover Report The perpetrators This report examines a sample of 150 data theft cases handled by Mishcon de Reya. Our research

More information

Key Cyber Risks at the ERP Level

Key Cyber Risks at the ERP Level Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche

More information

A strategic approach to fraud

A strategic approach to fraud A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

Cyber Governance Preparing for the Inevitable Perimeter Breach

Cyber Governance Preparing for the Inevitable Perimeter Breach SAP Brief SAP Extensions SAP Regulation Management by Greenlight, Cyber Governance Edition Objectives Cyber Governance Preparing for the Inevitable Perimeter Breach Augment your preventive cybersecurity

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Aftermath of a Data Breach Study

Aftermath of a Data Breach Study Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath

More information

Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP

Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Managing the Ongoing Challenge of Insider Threats

Managing the Ongoing Challenge of Insider Threats CYBERSECURITY IN THE FEDERAL GOVERNMENT Managing the Ongoing Challenge of Insider Threats A WHITE PAPER PRESENTED BY: May 2015 PREPARED BY MARKET CONNECTIONS, INC. 11350 RANDOM HILLS ROAD, SUITE 800 FAIRFAX,

More information

Are organizations completely ready to stop cyberattacks?

Are organizations completely ready to stop cyberattacks? Are organizations completely ready to stop cyberattacks? A research survey details the security perspective of IT decision makers in the US, UK, and Australia on resourcing, preparedness, and management

More information

Increase insight. Reduce risk. Feel confident.

Increase insight. Reduce risk. Feel confident. Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING

More information

Cyberprivacy and Cybersecurity for Health Data

Cyberprivacy and Cybersecurity for Health Data Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies

More information

Planning ahead Hot topics facing Financial Services organisations in IT Internal Audit

Planning ahead Hot topics facing Financial Services organisations in IT Internal Audit Planning ahead Hot topics facing Financial Services organisations in IT Internal Audit 2013 During Q4 2012, we surveyed Heads of IT Internal Audit at 22 global Financial Services organisations to identify

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

Cyber Security: Protecting your business survey stats

Cyber Security: Protecting your business survey stats Cyber Security: Protecting your business survey stats Researched and authorised by Pitmans LLP in partnership with techuk. Report prepared in January 2014 by Philip James, Partner and Rob Jarrett, Solicitor.

More information

How To Find Out What People Think About Hipaa Compliance

How To Find Out What People Think About Hipaa Compliance Healthcare providers attitudes towards HIPAA compliance in 2015 Created July, 27 2015 Healthcare providers attitudes towards HIPAA compliance in 2015 Over the course of this last year the healthcare industry

More information

Leading business advisers. Structural reform in the higher education sector Achieving Technological University status

Leading business advisers. Structural reform in the higher education sector Achieving Technological University status Leading business advisers Structural reform in the higher education sector Achieving Technological University status Introduction The Deloitte report Amalgamation in the higher education sector, moving

More information

Work Health and Safety Training Programs Building safety risk intelligence and outcomes

Work Health and Safety Training Programs Building safety risk intelligence and outcomes Work Health and Safety Training Programs Building safety risk intelligence and outcomes Tell me and I forget, teach me and I may remember, involve me and I learn. Benjamin Franklin Safety is not an intellectual

More information

How To Decide If You Should Move To The Cloud

How To Decide If You Should Move To The Cloud Can security conscious businesses really adopt the Cloud safely? January 2014 1 Phone: 01304 814800 Fax: 01304 814899 info@ Contents Executive overview The varied Cloud security landscape How risk assessment

More information

Gold Sponsor of the study: Incident Response Management

Gold Sponsor of the study: Incident Response Management Gold Sponsor of the study: Incident Response Management How European Enterprises are Planning to Prepare for a Cyber Security Breach Y R A M SUM IVE T U C E PAC 2015 X E Telefonica company profile About

More information

A HELPING HAND TO PROTECT YOUR REPUTATION

A HELPING HAND TO PROTECT YOUR REPUTATION OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

Cyber Security : preventing and mitigating incidents. Alexander Brown Robert Allen

Cyber Security : preventing and mitigating incidents. Alexander Brown Robert Allen Cyber Security : preventing and mitigating incidents Alexander Brown Robert Allen 07 & 08 October 2015 Cyber Security context of the threat The magnitude and tempo of [cyber security attacks], basic or

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

Advanced Cyber Threats in State and Local Government

Advanced Cyber Threats in State and Local Government RESEARCH SURVEY Advanced Cyber Threats in State and Local Government January 2014 SHUTTERSTOCK UNDERWRITTEN BY: Section 1: Executive Overview In the past, scattershot, broad-based attacks were often more

More information

How To Account For Insurance In Frs 103

How To Account For Insurance In Frs 103 March 2014 Financial Reporting Brief Special Edition FRS 103 Insurance Contracts In a nutshell The Financial Reporting Council (FRC) has issued FRS 103 Insurance Contracts. The standard consolidates existing

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Enterprise Software Security Strategies

Enterprise Software Security Strategies Enterprise Software Security Strategies Summary Results October 2014 Program Overview Between June and September, 2014, Gatepoint Research invited IT and Security executives to participate in a survey

More information

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: March 2013 Ponemon Institute Research Report

More information

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Smart Security. Smart Compliance.

Smart Security. Smart Compliance. Smart Security. Smart Compliance. SRM are dedicated to helping our clients stay safe in the information environment. With a wide range of knowledge and practical experience, our consultants are ready to

More information

Global Corporate IT Security Risks: 2013

Global Corporate IT Security Risks: 2013 Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs

More information

Managing Cyber Risk: Are Companies Safeguarding Their Assets?

Managing Cyber Risk: Are Companies Safeguarding Their Assets? Managing Cyber Risk: Are Companies Safeguarding Their Assets? In the last few years, companies both in the United States and abroad have witnessed the steady growth of cyberattacks and corporate espionage.

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

Are you being served? How can Security as a Service serve you? WHITE PAPER. Commissioned by SecureData Conducted by Vanson Bourne Published July 2013

Are you being served? How can Security as a Service serve you? WHITE PAPER. Commissioned by SecureData Conducted by Vanson Bourne Published July 2013 Are you being served? How can Security as a Service serve you? Commissioned by Conducted by Vanson Bourne Published July 2013 Part 1. Executive summary Businesses are starting to implement cloud technologies

More information

Secure Thinking Bigger Data. Bigger risk?

Secure Thinking Bigger Data. Bigger risk? Secure Thinking Bigger Data. Bigger risk? MALWARE HACKERS REPUTATION PROTECTION RISK THEFT There has always been data. What is different now is the scale and speed of data growth. Every day we create 2.5

More information

The Impact of Cybercrime on Business

The Impact of Cybercrime on Business The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Security Metrics to Manage Change: Which Matter, Which Can Be Measured?

Security Metrics to Manage Change: Which Matter, Which Can Be Measured? Security Metrics to Manage Change: Which Matter, Which Can Be Measured? Sponsored by FireMon Independently conducted by Ponemon Institute LLC Publication Date: April 2014 2 Security Metrics to Manage Change:

More information

CYBER STREETWISE. Open for Business

CYBER STREETWISE. Open for Business CYBER STREETWISE Open for Business As digital technologies transform the way we live and work, they also change the way that business is being done. There are massive opportunities for businesses that

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Future Threat Landscape - How will technology evolve and what does it mean for cyber security? James Hanlon CISSP, CISM Security Strategist Office of the CTO EMEA Future Threat Landscape - How will technology evolve and what does it mean for cyber security? Think > What does the future of technology

More information