The Changing IT Risk Landscape Understanding and managing existing and emerging risks
|
|
|
- Melina Carroll
- 9 years ago
- Views:
Transcription
1 The Changing IT Risk Landscape Understanding and managing existing and emerging risks Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
2 Agenda Current IT risk landscape Evolving IT internal audit universe Today s IT risks Tomorrow s IT risks Tools for today s internal auditor Discussion and closing thoughts Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 2
3 Current IT Risk Landscape Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 3
4 Current IT Risk Landscape Deficiencies in IT controls can have a significant impact on the organization Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 4
5 Evolving IT Internal Audit Universe Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 5
6 Evolving IT Internal Audit Universe The IT internal audit areas listed below help you adapt your IT audit plan to be more relevant, forward thinking, and emerging risk focused. Characteristics of services Core Advanced Emerging Derived client value Complexity of technology Subject matter expert requirement Value Social Media Resource cost Advanced India offshore staffing opportunity Compliance risk oriented Strategic risk oriented Current portion of IT IA plan = High = Medium = Low Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 6
7 Evolving IT Internal Audit Universe Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 7
8 Risk landscape Today s IT risks Cybersecurity Third-party risk management Cloud computing Mobile device governance Social media Tomorrow s IT risks Drone technologies Open source solutions Cognitive computing Sensor proliferation Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 8
9 Today s IT risks Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 9
10 Today s IT risks Cybersecurity Issue Cyber continues to increase in importance, and new cyber standards have emerged. There has been a significant increase in cyber activities and breaches; heightened attention from boards, audit committees, customers, partners, employees, auditors and regulators. Historic internal audit cyber reviews may provide insufficient coverage. Risk Direct loss of money Impact to organizational brand Loss of critical or confidential data Fines, sanctions Recommendation Move from thinking about project audits to program audits. Perform a thorough cyber risk assessment, covering all aspects of cyber (secure, vigilant, resilient). Components of an effective cyber program should be highly integrated, programmatic, and extend beyond the walls. Define multi-year audit plan covering all cyber domains. Execute audits along defined schedule. Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 10
11 Today s IT risks Cybersecurity Framework Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 11
12 Today s IT risks Third-party risk management Issue Increased focus on use of third parties or Outsourced Service Providers (OSP) for technology and/or support solutions. Ease of procurement for third-party solutions, particularly point specific cloud solutions. COSO 2013 requirement for management of OSPs. Risk Lack of understanding of what data and solutions are currently provided by OSPs SOC 1 reports do not provide enough coverage Loss of critical business data Lack of effective controls Recommendation Understand organization s current population of OSPs where key internal controls have been outsourced. Obtain SOC 1 reports if possible. Evaluate the user controls considerations and perform tests of controls. Evaluate the effectiveness of organization s monitoring procedures over control activities performed by OSPs. Evaluate how expectations for integrity and ethical values have been communicated to OSPs. Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 12
13 Today s IT risks Cloud computing Issue The use of cloud services may impact and change IT and Business risks. Organizations benefit from a risk-based, governance program to manage the range of areas impacted by the cloud, including on-premise activities to hybrid and multi-cloud scenarios that aligns with the business strategy. Risk Lack of a specific cloud computing strategy and standard Changes required for roles, responsibilities, documentation, and process enhancements Requests for numerous audits and assessments targeting vendors and cloud providers Determining where control ownership truly resides in the cloud Recommendation Develop a profile of the cloud computing environment in use by the organization. Based on the cloud use profile, evaluate through review and interviews with process owners, each of the cloud risk domains to identify specific risks the cloud environment may have to the organization. Perform a gap analysis and evaluate the maturity of each of the listed domains. 13 Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities.
14 Today s IT risks Cloud Approach Governance, risk management, and compliance Review and assessment of management s policies and procedures in place to evaluate and monitor cloud adoption and usage Review and assessment of whether management has built a comprehensive risk management cloud strategy that: Formulates a risk management road map for cloud Probes impact of risk events Prioritizes risk mitigation activities Review and assessment of management s current approach to manage changes and monitor compliance with regulatory requirements Vendor management Review and assessment of management s vendor selection process and controls. Review and assessment of management s vendor contracting process and controls (i.e. involvement of legal, HR and procurement where necessary). Review and assessment of management s resource provisioning and monitoring of cloud vendors Review and assessment of management s process and controls to avoid vendor lock-in. Business operations Review and assessment of management s process and controls to ensure that the right resources and departments are involved in the cloud process when and if needed Review and assessment of management s process and controls in place to ensure that the right resources are trained and available to manage the cloud based technologies. Only appropriate users having access to administrative cloud access. Review and assessment of management s process and controls in place to ensure that proper legal (e.g. retention of documents) and financial (e.g. documentation of financial controls) cloud considerations are in place. Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 14
15 Today s IT risks Mobile device governance Issue Organizations must consider the security of mobile devices, applications, and related infrastructure systems, such as mobile data management (MDM). Integration of mobile systems with existing enterprise solutions, such as Active Directory, Security Incident, and Event Management, and Data Loss Protection, is a challenge in today s IT environment. Risk No concrete regulatory requirements developed for mobile applications Sustaining security management in the face of evolving technology and threats Increasing risk and liability associated with breaches No control on the mobile device in the case of bring your own device (BYOD) scenario Heightened awareness and concerns about privacy Recommendation Review and assess mobile security strategy; that address multiple regulatory/legal requirements. Review and assess mobile security policies, procedures, and guidelines, and review and assess training/awareness to users; and periodic monitoring and reporting. Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 15
16 Mobile device governance - Approach Use understanding to define areas in scope Mobile program governance Review and assessment of current Mobile strategy: Determine whether a strategy document exists to outline the company's roadmap for using mobile devices. Review and assessment of defined roles and responsibilities for mobile operations and security, -Review and assessment of Mobile use/acceptable use policy: Determine whether an acceptable use policy exists to define the permitted and prohibited usage of devices. Review and assessment of training and awareness programs: Determine whether training modules and documentation are defined in order to train end users on mobile device/application acceptable usage and security in accordance with Enterprise security policies and standards. Determine whether training is updated and conducted on a regular basis to keep users aware of any changes to the defined policies around mobile devices to ensure compliance Mobile device security & configuration Review and assessment of device provisioning, tracking/inventory and decommissioning controls: Assess whether a process for device commissioning and decommissioning is defined and documented. Review and assessment of secure configuration requirements and standards Review and assessment of controls in place to manage software/firmware updates that affect security i.e. a patch management process exists for devices to patch or upgrade the device OS and applications Data protection and incident response Review and assessment of permissible data storage policies as defined by acceptable use policy Review and assessment of encryption policies and controls Review and assessment of secure data transmission policies and controls Review and assessment of the incident response strategy in place Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 16
17 Today s IT risks Social media Issue Significant deployment of social media solutions and technologies as critical business drivers, i.e., social business. Rapidly evolving technologies with commensurate rapidly evolving regulatory requirements and risk. Ease of deployment may hamper visibility of solutions in place to management. Businesses need to consider personal use as well. Risk Loss of brand reputation Exposure to regulatory sanctions and/or fines Legal liabilities such as copyright or trademark infringement Financial disclosures risk Recommendation Move from thinking about project audits to program audits. Program audits should encompass all aspects of social media within the organization, including integration points, crisis management plans, and relevant regulatory requirements. Consider legal aspects, including development of policies and procedures and human resource activities. Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 17
18 Tomorrow s IT risks Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 18
19 THIS IS 1999 Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 19
20 Tomorrow s IT risks Drone Technologies Issue Rapid evolution of guided and nonguided vehicles for business application. Can serve a variety of purposes, more than just supply chain applications. Potential for significant disruption. Lack of standards or regulatory oversight. Risk Regulatory violations Potential for physical events (crashes, loss of life) Potential cyber exposure Potential need for guidance (radio waves, perimeter devices) Lack of qualified support resources Issue Open Source Technologies Open source technologies are now finding large scale use in organizations, particularly for infrastructure elements. Use of open source solutions may often be unknown to executive management. Risk Security risks Ease of modification Support Reliance on personnel, internal and external Vulnerability to intellectual property claims and other legal issues Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 20
21 Tomorrow s IT risks Cognitive Computing Issue Cognitive computing platforms and technology are becoming more prevalent, and will be the driving factor behind real-time critical decision making for a variety of business purposes, including risk management, buy/sell decisions, retail and health care. May also be the governance, risk and control model of the future third line of defense. Risk Requires good data management and real-time data feeds Poor management of solutions could drive poor decision making, which may be automated Loss of brand reputation Sensor Proliferation Issue Rapid expansion of distributed sensor nodes, which in turn help drive and/or control business events. May or may not be connected to the Internet of Things (IoT). Risk Effective management of very large numbers of sensors Effective data usage processes and policies Variety of risks related to inoperable sensors Potential increased cyber exposure Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 21
22 Tools for today s internal auditor Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 22
23 Tools for Today s Internal Auditor Data analytics Define analytics strategy for supporting internal audit activities (beyond structured queries). Determine the extent of analytic technologies (either deployed or in-process) throughout the organization. Risk assess the data, processes and decision making driven off of these. Plan audit procedures accordingly. Consider completeness and accuracy of data stores. Location analytics Risk Modeling/Audit Planning Employee expenses Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. Predictive Project Analytics 23
24 Discussion and closing thoughts Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 24
25 Discussion and closing thoughts 1. Determine which items may be relevant in your business and technical environment 2. Ensure that risk assessment and audit universe address relevant items 3. Collaboration and communication with IT, audit committee and business and corporate areas are key 4. Plan resource requirements: Be careful not to underestimate Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 25
26 For more information Your presenters Kareem Sadek Sr. Manager, Enterprise Risk Services Chris Close Sr. Manager, Enterprise Risk Services Deloitte Transforming IT Internal Audit Deloitte LLP and affiliated entities. 26
27 Deloitte, one of Canada's leading professional services firms, provides audit, tax, consulting, and financial advisory services. Deloitte LLP, an Ontario limited liability partnership, is the Canadian member firm of Deloitte Touche Tohmatsu Limited. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. The information contained herein is not intended to substitute for competent professional advice. Deloitte LLP and affiliated entities. 27
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Practical and ethical considerations on the use of cloud computing in accounting
Practical and ethical considerations on the use of cloud computing in accounting ABSTRACT Katherine Kinkela Iona College Cloud Computing promises cost cutting efficiencies to businesses and specifically
Key Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
PwC Cybersecurity Briefing
www.pwc.com/cybersecurity Cybersecurity Briefing June 25, 2014 The views expressed in these slides are solely the views of the presenters and do not necessarily reflect the views of the PCAOB, the members
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]
Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
Where insights lead Cybersecurity and the role of internal audit: An urgent call to action
Where insights lead Cybersecurity and the role of internal audit: An urgent call to action The threat from cyberattacks is significant and continuously evolving. One estimate suggests that cybercrime could
Customer-Facing Information Security Policy
Customer-Facing Information Security Policy Global Security Office (GSO) Version 2.6 Last Updated: 03/23/2015 Symantec Corporation Table of Contents Compliance Framework... 1 High-Level Information Security
Internal audit value optimization for insurance organizations
Internal audit value optimization for insurance organizations Webinar May 13, 2015 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Conducting due diligence and managing cybersecurity in medical technology investments
Conducting due diligence and managing cybersecurity in medical technology investments 2015 McDermott Will & Emery LLP. McDermott operates its practice through separate legal entities in each of the countries
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
Cyber Security From The Front Lines
Cyber Security From The Front Lines Glenn A Siriano October 2015 Agenda Setting the Context Business Considerations The Path Forward Q&A Cyber Security Context Cyber Has Become a Boardroom Conversation
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
KPMG Internal Audit: Top 10 considerations in 2015 for technology companies. kpmg.com
KPMG Internal Audit: Top 10 considerations in 2015 for technology companies kpmg.com INTERNAL AUDIT TOP 10 CONSIDERATIONS IN 2015 1 Our annual compilation of Internal Audit considerations for technology
CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014
CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION Architecture Framework Advisory Committee November 4, 2014 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks and Introductions Shirley Ivan,
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013
IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 Debbie Lew Agenda Review what is IT governance Review what is IT risk management A discussion of key IT risks to be aware of Page 2
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
How To Transform It Risk Management
The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation
NCOE whitepaper Master Data Deployment and Management in a Global ERP Implementation Market Offering: Package(s): Oracle Authors: Rick Olson, Luke Tay Date: January 13, 2012 Contents Executive summary
Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape
January 2013 Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape At a glance Threats to data security both
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Moving Forward with IT Governance and COBIT
Moving Forward with IT Governance and COBIT Los Angeles ISACA COBIT User Group Tuesday 27, March 2007 IT GRC Questions from the CIO Today s discussion focuses on the typical challenges facing the CIO around
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP
IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/Continuous Monitoring INTRODUCTION New demands from the board, senior organizational
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management
White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK By James Christiansen, VP, Information Management Executive Summary The Common Story of a Third-Party Data Breach It begins with a story in the newspaper.
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
The digital grapevine Social media and the role of Internal Audit
The digital grapevine Social media and the role of Internal Audit Preface Organizations today are embracing new digital technologies to leapfrog or keep pace with growing competition in the marketplace.
Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32
Audit Capabilities: Beyond the Checklist Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32 Agenda Beyond the Checklist Visa Overview Visa Internal Audit Overview
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of
Privacy by Design Setting a new standard for privacy certification
Privacy by Design Setting a new standard for privacy certification Privacy by Design is a framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure,
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
Cybersecurity. Considerations for the audit committee
Cybersecurity Considerations for the audit committee Insights on November 2012 governance, risk and compliance Fighting to close the gap Ernst & Young s 2012 Global Information Security Survey 2012 Global
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview
Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What
Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective
Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Reaching the Cloud era in the EU Riga 16 June 2015 Jonathan Sage Government and Regulatory Affairs Cyber Security
Internal Audit Landscape 2014
Internal Audit Landscape 2014 Agenda Examining the evolution of risk in today s digital world and the impact on traditional audit, security, risk, and compliance functions Emerging internal audit methodologies
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
Identifying and Managing Third Party Data Security Risk
Identifying and Managing Third Party Data Security Risk Legal Counsel to the Financial Services Industry Digital Commerce & Payments Series Webinar April 29, 2015 1 Introduction & Overview Today s discussion:
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
Cyber security: Are consumer companies up to the challenge?
Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies
Credit Union Liability with Third-Party Processors
World Council of Credit Unions Annual Conference Credit Union Liability with Third-Party Processors Andrew (Andy) Poprawa CEO, Deposit Insurance Corporation of Ontario Canada 1 Credit Union Liability with
Managing the message. Businesses brace for new digital marketing compliance requirements
Managing the message Businesses brace for new digital marketing compliance requirements This page has been intentionally left blank. On December 4, Industry Canada released final regulations under Canada
Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations
Achieving Control: The Four Critical Success Factors of Change Management Technology Concepts & Business Considerations T e c h n i c a l W H I T E P A P E R Table of Contents Executive Summary...........................................................
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 Continuously Assess, Monitor, & Secure Your Information Supply Chain and Data Center Data Sheet: Security Management Is your organization able
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Software as a Service: Guiding Principles
Software as a Service: Guiding Principles As the Office of Information Technology (OIT) works in partnership with colleges and business units across the University, its common goals are to: substantially
Mobile Device Security and Audit
Mobile Device Security and Audit ISACA Chapter Meeting February 2012 Alex Stamps Manager Security & Privacy Services Deloitte & Touche LLP [email protected] Session Objectives Define mobile devices
Security. Security consulting and Integration: Definition and Deliverables. Introduction
Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
REPORT. Next steps in cyber security
REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15
Third-Party Cybersecurity and Data Loss Prevention
Third-Party Cybersecurity and Data Loss Prevention SESSION ID: DSP-W04A Brad Keller Sr. Vice President Santa Fe Group Jonathan Dambrot, CISSP CEO, Co-Founder Prevalent Networks 3rd Party Risk Management
Managing Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP
Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII
HP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
Third-Party Risk Management for Life Sciences Companies
April 2016 Third-Party Risk Management for Life Sciences Companies Five Leading Practices for Data Protection By Mindy Herman, PMP, and Michael Lucas, CISSP Audit Tax Advisory Risk Performance Crowe Horwath
Hedge fund launch considerations Reaching new boundaries. Investment Management
Hedge fund launch considerations Reaching new boundaries Investment Management There are people who make things happen, there are people who watch things happen, and there are people who wonder what happened.
CGI Cyber Risk Advisory and Management Services for Insurers
CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their
Impact of New Internal Control Frameworks
Impact of New Internal Control Frameworks Webcast: Tuesday, February 25, 2014 CPE Credit: 1 0 With You Today Bob Jacobson Principal, Risk Advisory Services Consulting Leader West Region [email protected]
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Understanding changes to the Trust Services Principles for SOC 2 reporting
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding changes to the Trust Services Principles for SOC 2 reporting
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
The enemies ashore Vulnerabilities & hackers: A relationship that works
The enemies ashore Vulnerabilities & hackers: A relationship that works Alexandros Charvalias, Manager CISSP, CISA, ACDA Assurance & Enterprise Risk Services Cyber security maturity model How effectively
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
ASAE s Job Task Analysis Strategic Level Competencies
ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management
CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT
CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT ABSTRACT Identity and access governance should be deployed across all types of users associated with an organization -- not just regular users
1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform
RSA Archer Risk Intelligence
RSA Archer Risk Intelligence Harnessing Risk to Exploit Opportunity June 4, 2014 Steve Schlarman GRC Strategist 1 Risk and Compliance Where is it today? 2 Governance, Risk, & Compliance Today 3 4 A New
Hosting and cloud services both provide incremental and complementary benefits to the organization
33 Yonge St., Suite 420, Toronto, Ontario Canada, M5E 1G4 W H I T E P A P E R I D C a n d T E L U S E n t e r p r i s e C l o u d S t u d y, 2 0 1 3 : C a p i t a l i z i n g on C l o u d ' s W i n d o
