The CFO s role in cybersecurity. CFOs play a critical role in establishing an effective cybersecurity program
|
|
|
- Marylou Freeman
- 10 years ago
- Views:
Transcription
1 The CFO s role in cybersecurity CFOs play a critical role in establishing an effective cybersecurity program
2 Contents 3 Executive summary 4 Introduction 5 Top cybersecurity concerns: What is on the minds of CFOs and CIOs? 7 Organizational structure around cybersecurity 12 Strategy and practical considerations 18 Conclusion 19 Interviewees 20 Author and contributors 21 About Financial Executives Research Foundation 21 About Grant Thornton LLP Author William M. Sinnett Senior Director, Research Financial Executives Research Foundation Contributors Kevin Morgan Principal, Business Advisory Services Co-Leader, Cybersecurity Grant Thornton LLP Skip Westfall Managing Director, Forensic, Investigative and Dispute Services Co-Leader, Cybersecurity Grant Thornton LLP Johnny Lee Managing Director, Forensic, Investigative and Dispute Services Grant Thornton LLP
3 Executive summary Organizations must comply with myriad industry standards while managing the security of both their proprietary and customer data, as well as brace for the possibility of unknown breaches and leaks. A data breach can be exceedingly costly and can jeopardize a business of any size. To help senior-level financial executives improve their cybersecurity and protect their organizations, Grant Thornton LLP and Financial Executives Research Foundation (FERF) identify critical elements of the CFO s role in protecting his/her organization from cyberattacks, as well as practical recommendations for establishing an effective cybersecurity program. These findings are based on a survey of 98 members of Financial Executives International (FEI) and Grant Thornton clients, conducted between July and December The survey was followed by in-depth interviews of FEI members to get perspectives on a number of organizations experiences managing cyberthreats. Key findings include: 1. Respondents top cybersecurity concerns include protection of data including customer data and intellectual property (IP) from data breaches and compliance with data security laws. 2. Either the CFO or the chief information officer (CIO) is usually responsible for the company s cybersecurity program. However, interviews revealed that collaboration between different groups is more reasonable. 3. Although the CFO is often responsible for cybersecurity, the organization s IT department typically manages the dayto-day aspects of cybersecurity. General counsel are usually involved as well, advising senior management and board members on legal responsibilities. 4. The CFO is often expected to assess cybersecurity risks, align cybersecurity strategy with business strategy and get buy-in from the board on necessary cybersecurity investments. 5. The most common impediment to developing an enterprisewide cybersecurity strategy is a lack of understanding of cyberrisks and potential impacts of a breach.
4 Introduction Significant data breaches security incidents in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an unauthorized individual at flagship companies are becoming nearly an everyday occurrence. At the same time, the costs related to these breaches continue to skyrocket. The Ponemon Institute s 2014 Cost of Data Breach Study: United States puts the average cost for each lost or stolen record at $201, and the total average 2014 cost paid by organizations at $5.9 million for each data breach, up from $5.4 million in The surging costs are attributable to the loss of customers following the data breach due to the additional expense required to preserve the organization s brand and reputation. 1 In short, data breaches are costly, damaging to prized brands and reputations, and happening at a staggering pace. The question is: What can companies especially their CFOs do about it? All data, including IP, is vulnerable to a data breach. And cybercriminals have become ever more sophisticated and continue to hone their methods at getting the data they want, whether it is trade secrets, medical records, financial data, Social Security numbers or more. Today s organizations must comply with numerous industry standards while managing the security of their data, as well as brace for the possibility of unknown breaches and leaks. While cybersecurity traditionally has been handled by the CIO and the IT function, the escalating risks have driven cybersecurity up the corporate ladder to the desk of the CFO. Financial Executives Research Foundation (FERF), in collaboration with Grant Thornton LLP, surveyed CFOs to identify their critical role in cybersecurity, and offer insights and recommendations for establishing an effective cybersecurity program. Data breaches are costly, damaging to prized brands and reputations, and happening at a staggering pace Cost of Data Breach Study: United States, May See for more information. 4 The CFO s role in cybersecurity
5 Top cybersecurity concerns: What is on the minds of CFOs and CIOs? A majority of survey respondents indicate that their organizations top cybersecurity and data privacy concerns are the protection of customer and client data (64%), followed closely by the potential for undetected breaches (63%). (See Figure 1.) Skip Westfall, managing director of Forensic and Valuation Services with Grant Thornton LLP and co-leader of its Cybersecurity practice explains: Protecting customer data and safeguarding against data breaches are important and necessary concerns for CFOs. However, many CFOs are insufficiently concerned and possibly even unaware of items they should be protecting, such as data that leaves the four walls of their organization when it is shared with a third party or vendor. Figure 1: What are your organization s top cybersecurity and data privacy concerns? Customer/client data privacy 64% Potential for undetected breaches 63% Compliance with data security laws 52% Unknown risks 49% Impact of a breach on bottom line 48% Other 7% Participants were able to select all responses that applied. Concerns vary by business type While protecting client and customer data are top of mind for most CFOs and CIOs, cybersecurity concerns vary considerably depending on the particular business. For instance, a technology CFO tends to focus on cyberthreats to IP; a marketing firm that handles third-party data worries about a breach of clients records; and a food company CFO sweats issues such as mobile device security and phishing schemes. Phil Roush, vice president of finance and head of internal audit at SanDisk Corp., a multinational corporation that designs, develops and manufactures flash memory storage solutions and software, says that his three primary cybersecurity concerns are protecting IP, employee data and customer data. Our business model is based on flash memory technology, so the programs, software, design and schematics all of that IP is critical to our company and drives our brand value, says Roush, adding that SanDisk s customer and employee data is also critical. Paul Karras, senior vice president and CIO at Wilton Brands LLC, the leading supplier in the U.S. crafts industry, shares a litany of concerns, including phishing, social engineering malware and mobile devices: Phishing and attacks are extremely worrisome. An additional concern is social engineering, when rogue individuals manipulate people into divulging confidential data. There are a lot of folks out there who pretend to be somebody that they're not, and try to win your trust so that you will disclose information to them, or release funds to them. Malware and bots are also on Karras mind. Any time you receive an from somebody you don't know, and there's an offer for you to click through, you could be opening a malware site that can unleash corruption within your organization. Unless people within your organization are informed, it's very difficult to stop.
6 Karras adds, We have company-issued devices, as well as people who bring their own device to work. Unless there is an effective mobile device management strategy in place, and the tooling behind it, it's very difficult to manage that. Finally, Wilton Brands is concerned about hacked accounts. If you don't have a strong password level control within an environment, explains Karras, it's easy for somebody to have a robot on the other end that can hit your login ID, and within a second have 15,000 attempts to enter into your company. Companies that handle large amounts of data on behalf of their clients are for obvious reasons worried about data breaches that could affect clients. Gary Long, executive vice president and CFO at Ivie & Associates, a full-service global marketing company, worries about this issue. We're a marketing agency and we work with a lot of retailers. Our concern is a data breach would impact those retailers in a negative way. We've all seen what's happened with some prominent retailers recently, notes Long. Threats keep evolving, so CFOs can t rest easy, says Miller. Before it was Social Security numbers, bank account numbers and credit card information; now it's medical information. What's the next piece of information that somebody's going to want? Compliance is another major concern, particularly as laws governing information security continue to change. For universities, a key risk is privacy related to student records. Judy Roy, executive vice president of finance and administration at Indiana Tech, a private university with 8,000 students, says that compliance with data security laws and student data privacy are her top concerns. We've got a whole realm of personal data on our students that we need to keep secure not only Social Security numbers, but names and addresses, as well as grades and payment information. Doug Miller, CFO at law firm Sutter O Connell Company, explains, Because we deal with injuries, we have medical records, and we don't want those to be exposed to the outside. Medical information theft is much more lucrative than straight-up identity theft and is, therefore, alluring to cybercriminals. He continues, With a name, Social Security number and insurance identification number, a criminal can set up a fake doctor's office and start pumping in claims. 6 The CFO s role in cybersecurity
7 Organizational structure around cybersecurity Who is responsible for cybersecurity? The CFO was most often identified as the position within the organization responsible for cybersecurity (38%), followed by the CIO at 36%. (See Figure 2.) These responses show that CFOs are getting more involved as the advocate for strategic initiation and implementation of their organizations cybersecurity measures this migration is due to their unique position of internal and external visibility with their organizations. Also, they are in the best position to address the imminent scrutiny that companies may receive from the SEC and other regulators. Cybersecurity has been listed as a top examination priority for 2015 by the SEC s Office of Compliance Inspections and Examinations D Figure 2: Who is responsible for cybersecurity? CFO 38% CIO 36% Other 19% CISO 7% While 74% of respondents cybersecurity function is led by either the CFO or CIO, interviews reveal that, in fact, responsibility is often shared among more than one member of the organization, such as the chief information security officer (CISO), internal audit, CIO or general counsel, rather than one designated position. Given that the role of the CIO is to strike a balance between the budget and running a smarter business through technology implementation, a natural conflict of interest may arise between a CISO s duty of protecting the company s assets regardless of budget and the CIO s role of protecting the budget. This may, of course, differ based on the size of the organization. Some organizations appoint a CISO to oversee cybersecurity and report to the internal audit leader or CFO. The creation of such a position can decrease the cost per record of information, in the event of a breach, by $ Ibid.
8 A multidisciplinary approach Given that organizations are faced with constant cybersecurity threats, incidents and breaches, Kevin Morgan, principal of Business Advisory Services with Grant Thornton and co-leader of the firm s Cybersecurity practice, agrees that a shared approach is often best. We recommend that the IT, general counsel and finance departments work closely together at the outset of projects to protect attorney-client privilege. Indeed, agrees Johnny Lee, a managing director in Grant Thornton s Forensic, Investigative and Dispute Services group, a former attorney, and a member of the cybersecurity leadership team. Careful consideration should be paid to the question of privilege at the outset of these projects even if they are assessment-oriented. These protections can be powerful if properly administered, but counsel should direct this work, and it must follow specific protocols throughout the life cycle of the project. Morgan clarifies that information security incidents can constitute a variety of events, such as an unencrypted stolen laptop or smartphone, or sensitive documents in an unlocked file cabinet. While some incidents are considered breaches, incidents do not necessarily constitute a breach. They do, however, herald a wake-up call to the organization that cybersecurity warrants immediate attention, says Morgan. Morgan also cautions that sometimes organizational barriers, such as siloed functions, create additional challenges for companies trying to protect themselves from cyberattacks. We recommend that organizations align the people, processes and technology that encompass its cybersecurity response structure. Then create an incident response plan that outlines roles and responsibilities. SanDisk s Roush explains that the global information security officer in the IT organization is responsible for cybersecurity. We [internal audit] work very closely with IT, but we design a series of audit projects within our internal audit plans that cover different aspects of security. In that way, we can provide an independent view of the security environment. Figure 3: Who is responsible for reporting to the board about cybersecurity? 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% 40% 37% 7% CFO CIO CEO 6% 3% 7% General counsel CISO Other Reporting to the board The CFO and CIO (40% and 37%, respectively) are responsible for reporting to the board on cybersecurity issues (see Figure 3). Not only should the CFO (or CIO) be reporting to the board on the organization s cybersecurity initiatives, but he/she should also be getting buy-in from the board on necessary cyberinvestments and advocating for cybersecurity resources. While clearly boards are having discussions about cybersecurity, these statistics don t clarify how effective and engaged the board actually is. As the potential loss for each attack could range in the millions, it is imperative that boards focus closely on cybersecurity oversight, and the CFOs introduce the discussion. Mike Fishoff, CFO of Wilton Brands, notes, IT leads cybersecurity at our organization, but legal is a close No. 2 because if we have any breaches or issues, those two functions work side by side. 8 The CFO s role in cybersecurity
9 At the barest minimum, boards should expect senior management in this case, the CFO or CIO to demonstrate that the organization has a robust cybersecurity plan in place. (The National Institute of Standards and Technology s Framework for Improving Critical Infrastructure Cybersecurity provides a framework that can be used to establish this plan.) In a roundtable conducted by the National Association of Corporate Directors (NACD) in 2013, directors agreed that it is a challenge to effectively oversee management s cybersecurity activities because of the lack of adequate knowledge. Therefore, it is essential that the board receive training on cybersecurity trends and threats, and/or nominate a cybersecurity subject matter expert to advise the board. Given the high stakes, even though corporate directors are concerned about cybersecurity, they frequently are insufficiently knowledgeable about the subject an opportunity for CFOs to help them understand the risks. Roush sees education and training as one of the CFO s key cybersecurity roles. He urges CFOs to make sure board members understand the risks and educate them on what is considered sensitive information. Interviewees report a range of perspectives about how effective their boards are when it comes to overseeing cybersecurity. In some cases, respondents say the board lacks the foundational knowledge and understanding to provide appropriate oversight. Other respondents say their board is engaged with cybersecurity threats, and receives continual updates from management on these issues. Fishoff says that Wilton s board is engaged and that the CFO and vice president of information services jointly report to the board and the general counsel at least once a year. Cybersecurity is a standing yearly agenda item. Obviously, if anything happens during the year and we hope it doesn't then we report on any incidents, explains Fishoff. Figure 4: Which departments are involved with cybersecurity efforts? 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 95% 63% 34% 27% 75% IT Finance Legal Internal audit Participants were able to select all responses that applied. Other Who is involved with cybersecurity initiatives? In the vast majority of organizations, the IT department is involved with cybersecurity (95%), followed by finance (63%) and legal (34%). (See Figure 4.) More than three-quarters (76%) of respondents indicate that more than one department is involved. Three-quarters selected other and cite involvement of disparate roles, including HR, operations, the CEO, the chief risk officer and others. Only 34% of respondents say the legal department is involved in cybersecurity efforts, which leaves ample room for improvement. Legal s involvement is essential because it plays a key role in confirming that policies are properly derived and in establishing the mechanisms that make sure organizations follow all applicable requirements. Additionally, as mentioned above, careful consideration should be paid at the outset of these projects to ensure that any privilege protections desired by the company are managed by counsel familiar with these legal nuances. The attorneyclient privilege (and its related work-product doctrine) can offer protections from discovery to certain communications and analysis, but only if the work is performed at the direction of counsel in anticipation of litigation. These issues involve specific legal advice and should be discussed with counsel for the company whether that be in-house counsel or special counsel appointed for the project.
10 An enterprise-wide approach While cybersecurity was once relegated to a technical or operational issue handled by IT, a cross-departmental, enterprisewide approach to cybersecurity is necessary, according to the Cyber-Risk Oversight, Directors Handbook Series, produced by the NACD. The publication suggests that cybersecurity should be evaluated and managed in the same manner as the organization considers physical security of human and physical assets. 3 Consistent with survey findings, interviewees report that their efforts involve multiple departments. At SanDisk, the global information security officer leads cybersecurity efforts, says Roush. But, there isn't one 'designated body' who is responsible for cybersecurity. We want to make sure we have common policies and practices, particularly within the labs. It's driven by our IT team and the global information security officer, with legal and HR departments collaborating as partners to design policies and drive actions. At Wilton Brands, cybersecurity is a collaborative effort as well. Karras explains the role of each group within the organization: IT owns the tools, such as the firewalls, antivirus software, password controls and mobile device management. Legal is our partner in terms of consultation, and they approve the data protection policies that we have in place. They also push out the data protection policies and report on compliance for any legal or regulatory obligations. HR is our change management partner, communicating to the organization in partnership with IT. And they also approve, and are consulted in terms of data protection policies, because they own a significant portion of employee information. Finance not only provides the funding and the resources around data protection, but they also are consulted with and approve the data protection policies. Because Wilton Brands distributes to the retail trade and not directly to consumers, the company doesn t have a point of sale front. So when we get into discussions about credit card security and privacy, we have outsourced that responsibility, CFO Fishoff says. But Westfall cautions that even when companies outsource certain business functions, they can t truly outsource data security. It s critical to conduct a vendor assessment and account for data held by business partners, vendors and other third parties not just the data stored within your organization. You need to understand exactly how these organizations will protect your data, he says. 3 Cyber-Risk Oversight, Director s Handbook Series 2014 by the National Association of Corporate Directors. 10 The CFO s role in cybersecurity
11 Cybersecurity task forces While establishing a cybersecurity task force is considered a best practice by many, the majority of respondents (84%) surprisingly do not have a task force in place yet (see Figure 5). For those organizations that do not yet have a cybersecurity task force, Grant Thornton s Morgan recommends, CFOs should establish a formal task force to help implement the strategic objectives of the organization s cybersecurity mission by reaching out and identifying the vulnerabilities in the data supply chain within their organization. Noting that the task force, at a minimum, should include IT, legal and finance, Morgan adds, Who is involved depends on the size and vulnerability of the organization. Those that have a task force indicate that it is made up of primarily the IT department, with support from legal, finance or other areas within the organization (see Figure 6). Two interviewees say that their IT and legal departments are equal in their involvement in the task force. On Wilton Brands task force, IT and legal take the lead for cybersecurity, but finance and HR are also involved. The cybersecurity task force at Ivie, likewise, involves IT and legal functions, among others. Our general counsel has recently taken a very large interest in cybersecurity, CFO Long says, so we now have a task force that includes the general counsel and our vice president of IT. Companies that have task forces, as well as those that have experienced breaches, have a much greater awareness of cybersecurity risks, and tend to have a more robust role for their legal function, says Melissa J. Krasnow, corporate and privacy partner at Dorsey & Whitney LLP. Preparing for cybersecurity involves being aware of the risks. Companies need to prepare and implement cybersecurity policies and procedures, which may be required by law, as well as incident response plans, which are a best practice in any event. They can be required as part of entering into a technology or other commercial transaction, including mergers and acquisitions, Krasnow explains. Figure 5: Does your organization have a cybersecurity task force? No 84% Yes 16% D Figure 6: Which areas of the business are on the task force? 80% 70% 60% 50% 40% 30% 20% 10% 0% 69% 25% 19% 19% IT Legal Finance Other
12 D Strategy and practical considerations Most survey respondents (74%) have not experienced a cybersecurity breach within their organizations (see Figure 7). However, these findings are not reflective of larger data trends that show cyberattacks are on the rise. Even if an organization has not been subject to an attack, it does not mean that efforts to secure information systems should be tabled quite the contrary, since cyberthreats continue to be very real. Any company with data systems connected to the Internet is at risk of a breach. Roy of Indiana Tech thinks that many organizations have a false sense of security, particularly those that have never experienced a data breach: Many think that installing virus protection on your PC indicates that you are secure, and it is not. Cybersecurity is more than just installing software. You have to be proactive and find out if people are actively trying to intrude into your system. Of those that indicated a breach had occurred, 57% say their breach cost the organization less than $500,000. This amount seems nominal compared to data provided in the Ponemon report, which put average costs for a data breach at $5.9 million for The most expensive types of cyberattacks for companies to deal with, according to the Ponemon report, are malicious insiders, malicious code and web-based incidents. Figure 7: Has your organization experienced a cybersecurity breach? No 74% Yes 14% Not sure 11% While survey respondents do not report high costs, this runs contrary to the recent and highly publicized experiences of many high-profile companies, including Sony Corp. and Target. The cyberattack on Sony resulted in an estimated loss of $1.25 billion. Home Depot suffered a data breach of 56 million credit card numbers, costing the company $33 million in 2014, after insurance payouts. Staples reported a data breach of 1.16 million customer payment cards in 2014, costing an as-yet-untallied sum. In Target s annual report, as of Jan. 31, 2015, the retailer cited net cumulative expenses of $162 million after insurance payouts related to its data breach See annual report: 12 The CFO s role in cybersecurity
13 What are companies doing to respond to cybersecurity risks? Companies are doing a number of things to respond to cybersecurity risks. Atop the list, respondents are performing vulnerability assessments as a first step (21%), followed by monitoring cybersecurity internal controls (20%). (See Figure 8.) Even so, the relatively small percentages indicate that these organizations may not be doing enough to safeguard against cyberthreats. Figure 8: What steps is your organization taking to respond to cybersecurity risks? Performing vulnerability assessments 21% Monitoring cybersecurity internal controls 20% Determining locations of sensitive/private data 16% Evaluating cybersecurity insurance coverage 16% Developing an incident response plan 4% Not sure 5% Other 4% No response 12% Participants were able to select all responses that applied. Other practices include establishing password diligence programs, ensuring appropriate insurance coverage, encrypting laptops and mobile devices, hiring outside consultants, performing outside assessments, reviewing detection tools and joining industry consortia. Building cybersecurity into the corporate culture is an approach embraced by Wilton Brands. Fishoff, Wilton s CFO, shares two practical examples: When people travel to high-risk locations, they are given a separate laptop to take, so if it was compromised, it wouldn't corrupt our entire network. It enables them to be connected and do their work without creating the potential for violating our internal security. We also have a very robust password-changing process, which isn't very popular because people get lazy, but you have to enforce the rules. Miller of Sutter O Connell explains that his firm has encrypted all its laptops and is now encrypting mobile devices, since employees sometimes receive s with medical records attached. We are moving steadily toward multiple authentication and encryption on all our devices. Roush s cybersecurity approach at SanDisk begins with education and training to build awareness. We continue to look at the current detection tools. And we share information about a breach. It used to be that nobody would even acknowledge if they got hacked because they were afraid of how it would look. But now, companies are sharing more and more information, which is important, because the hackers may be targeting multiple firms in your industry or locations with similar security features. As we start to share information, it improves our ability to detect and respond to these situations.
14 Impediments to cybersecurity The most common impediment to developing an enterprise-wide cybersecurity strategy is a lack of understanding of the risks and potential impacts of a breach (46%). (See Figure 9) This is a common issue among organizations, and unfortunately leaves valuable information exposed. The goal of most organizations is to get to the finish line with their product as soon as possible, and therefore see security as a hurdle or nuisance, cautions Westfall. But it should not be ignored as the threat is very real, and only growing more so. Interviewees share other impediments, such as decentralized environments or geographic dispersion. For example, Roush notes that SanDisk has both a decentralized environment, which can hinder developing an enterprise-wide cybersecurity strategy, as well as engineering labs in countries around the world. When you cut across geographical borders, language barriers and historical practices, it is difficult to make sure that everyone is following the same process and procedures around cybersecurity, Roush says. Acquisitions can be another challenge, especially startups. Some startups pay scant attention to potential security risks, Roush notes. They're often focused on a single product, a particular customer or a very small customer set, while lacking formal processes and governance. Companies need to be very careful as they look to connect or interface with acquired IT systems. Figure 9: What are the impediments to developing an enterprise-wide cybersecurity strategy? Lack of understanding of risks and impacts Budget constraints Lack of perceived value 11% Lack of consensus on strategy 9% All of the above 2% None 2% Time constraints 1% 29% Participants were able to select all responses that applied. 46% The changing nature of cyberthreats is another challenge, Long notes. You can do everything known to mankind today to prevent a problem, but there's something different coming at you tomorrow. We invest heavily to prevent data breaches, but it's such a dynamic environment that it s nearly impossible to predict what s next. 14 The CFO s role in cybersecurity
15 What should companies be doing? CFOs should undertake a number of actions to help safeguard their organization against a data breach or other cyberthreat: Map and classify data Before the CFO can come up with an appropriate plan to protect the company s data, it s critical to know what to protect. The CFO needs to understand how the data supply chain functions, identify where information flows through their extended ecosystems, and examine data privacy across the enterprise, says Morgan. Determining the location of sensitive and private data is critical the crown jewels for data. My clients usually ask, Where is the sensitive data and how can I protect it? Normally, the exercise begins at a business-unit level, and works up to the enterprise-wide level, Westfall advises. That s where data mapping making a digital inventory of where all the data resides comes in. Data mapping can help you answer important questions like: What are the crown jewels of our business? Is IP important? Are we an information-gathering or data-hosting firm? It s important to know what the data assets are as well as their value in order to protect them. Conduct a vulnerability assessment Grant Thornton s Westfall urges companies not to overlook the common-sense approach and value to be gained from conducting a vulnerability assessment. Vulnerability assessments help organizations understand what their internal risks are. What are the programs and operating systems in my infrastructure? Are these programs patched correctly? Westfall suggests that the vulnerability assessment be conducted simultaneously with a penetration test, which examines how an intruder could get into the walls of the organization. Keep in mind that the vulnerability assessment looks only at one point in time, and therefore, you must remain vigilant in continuing assessment and staying on top of security. The timing of the assessment should be defined in monitoring cyber internal controls, Westfall says. Develop an incident response plan Shockingly, only 4% of respondents report developing an incident response plan. It is critical to have an incident response plan, in contrast to a breach response plan, Westfall says. You can have an incident that you will need to respond to quickly and efficiently, too, in order to avoid a breach. Developing a playbook to avoid a breach is critical. A clear-cut incident response plan is a must, so that everyone within your organization can understand their roles and responsibilities, Grant Thornton s Morgan adds. An incident response plan defines what constitutes a cybersecurity incident, and provides a step-by-step process to follow when an incident occurs. The incident response team should include representatives from all data custodians, such as HR, marketing, accounting and R&D, as well as the security officer and IT director. In some cases, it is appropriate to include any vendors or partners that have access to key data, members of the public relations team, specialized consultants and others. 5 An effective incident response plan should: Identify specific risk owners and contacts within the organization Have clear decision-making guidelines and associated actions Be usable, and not overly complex Be tested regularly (at least once per quarter) Include all data loss incident types (i.e., not only intrusions) Outline how to help customers (including guidance, resources, etc.) But it s not enough simply to create a response plan, notes Morgan. Practice and testing are important too, he says. 5 Westfall, Skip. Unprepared organizations pay more for cyberattacks, CorporateGovernor 2015 Winter issue. See Incident-response-plan-reduces-cybersecurity-breach-costs.aspx for more information.
16 Conduct a vendor assessment Cybersecurity demands a close look at vendor management and third-party risk, which are at the top of regulators agendas. Companies need to account for data held by business partners, vendors and other third parties not just the data stored within their organization. Are vendors protecting data with the same fervor as the company? To find out, it s critical to conduct an assessment of vendors cybersecurity measures and assess their vendors management processes. You ll need to determine how these organizations will protect your data, either through contractual agreements, assessments or audits. Depending on the size of your organization, your vendor management group may be able to handle this, or it might require a combined effort, with your accounting group and IT security staff working together to look at vendors, explains Morgan. Evaluate insurance coverage Westfall notes that participants are focusing on evaluating insurance coverage because the more costly these breaches become, the more exclusions insurance companies will include in a policy. Reviewing the coverage in detail is very important. Create a risk profile Many companies rely on outside consultants to test the security of their network and make recommendations. Ivie is among them, Long notes. Outside assessments are a useful tool, Roush says. I have somebody do either an attack and penetration test or look at our network diagrams and architecture to make sure they are appropriate, and then they conduct an audit. Based on the outside assessment report, the CFO should create a risk profile and identify the most glaring vulnerabilities. This information will help determine where to allocate resources and which areas to prioritize. Stay on top of compliance obligations Fast-changing compliance requirements can be daunting. Roy of Indiana Tech says: Trying to stay compliant with all these regulations such as the Family Education Rights and Privacy Act the HIPAA for educational institutions with just seven people in our IT department is really difficult for us. To keep up with the changing expectations, Roy and Indiana Tech s director of IT, Jeff Leichty, talk and meet regularly with peer groups from other private universities. Jeff has an IT CIO group, and I've got a CFO group, explains Roy. We talk about compliance issues and share best practices. The university also has cybersecurity insurance that covers costs associated with a breach. There s no way to know exactly how vulnerable systems are without having an outsider try to hack them, Westfall says. It s useful to hire an outside firm to conduct a vulnerability assessment and penetration test (i.e., ethical hacking). 16 The CFO s role in cybersecurity
17 Set cybersecurity risk management strategy The survey data suggests that the leading way CFOs optimize cybersecurity risk management is by assessing risk and investments related to cybersecurity (40%). (See Figure 10.) In other words, what has the organization invested in most heavily (resources and/or money)? And, is the level of protection appropriate to that area s strategic importance? In most cases, this is the organization s intellectual property, since loss of this information would be severely detrimental to the organization. Roush offers three suggestions for how CFOs can optimize cybersecurity risk management: First, get directly involved in resourcing. Understand what cybersecurity resources are being applied across the company, and what risks are being addressed with these investments. Second, make sure the goals are clearly defined. What do you expect of the people running cybersecurity? Finally, drive awareness of risks through education and training. For example, make sure people understand what a phishing attack could look like, and educate them on what is considered to be sensitive information. Figure 10: In what ways can CFOs optimize cybersecurity risk management strategy? Assess risks and investments relative to cybersecurity 40% Align cybersecurity strategy to business strategy 36% Get buy-in from management and board to invest in strategy 20% All of the above 4%
18 Conclusion With cyberattacks and data breaches becoming increasingly common, costly and regulated, cybersecurity has risen in its strategic importance, and has landed squarely on the desk of the CFO. As the frequent keeper of cybersecurity strategy, the CFO is expected to assess cybersecurity risks and align cyberstrategy with business strategy. This is no small task. The key actions CFOs are expected to undertake in this role include: Understand the organization's full risk universe Advocate for a budget to support cybersecurity preparedness Develop a close relationship with the CISO or CIO, if the organization does not have a CISO Know the relevant cybersecurity regulations and SEC expectations, which are more important than ever now that cybersecurity has become both an examination and reporting priority The threats to data privacy and data security are fierce and continuously evolving. Effective information security depends not on a single technology or strategy, but on a layered approach that needs to be monitored continually as threat patterns change, according to Vernon Habersetzer, an information security engineer with Wells Fargo. 6 You have to assume adversaries are inside, and watch your network to see what s going on, Habersetzer said. The average time of detection is four to six months, which is scary because there can be a lot of damage to a company in four months. Given the seriousness of the threats faced and the obvious prominence of the CFO in these cybersecurity discussions, it s critical for CFOs to be better educated about the risks and to participate in a thoughtful dialogue with key stakeholders to ensure that the enterprise is adequately shielded from cyberthreats. Evaluate the organization s cybersecurity insurance Report to the board on the organization s cybersecurity initiatives and get buy-in from the board on necessary cyberinvestments FEI Leadership Summit session, Real World Cyber Threats. 18 The CFO s role in cybersecurity
19 Interviewees The seven in-depth follow-up interviews provided a much better feel for how companies are reacting to cybersecurity. The following individuals participated in these interviews: Mike Fishoff, CFO of Wilton Brands LLC Paul Karras, senior vice president and CIO at Wilton Brands LLC Melissa J. Krasnow, corporate and privacy partner, Dorsey & Whitney LLP Gary Long, executive vice president and CFO, Ivie & Associates Inc. Doug Miller, CFO at Sutter O Connell Company Phil Roush, vice president of finance at SanDisk Corp. Judy Roy, executive vice president of finance and administration at Indiana Tech
20 Author and contributors William M. (Bill) Sinnett William M. (Bill) Sinnett is senior director, research, for Financial Executives Research Foundation Inc. (FERF), the research affiliate of Financial Executives International (FEI). Sinnett also supports FEI s Committee on Finance & IT (CFIT), and writes its e-newsletter, Finance & IT News. He can be reached at or bsinnett@ financialexecutives.org Kevin Morgan Kevin Morgan is a principal in Grant Thornton s Business Advisory Services practice and the co-leader of Cybersecurity Services. Morgan advises clients regarding application development, large-scale software package implementation, complex problem-solving and predictive analytics. He can be reached at or [email protected]. Skip Westfall Skip Westfall is a managing director and the national practice leader of Grant Thornton s Forensic Technology Services group as well as the co-leader of Cybersecurity Services. Westfall specializes in providing strategic advice related to computer forensics, electronic discovery, cybersecurity and data analytics in support of investigations and civil litigation. He can be reached at or [email protected]. Johnny Lee Johnny Lee is a managing director in Grant Thornton s Forensic, Investigative and Dispute Services group, a practice leader of Forensic Technology Services, and a member of the cybersecurity leadership team. Lee is a former attorney, as well as a management and litigation consultant specializing in data analytics, computer forensics, and electronic discovery in support of investigations and litigation. He can be reached at or [email protected]. 20 The CFO s role in cybersecurity
21 About Financial Executives Research Foundation About Grant Thornton LLP Financial Executives Research Foundation (FERF) is the non-profit 501(c)(3) research affiliate of Financial Executives International (FEI). FERF researchers identify key financial issues and develop impartial, timely research reports for FEI members and nonmembers alike, in a variety of publication formats. FERF relies primarily on voluntary tax-deductible contributions from corporations and individuals. FERF publications can be ordered by logging onto The views set forth in this publication are those of the authors and do not necessarily represent those of the FERF Board as a whole, individual trustees, employees or the members of the Research Committee. FERF shall be held harmless against any claims, demands, suits, damages, injuries, costs, or expenses of any kind or nature whatsoever except such liabilities as may result solely from misconduct or improper performance by FERF or any of its representatives. The people in the independent firms of Grant Thornton International Ltd provide personalized attention and the highestquality service to public and private clients in more than 100 countries. Grant Thornton LLP is the U.S. member firm of Grant Thornton International Ltd, one of the world s leading organizations of independent audit, tax and advisory firms. Grant Thornton International Ltd and its member firms are not a worldwide partnership, as each member firm is a separate and distinct legal entity. In the United States, visit grantthornton.com for details by Financial Executives Research Foundation, Inc. All rights reserved. No part of this publication may be reproduced in any form or by any means without written permission from the publisher. International Standard Book Number Authorization to photocopy items for internal or personal use, or for the internal or personal use of specific clients, is granted by FERF provided that an appropriate fee is paid to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA Fee inquiries can be directed to Copyright Clearance Center at For further information, please visit the Copyright Clearance Center online at
22 Financial Executives Research Foundation (FERF) gratefully acknowledges these companies for their longstanding support and generosity: Platinum Major Gift $50,000 + Exxon Mobil Corporation Microsoft Corporation Gold President s Circle $10,000 $14,999 Cisco Systems, Inc. Cummins Inc Dow Chemical Company General Electric Co Wells Fargo & Company Silver President s Circle $5,000 $9,999 Apple, Inc. The Boeing Company Comcast Corporation Corning Incorporated Credit Suisse AG Dell, Inc. DuPont Eli Lilly and Company GM Foundation Halliburton Company The Hershey Company IBM Corporation Johnson & Johnson Lockheed Martin Corp. McDonald s Corporation Medtronic, Inc. Motorola Solutions, Inc. PepsiCo, Inc. Pfizer Inc. Procter & Gamble Co. Tenneco Tyco International Mgmnt Co. Wal-Mart Stores, Inc. 22 The CFO s role in cybersecurity
23
24 About Grant Thornton LLP The people in the independent firms of Grant Thornton International Ltd provide personalized attention and the highest-quality service to public and private clients in more than 100 countries. Grant Thornton LLP is the U.S. member firm of Grant Thornton International Ltd, one of the world s leading organizations of independent audit, tax and advisory firms. Grant Thornton International Ltd and its member firms are not a worldwide partnership, as each member firm is a separate and distinct legal entity. In the United States, visit grantthornton.com for details. Content in this publication is not intended to answer specific questions or suggest suitability of action in a particular case. For additional information about the issues discussed, consult a Grant Thornton LLP client service partner or another qualified professional. Connect with us linkd.in/grantthorntonus Grant Thornton refers to Grant Thornton LLP, the U.S. member firm of Grant Thornton International Ltd (GTIL). GTIL and its member firms are not a worldwide partnership. All member firms are individual legal entities separate from GTIL. Services are delivered by the member firms. GTIL does not provide services to clients. GTIL and its member firms are not agents of, and do not obligate, one another and are not liable for one another s acts or omissions. Please visit grantthornton.com for details Grant Thornton LLP All rights reserved U.S. member firm of Grant Thornton International Ltd
Financial Executive Compensation Survey 2016. Thomas (Tom) Thompson and Ken Cameron
Financial Executive Compensation Survey 2016 Thomas (Tom) Thompson and Ken Cameron Contents 1 Financial executives salary increases taper off 2 Slight changes in finance/accounting staffing levels Sign-on
Cybersecurity incident response: Planning is just the beginning
Cybersecurity incident response: Planning is just the beginning Contents 3 Executive summary 4 Introduction 5 Cybersecurity incident response 7 Exercises and training 8 Board involvement 9 Cyberinsurance
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
www.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
What Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 [email protected] Presented by: Rob D. Moseley, Jr. 2 West
Cybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com
Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
CYBERSECURITY IN HEALTHCARE: A TIME TO ACT
share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector
New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED
THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED THE CYBER SECURITY PLAYBOOK 2 03 Introduction 04 Changing Roles, Changing Threat
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Managing data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
COMPETITION TRIGGERS BATTLE FOR TALENT AND ACQUISITIONS
2015 www.bdo.com For more information on BDO USA s service offerings to this industry vertical, please contact one of the regional service leaders below: TIM CLACKETT Los Angeles 310-557-8201 / [email protected]
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
How GCs And Boards Can Brace For The Cybersecurity Storm - Law360
Page 1 of 6 Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] How GCs And Boards Can Brace For The Cybersecurity
ACE European Risk Briefing 2012
#5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014
www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
HIPAA Compliance: Efficient Tools to Follow the Rules
Bank of America Merrill Lynch White Paper HIPAA Compliance: Efficient Tools to Follow the Rules Executive summary Contents The stakes have never been higher for compliance with the Health Insurance Portability
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
White. Paper. Rethinking Endpoint Security. February 2015
White Paper Rethinking Endpoint Security By Jon OItsik, Senior Principal Analyst With Kyle Prigmore, Associate Analyst February 2015 This ESG White Paper was commissioned by RSA Security and is distributed
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
State of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures
TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP [email protected]
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?
HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? FREEMAN WOOD HEAD OF MERCER SENTINEL NORTH AMERICA GREGG SOMMER HEAD OF OPERATIONAL RISK ASSESSMENTS MERCER
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
Cyber Security Management
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
CISM (Certified Information Security Manager) Document version: 6.28.11
CISM (Certified Information Security Manager) Document version: 6.28.11 Important Note About CISM PDF techexams CISM PDF is a comprehensive compilation of questions and answers that have been developed
Presidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,
CGI Cyber Risk Advisory and Management Services for Insurers
CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication
Global IT Security Risks
Global IT Security Risks June 17, 2011 Kaspersky Lab leverages the leading expertise in IT security risks, malware and vulnerabilities to protect its customers in the best possible way. To ensure the most
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
The Importance of Senior Executive Involvement in Breach Response
The Importance of Senior Executive Involvement in Breach Response Sponsored by HP Enterprise Security Services Independently conducted by Ponemon Institute LLC Publication Date: October 2014 The Importance
The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T
The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.
Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot
Who s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
Cyber Security Risk Management
Cyber Security Risk Management For November 6, 2014 Jim Halpert Co-Chair Global Privacy & Security Practice [email protected] Trends Point of Sale Attacks Malware Skimming Industrial Control Systems
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Brief. The BakerHostetler Data Security Incident Response Report 2015
Brief The BakerHostetler Data Security Incident Response Report 2015 The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 the year of the
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
Defining the Gap: The Cybersecurity Governance Study
Defining the Gap: The Cybersecurity Governance Study Sponsored by Fidelis Cybersecurity Independently conducted by Ponemon Institute LLC Publication Date: June 2015 Ponemon Institute Research Report Defining
Cyber Governance Preparing for the Inevitable Perimeter Breach
SAP Brief SAP Extensions SAP Regulation Management by Greenlight, Cyber Governance Edition Objectives Cyber Governance Preparing for the Inevitable Perimeter Breach Augment your preventive cybersecurity
Data Breach Response Planning: Laying the Right Foundation
Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?
HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES
