Cyber Security Risk Management
|
|
|
- Georgiana Woods
- 10 years ago
- Views:
Transcription
1 Our Ref.: B1/15C B9/29C 15 September 2015 The Chief Executive All Authorized Institutions Dear Sir/Madam, Cyber Security Risk Management I am writing to draw your attention to the growing importance of proper cyber security 1 risk management and provide some general guidance on the matter. Although authorized institutions (AIs) should have already put in place controls and processes to manage technology risks in general, we wish to highlight that cyber security risk management still warrants AIs special attention. It is because different cyber attacks happened or statistics published in recent years have indicated that the frequency, stealth, sophistication and the potential impact of cyber attacks are on the rise globally. Separately, cyber attacks could also be motivated by a wide range of reasons or parties, where some might aim at compromising or even damaging specific types of information/systems. Hence, different risk management measures may be needed to deal with some types of potential cyber attacks. Accordingly, there is a legitimate concern that certain conventional risk management philosophy and controls practised by AIs might need to be adjusted or enhanced to cope with the risks. As the Board 2 and senior management of an AI have the responsibility of, among others, protecting the AI s critical assets including sensitive information 1 2 Cyber security refers to the ability to protect or defend against cyber attacks. For the purpose of this circular, cyber attacks refer to attacks that target an institution s IT systems and networks with an aim to disrupt, disable, destroy or maliciously control an IT system / network, to destroy the integrity of the institution s data, or to steal information from it. For a locally-incorporated AI, the Board may delegate its oversight duties to designated Board-level committee(s). As regards the Hong Kong operations of an overseas incorporated AI, the term Board in this circular generally refers to the local senior management of the AI, under the scrutiny by its head office or regional headquarters.
2 - 2 - of its customers, they are expected to play a proactive role in ensuring effective cyber security risk management in the AI, covering at least the following areas: (i) (ii) (iii) Risk ownership and management accountability Clear ownership and management accountability of the risks associated with cyber attacks and related risk management measures should be established, which should cover not only the IT function but also all relevant business lines. Since users are usually the weakest link of cyber security controls and the initial targets of cyber attacks, effective cyber security risk management entails cooperation and strong security awareness and culture 3 across a full spectrum of relevant users (including management, the staff/contractors of the AI or other offices of the banking group and relevant service providers), especially if certain cyber security controls 4 could result in inconvenience to the management or users; Periodic evaluations and monitoring of cyber security controls As the threats of cyber attacks are evolving in nature, the Board should request the senior management to evaluate periodically the adequacy of the AI s cyber security controls, having regard to emerging cyber threats and a credible benchmark of cyber security controls (see Annex) endorsed by the Board. If material gaps are identified, the Board should ensure that the senior management properly justifies and documents any acceptance of the risks arising from the gaps. More importantly, the senior management should establish a concrete implementation plan, supported by adequate staffing and financial resources, to promptly uplift the AI s cyber security controls after deciding what upgrades or alternative compensating controls are needed if the relevant risks are not accepted by the Board or senior management. In addition, the Board should also demand periodic reports from the senior management so as to monitor the overall situation and any significant risks identified out of (a) the outcome of the above evaluations and (b) the status of adherence to the AI s security policies by the IT and other relevant functions on an ongoing basis, given that a discipline of proper security practices in all relevant functions is vital in defending against cyber attacks; Industry collaboration and contingency planning Since cyber attacks 3 4 As part of the AI s security awareness and culture, users at all levels should be alerted of their roles and responsibilities in defending against cyber attacks. Moreover, they should be empowered and expected to escalate to the management their concerns, if any, about poor security practices. For instance, certain effective cyber security controls may restrict users access to the Internet (e.g. unapproved websites, personal accounts) or entail stringent controls or checking of mobile devices used by management and staff for business purposes. For users with privileged access rights to key systems, some cyber security controls may also subject them to more rigorous background checks, authentication controls or restrictions (e.g. in terms of disclosing their job-related information in social media websites or to outside parties).
3 - 3 - could aim at multiple institutions within a short period of time, the senior management should designate relevant function(s) of the AI to explore appropriate opportunities of collaborating with other institutions and/or the Police in both sharing and gathering cyber threat intelligence in a timely manner. Such intelligence sharing may help the AI and/or other institutions to get ready for possible cyber attacks. In this connection, we believe that the broader the sharing of such intelligence among AIs, the more the banking industry will be ready to address the relevant risk. To prepare for the eventualities of cyber attacks, the AI s incident response mechanism and Business Continuity Plan should also be properly enhanced (after taking into account any guidance given by all relevant authorities from time to time) and regularly tested to assure that the AI s senior management is capable of dealing with cyber attacks, even the more catastrophic ones 5, and appropriately communicating with their customers and relevant stakeholders; and (iv) Regular independent assessment and tests Given the highly technical nature of cyber security, it is crucial that there are sufficient cyber security expertise and resources within the responsible function(s) 6 of the AI to exercise effective and ongoing checks and balances against the above-mentioned evaluations and monitoring of cyber security controls carried out by the senior management as well as the contingency planning efforts related to cyber attacks. Such checks and balances should entail, among others, regular independent assessment and possibly penetration tests 7. If some of the above-mentioned areas have yet to be in place in your institution, the Board and senior management of your institution are expected to strengthen their oversight in those areas so that some concrete progress (including the evaluation of your institution s cyber security controls against the benchmark as mentioned in (ii) above) should start to be evidenced in the remaining meeting(s) of the Board this year or early next year. If there is a need, the HKMA will request your institution to submit specific deliverables for us to assess the output or progress of the work These may include massive destructions or corruptions of data, or simultaneous attacks to both production and backup IT systems, networks and other infrastructures, which might render conventional IT system resilience or disaster recovery arrangements ineffective. Depending on the risk governance arrangements of the AI or its banking group, the function(s) could be the AI s IT function, technology risk management function, internal audit function or similar function(s) of the banking group so long as there is a clearly defined responsibility of the function(s) to exercise checks and balances surrounding the relevant controls of the AI. Where there is a need, the AI s responsible function(s) could engage external firms with relevant expertise and resources to carry out certain work on their behalf. AIs with processes and services that are more important to the members of the public or the functioning of the financial systems of Hong Kong are generally expected to conduct periodic penetration tests having regard to their risk assessment. Please also refer to the Supervisory Policy Module (SPM) module TM-E-1 Risk Management of E-banking for guidance on penetration tests related to electronic banking services.
4 - 4 - Should you have any questions on the content of this letter, please feel free to contact Mr George Chou at or Mr Tsz-Wai Chiu at Yours faithfully, Henry Cheng Executive Director (Banking Supervision) Encl.
5 - 1 - Annex A credible benchmark of cyber security controls At this stage, the HKMA does not prescribe what benchmark should be used by AIs senior management to conduct periodic evaluations of the adequacy of cyber security controls. For the time being, an AI should consider its own situation when determining the benchmark that is appropriate to the institution. Apart from the guidelines or guidance issued by relevant authorities or banking industry associations 1, the AI may draw reference from international standards or sound practices (see Note below), the relevant policies adopted by the banking group as a whole, and specific cyber-related risks relevant to the business and operations of the AI. The AI should also recognize that the benchmark should be evolving in the light of technological advancements and emerging cyber threats. In general, AIs with processes and services that are more important to the members of the public or the functioning of the financial systems of Hong Kong are expected to adopt a more stringent benchmark. For those AIs, the HKMA believes that it is prudent for their benchmark to cover, among others, the following areas of security controls although other AIs may also draw reference from the areas mentioned: Controls that are basically preventive or detective in nature 2 : (a) Registration of authorized and restriction on unauthorized devices, software and networks; (b) Secure configuration and access controls of devices, software and networks; (c) Identification and remediation of vulnerabilities of devices, software and networks; (d) Controlled use of privileged user accounts of devices, software and networks; 1 2 Including, among others, the Supervisory Policy Module (SPM) modules TM-G-1 General Principles for Technology Risk Management, TM-G-2 Business Continuity Planning, TM-E-1 Risk Management of E-banking, the circular on Customer Data Protection issued on 14 October 2014 and the guideline issued by the Hong Kong Association of Banks on the use of Bring-Your-Own-Device. According to some industry practitioners, it is generally more cost effective for organizations to invest in the preventive and detective cyber security controls as compared with the potentially significant cost of dealing with the aftermath of cyber attacks, as illustrated in some past incidents. Moreover, individual international standards also suggest that certain controls covered under items (a) to (d) could have the most immediate impact on preventing cyber attacks.
6 - 2 - (e) Defenses against malwares and Advanced Persistent Threats (APTs 3 ); (f) Security and access controls of application systems; (g) Protection of customer data and sensitive information stored in, or accessible by, different media, devices, software and networks; (h) Security related to IT systems and networks accessible by mobile devices or devices outside the AI s physical security controls; (i) Detection of unusual activities of, and potential intrusions into, IT systems and networks; (j) Management of security related to service providers; (k) User education and awareness; Controls that are mainly for dealing with contingency scenarios: (l) Incident responses and management, including controls for digital forensic if appropriate; (m) System resilience, including protection against distributed denial-of-services (DDoS); and (n) Data recovery capability 4. Note: Although the HKMA does not currently prescribe what specific international standard(s) or sound practices document(s) should be adopted by AIs as a benchmark for evaluating their cyber security controls, the HKMA will continue to review whether a common framework should be established to benchmark the adequacy of AIs relevant controls. In this connection, AIs may wish to refer to the following examples (some of which highlight what combinations of controls could be more cost-effective in combating cyber threats), or any other standards/sound practices documents (including national standards) that are helpful in their circumstances, for now and adopt the maturity level of controls appropriate in their own circumstances: 3 4 There are various definitions of APTs but the term typically covers attacks in which unauthorized users gain access to systems or networks and remain there for an extended period of time without being detected. As such attacks typically involve several stages, the benchmark adopted by AIs for periodic evaluations of their cyber security controls may need to indicate the coverage of their defensive controls. To achieve a better data recovery capability, specific controls may need to be introduced or enhanced to address the risks that cyber attacks may (i) simultaneously aim at both production and backup IT systems and networks, (ii) involve massive destruction or alterations of data, or (iii) remain undetected for a long period of time, thereby increasing the risk that data in the backup medium within the retention period might have already been corrupted. Depending on AIs own risk assessment, these may include, for instance, more frequent and offsite data backup of critical IT systems, real-time backup about changes to critical data to a separate storage location (i.e. "Continuous Data Protection", which is different from the conventional real-time offsite mirroring control), a longer data retention period, regular testing of recoverability from data backup, and more checking of data integrity in IT systems.
7 - 3 - Control Objectives for Information and Related Technology (COBIT) ( SANS Top 20 Critical Security Controls (CSC) ( Information Security Forum Standard of Good Practice for Information Security ( ISO/IEC 27001, Information technology Security techniques Information security management systems Requirements ( ISO/IEC 27002, Information technology Security techniques Code of practice for information security controls ( ISO/IEC 27035, Information technology Security techniques Information security incident management (
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
Control measures for guarding against some recent fraud cases
Our Ref.: B1/15C B9/81C 5 June 2014 The Chief Executive All Authorized Institutions Dear Sir/Madam, Control measures for guarding against some recent fraud cases I am writing to draw the attention of your
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Consultative report. Committee on Payment and Settlement Systems. Board of the International Organization of Securities Commissions
Committee on Payment and Settlement Systems Board of the International Organization of Securities Commissions Consultative report Principles for financial market infrastructures: Assessment methodology
How To Assess A Critical Service Provider
Committee on Payments and Market Infrastructures Board of the International Organization of Securities Commissions Principles for financial market infrastructures: Assessment methodology for the oversight
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Electronic Trading Information Template
Electronic Trading Information Template Preface This Electronic Trading Information Template (the "Template") has been created through the collaborative efforts of the professional associations listed
Client Update SEC Releases Updated Cybersecurity Examination Guidelines
Client Update September 18, 2015 1 Client Update SEC Releases Updated Cybersecurity Examination Guidelines NEW YORK Jeremy Feigelson [email protected] Jim Pastore [email protected] David Sarratt
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Technology and Cyber Resilience Benchmarking Report 2012. December 2013
Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities
Appendix J: Strengthening the Resilience of Outsourced Technology Services
Appendix J: Strengthening the Resilience of Outsourced Technology Services Background and Purpose Many financial institutions depend on third-party service providers to perform or support critical operations.
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Practice note on credit risk management for loans to the corporate sector
Banking Supervision Department 銀 行 監 理 部 Our Ref.: B10/1C 27 March 2015 The Chief Executive All Authorized Institutions Dear Sir/Madam, Practice note on credit risk management for loans to the corporate
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
Supervisory Policy Manual
This module should be read in conjunction with the Introduction and with the Glossary, which contains an explanation of abbreviations and other terms used in this Manual. If reading on-line, click on blue
SFC ELECTRONIC TRADING REGIME
SFC ELECTRONIC TRADING REGIME CompliancePlus 2013 Year End Training 18 December 2013 Limited 801, Two Exchange Square, 8 Connaught Place, Central, Hong Kong Tel: (852) 3487 6903 www.complianceplus.hk Disclaimer
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
CORE Security and GLBA
CORE Security and GLBA Addressing the Graham-Leach-Bliley Act with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected] www.coresecurity.com
Supervisory Policy Manual
This module should be read in conjunction with the Introduction and with the Glossary, which contains an explanation of abbreviations and other terms used in this Manual. If reading on-line, click on blue
Chapter 4 Information Security Program Development
Chapter 4 Information Security Program Development Introduction Formal adherence to detailed security standards for electronic information processing systems is necessary for industry and government survival.
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
Committee on Payments and Market Infrastructures Board of the International Organization of Securities Commissions. Consultative report
Committee on Payments and Market Infrastructures Board of the International Organization of Securities Commissions Consultative report Guidance on cyber resilience for financial market infrastructures
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Information System Audit Guide
Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Commonwealth of Australia 2011 Page 1 TABLE OF CONTENTS 1. INTRODUCTION TO ACCREDITATION...4 2. THE
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response
Cybersecurity and Hospitals What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response This resources was prepared exclusively for American Hospital Association members by Mary
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology
How small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
Statement of Guidance
Statement of Guidance Business Continuity Management All Licensees 1. Statement of Objectives 1.1. To enhance the resilience of the financial sector and to minimise the potential impact of a major operational
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
Keynote Speech. Beth Dugan Deputy Comptroller for Operational Risk. The Clearing House s First Operational Risk Colloquium
Keynote Speech by Beth Dugan Deputy Comptroller for Operational Risk at The Clearing House s First Operational Risk Colloquium February 11, 2015 Washington, D.C. Thank you. It s an honor to be invited
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
Information Technology
Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Benchmark of controls over IT activities. 2011 Report. ABC Ltd
www.pwc.com/cy Benchmark of controls over IT activities 2011 Report ABC Ltd... 2012 Scope and approach We wish to provide you with our IT Benchmarking report over IT activities at ABC Ltd (the Company)
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
ALERT LOGIC FOR HIPAA COMPLIANCE
SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Technology Risk Management
1 Monetary Authority of Singapore Technology Risk Guidelines & Notices New Requirements for Financial Services Industry Mark Ames Director, Seminar Program ISACA Singapore 2 MAS Supervisory Framework Impact
IT Security Incident Management Policies and Practices
IT Security Incident Management Policies and Practices Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Feb 6, 2015 i Document Control Document
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
STATE OF CYBER SECURITY IN ETHIOPIA
ETIOPIAN TELECOMMUNICATIONS AGENCY STATE OF CYBER SECURITY IN ETHIOPIA By Mr. Balcha Reba Ethiopian Telecommunications Agency Standards and Inspection Department Head, Standards Division email: [email protected]
Understanding the NIST Cybersecurity Framework September 30, 2014
Understanding the NIST Cybersecurity Framework September 30, 2014 Earlier this year the National Institute of Standard and Technology released the Framework for Improving Critical Infrastructure Cybersecurity
Enterprise Cybersecurity: Building an Effective Defense
Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has
Business Continuity Business Continuity Management Policy
Business Continuity Business Continuity Management Policy : Date of Issue: 28 January 2009 Version no: 1.1 Review Date: January 2010 Document Owner: Patricia Hughes Document Authoriser: Tony Curtis 1 Version
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
Top 10 Baseline Cybersecurity Controls Banks Aren't Doing
Top 10 Baseline Cybersecurity Controls Banks Aren't Doing SECURE BANKING SOLUTIONS 1 Contact Information Chad Knutson President, SBS Institute Senior Information Security Consultant Masters in Information
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies
IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
