Cybersecurity: The changing role of audit committee and internal audit
|
|
|
- Charla Jennings
- 10 years ago
- Views:
Transcription
1 Cybersecurity: The changing role of audit committee and internal audit
2 Contents 1. Introduction 3 2. What is the role of Internal Audit and the Audit committee? Three Lines of Defence Model Organisational Roles and Responsibilities for Cybersecurity The audit committee s role in Cyber Security Transforming Cyber Defences 6 3. Framework for Cyber Risk Management Cyber Risk Appetite and Tolerance A representative Internal Audit Plan to address cyber risk Looking Ahead 13
3 1. Introduction Among the most complex and rapidly evolving issues companies must contend with is cybersecurity. With the advent of mobile technology, cloud computing, and social media, reports on major breaches of proprietary information and damage to organisational IT infrastructure have also become increasingly common, thus transforming the IT risk landscape at a rapid pace. International media reports on high-profile retail breaches and the major discovery of the Heartbleed security vulnerability posing an extensive systemic challenge to the secure storage and transmission of information via the Internet have shone a spotlight on cybersecurity issues. Consequently, this has kept cybersecurity a high priority on the agenda of boards and audit committees. Organised crime is monetising cyberspace, exploiting vulnerabilities in computer systems to compromise and remotely control computers; recording key strokes, monitoring screen displays and manipulating the computer user into divulging sensitive data. Cyberspace being borderless allows any attacker to route their assaults through multiple countries and jurisdictions, complicating investigation and law enforcement. Companies run the risk of losing substantial amounts of sensitive company information to malicious employees, who could also potentially remove it from company premises or introduce malicious software to corrupt company databases or sabotage network operations. Corporate espionage by firms is commonplace in cyberspace. Attacks often target sensitive intellectual property, and there have been multiple instances of major firms with its security compromised over many months and losing substantial amounts of sensitive data during these attacks. Activism is also prevalent in cyberspace with sabotage and denial of service attacks growing progressively frequent. In the past, they would be attributed to hacktivist groups such as Anonymous; but increasingly attacks point to political motivations. Based on the Global Risk Landscape 2014 published by the World Economic Forum, cyber-attacks are one of the risks with high impact as well as high likelihood. Figure Global Risk Landscape (World Economic Forum) Cybersecurity: The changing role of audit committee and internal audit 3
4 2. What is the role of Internal Audit and the Audit committee? 2.1 Three Lines of Defence Model Effective risk management is the product of multiple layers of risk defence. Internal Audit should support the board s need to understand the effectiveness of cybersecurity controls. Organisations should institute and continually shore up three lines of defences: 1. Management. Companies that are good at managing information security risks typically assign responsibility for their security regimes to the highest levels of the organisation. Management has ownership, responsibility and accountability for assessing, controlling and mitigating risks. 2. Risk management and compliance functions. Risk management functions facilitate and monitor the implementation of effective risk management practices by management, and help risk owners in reporting adequate risk-related information up and down the firm. 3. Internal audit. The internal audit function provides objective assurance to the board and executive management on how effectively the organisation assesses and manages its risks, including the manner in which the first and second lines of defence operate. It is imperative that this line of defence be at least as strong as the first two. Without a function that provides competent and objective assurance, a company faces real risks of its information privacy practices becoming inadequate or even obsolete. This is a role that internal audit is uniquely positioned to fill. But to do so, it must have the mandate and the resources to match. The three lines of defence illustrated below are not unique to data privacy and security, but should be in place and operating at a robust level to deal with any critical risk to the business. For most organisations, information security and privacy are critical risks because of its potential to cause financial and reputational damage. Given recent high profile cyber-attacks and data losses, and the expectations of the SEC and other regulators, it is critical for Internal Audit to understand cyber risks and be well prepared to address the questions and concerns expressed by the audit committee and board. Roles and responsibilities 1 st Line of defense business and IT functions 2 nd Line of defense information and technology risk managment functions Incorporate risk-informed decision making into day-to-day operations and fully integrate risk management into operational processes Define risk appetite and escalate risks outside of tolerance Mitigate risks, as appropriate Establish governance and oversight Set risk baselines, policies, and standards Implement tools and processes Monitor and call for action, as appropriate Provide oversight, consultation, checks and balances, and enterprise-level policies and standards 3 rd Line of defense internal audit Independently review program effectiveness Provide confirmation to the board on risk management effectiveness Meet requirements of SEC disclosure obligations focused on cybersecurity risks 4
5 2.2 Organisational Roles and Responsibilities for Cybersecurity Audit committee and board of directors Overseeing a successful cybersecurity programme requires frequent and proactive engagement from the board of directors and audit committee. The audit committee, in its capacity of overseeing risk management activities and monitoring management s policies and procedures, plays a significant strategic role in coordinating cyber risk initiatives and policies and confirming their efficacy. These responsibilities include setting expectations and accountability for management, as well as assessing the adequacy of resources, funding and focus for cybersecurity activities. The audit committee chair can be a particularly effective liaison with other groups in enforcing and communicating expectations regarding security and risk mitigation. Boards are devoting increased attention and resources to responding to cybersecurity issues. In a recent study² of global enterprise security governance practices conducted by the Carnegie Mellon University CyLab, 48% of corporations surveyed reported having a board-level risk committee responsible for privacy and security risks, a dramatic increase from the 8% that reported having such a committee in Among North American respondents, 40% indicated that their company s board deals with computer and information security issues. Whether or not there is a dedicated risk committee on the board, it is important to confirm that there are directors with knowledge and skills in security, IT governance and cyber risk. Given the audit committee s responsibility for risk oversight, it can be advantageous to recruit committee members with cybersecurity experience so that informed decisions are made about the sufficiency of the efforts overseen. Management All members of management should be fully aware of the plan of action and who will occupy key roles in the event of an attack or threat. Most companies have a senior management position related to information security in place so that there is a clear voice directing cyberthreat prevention, remediation and recovery plans, related educational activities, and the development of frameworks for effective reporting. This position is sometimes held by a chief information officer, or a chief security officer who is also responsible for physical security, but some companies may have a dedicated chief information security officer who focuses solely on cyberthreats. These executives will sometimes report directly to the board, but in all cases, they can be an effective liaison with whom the audit committee and board can communicate regarding risks and the response to attacks. Internal audit The audit committee should confirm that the internal audit function regularly reviews controls pertaining to cybersecurity, is up-to-date on the latest developments and include related issues prominently and regularly on its agenda. External auditor The external auditor can often be a valuable source of information on cybersecurity issues. Many firms have practices focused on evaluating and strengthening security controls and implementing programmes for enterprise risk management. They are also qualified to provide perspectives gained through working with a wide variety of companies in diverse industries. External specialists It can be helpful to seek the input of external specialists in assessing cybersecurity. Companies can conduct annual external reviews of security and privacy programmes, including incident response, breach notification, disaster recovery and crisis communication plans. Such efforts can be commissioned and reviewed by the board s risk committee or another designated committee to confirm that identified gaps or weaknesses are addressed. Third-party security assessments can also provide benchmarking relative to other companies of similar size or in the same industry. Cybersecurity: The changing role of audit committee and internal audit 5
6 2.3 The audit committee s role in Cyber Security The extent of the audit committee s involvement in cybersecurity issues varies significantly by company and industry. In some organisations, cybersecurity risk is tasked directly to the audit committee, while in others, there is a separate risk committee. Companies for which technology forms the backbone of their business often have a dedicated cyber risk committee that focuses exclusively on cybersecurity. Regardless of the formal structure adopted, the rapid pace of technology and data growth, and the attendant risks highlighted by recent security breaches demonstrate an increasing importance in understanding cybersecurity as a substantive, enterprise-wide business risk. Audit committees should be aware of cybersecurity trends, regulatory developments and major threats to the company, as the risks associated with intrusions can be severe and pose systemic economic and business consequences that can significantly affect shareholders. Engaging in regular dialogue with technology-focused organisational leaders will help the committee better understand where attention should be concentrated. Some questions for audit committees to consider asking the management regarding cybersecurity are: What is the overall strategy and plan for protecting assets? How robust are the organisation s incident response and communication plans? What are the organisation s critical assets and associated risks to be secured? How are vulnerabilities identified? How are risks disclosed? How are critical infrastructure and regulatory requirements met? What controls are in place to monitor cloud and supplier networks, as well as software running on company devices, such as mobile devices? What digital information is leaving the organisation, where is it going, and how is it tracked? Do we have trained and experienced staff who can forecast cyber risks? Is it known who is logging into the company s network, from where, and if the information they are accessing is appropriate to their role? 2.4 Transforming Cyber Defences Within the broader context of responsibility for risk oversight, audit committees are responsible for the oversight of financial reporting and disclosure, and more recently cybersecurity. Cybersecurity is a business issue as it exceeds the boundaries of IT and cyber risk needs to be managed with as much discipline as financial risk. Both the technical nature of the threat and amount of attention cyber risk demands calls for primary audit committee involvement. Yet organisations have acknowledged a lack of expertise on cybersecurity issues. As a result, audit committees are seeking not only education for themselves, but also an elevation of the discussion amidst C-level executives. These efforts include increasing engagement with the chief information officer (CIO) and chief information security officer (CISO), drawing on the expertise of the IT partner from the external audit firm, encouraging CIOs and CISOs to participate in peer-group information sharing, and challenging management to produce metrics that the audit committee can use to evaluate cybersecurity effectiveness. A comprehensive cybersecurity plan also requires appropriate culture and tone at the top. These encompass an awareness of the importance of security extending from the C-suite to the professionals in each function, since breaches can occur at any level and in any department. The CEO should make it clear that cybersecurity is a major corporate priority, and should communicate that he or she is fully on board with enforcing compliance with policies and supporting efforts to strengthen infrastructure and combat threats. 6
7 Several practices that companies are employing to enhance the audit committee s oversight of cybersecurity risk, leverage the recent broader strategic focus of the CISO and CIO roles: a) Increasing interaction with the IT department CIO and CISO should attend audit committee meetings and take the audit committee through one deep dive education session on cybersecurity issuse. The audit committee should also continue engaging with the CIO and CISO. b) Sharing information with industry counterparts CIOs and CISOs benefit from sharing information with their industry counterparts about cyberattack patterns and cyberdefence strategies. For instance, providing first-hand experience of a cyberattack to industry peers would better inform and prepare them for the prevention of similar attacks and in the process isolate a high-impact and high-likelihood risk from crippling an organisation. c) Technology experts joining the board. The lack of technology expertise is an issue that has to be recognised in boards today. With the average age of board members exceeding 50, there is often a lack of understanding of context as a CIO is briefing the board. It is, therefore, beneficial for the board to have a member with significant technology experience. d) Engaging the expertise of the external audit firm External auditors employ a variety of professionals that include cybersecurity experts. They are a great resource for providing an honest perspective on the organisation the knowledge of the management team and how the company is benchmarked. Some companies engage external audit firms to be ethical hackers without the knowledge of the CIO and/or CISO, while others choose to notify these executives ahead of time e) Deploying internal audit Internal audit plays a central role in helping the audit committee oversee cybersecurity. The regular assessments conducted by internal audit play an important part in providing the audit committee with a comprehensive appraisal of the organisation s strength and weakness. Internal audit should also be able to develop a road map for the future dealing with various cyber risk issues and scenarios. f) Evaluating the company s cybersecurity programmes A company s cybersecurity programme can be difficult to evaluate because audit committees do not know the key success factors and its indicators to measure it. The most important indicator is the amount of time that elapses between the hacker s penetration and the company s detection. Detection and response time are among the most important metrics that the company should track to ensure progression and effectiveness of the techniques being employed. Cybersecurity: The changing role of audit committee and internal audit 7
8 3. Framework for Cyber Risk Management The Cyber Risk Management Framework can help focus the conversation among the audit committee, other members of the board and senior management on what cybersecurity plans are in place and its possible gaps. This can potentially bridge the gap between the seemingly technical world of cybersecurity and how it translates into the governance decisions that boards and senior executives make. It also encourages dialogue between companies in similar industries which have a shared interest in identifying and addressing vulnerabilities. The framework s core consists of five functions governance and leadership, organisational enablers, capabilities, cyber lifecycle and solution lifecycle that provide a high-level, strategic view of an organisation s management of cybersecurity risks and examine existing cybersecurity practices, guidelines and standards. Board 1. Governance & Leadership Executive Management Business Value Technology Leadership IT Risk Leadership Threat Management 3. Capabilities Infrastructure Security Identity & Access Management 4. Cyber lifecycle Protect, detect, respond & recover Application Security Risk Analytics Data Protection Third Party Management Workforce Management Crisis Management 5. Solution lifecycle Design, build, implement & operate Policies & Standards 2. Organisational Enablers Talent & Culture Risk Identification & Reporting Stakeholder Management 8
9 Cybersecurity plans should take into account the past, present and future with regard to cyber risks. Consideration should be given to the percentage of the available budget required for prevention efforts, immediate response to attacks and resiliency exercises. Throughout the past decade, most organisations cyber security programmes have focused on strengthening prevention capabilities based on established information assurance strategy: defence in-depth. This approach advocates a multi-layered approach to deploying security controls with the intent of providing redundancy in the event a security control fails or a vulnerability is successfully exploited in one of the layers. To be effective and well balanced, a cyberdefence must have three key characteristics: secure, vigilant, and resilient. 1. Secure: Being secure means focusing protection around the risk-sensitive assets at the heart of your organisation s mission - the ones that both you and your adversaries are likely to agree are the most valuable. 2. Vigilant: Being vigilant means establishing threat awareness throughout the organisation, and developing the capacity to detect patterns of behaviour that may indicate, or even predict, compromise of critical assets. 3. Resilient: Being resilient means having the capacity to rapidly contain the damage, and mobilise the diverse resources needed to minimise impact - including direct costs and business disruption, as well as reputation and brand damage. In summary, the model below has 3 objectives secure, vigilant and resilient woven together with 5 design principles of: a) Incorporating security in the core design b) Applying threat intelligence in the core design c) Sharing of intel and information among security practitioners d) Automating processes to address the scarcity of skilled resources e) Enabling the power of combating crime together Secure Enhance risk-prioritised controls to protect against known & emerging threats, & comply with industry cybersecurity standards & regulations Vigilant Detect violations & anomalies through better situational awareness across the environment Resilient Establish the ability to quickly return to normal operations & repair damage to the business Actionable threat intelligence Strategic organisational approach Cybersecurity: The changing role of audit committee and internal audit 9
10 Once the cyber risks have been identified, the 3 objectives within the cybersecurity plan can be used to map the programme and governance to mitigate or address those risks. Who might attack? What are they after, and what business risks do I need to mitigate? What tactics might they use? Cyber Risk Program and Governance Secure Are controls in place to guard against known and emerging threats? Vigilant Can we detect malicious or unauthorised activity, including the unknown? Resilient Can we act and recover quickly to reduce impact? Theft if IP / strategic plans Financial fraud Reputation damage Business disruption Destruction of critical infrastructure Threats to health and safety Governance and operating model Policies and standards Management processes and capabilities Risk reporting Risk awareness and culture Threat intelligence Security monitoring Behavioral analysis Risk analytics Cyber criminals Hactivists (agenda driven) Nation states Insiders / partners Competitors Skilled individual hacker Spear phishing, drive by download, etc. Software or hardware vulnerabilities Third party compromise Multi-channel attacks Stolen credentials Perimeter defenses Vulnerability management Asset management Identity management Secure SDLC Data protection Incident response Forensics Business continuity / disaster recovery Crisis management 3.1 Cyber Risk Appetite and Tolerance Risk appetite and tolerance must be a high priority on the board agenda. It is a core consideration in an enterprise risk management approach. Risk appetite can be defined as the amount and type of risk that an organisation is willing to take in order to meet its strategic objectives. Every organisation possess different risk appetites depending on their sector, culture and objectives. A range of appetites exist for a diverse portfolio of risks, which may change over time according to the risk portfolio. While risk appetite is interpreted differently, there is general consensus that effective communication of an appropriate risk appetite statement can help organisations achieve their goals and sustain their operations. Management should develop an understanding of the cyber-criminal, their objectives, and how the attack might happen. The following questions can be used to develop the understanding: 1. Who might attack? 2. What are they after, and what business risks do we need to mitigate? 3. What is the intruder s arsenal? 3.2 A representative Internal Audit Plan to address cyber risk It is imperative that internal audit takes a leading role in determining whether a systematic and disciplined approach exists to evaluate and strengthen the effectiveness of cyber risk management. It should also determine if appropriate cyber security capabilities (people, process, and technology) are in place to protect against cyber threats. 10
11 In developing the internal audit plan for Cyber Security, the 2013 COSO Framework should be used as the framework for guiding the internal audit s approach. Managing cyber risk through a COSO lens enables the board and senior executives to better communicate their business objectives, their definition of critical information systems, and related risk tolerance levels. This enables others within the organisation, including IT personnel, to perform a detailed cyber risk analysis by evaluating the information systems that are most likely to be targeted by attackers, likely methods of attack, and points of intended exploitation. In turn, appropriate control activities can be established to address such risks. Through the COSO cube, organisations may view their cyber risk profile through the components of internal control to manage cyber risks in a secure, vigilant, resilient manner. For example: Operations Reporting Control Environment Risk Assessment Control Activities Information & Communication Monitoring Activities Figure 1 The COSO Cube Compliance Entity Level Division Operating Unit Function a) Control Environment Does the board understand the organisation s cyber risk profile and are they informed of how the organisation is managing the evolving cyber risks management faces? b) Risk Assessment Has the organisation and its critical stakeholders evaluated its operations, reporting and compliance objectives, and gathered information to understand how cyber risk could impact such objectives? c) Control Activities Has the entity developed control activities, including general control activities over technology that enable the organisation to manage cyber risk within the acceptable level of tolerance to the organisation? Have such control activities been deployed through formalized policies and procedures? d) Information and Communication Has the organisation identified information requirements to manage internal control over cyber risk? Has the organisation defined internal and external communication channels and protocols that support the functioning of internal control? How will the organisation respond to, manage, and communicate a cyber risk event? e) Monitoring Activities How will the organisation select, develop, and perform evaluations to ascertain the design and operating effectiveness of internal controls that address cyber risks? When deficiencies are identified how are these deficiencies communicated and prioritized for corrective action? What is the organisation doing to monitor their cyber risk profile? Cybersecurity: The changing role of audit committee and internal audit 11
12 A cybersecurity assessment can drive a risk-based IT internal audit plan, and audit frequency should correspond to the level of risk identified, and applicable regulatory requirements/expectations. The following table illustrates the detailed cyber risk programme and governance derived from the three key characteristics (secure, vigilant, and resilient) linked to the internal audit plan each year to address the cyber risks. Another approach is to allow some coverage of each area (Secure, Vigilant and Resilient) in each year Cyber security risk and compliance management Secure development life cycle Security program and talent management Secure Compliance monitoring Issue and corrective action planning Regulatory and exam management Risk and compliance assessment and management Integrated req and control framework Secure build and testing Secure coding guidelines Application role design/access Security design/architecture Security/risk requirements Security direction and strategy Security budget and finance management Policy and standards management Exception management Talent strategy Third party management Information and asset management Identify and access management Evaluation and selection Contract and service initiation Ongoing monitoring Service ternination Information and asset classification and inventory Information records management Physical and environment security controls Physical media handling Account provisioning Privileged user managment Access certification Access management and governance Threat and vulnerability management Data management and protection Risk analytics Vigilent Incident response and forensics Application security testing Threat monitoring and interlligence Security event monitoring and logging Penetration testing Vulnerability management Data classification and inventory Breach notification and management Data loss prevention Data security strategy Data encryption and obfuscation Records and mobile device management Information gathering and analysis around: - User, account, entity - Events/incidents - Fraud and anti-money laundering - Operational loss Crisis management and resilency Security operations Security awareness and training Resilient Recovering startegy, plans, and procedures Testing and exercising Business impact analysis Business continuity planning Disaster recovery planning Change management Configuration management Network defense Security operations management Security architecture Security training Security awareness Third party responsibilities SOX (financially releveant systems only) Penetration and vulnerability testing BCP/DRP Testing 12
13 4. Looking Ahead As recently as five years ago, it was rare for a board of directors to be closely involved in managing cybersecurity risks, but rapid advancements in technology, coupled with a corresponding increase in the sophistication of cyber criminals and cyber legislation, have made it essential for the board and audit committee to be informed and proactive. New technologies continue to shape the physical and virtual borders of organisations, which must frequently review and quickly adapt policies to address emerging issues. Cybersecurity specialists are developing increasingly sophisticated approaches for preventing, detecting, and responding to security breaches, but no single solution can address all the evolving challenges associated with cyber threats. It remains important to apply prudent and adaptable controls to respond to changes in the threat landscape, and to have strong response and resiliency plans in place in the event of an attack. Increasingly, cybersecurity is becoming a top-of-mind issue for most CEOs and boards, and they are becoming more preemptive in evaluating cybersecurity risk exposure as an enterprise-wide risk management issue, not limiting it to an IT concern. Cybersecurity: The changing role of audit committee and internal audit 13
14 Authors Siah Weng Yew Executive Director, Risk Consulting Tan Ing Houw Director, Risk Consulting Thio Tse Gan Executive Director, Risk Consulting Diona Lim Assistant Manager, Clients & Markets Kenneth Leong Director, Risk Consulting Contacts SEA and Singapore Indonesia Philippines Thailand Thio Tse Gan Executive Director Shaharil Abdul Malek Director [email protected] Maria Carmela Migrino Director [email protected] Parichart Jiravachara Executive Director ext [email protected] Jeffery Tan Executive Director [email protected] Edna Yap Director [email protected] Malaysia Megat Mohammad Faisal Director [email protected] Pinyo Treepetcharaporn Director ext ptreepetcharaporn@ deloitte.com Leslie Moller Director [email protected] 14
15 15
16 Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ( DTTL ), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as Deloitte Global ) does not provide services to clients. Please see for a more detailed description of DTTL and its member firms. Deloitte provides audit, consulting, financial advisory, risk management, tax and related services to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries and territories, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte s more than 220,000 professionals are committed to making an impact that matters. About Deloitte Southeast Asia Deloitte Southeast Asia Ltd a member firm of Deloitte Touche Tohmatsu Limited comprising Deloitte practices operating in Brunei, Cambodia, Guam, Indonesia, Lao PDR, Malaysia, Myanmar, Philippines, Singapore, Thailand and Vietnam was established to deliver measurable value to the particular demands of increasingly intra-regional and fast growing companies and enterprises. Comprising 270 partners and over 7,000 professionals in 25 office locations, the subsidiaries and affiliates of Deloitte Southeast Asia Ltd combine their technical expertise and deep industry knowledge to deliver consistent high quality services to companies in the region. All services are provided through the individual country practices, their subsidiaries and affiliates which are separate and independent legal entities. About Deloitte Singapore In Singapore, services are provided by Deloitte & Touche LLP and its subsidiaries and affiliates Deloitte & Touche Enterprise Risk Services Pte Ltd
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Where insights lead Cybersecurity and the role of internal audit: An urgent call to action
Where insights lead Cybersecurity and the role of internal audit: An urgent call to action The threat from cyberattacks is significant and continuously evolving. One estimate suggests that cybercrime could
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Cyber-Security: Proactively managing the cyber threat landscape
Cyber-Security: Proactively managing the cyber threat landscape Agenda Understanding the cyber threat landscape Building a resilient Cyber Risk capability An Internal Audit approach Closing thoughts Understanding
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
www.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
Cyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks
Cyber security: everybody s imperative A guide for the C-suite and boards on guarding against cyber risks Secure Enhance risk-prioritized controls to protect against known and emerging threats, and comply
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
A HELPING HAND TO PROTECT YOUR REPUTATION
OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
Cyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
Who s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Managing Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response
Cybersecurity and Hospitals What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response This resources was prepared exclusively for American Hospital Association members by Mary
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Capital Requirements Directive Pillar 3 Disclosure. December 2015
Capital Requirements Directive Pillar 3 Disclosure December 2015 1. Background The purpose of this document is to outline the Pillar 3 disclosures for BlueBay Asset Management LLP ( BlueBay ). BlueBay
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
Assessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
ISO27032 Guidelines for Cyber Security
ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance
¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India
CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014
www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Cybersecurity. Considerations for the audit committee
Cybersecurity Considerations for the audit committee Insights on November 2012 governance, risk and compliance Fighting to close the gap Ernst & Young s 2012 Global Information Security Survey 2012 Global
POLICIES TO MITIGATE CYBER RISK
POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various
Cybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
Cyber Security: Confronting the Threat
09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%
Answering your cybersecurity questions The need for continued action
www.pwc.com/cybersecurity Answering your cybersecurity questions The need for continued action January 2014 Boards and executives keeping a sustained focus on cybersecurity do more than protect the business:
CYBERSECURITY IN HEALTHCARE: A TIME TO ACT
share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
PRIORITIZING CYBERSECURITY
April 2016 PRIORITIZING CYBERSECURITY Five Investor Questions for Portfolio Company Boards Foreword As the frequency and severity of cyber attacks against global businesses continue to escalate, both companies
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
12/11/15. Evolving Cybersecurity Risks. Agenda. The current cyber risk landscape Overview. Results on EY s Global Information Security Survey
Evolving Cybersecurity Risks Results on EY s Global Information Security Survey Agenda Market insights: What are we seeing? Factoring cybersecurity into your planning and risk appetite Marketplace response
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3
GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party
developing your potential Cyber Security Training
developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Key Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
OECD PROJECT ON CYBER RISK INSURANCE
OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years.
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
State of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
