ISO27032 Guidelines for Cyber Security
|
|
|
- Bernard Norman
- 10 years ago
- Views:
Transcription
1 ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience
2 Contents Foreword 1 Cyber governance guidelines 2 Technical controls 3 Information sharing and incident handling 4 Emerging cyber themes 5 About Deloitte 6
3 Foreword A clearer way ahead for Cybersecurity The increasing volume and sophistication of Cybersecurity threats including Advanced Persistent Threats (APT), nation state sponsored threats and targeting phishing scams demand that organisations, big and small, remain vigilant about securing systems and information accessible from the internet. In August 2012, the International Organization for Standardization (ISO) released a set of guidelines for Cybersecurity (ISO 27032), providing guidance for improving Cybersecurity and drawing out the unique aspects of that activity and its dependencies on other security domains, such as information security, application security, network security and Internet security as the fundamental building blocks. While the 62-page document leaves many unanswered questions regarding best practice Cybersecurity frameworks and implementations, ISO s central purpose remains simple: to provide stakeholders involved in Cybersecurity with a set of guidelines to refer to when implementing minimum controls across their organisations to protect against the risks of the Cyberspace. ISO27032 Guidelines for Cybersecurity has not been released as an auditable international standard. Maria Lazarte Spokesman for the International Organisation for Standardization (ISO) Even with the uncertainty, organisations involved in the Cyberspace should be encouraged that the picture surrounding Cybersecurity standards is brightening. The guidelines released contain numerous controls that indicate the International Organization for Standardization took influential industry comments into consideration. The scale of Cybersecurity implementation based on this International Standard can be daunting as the requirements cut across business lines, functions, and geographic locations, but a good practice Cybersecurity approach is a manageable task and can be done efficiently. Organisations involved in the Cyberspace should greet ISO27032 with vigilance and scrutiny given it is not intended to be an auditable standard but instead, a set of guidelines to ensure a standard approach to Cybersecurity implementations. In this document, Deloitte UK LLP provides a glimpse into specific provisions of the new International Standard, which is divided into framework domains and capabilities. Governance guidelines adapted from the ISO27001; Cybersecurity technical controls set of technical controls for addressing common Cybersecurity risks to the critical assets identified; Incident information sharing and handling framework guidelines; Emerging themes considerations for Cybersecurity readiness. The following pages will provide Deloitte UK s look at each of the areas and the interpretation of the guidelines and requirements. 8 November 2012 A Deloitte Practical Guide For ISO27032 Guidelines for Cybersecurity 1
4 Cyber governance guidelines The new governance guidelines in this International Standard put more focus on stakeholder roles and responsibilities, policies and procedures The proposed guidelines regarding governance of Cybersecurity are a direct adaptation of the ISO27001 Information Security Management System (ISMS) requirements with the suggestion of extending the scope of the existing ISMS to include the transfer and sharing of information via the Cyberspace. The biggest and, for many, the most welcoming adaptation of the ISO27001 standard in ISO27032 is the dependency on the Risk Assessment process organisations implement to comply with ISO As an organisation in the Cyberspace you are still required to identify your critical assets, identify your threats and vulnerabilities and prioritise the risks to your critical assets which will, in turn, give you a framework for Cybersecurity investment. For organisations aligned or certified to ISO27001, the risk assessment process should be a straightforward activity given the framework is established and implemented. Organisations implementing an ISMS in accordance with ISO27001 will be aligned to the Governance guidelines of ISO27032 once the scope of the ISMS is extended to include Cybersecurity. 8 November 2012 A Deloitte Practical Guide For ISO27032 Guidelines for Cybersecurity 2
5 Technical controls A new approach to technical controls Technical controls defined in this International Standard rely on organisations having a good practice Cybersecurity framework in place leveraging existing ISO/IEC information security frameworks and control implementations at the organisation. The process of implementing the technical controls is simplified if an organisation complies with the ISO/IEC standard. This International Standard introduces Cybersecurity technical controls to protect against: Social engineering attacks; Hacking; Malicious software (malware); Spyware; and Other unwanted software The technical controls include: Secure coding: Secure coding controls must be implemented to secure information collected by products in the Cyberspace. Network monitoring and response: Controls must be implemented to ensure network services remain reliable, secure and available. The Cyberspace should not compromise the quality of network services. Server level controls: Controls must be implemented to ensure servers are securely accessible from the Cyberspace and protected against unauthorised access and malicious content. Application level controls: Implement controls to protect against unauthorised data edits, carry out transaction logging and error handling. End user workstation controls: Controls must be implemented to protect the end user infrastructure across organisations against known exploits and attacks. Organisations should train and educate users on the use of suitable technical controls to protect against known exploits and attacks. As a general guide, technical controls defined in this section of ISO27032 should be implemented. 8 November 2012 A Deloitte Practical Guide For ISO27032 Guidelines for Cybersecurity 3
6 Information sharing and incident handling A formalised framework is suggested to share Cybersecurity information and handle incidents This section in the International Standard provides guidelines for the implementation of a secure, reliable, effective and efficient information sharing and cyber incident response framework. The framework includes the following areas: Policies; Methods and processes; People and management controls; and Technical controls. This International Standard introduces the concepts of IPO and IRO which the ISO advise should feature heavily in the framework developed for information sharing and incident handling. IPO: Information Providing Organisation the sender of the Cybersecurity related information; and IRO: Information Receiving Organisation the recipient of the Cybersecurity information. Framework Entity Policies Methods and Processes Description Policies should be defined to address the lifecycle of the Cybersecurity incident information from creation to transfer and destruction to ensure its confidentiality, integrity and availability are maintained. To implement the policies defined in the framework and ensure consistency in practices of information sharing and incident handling, the appropriate methods and processes should be in place which all parties involved in the information sharing practices follow. People and Management Identify the stakeholders involved in the information sharing and cyber incident handling framework and enable the process by implementing training and awareness controls and investigating potential alliances based on technology, industry or specialist area. Technical Specific techniques for implementing the policies, improving the information sharing processes and automating the management controls to deal with the changing Cybersecurity risk environment. 8 November 2012 A Deloitte Practical Guide For ISO27032 Guidelines for Cybersecurity 4
7 Emerging cyber themes The digital revolution is driving business innovation and growth, yet also exposing us to emerging Cybersecurity threats. This International Standard gives focus to three main themes of Cybersecurity that Intelligence agencies and national bodies concerned with the protection of critical national infrastructure are dedicating research time in understanding in order to provide practical solutions organisations can implement to help mitigate these threats. Dark Net Monitoring Cybersecurity Attack Detection Dark net monitoring is an effective method to analyse malicious traffic. Any traffic on dark net hosts is confirmed as malicious given the IP addresses are not in use. Why the name Dark net? Because there is nothing lit up inside these networks. The real world example of Dark net attacks, is receiving a bill from a company that has gone into administration years ago (e.g., receiving a bill from Woolworths). The bill is obviously illegitimate and does not come from a valid source therefore the person sending this information is a confirmed scammer or attacker. Monitoring these addresses will allow organisations to respond promptly to any illegitimate activity carried out through these network addresses. Trace Back Cybersecurity Attack Investigation Trace back is tracking the attack back to a source hacker/criminal so that one has the ability to punish them and/or ensure they do not conceal themselves and launch new attacks. This will help significantly reduce the number of attacks organisations face every day. The controls are currently very difficult to implement in a practical sense. One reason is that today s Internet is stateless. There is too much data in the Internet to record it all. Another reason is attackers can use IP spoofing and can therefore, for example, through unauthorised access, send millions of s using a valid organisation s address resulting in the mailbox being bombed with millions of replies. Sinkhole Operation Cybersecurity Attack Response A sinkhole operation is defined as a method in which organisations redirect specific IP network traffic that could be malicious for different security reasons including analysis, diversion of attacks and detection of irregular activities. This technology has long been deployed by Tier-1 ISPs globally usually to protect their downstream customers. This International Standard suggests organisations globally should also consider implementing Sinkhole Operations to monitor specific IP traffic without informing the potential attacker, providing valuable intelligence regarding the security threats their networks are facing. 8 November 2012 A Deloitte Practical Guide For ISO27032 Guidelines for Cybersecurity 5
8 About Deloitte Deloitte UK s capabilities We help organisations to prepare for, be aware of and respond to Cybersecurity threats. Deloitte s ability to draw upon a broad range of in-house expertise, insight from the Deloitte global network and strategic relationships with market leading vendors allows us to offer a complete Cyber capability to organisations. Prepare Our skilled practitioners have a track record of delivering strategic cyber simulations and crisis management exercises based on methodologies adopted from military war-games. The team pressure-tests cyber incident management strategy and planning so that hidden errors, false assumptions, gaps in plans and unrealistic expectations are exposed and eliminated before plans have to be deployed in the real world. Aware Our unique relationship with a number of key security technology vendors, combined with our technical expertise and proprietary Cyber Threat Intelligence portal, allows us to offer a tailored view of an organisation s threat landscape. We are able to go beyond standard risk feeds or static reviews, to give organisations actionable, timely and integrated cyber threat intelligence. Respond Effective cyber incident response requires flexibility and the ability to make proactive decisions, often with limited intelligence. Deloitte s ability to draw upon a broad range of in-house expertise allows us to provide the incident management and response services along with investigation and remediation to help steer organisations through cyber incidents. For more information, please see our online resources: Or contact us: [email protected] 8 November 2012 A Deloitte Practical Guide For ISO27032 Guidelines for Cybersecurity 6
9 Member of Deloitte Touche Tohmatsu Limited Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited ( DTTL ), a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see for a detailed description of the legal structure of DTTL and its member firms. Deloitte LLP is the United Kingdom member firm of DTTL. This publication has been written in general terms and therefore cannot be relied on to cover specific situations; application of the principles set out will depend upon the particular circumstances involved and we recommend that you obtain professional advice before acting or refraining from acting on any of the contents of this publication. Deloitte LLP would be pleased to advise readers on how to apply the principles set out in this publication to their specific circumstances. Deloitte LLP accepts no duty of care or liability for any loss occasioned to any person acting or refraining from action as a result of any material in this publication Deloitte LLP. All rights reserved. Deloitte LLP is a limited liability partnership registered in England and Wales with registered number OC and its registered office at 2 New Street Square, London EC4A 3BZ, United Kingdom. Tel: +44 (0) Fax: +44 (0)
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
Cyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
Robotic Process Automation Overview and RPA Case Study. November 2015
Robotic Process Automation Overview and RPA Case Study November 2015 Big data?! Effective data management?! 2 What is Robotic Process Automation (RPA)? Software! Robots are Robots are not Computer coded
Global Mobility for Professional Practices Managing a mobile workforce
Global Mobility for Professional Practices Managing a mobile workforce Overview Global Mobility has become a prominent theme as Professional Practice Firms have expanded internationally. Their global strategies,
Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit
Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit 2014 Welcome to our third annual review of the IT hot topics facing Internal Audit functions within
The Internal Audit fraud challenge Prevention, protection, detection
The Internal Audit fraud challenge Prevention, protection, detection Contents Introduction to survey 1 Key findings 2 What are the views of senior management? 3 Adequately resourced? 6 Current trends and
The Internet of Things Risks and Challenges
The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat
Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015
Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
The robots are coming. A Deloitte Insight report
The robots are coming A Deloitte Insight report Definitions For the purpose of this report robotic process automation is defined as the software (commonly known as a robot ) used to capture and interpret
Deloitte Service Code: D-G6-L4-543 December 2014
Managed Cyber Security Cyber Intelligence Centre Deloitte LLP Service Deloitte Service Code: D-G6-L4-543 December 2014 Contents 1 Service Overview 1 2 Detailed Service Definition 2 3 Pricing 6 4 Ordering
Enhanced Portfolio Management in uncertain times
Enhanced Portfolio Management in uncertain times How businesses can generate and protect value through enhanced, risk return techniques improving portfolio and capital allocation decisions Contents Executive
Current issues and trends in the Aerospace supply chain
Current issues and trends in the Aerospace supply chain Iain Subtitle Kirwan runs here 1 line max Director Supply Chain Consulting Global A&D insights and trends Overall global A&D industry expected to
01/ 02/ 03/ 04/ 05/ Beyond borders Deloitte Discovery April 23 rd 2015 Cyprus 1 Going beyond borders to move our clients ahead Deloitte Discovery Services - Deloitte Legal 2 The Deloitte
Deloitte Shared Services, GBS & BPO Conference SMAC / Enabling Technologies and Shared Services in the Public Sector
Deloitte Shared Services, GBS & BPO Conference SMAC / Enabling Technologies and Shared Services in the Public Sector Carolyn Williamson, Hampshire County Council; David Harker, Deloitte 22 23 September
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Annual Shared Services and BPO Conference 2013 Shared services from feasibility through to implementation. Tibor Nagy & Jeppe Larsen
Annual Shared Services and BPO Conference 2013 Shared services from feasibility through to implementation Tibor Nagy & Jeppe Larsen Key considerations Will the corporate vision and goals be reached by
Developmental assignments Enablers not solutions
Developmental assignments Enablers not solutions In this article we will look at the roots of this phenomenon, and outline some strategic principles followed by organisations which successfully optimise
How small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
Evaluating DMARC Effectiveness for the Financial Services Industry
Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC
Deloitte Shared Services, GBS & BPO Conference Shared Services Design Through to Implementation
Deloitte Shared Services, GBS & BPO Conference Shared Services Design Through to Implementation Jo Hart & Charlotte Allen, Deloitte 22 23 September 2015 Berlin, Germany Agenda Shared Services Approach
The enemies ashore Vulnerabilities & hackers: A relationship that works
The enemies ashore Vulnerabilities & hackers: A relationship that works Alexandros Charvalias, Manager CISSP, CISA, ACDA Assurance & Enterprise Risk Services Cyber security maturity model How effectively
Transforming customer management in the water sector How to become a leader in customer service
Transforming customer management in the water sector How to become a leader in customer service management strategies have always been important to water companies, with a focus on resolving issues first
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
CIIA South West Analytics in Internal Audit - Tackling Fraud
CIIA South West Analytics in Internal Audit - Tackling Fraud 10 December 2014 Agenda Intro to Analytics When to use analytics and how to get started Risk Monitoring and Control Automation Common Pitfalls
(BDT) BDT/POL/CYB/Circular-002. +41 22 730 6057 +41 22 730 5484 [email protected]
2011 15 (BDT) BDT/POL/CYB/Circular-002 +41 22 730 6057 +41 22 730 5484 [email protected] 2008 2010 2010 International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland Tel: +41
How To Help Your Business Succeed
G Cloud III Framework Lot 4 (SCS) CHECK Accredited Penetration Testing Services Contents Executive Summary 3 CHECK Accredited Penetration Testing Services 4 Why Deloitte? 5 Package Cost 7 Contact 9 Service
Indirect Tax Conference VAT and Pensions. Alistair Jones & Andrew Dalah Financial Services VAT 14 November 2014
Indirect Tax Conference VAT and Pensions Alistair Jones & Andrew Dalah Financial Services VAT 14 November 2014 Agenda 1. Introduction 2. Liability Wheels ATP Pension Service United Biscuits 3. Employer/Scheme
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
MiFID II/MiFIR. Implications for Fund Managers. May 2014. 2014 Deloitte LLP. All rights reserved.
/MiFIR Implications for Fund Managers May 2014 Webinar participants Manmeet Rana Senior Manager Audit Deloitte UK [email protected] +44 20 7303 8624 Manmeet Rana is a Senior Manager within Deloitte
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Extract of article published in International HR Adviser magazine 2013. The role of HR in global mobility
Extract of article published in International HR Adviser magazine 2013 The role of HR in global mobility Increasingly the regional HR director for Asia Pacific for many large multinationals will be based
D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV
D-G4-L4-231 Data Governance Assessment Design and Implementation Deloitte LLP Service for G- Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 4 3 Commercials 8 4 Our
Managing Complex Transformations Achieving excellence
Managing Complex Transformations Achieving excellence A summary of our transformation management and programme leadership capability in the mining industry February 2009 Contents Introduction 1 Our approach
G Cloud III Framework Lot 4 (SCS) Project Management
G Cloud III Framework Lot 4 (SCS) Project Management Contents Executive Summary 3 Project Management 4 Why Deloitte? 6 SFIA Rate Card 7 Contact 8 Service Definition (a) to (p) 9 Executive Summary PROJECT
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
ESKISP6055.01 Manage security testing
Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting
IFRS industry insights
IFRS Global Office April 2012 IFRS industry insights IASB issues revised exposure draft on revenue recognition insights for the insurance industry The revised ED is the next step in developing an entirely
D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV
D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials 6 4 Our
Cyber intelligence exchange in business environment : a battle for trust and data
Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
BT Assure Threat Intelligence
BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters At all times, organisations are vulnerable to all kinds of cyber attacks
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Finance Transformed. Changing the focus Finance Business Partnering
Finance Transformed Changing the focus Finance Business Partnering Contents Out of the shadows of the back office 1 Striking the right balance in finance 2 Finance finds multiple barriers to becoming a
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Charity Audit Committee performance evaluation Self assessment checklist. October 2014
Charity Audit Committee performance evaluation Self assessment checklist October 2014 With increasing responsibilities and complexities, being a member of the Audit Committee has never been more challenging
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper Safeguarding data through increased awareness November 2015 1 Contents Executive Summary 3 Introduction 4 Martime Security 5 Perimeters Breached
UK Indirect Tax Conference 2015 How does the EU do VAT? Aili Nurk 11 November 2015
UK Indirect Tax Conference 2015 How does the EU do VAT? Aili Nurk 11 November 2015 Contents EU Policy lifecycle of a tax change Influencing making it work in practice EU VAT agenda open dossiers Q&A 2
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.
SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,
Procuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
January 2015. Senior Insurance Managers Regime Strengthening accountability in insurance
January 2015 Senior Insurance Managers Regime Strengthening accountability in insurance Contents Introduction 1 Key points 2 Implementing Solvency II 3 Implications for Non Executive Directors 4 Practical
SPEAR PHISHING AN ENTRY POINT FOR APTS
SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing
Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a
Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a focus on cyber security Introduction and Executive summary From September
Technology and Cyber Resilience Benchmarking Report 2012. December 2013
Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities
Finance Business Partnering Less than the sum of the parts. Organisational perception of Finance, percentage of respondents agreeing with statements
Finance Business Partnering Less than the sum of the parts Key points Deloitte s research into Finance Business Partnering has analysed the responses of 75 senior Finance executives from UK headquartered
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
I N T E L L I G E N C E A S S E S S M E N T
I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document
Tax Incentives in the Gaming Industry
Tax Incentives in the Gaming Industry Garry Tetley 6 September 2012 Overview of UK Tax Regime for Dynamic Creative Companies Favourable and improving R&D credits, Patent Box, Creative Industries Relief
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations
Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations September 2015 Copyright 2015 Deloitte Development LLC. All rights reserved. This presentation
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
Security-as-a-Service (Sec-aaS) Framework. Service Introduction
Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
IFRS industry insights
IFRS Global Office Issue 1, April 2012 IFRS industry insights IASB issues a revised exposure draft on revenue recognition insights for the financial services industry The revised ED is the next step in
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY
2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 1 EXECUTIVE SUMMARY INTRODUCING THE 2015 GLOBAL THREAT INTELLIGENCE REPORT Over the last several years, there has been significant security industry
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
D-G4-L4-253 Data Loss Prevention Risk Assessment Deloitte LLP Service for G-Cloud IV
D-G4-L4-253 Data Loss Prevention Risk Assessment Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 3 3 Commercials 6 4 Our G-Cloud Services
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?
Compliance Guide: ASD ISM OVERVIEW
Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks July 2014 Cyber Threat Intelligence and Incident Coordination Center: Protecting
