Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA
|
|
|
- Diana Wilkerson
- 10 years ago
- Views:
Transcription
1 Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA
2 HANS HENRIK BERTHING Married with Louise and dad for Dagmar and Johannes CPA, CRISC, CGEIT, CISA and CIA ISO 9000 Lead Auditor Partner and owner for Verifica Financial Audit, since 1994 and IT Assurance since 1996 Member of FSR IT Advisory Board ISACA IT Assurance Task Force Instructor, facilitator and speaker Associated professor Aalborg University (Auditing, Risk & Compliance)
3 AGENDA SLIDE Cybercrime Cyber Governance IT Assurance Cyber Crime assurance Cloud Governance 3
4 LEARNING OBJECTIVES Know what cyber- and cloud-specific questions the BoD and C- suite need to ask Understand the potential areas of risk that an organization has related to cybersecurity Learn how the IT Auditor can provide assurance over cybersecurity issues Learn the assurance considerations for cloud computing
5 BUSINESS BENEFITS OF CLOUD COMPUTING Cloud strategies make the enterprise more efficient and agile. Cloud computing allows delivered services to be more innovative and more competitive. Cloud computing reduces overall operating costs. How confident can boards be that management plans will achieve these benefits? 5 Source: CLOUD GOVERNANCE: Questions Boards of Directors Need to Ask, 2013, ISACA
6 GOVERNANCE AND CHANGE ISSUES WITH CLOUD COMPUTING Strategic direction of the business and of IT Changes to meet performance objectives IT is aligned with the business Systems are secure Risk is managed 6 Source: Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives, 2009, ISACA
7 BOARD AND CYBER SECURITY A primary responsibility of every board of directors is to secure the future of the organization. The very survival of the organization depends on the ability of the board and management not only to cope with future events but to anticipate the impact those events will have on both the company and the industry as a whole. Tom Horton 7
8 8 CYBERCRIME Cybercrime is a fast-growing area of crime. More and more criminals are exploiting the speed, convenience and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, either physical or virtual. Interpol Attacks against computer hardware and software, for example, botnets, malware and network intrusion; Financial crimes, such as online fraud, penetration of online financial services and phishing; Abuse, especially of young people, in the form of grooming or sexploitation. Cybercrime reports continue to rise. Fourth-most reported type of crime in PWC s 2014 Crime survey. Cybercrime is not just a technology problem. It is a business strategy problem. Oil and energy industry in Norway is under attack, August 30, 2014 Cyber Security for Nuclear Power Plants, US, January 2012 updated April 2015 Police are investigating a "significant and sustained cyber-attack" on the TalkTalk website, the UK company says, October Convention on Cybercrime, As of September 2015, 47 states have ratified the convention, seven states had signed the convention but not ratified it Danish Water Plants potential attack, November 2015
9 CYBER SECURITY FOR NUCLEAR POWER PLANTS Critical safety, security and emergency preparedness systems at nuclear energy facilities are isolated from the Internet. Protected by cyber security and physical security plans Nuclear power plants are designed to shut down safely Industry began addressing cyber security after Sept. 11, Ordered to enhance security in several areas and subsequently codified the new requirements in New cyber security requirements. NRC-approved cyber security program. Mandatory, enforceable cyber security standards 2014 revised cyber security rule to align with the intent to protect public health and safety by preventing radiological sabotage. Source: Nuclear Energy Institute, April 2015
10 TALKTALK ATTACK, OCTOBER 2015 "TalkTalk Number constantly of customers updates (personal its systems details) to 156,959 make sure they are as secure 15,656 as bank possible account against numbers the rapidly and sort evolving codes threat were accessed; of cyber crime, 28,000 impacting obscured an credit increasing and debit number card of numbers individuals that and were organisations," accessed cannot says be TalkTalk used for CEO financial Dido transactions, Harding. "We and take were any threat orphaned, to the security meaning of that our customers customers' cannot data extremely be identified seriously by the and stolen we data. are taking all the necessary steps to understand what has happened here." Forensic analysis of the site confirms that the scale of the attack was much more limited than initially suspected. Only 4% of TalkTalk customers sensitive personal data at risk. Difficult decision to notify all our customers of the risk. We believe we had a responsibility to warn customers Source: TalkTalk website Status of October 21, 2015 attack, November 6/10, 2015
11 2015 IT RISK/REWARD BAROMETER EUROPE Source: ISACA 2015 IT Risk/Reward Barometer Europe Results, October 2015
12 CYBERATTACK ISACA SURVEY When was your last Cyberattack/Breach: Greater than 18 months months 6-12 months 2-6 months Last 60 days Never 11.03% 11.03% 8.09% 14.71% 38.97% 16.18% Respondent:126 partipants. Please take the poll under Session 211: Panel Discussin moderate by Rob Stroud Source: Poll at EuroCacs/ISRM 2015, November 10, 2015
13 THE BOARD S PERCEPTION OF CYBERSECURITY RISKS OVER THE LAST ONE TO TWO YEARS Source: IIA s Audit Executive Center Pulse of the Profession Geopolitical, macroeconomic, and cyber-related surprises have become almost routine. Source: IIA s July Global Pulse of Internal Audit
14 BOARD INVOLVEMENT DURING THE LAST FISCAL YEAR IN REGARD TO SPECIFIC ACTION OR REQUEST ON CYBERSECURITY PREPAREDNESS? Source: IIA s Audit Executive Center Pulse of the Profession % of the respondents said that they should be actively involved in cybersecurity matters. Rarely a day goes by without reference to new global threat or cyberattack. 14 Source: IIA s July Global Pulse of Internal Audit
15 FIVE PRINCIPLES FOR CORPORATE BOARDS: AS THEY SEEK TO ENHANCE THEIR OVERSIGHT OF CYBER RISKS 1. Directors need to understand and approach cybersecurity as an enterprisewide risk management issue, not just an IT issue. 2. Directors should understand the legal implications of cyber risks as they relate to their company s specific circumstances. 3. Boards should have adequate access to cybersecurity expertise, and discussions about cyber-risk management should be given regular and adequate time on the board meeting agenda. 4. Directors should set the expectation that management will establish an enterprise-wide risk management framework with adequate staffing and budget. 5. Board-management discussion of cyber risk should include identification of which risks to avoid, accept, mitigate, or transfer through insurance, as well as specific plans associated with each approach. 15 The National Association of Corporate Directors (NACD), in conjunction with the American International Group (AIG) and the Internet Security Alliance (ISA), 2014
16 SIX QUESTIONS THE BOARD SHOULD ASK REGARDING CYBER SECURITY 1. Does the organization use a security framework? 2. What are the top five risks the organization has related to cybersecurity? 3. How are employees made aware of their role related to cybersecurity? 4. Are external and internal threats considered when planning cybersecurity program activities? 5. How is security governance managed within the organization? 6. In the event of a serious breach, has management developed a robust response protocol? 16 Cybersecurity what the Board of Directors need to ask, IIARF Research Report, 2014
17 POTENTIAL RISK AREAS 1. Proliferation of BYOD and smart devices 2. Cloud computing 3. Outsourcing of critical business processes to a third party (and lack of controls around third-party services) 4. Disaster recovery and business continuity 5. Periodic access reviews 6. Log reviews 17 Cybersecurity what the Board of Directors need to ask, IIARF Research Report, 2014
18 COMMON CYBERCRIMINAL ATTACK VECTORS Application vulnerabilities Remote access. Ineffective patch management Weak network security/flat networks Lack of real-time security monitoring Third parties Lack of a data retention policy 18
19 INFORMATION ASSURANCE AND CYBERSECURITY Protecting the most important digital information assets According to the Department of Homeland Security, cyber intrusions and attacks have increased dramatically over the last decade, exposing sensitive personal and business information, disrupting critical operations, and imposing high costs on the economy. Anyone connected to the internet is vulnerable. Various research is identifying new ways to protect critical public and private information infrastructure; helping organizations monitor potential security risks; and developing courses and realworld simulations to educate information assurance and Cybersecurity professionals 19
20 20 EXPERTISE AND RESEARCH IN INFORMATION ASSURANCE AND CYBER SECURITY Applicability Risk assessment and management Developing security policies and rights management systems Identifying security awareness issues within organizations and recommending processes to overcome them Implementing or integrating security tools and applications Assessing software and information architecture for security Assessing network security Implementing intrusion detection, forensics and timely response processes Protecting privacy and increasing awareness Implementing next generation infrastructure and applications Detection of emerging opinions and opinion leaders in emerging media
21 IT ASSURANCE TASKS IT Governance and Assurance IT Security Strategy and policies/guidelines Implementation Project risk management Cyber Assurance Assessment of maturity and GAP analysis Risk workshop Facilitator 21
22 22 UNDERSTAND THE BUSINESS & INTERNAL CONTROLS ISA 315 In understanding the entity s control activities, the auditor shall obtain an understanding of how the entity has responded to risks arising from IT Use of IT (a potential related business risk might be, for example, that systems and processes are incompatible). A39 Management s failure to commit sufficient resources to address IT security risks may adversely affect internal control by allowing improper changes to be made to computer programs or to data, or unauthorized transactions to be processed A82 The use of IT affects the way that control activities are implemented. From the auditor s perspective, controls over IT systems are effective when they maintain the integrity of information and the security of the data such systems process, and include effective general IT-controls and application controls. A103 Inconsistencies between the entity s IT strategy and its business strategies. APP 2
23 IT BENEFITS AN ENTITY S INTERNAL CONTROL Consistently apply predefined business rules and perform complex calculations in processing large volumes of transactions or data; Enhance the timeliness, availability, and accuracy of information; Facilitate the additional analysis of information; Enhance the ability to monitor the performance of the entity s activities and its policies and procedures; Reduce the risk that controls will be circumvented; and Enhance the ability to achieve effective segregation of duties by implementing security controls in applications, databases, and operating systems. 23 Source: ISA 315 Appendix 62
24 IT POSES SPECIFIC RISKS TO INTERNAL CONTROL 24 Reliance on systems or programs that are inaccurately processing data, processing inaccurate data, or both. Unauthorized access to data that may result in destruction of data or improper changes to data, including the recording of unauthorized or nonexistent transactions, or inaccurate recording of transactions. Particular risks may arise where multiple users access a common database. The possibility of IT personnel gaining access privileges beyond those necessary to perform their assigned duties thereby breaking down segregation of duties. Unauthorized changes to data in master files or to systems or programs. Failure to make necessary changes to systems or programs. Inappropriate manual intervention. Potential loss of data or inability to access data as required. Source: ISA 315 Appendix 63
25 IT ENVIRONMENT 25 People and organization Applications and infrastructure IT processes Understanding of the IT environment and its planned changes (IT strategies) Work relating to the IT environment depends of likelihood of material business and audit risks and complexity of the IT environment Document the work Complexity of IT environment (in addition to local guidance) Changes in the IT environment (IT strategy/action plans) Organization of the IT function Regulatory requirements
26 IIA THIRD LINE OF DEFENSE 26
27 CYBERCRIME AUDIT/ASSURANCE PROGRAM 1. Planning and Scoping the Audit 2. Understanding Supporting Infrastructure 3. Governance 4. Organization 5. Organizational Policies 6. Business Role in Cybercrime Prevention 7. IT Management 8. Incident Management Policy And Procedures 9. Incident Management Implementation 10. Crisis Management 27
28 GOVERNANCE QUESTIONS ABOUT CLOUD 1. Do management teams have a plan for cloud computing? Have they weighed value and opportunity costs? 2. How do current cloud plans support the enterprise s mission? 3. Have executive teams systematically evaluated organizational readiness? 4. Have management teams considered what existing investments might be lost in their cloud planning? 5. Do management teams have strategies to measure and track the value of cloud return vs. risk? 28 Source: CLOUD GOVERNANCE: Questions Boards of Directors Need to Ask, 2013, ISACA
29 TRUE ABOUT PRIVATE CLOUD, PUBLIC CLOUD AND HYBRID CLOUD (N =904) 29 Source: IT Risk/Reward Barometer: Europe, 2012, ISACA (n=980)
30 BUSINESS CHALLENGES TO CONSIDER 30 Source: ISACA Cloud Computing Vision Series White Paper July 2012
31 RISKS AND SECURITY CONCERNS WITH CLOUD COMPUTING Reputation, history and sustainability of the provider Failure to perform to agreed-upon service levels Where information actually resides Third-party access to sensitive information Compliance to regulations and laws in different geographic regions (Public Clouds) Information may not be immediately located Source: Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives, 2009, ISACA 31
32 ASSURANCE CONSIDERATIONS Transparency Privacy Compliance Trans-border information flow Certification 32 Source: Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives, 2009, ISACA
33 POSITIVE AND NEGATIVE INFLUENCES ON CLOUD ADOPTION AND INNOVATION Proces Bus Growth Bus Growth Proces Proces Bus Growth Proces Bus Growth Bus Growth Proces Bus Growth 33 Source: Cloud Computing Market Maturity Study Results, 2012, ISACA & CSA
34 PERSPECTIVES ON SECURITY AND ASSURANCE COMPONENTS 34
35 ADDITIONAL RESSOURCES 35 Cybersecurity Nexus, ISACA Cybercrime Audit Assurance Program, 2012, ISACA Cybersecurity What the Board of Directors Needs to Ask, 2014, IIARF Research Report Transforming cybersecurity using cobit5, 2013, ISACA US cybercrime: Rising risks, reduced readiness Key findings from the 2014 US State of Cybercrime Survey, PWC PwC s Global Economic Crime Survey Interpol and National Cyber Crime Investigation & Research Responding to Targeted Cyberattacks, 2014, ISACA & EY ISACA Knowledge Center: Cybersecurity Nexus Plus many more
36 SUMMARY Cyber Governance & Assurance business critical Where and how to add value and manage risk for the business. Organization of any scale can be cyber attacked Ask Cyber & cloud-specific questions to B-o-D and C-suite Cloud computing are aligned to the enterprise strategy. Security and assurance. Keep updated via research and white paper 36
37 QUESTIONS Associated Professor & Statsautoriseret Revisor Hans Henrik Aabenhus Berthing CGEIT CRISC CISA CIA Phone: Mobile Verifica Statsautoriseret Revisionsvirksomhed
Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014
Aalborg Universitet Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication
Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit 2020. Abstract from Nordic ISACA Conference 2014, Oslo, Norway.
Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation
Aalborg Universitet. Cloud Governance Berthing, Hans Henrik Aabenhus. Publication date: 2013. Document Version Preprint (usually an early version)
Aalborg Universitet Cloud Governance Berthing, Hans Henrik Aabenhus Publication date: 2013 Document Version Preprint (usually an early version) Link to publication from Aalborg University Citation for
Strategic IT audit. Develop an IT Strategic IT Assurance Plan
Strategic IT audit Develop an IT Strategic IT Assurance Plan Speaker Biography Hans Henrik Berthing is Partner at Verifica and Senior Advisor & Associated Professor at Aalborg University. He is specialized
Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
Adopting a Cybersecurity Framework for Governance and Risk Management
The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
Who s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
Cybersecurity@RTD Program Overview and 2015 Outlook
Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
CYBERSECURITY EXAMINATION SWEEP SUMMARY
This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts
CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
www.pwc.com/mt Internal Audit Takes On Emerging Technologies
www.pwc.com/mt In Internal Audit Takes On Emerging Technologies Contents Introduction 2 Cloud Computing & Internal Audit 3 Smart Devices/ Technology & Internal Audit 6 Social Media & Internal Audit 8 Cyber
Information Security and Risk Management
Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
FINRA Publishes its 2015 Report on Cybersecurity Practices
Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February
Committees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
What Directors need to know about Cybersecurity?
What Directors need to know about Cybersecurity? W HAT I S C YBERSECURITY? PRESENTED BY: UTAH BANKERS ASSOCIATION AND JON WALDMAN PARTNER, SENIOR IS CONSULTANT - SBS 1 Contact Information Jon Waldman Partner,
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
2 0 1 4 F G F O A A N N U A L C O N F E R E N C E
I T G OV E R NANCE 2 0 1 4 F G F O A A N N U A L C O N F E R E N C E RAJ PATEL Plante Moran 248.223.3428 [email protected] This presentation will discuss current threats faced by public institutions,
The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant
THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
Ed McMurray, CISA, CISSP, CTGA CoNetrix
Ed McMurray, CISA, CISSP, CTGA CoNetrix AGENDA Introduction Cybersecurity Recent News Regulatory Statements NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Questions Information Security Stats
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013
IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 Debbie Lew Agenda Review what is IT governance Review what is IT risk management A discussion of key IT risks to be aware of Page 2
The Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski
IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 [email protected] Managing
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
NIST Cybersecurity Framework & A Tale of Two Criticalities
NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager [email protected] Presented
Cloud Computing. Cloud Computing An insight in the Governance & Security aspects
Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010
Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015
Risky Business Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 What We ll Cover About Me Background The threat Risks to your organization What your organization can/should
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
CYBERSECURITY HOT TOPICS
1 CYBERSECURITY HOT TOPICS Secure Banking Solutions 2 Presenter Chad Knutson VP SBS Institute Senior Information Security Consultant Masters in Information Assurance CISSP, CISA, CRISC www.protectmybank.com
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
IT Governance. What is it and how to audit it. 21 April 2009
What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
How small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
Information Security Governance:
Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
Aalborg Universitet. Data Security, Data Breaches and Security Alerts Berthing, Hans Henrik Aabenhus. Publication date: 2012
Aalborg Universitet Data Security, Data Breaches and Security Alerts Berthing, Hans Henrik Aabenhus Publication date: 2012 Document Version Preprint (usually an early version) Link to publication from
Protecting Organizations from Cyber Attack
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics
Department of Homeland Security
Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
Technology Risk Management
1 Monetary Authority of Singapore Technology Risk Guidelines & Notices New Requirements for Financial Services Industry Mark Ames Director, Seminar Program ISACA Singapore 2 MAS Supervisory Framework Impact
2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview
Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Identifying and Managing Third Party Data Security Risk
Identifying and Managing Third Party Data Security Risk Legal Counsel to the Financial Services Industry Digital Commerce & Payments Series Webinar April 29, 2015 1 Introduction & Overview Today s discussion:
Developing National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
Vendor Management. Outsourcing Technology Services
Vendor Management Outsourcing Technology Services Objectives Board and Senior Management Responsibilities Risk Management Program Risk Assessment Service Provider Selection Contracts Ongoing Monitoring
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
How GCs And Boards Can Brace For The Cybersecurity Storm - Law360
Page 1 of 6 Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] How GCs And Boards Can Brace For The Cybersecurity
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
GEARS Cyber-Security Services
Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
Cyber Risk Management with COBIT 5
Cyber Risk Management with COBIT 5 Marco Salvato CISA, CISM, CGEIT, CRISC, COBIT 5 Approved Trainer 1 Agenda Common definition of Cyber Risk and related topics Differences between Cyber Security and IS
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
Collateral Effects of Cyberwar
Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global
Ensuring Cloud Security Using Cloud Control Matrix
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 933-938 International Research Publications House http://www. irphouse.com /ijict.htm Ensuring
