2014 Deloitte-NASCIO Cybersecurity Study State governments at risk: Time to move forward
|
|
|
- Moris White
- 10 years ago
- Views:
Transcription
1 2014 Deloitte-NASCIO Cybersecurity Study State governments at risk: Time to move forward A publication of Deloitte and the National Association of State Chief Information Officers (NASCIO)
2 Contents Message from NASCIO President 2 Foreword 3 Key findings 5 Maturing role of the CISO 6 Budget-strategy disconnect 9 Cyber complexity challenge 13 Talent crisis 17 Emerging trends 21 Moving forward 24 Sources 25 Appendix 26 Acknowledgements 27 About Deloitte & NASCIO 28 Contacts 29 1
3 Message from NASCIO President State Chief Information Officers (CIOs) consistently rank cybersecurity as a primary concern and priority in light of the numerous cyber attacks on state and private sector systems, that ranking is not surprising. In the 2014 Deloitte-NASCIO Cybersecurity Study we asked state Chief Information Security Officers (CISOs) about those concerns and we have highlighted them here. What we found is that insufficient funding, sophisticated threats, and shortage of skilled talent threaten security and put state governments at risk. For example: Although nearly half of the CISOs reported incremental increases to cybersecurity budgets, insufficient funding remains the leading barrier to battling cyber threats Further, approximately 6 in 10 CISOs cited an increase in sophistication of threats, up from roughly half in our 2012 survey Finally, the number citing a shortage of qualified cybersecurity professionals jumped to 59% in 2014 from 46% in 2012 Because of these challenges and the growing number of threats, CISO roles and responsibilities have changed in just the past two years the position is maturing. However, in spite of roadblocks, CISOs continue to launch broad-based awareness campaigns, look for qualified talent and homogenize security practices. CISOs also continue to collaborate with their CIOs, state business leaders and the private sector. The national survey data and recommendations for moving forward provide state CISOs and CIOs with information they need to work through the hurdles they face on a daily basis. Likewise, moving forward, NASCIO will continue to identify cybersecurity as a critical concern and priority of state CIOs, support a policy research agenda, advocate for increased funding and education on threat trends, and aid states in strategies to attract and retain qualified talent. Craig P. Orgeron, PhD NASCIO President and CIO, State of Mississippi 2
4 Foreword Today s media headlines are filled with stories of cybersecurity incidents and their disturbing impact. Despite heightened attention and unprecedented levels of security investment, the number of cyber incidents, their associated costs, and their impact on the lives of U.S. citizens continue to rise. Cyber threats now permeate every aspect of life, and have become an important focus for Chief Executive Officers (CEOs) and board members of private corporations. As we embrace emerging technologies beyond cloud and mobile, such as wearable technology and internet-of-things (IOT), cybersecurity will continue to be critical to business. States have also witnessed an increase of high-impact cybersecurity incidents since 2012 incidents that have attracted public, media, and legislative attention. As a result, governors in affected states had to respond quickly to restore public trust. In 2013, the National Governors Association (NGA) established a resource center for cybersecurity as well as a policy council to advise state governors. Since 2010, Deloitte and NASCIO have conducted biennial surveys of the state government enterprise CISOs to take the pulse of this critical issue. In the 2014 survey, our third to date, we see evidence of states growing focus on improving their cybersecurity posture by placing more responsibility in the hands of CIOs and CISOs. State CIOs and CISOs continue to improve and standardize security services, launch broad-based awareness campaigns, and look for ways to attract the right talent to join them in their fight against cyber threats. However, such advances are inadequate. In light of the increasing severity, volume and sophistication of cyber threats, compounded by lagging discovery times and longer restoration periods, states are becoming more vulnerable to cyber attacks. It is more important now than ever that they continue to identify collaborative approaches for addressing cyber threats. Consider the following: States are facing persistent challenges: CISOs continue to be impeded by constrained budgets, increasing sophistication of threats, and lack of cybersecurity professionals. These remain their top three barriers to fighting cyber threats. State officials are more confident than CISOs: An accompanying survey of state business and elected officials found that 60% had a high level of confidence in the ability of states to protect and defend against external cyber threats. Contrast that to the considerably smaller percentage only a quarter of state CISOs, expressing a similar level of confidence. State leaders need to be better informed regarding the gravity of the situation. This disconnect may significantly undermine the CISOs ability to gain funding and support for cybersecurity programs. CISO role is maturing as well as expanding: Results show that even as CISO responsibilities are evolving to encompass some of the more traditional responsibilities of a corporate risk and compliance executive, many CISOs are also becoming accountable for a range of other areas. CIOs and state leaders need to consider creative ways of allocating and managing these expanding responsibilities. A multi-pronged approach involving Chief Privacy Officers (CPOs), security technology leaders, agency business executives, and governors offices, all working with the CISOs could help gain more executive accountability and support. In this report, we offer thought-provoking suggestions for tackling cybersecurity challenges. It is our hope that states consider these ideas as they evolve and improve their cybersecurity programs. Finally, we would like to acknowledge the support of all those who participated in the 2014 survey as reflected in the outstanding response rate: 49 state CISOs or their equivalents responded to the long version of the CISO survey 186 state officials responded to the accompanying state officials survey Thank you for your continued recognition and efforts in aid of this important issue, and your commitment to helping states protect citizens information and maintain the public trust. Srini Subramanian Principal Deloitte & Touche LLP Doug Robinson Executive Director NASCIO 3
5 Time to Move Forward Trends and Challenges Call to Action $ Strategy Budget Budget disconnect 47.9% have budget increases (YoY); 75.5% cited lack of sufficient CISO role maturing budget as top challenge 98.0% have CISO role; 89.8% of CISOs report to CIO Approved strategies are still largely missing Define and establish new executive roles Support responsibilities with CPO and security technology roles Communicate risks and impacts Periodically communcate to business leaders to obtain commitment and funding Role standardization Over 96% of CISOs shared similar top five functions 45% Absence of approved strategy Document and approve Define cybersecurity strategy to obtain appropriate funding Define and measure Establish metrics, align them to business values Confidence Gap Ability to protect against external attacks; Only 24% CISOs vs. 60% State officials State officials CISOs Cyber threats Increasing sophistication of threats #2 barrier; 74.5% malicious code top external data breach Periodically assess security Stay abreast of emerging technologies and threats; build vigilant and resilient capabilities Collaborate with HR Establish millenials-focused talent management Talent crisis 59% of CISOs choose talent as #3 top barrier; 9 out of 10 choose salary as top barrier to staffing Embrace outsourcing of cybersecurity functions Bridge the talent inadequacy 4
6 Key findings Security is the top priority for state CIOs. While security has always been a priority it has never been at the top of the list until Once considered just another item on state officials busy to-do lists, cybersecurity has moved front and center, an issue that is increasingly drawing the attention not just of Information Technology (IT) departments, but state agency heads, legislators, and governors. The results of the 2014 Deloitte-NASCIO Cybersecurity Study confirm the growing importance of cybersecurity for states. The following key themes emerged from our analysis: Maturing role of the CISO: State CISO role continues to gain legitimacy in authority and reporting relationships. The responsibilities of the position are becoming more consistent across states, yet expanding. CISOs today are responsible for establishing a strategy, execution of that strategy, risk management, communicating effectively with senior executives and business leaders, complying with regulators, and leading the charge against escalating cyber threats using various security technologies. Continuing budget-strategy disconnect: The improving economy and states growing commitment to cybersecurity have led to an increase albeit small, in budgets. CISOs have also been successful at tapping supplemental resources, whether from other state agencies, federal funding, or various agency and business leaders. Nevertheless, budgets are still not sufficient to fully implement effective cybersecurity programs it continues to be the top barrier for CISOs according to the survey results. In addition, survey responses show that there may be additional barriers to securing the budget: namely the lack of well-thought-out and fully vetted cybersecurity strategy. Without solid strategies to help them prioritize their activities, and program metrics that can track their progress, CISOs appear to struggle to gain the financial commitment of business leaders. Cyber complexity challenge: State information systems house a wide range of sensitive citizen data, making them especially attractive targets for cyber attacks. CISOs are concerned about the intensity, volume and complexity of cyber threats that run the gamut from malicious code to zero-day attacks. They need to stay abreast of existing and developing threats and increasing regulations to establish and maintain the security of an information environment that now increasingly extends from internal networks to cloud and mobile devices. Additionally, state officials appear more confident than CISOs in the safeguards against external cyber threats, perhaps a result of ineffective communication of risks and impacts. Talent crisis: The skill sets needed for effective cybersecurity protection and monitoring are in heavy demand across all sectors. Private sector opportunities and salaries are traditionally better than those offered by government. Not surprisingly, state CISOs are struggling to recruit and retain people with the right skills, and they will need to establish career growth paths and find creative ways to build their cybersecurity teams. Furthermore, as states turn to outsourcing and specialist staff augmentation as a means to bridge their cybersecurity talent gaps, it s imperative for CISOs to manage third-party risks effectively. The study compares the responses from CISOs and state officials, along with relevant results from the 2010 and 2012 Deloitte-NASCIO cybersecurity studies. These comparisons provide additional context for evaluating the implications of this year s results. 5
7 I. Maturing role of the CISO Given the enormous array of cyber threats that impact state governments, it is apparent that the state CIOs are looking to the top professional charged with protecting their information assets the CISO. As a result, the CISO position is gaining in importance, becoming better defined, and calling for more consistent capabilities. Maturing role of the CISO 39.6% Governors 100% Awareness and training 100% Strategy and planning 25.0% Secretary/deputy secretary 98.0% Incident management 40.4% State legislature 98.0% Governance (architecture, policies, and standards) 43.8% Business stakeholders 95.9% Risk assessment and management Communication to business leaders is mostly ad hoc While communication/reporting to business leaders is improving, most reporting is still ad hoc in nature Top CISO functions have standardized CISO role is evolving to be more focused on risk management and compliance versus security technology 98.0% Of states have a CISO role 49.0% CISO authority established by statute or law 89.8% CISOs report to CIO 55.1% CISO authority established by secretary or CIO 6
8 CISO role has gained legitimacy Ninety-eight percent of states have established an enterprise CISO role. Today, nine out of ten CISOs report to the CIO or equivalent versus about threequarters in In a further indication that states are acknowledging the importance of CISOs, the position is increasingly being established by either the agency secretary and/ or by statute. The scope of authority for state CISOs is also becoming better defined. In 2014, more CISOs had responsibility for all executive branch agencies compared with two years ago. Conversely, only 2% say their authority does not extend beyond their department, compared with 12% two years ago. Figure 1: Top five cybersecurity initiatives for 2014 Figure X: Top five cybersecurity initiatives for % Incident response New % Continuous security events monitoring; security operations center New % Data protection #2 in 2012 and #1 in % Risk assessments #1 in 2012 and #2 in % Training and awareness #2 in 2012 and #3 in 2010 Responsibilities are becoming more standardized Within the past two years, the CISO role has become better defined position descriptions are more standardized, and expectations across the different states are more consistent. At the same time, the responsibilities associated with the CISO position are expanding rapidly. Compared with 2012, we found that a much higher percentage of CISOs are performing similar functions in a long list of responsibilities. For example, all respondents said they were responsible for strategy and planning, as well as training. Yet, more CISOs indicate they have also taken on oversight of various technical security functions since 2012, including network security and perimeter defense and vulnerability management adding to the increasing list of their responsibilities. The range of top cybersecurity initiatives that CISOs have undertaken indicate more focus to strategy, risk management and compliance functions. Top on their initiative list are performing risk assessments, training and awareness, data protection, continuous event monitoring, and incident response. The Figure state 2: CISOs Top five indicated areas within mandate the following and scope top of the 5 areas within the mandate and scope of the CISO's responsibility: CISO s responsibility 89.8% Hardware 95.9% Information in digital format 87.8% Mobile devices 85.7% Networks 83.7% Software 7
9 Communication has increased, but there is more to do An important component of the CISO s job is communicating with stakeholders from the general public to the governor. Due to the increased visibility of cyber incidents, governors and legislators are requesting formal reports on cybercrime and what is being done to combat it. Nearly four out of five CISOs now send reports to the governors, versus only three out of five in 2012 likewise, the number who send reports to their state legislature has also increased significantly. To satisfy this growing demand for information on cybersecurity, CISOs will need to find better ways to collect and use metrics for monitoring the intensity and frequency of threats, as well as for evaluating the effectiveness of their strategies. CPOs to complement CISOs? Increasingly, states have begun to establish the position of CPO 30% of the states reported that they have a CPO, compared to 18% in This is an encouraging trend because it helps CISOs focus on their mission, while the CPOs aid in communication to business leaders in their citizen privacy and trust advocacy role. Given that CISOs responsibilities include governance, risk management, and compliance, there will be a need for collaboration between CISOs and CPOs on strategy, reporting to business leaders and legislatures, and measurement. Figure 4: States with enterprise CISO and CPO roles CISO 98.0% 96.0% CPO 29.2% 18.0% Figure 3: While reporting has improved, it is still largely ad hoc in nature 35.5% 39.6% 39.9% 25.0% 14.7% 52.1% Governor Secretary/Deputy secretary General counsel/legal or audit committee State legislature 27.7% 40.4% Agency IT and cybersecurity management (Agency CIOs, CISOs) 64.6% 20.8% Business stakeholders 31.3% 43.8% Periodic Ad hoc Moving forward As CISOs take on more and more responsibilities, an important question arises: Have the responsibilities become too diversified for one executive to handle? If so, what priorities take a back seat? The CISO function might evolve to manage three broad areas: a) governance, risk, and compliance; b) privacy; and c) security technology and operations. While one or more positions may still report to an elevated CISO position, having leaders who specialize in each of these areas and assigning them resources can help improve program efficiency. CISOs could continue to manage the strategic, risk management, and regulatory/compliance functions that have always been core to the role. Improving communication with elected and appointed business leaders and agency/program leaders regarding risks, and navigating the increasingly complex regulatory environment, will also be important to their role. Enterprise-level privacy officers can help determine which data needs to be protected and why. They also play an important role safeguarding citizen privacy and restoring trust when an incident occurs. Working together, privacy officers and CISOs are better positioned to gain business leadership support for their programs. The technical and operational aspects of security management are a better fit for a security executive with a deeper IT infrastructure and operations background. 8
10 II. Budget-strategy disconnect Budgets are the financial manifestation of an organization s strategy. CISOs acknowledge that their budgets have increased from past years, but believe they are still insufficient to establish a strong security posture for their states. CISOs continued to cite the lack of adequate funding as the top barrier to program effectiveness, consistent with both the 2010 and 2012 surveys. Budget-Strategy Disconnect Budget-strategy disconnect Additional funding sources are helping with the increase Cybersecurity budgets are increasing year over year 47.9% 14.0% Funding is still the #1 barrier to effective cybersecurity 49.0% 49% U.S. Department of Homeland Security 32.7% Business/program stakeholders 75.5% Lack of sufficient funding Security allocation as part of IT budget remains unchanged Senior Executive commitment is there, but funding still insufficient Percentage of CISO respondents IT budget 46.8% of states have only 1-2% of IT budget for cybersecurity 65.3% Approved strategies are still largely missing Budget-Strategy Disconnect Budget $ Strategy Absence of business-aligned metrics 45% Absence of approved strategy While budgets are seeing some increases, lack of funding is the top challenge Strategies and metrics are not in place to help point dollars to the right direction, or to define new line item requests 47.9% Majority of CISOs continue to work on establishing business-aligned metrics 9
11 The budget landscape is improving After years of strapped budgets, states are allocating more money for cybersecurity. Almost half of the states report increases in year-over-year budgets. This is in contrast to 2012, when more than threequarters of respondents said their budgets were either decreasing or staying the same. CISOs also reported that they have been effective in identifying other sources of funding for cybersecurity initiatives. The majority of CISOs find additional support through such channels as the U.S. Department of Homeland Security, business or program stakeholders, and other state funding sources, as well as Affordable Care Act-related funds. Figure 5: Cybersecurity budgets have increased (YoY) 47.9% Figure Top 7: Top five areas five areas covered covered within the within cybersecurity budgetbudgets 14.0% 31.3% 44.0% 8.4% 34.0% 77.6% 73.5% 69.4% 61.2% 53.1% Budget has increased Budget has remained the same Budget has decreased Sources of additional funding Figure for 6: Additional state cybersecurity sources that contribute initiatives, to fund cybersecurity other than initiatives the cybersecurity budget Awareness/ communication costs Compliance and risk management Incident response Infrastructure protection devices/products Security consultants 49.0% 32.7% 32.7% U.S. Department of Homeland Security (DHS) Business/program stakeholders Other state funding 18.4% 18.4% 16.3% State emergency management Other federal funding Affordable Care Act funding 12.2% 8.2% 6.1% Cybersecurity budget is only Source Compliance regulatory Extramural-Foundations/Grants 10
12 Yet, budget continues to be the top barrier Despite some improvement, cybersecurity still makes up a relatively small portion of states overall IT budgets just under half of respondents place it between 1% and 2%, while an additional 11% say it commands between 3% and 5%. About three-quarters of the CISOs cite the lack of sufficient funding as a major barrier to addressing cybersecurity challenges in their states. Business leaders concur with the CISOs assessment: lack of funding was the most frequently cited barrier to addressing cybersecurity challenges. More than half of the states that reported an uptick in their annual budget since 2012 still say lack of sufficient funding is their biggest barrier further evidence that budgets need to increase substantially to be sufficient. One reason CISOs may be especially concerned about the adequacy of budgets is that they are beginning to take on a broader mission with an increased range of activities. In others words, CISOs are taking on more initiatives with budgets that were already inadequate. CISOs indicate that the leading areas covered in cybersecurity budgets include awareness/communication, compliance and risk management, and incident response. Compared to 2012, more CISOs accept these areas as part of their cybersecurity budgets. As cybersecurity Increasing sophistication needs increase, of threats there continues is also greater to be competition the for #2 barrier (61.2%) since 2010 Figure 8: Lack of sufficient funding continues to be the #1 barrier since 2010 resources among these different initiatives, forcing a need to prioritize. Budgets will certainly need to grow if states are to appropriately fund all the areas encompassed by CISOs expanding missions. Strategy still lags Let s face it. Considering that lack of budget has been cited as a top barrier since this survey s inception in 2010, and that security spending as a percentage of IT still is in the 1% to 2% range, funding will probably always be an issue unless CIOs and CISOs take deliberate actions. Since increasing their budgets is a top priority for CISOs, they need better ways to convince business executives to loosen their purse strings. Yet without a strategic roadmap that is aligned to program priorities, it is hard for them to garner funding from key decision makers. In fact, the survey data suggests that having an approved strategy is an effective way to increase funding. About two-thirds of the CISOs who indicated a rise in their annual cybersecurity budgets Percentage had an approved of overall strategy. IT budget is allocated to cybersecurity. The range of 1-2% has stayed consistent since Figure 9: Percentage of overall IT budget allocated to cybersecurity 0% 8.5% 1-2% 3-5% <10% Other Not Applicable The range of 1-2% has stayed consistent since % 10.6% 8.5% 23.4% 46.8% Lack of sufficient funding 75.5% Figure 10: Half Does of your the states state maintain a cybersecurity a strategy cybersecurity strategy? Increasing sophistication of threats 61.2% Inadequate availability of cybersecurity professionals 59.2% Lack of visibility and influence within the enterprise 49.0% Lack of documented processes 32.7% 55.1% Documented and approved strategy 8.2% Documented, not approved 36.7% Within next 12 months 11 11
13 Measurement is a work in progress In addition to strategy, it is important for CISOs to be able to gauge whether cybersecurity programs are effective. But for this, they need tools such as key risk indicators and metrics, dashboards, and benchmarking to help them assess and report on performance to business leaders. Most CISOs say that measuring and demonstrating effectiveness is a work in progress. While the number of states that have established and regularly report performance metrics has increased slightly, such concrete evaluation is still lacking. About half of CISOs say they are working on establishing metrics, a modest increase from Clearly, this is a significant development opportunity. Improvement is also needed when it comes to conducting assessments of states cybersecurity risk posture. Although the number of states that perform scheduled reviews is increasing, the majority of the CISOs continue to indicate that any reviews they perform are ad hoc in nature. While the number of states that conduct application security vulnerability testing and code reviews on a quarterly basis has nearly doubled since 2012, this still constitutes only about a quarter of states. Frequent communication with business stakeholders regarding cyber risks or system vulnerabilities is a sign of improving program maturity. Another important aspect of measurement is assessing the financial impact of security breaches. More states have begun to calculate the cost of breaches. In 2012, three-fifths of respondents said they either didn t measure monetary damages or didn t know; by 2014, that number had shrunk to The majority of the survey respondents indicated that a third. they continue to work on establishing metrics and aligning them to business value. This has increased Figure 11: Majority from of 39% CISOs indicate 2012 that they and continue 25% to in work on establishing metrics and aligning them to business value Working on establishing metrics and aligning them to business value (This has increased from 39% in 2012 and 25% in 2010.) Established technical metrics, not well understood by functions outside of cybersecurity and IT Little, if any, measurement is undertaken Metrics aligned to business value, reported on a scheduled basis Other 4.2% 12.5% 16.7% 18.8% 47.9% Moving forward Strategy is about prioritizing and deliberately choosing paths. In a highly networked society, it is no longer possible to protect everything equally. Cybersecurity budgets will most likely never be sufficient to cover every need, so CISOs must understand which program components and which information assets are most important and focus their efforts on these. CISOs need to collaborate with legislators and executive leadership to build a business case for security as a line item in the budget. For new technology and business initiatives, CISOs need to work with state CIOs to allocate a reasonable percentage of their budgets to cybersecurity. This will help ensure that future systems incorporate the appropriate cybersecurity measures. Effective collaboration with agency-level program and business leaders is key to getting cybersecurity included in program budgets. As state CIOs move forward with data center consolidation and cloud adoption they should look to CISOs for creative ways to include cybersecurity as a critical part of these enterprise initiatives. 12
14 III. Cyber complexity challenge States today are subject to a growing number of sophisticated cyber attacks that range from data breaches to the political protests of hacktivists individuals who break into computer networks to promote their political agendas. Within just the past few years, a number of high-profile attacks on states have resulted in loss of Personally Identifiable Information (PII) of millions of citizens, including social security numbers, payment card records, dates of birth, driver s license numbers, and tax data. These incidents have cost states millions of dollars in clean-up costs, as well as loss of both revenues and public trust. 1 The problem is not likely to go away any time soon, as cybercriminals Ongoing continue cyber to be battle, drawn to regulatory the wealth of complexity, data residing within each state. and the confidence gap Cyber complexity challenge Confidence Gap Ability to protect against external attacks; Only 24% CISOs vs. 60% State officials Top barriers State officials and CISOs agree #1 Funding State officials CISOs Top 3 cyber concerns 74.5% Malicious code Sophistication and sheer range of cyber threats continue to evolve #2 Sophistication of threats? 53.2% Hactivism 42.6% Zero-day attacks Top external cybersecurity standards used Regulatory complexity is growing Complex and mostly federated state government environment poses governing challenges CISOs and business leaders are not on the same page regarding the states' abilities to protect against cyber threats CMS MARS-E Top 2 regulations for states More regulations introduced OCSE security IRS 1075 updates 93.9% 46.9% NIST standards NIST Cybersecurity Framework % HIPAA 98.0% IRS
15 Cyber threats are a moving target The sophistication and sheer range of cyber threats continue to evolve rapidly, making the CISO s job of safeguarding the state s information assets extremely difficult. Staying current on emerging technologies and the cyber threat landscape is a significant challenge for CISOs; in fact, three out of five survey respondents cited the increasing sophistication of threats as a major barrier to addressing cybersecurity in their states. Layer on budget and talent constraints, and it s even more of an uphill battle. Majority of state CISOs indicated that they are Figure most 12: concerned Top cyber (somewhat threats that higher the CISOs threat are most or very concerned high threat) with with the following cyber threats Phishing and pharming CISOs are especially concerned with activities that prey on vulnerable users of information systems. Eighty percent agree that the next 12 months will bring an increased threat of pharming and phishing scams, while 72% believe the same of social engineering schemes. Another top concern for CISOs is threats that exploit vulnerabilities in mobile devices. It is clear that a focus on end-user education is a priority. Malicious code continues to be the CISO s most dreaded channel for a data breach. But in 2014, two other cyber threats newly added to our list claimed second and third place: hacktivism and zero-day attacks the latter referring to security risks as yet unknown to hardware and software vendors. Figure 13: Adoption of NIST Cybersecurity Framework 1.0 Mobile device threats Social engineering 2.0% No plan to leverage the framework 38.8% Reviewing the framework 18.4% Plan to leverage in 6 months Insecure code Increasing sophistication of threats 28.6% Plan to leverage in one year 2.0% Plan to leverage after one year 14
16 Regulatory complexity is growing In an effort to protect citizen data from cyber threats, federal and state governments have passed a spate of new regulations that stipulate the timeframe for notifying legislators, citizens, and federal agencies when there is a breach. For example, the Internal Revenue Service (IRS) requires incident notification within 24 hours, and the Centers for Medicare and Medicaid Services (CMS) incident notification requirement is an hour from the time a state agency detects an incident has occurred. Within the past two years, CISOs have attempted to address additional security requirements from new regulations, including the CMS Minimum Acceptable Risk Standards for Exchanges (MARS-E), new updates Figure XX: The top leading regulations that the Figure 14: Leading states regulations need to comply with which with states need to comply 95.9% FBI Criminal Justice Information Services 100% Health Insurance Portability and Accountability Act 98.0% Federal IRS publication % Federal Social Security Administration security standards to the Internal Revenue Service (IRS) 1075 publication and the Office of Child Support Enforcement (OCSE) security requirements. Most states adhere to the Commerce Department s National Institute of Standards and Technology (NIST) guidelines. In February 2014, NIST released Version 1.0 of its Cybersecurity Framework to help organizations that oversee the country s financial, energy, health care, and other critical systems secure their information against cyber attacks. 2 The Framework is beginning to gain traction. Nearly two out of five CISOs say they are currently reviewing the Framework, with an additional 47% saying they plan to leverage it within the next six months to a year. Most states appear relatively watchful about reviewing their cybersecurity policies for compliance with regulations and alignment with industry standards. Seventy-five percent of respondents indicated a review within the past year. Both internal and external security audits continue to reveal a number of gaps in state cybersecurity measures. According to the survey, the most frequent gaps are access control, risk assessment, and configuration management. Nearly half of the respondents (49%) indicate a lack of visibility and influence within the enterprise as one of their top barriers, impacting the ability of CISOs to enforce compliance measures consistently across the agencies. Figure 15: Senior executive support (Governor s office or CIO) to address cybersecurity regulatory and legal requirements 65.3% 26.5% 6.1% 2.0% Commitment but inadequate funding Commitment and adequate funding Other No commitment or funds 15
17 CISOs and business leaders have a confidence gap The mostly federated and agency program-driven governance of states makes it a challenge to forge a strong alliance with business, program and elected leaders. Furthermore, regular changes to the appointed and elected leadership is the norm in states which necessitates a deliberate focus on leadership relationship management. The complexity of the state government environment makes CISO/ CIO communication with the business leaders a continuing challenge. Consider how the challenge is manifesting in a communication gap. As CISOs continue to battle the wide-ranging cyber threats bearing down on their states. There appears to be a discrepancy between them and business stakeholders when it comes to how confident they are that their efforts are succeeding against these continueing threats. A high percentage of state official respondents (60%) indicated that they are very or extremely confident that their state s information assets were protected against external cyber threats. However, only 24% of the CISO survey respondents expressed a similar sentiment. The higher degree of confidence among business leaders indicates the need for state CISOs to do a better job of communicating risks and potential impacts to business stakeholders. Improving this communication and closing the confidence gap will likely help address the budget challenge as well. Figure 16: State officials and CISOs are not aligned in their level of confidence of the states abilities to protect against external cyber threats Very/Extremely Confident Somewhat Confident 24.5% 27.0% 55.1% 60.1% Not very/least Confident 11.2% 16.3% State Officials CISOs Moving forward As the complexity of cyber threats increases, CISOs are challenged to keep up and adequately communicate with stakeholders about the critical nature of these threats. At the same time, as government responds with more and more regulation, CISOs will have to devote significant resources to compliance activities. There is an opportunity for CISOs to use both increasing regulatory requirements and audit findings to gain the attention of business and program executives. Business stakeholders understand the risk to their program mission when regulatory and audit issues are not addressed and are more likely to respond with adequate funding. It is critical for CISOs to clearly communicate the nature and severity of cyber risks to business, agency program, and legislative leaders and stakeholders. Simply reporting on the progress and success of cyber initiatives is not enough. In fact, it seems to be resulting in unwarranted complacency on the part of business leaders, who are more confident than CISOs in their state s ability to protect against threats. The defense mechanisms need to evolve they can t rely on protection of the perimeter alone. CISOs need to develop threat-monitoring plans for early detection of incidents and be prepared to respond when incidents do occur. They also need effective recovery plans so that operations can be up and running quickly after a cyber incident. 16
18 IV. Talent crisis To keep information safe, organizations need employees with skills in cybersecurity skills that require continual updating as cyberthreat actors develop ever-more sophisticated ways of infiltrating IT infrastructures. Government agencies at the federal, state, and local levels are hard-pressed to compete against the private sector for technology talent. As cybersecurity threats increase for private companies and government alike, the need for employees with coveted cybersecurity skills is likely to become even more acute. Talent crisis Talent crisis 38.8% Forensics/legal support Top functions outsourced 36.7% Threat management and monitoring services 36.7% Threat risk assessments Top three actions to improve workforce 57.1% Non-salary benefit 46.9% Cross-train IT workforce 42.9% University relations FTE counts are increasing 49% 6 to 15 FTEs Competencies have increased, training has improved NICE framework 35.4% CISOs are reviewing Collaboration needed with HR to define cybersecurity career path 7 out of 10 states agree Inadequate availability of cybersecurity professionals Barrier #3 59% 25% States with appropriate job descriptions documented by HR Salary is top challenge in staffing Leading challenge in workforce development 67.3% 9 out of 10 CISOs CISOs choose "Lack of a defined cybersecurity career path" Improvement is seen in the number of FTE positions but 59% of CISOs indicated that inadequate availability of cybersecurity professionals is a top barrier More states are embracing outsourcing to mitigate talent risk Collaboration with HR is needed to define career paths and better define cybersecurity jobs 17
19 The right talent is hard to find Despite the fact that only 2% of CISOs point to talent management as a top priority, down from 10% in 2012, CISOs believe that the scarcity of qualified professionals willing to work in the public sector is one of the biggest barriers to effectively addressing cybersecurity challenges. According to nine in ten respondents, the biggest challenge in attracting talent to state cybersecurity positions comes down to salary, hardly surprising in this seller s market for cybersecurity talent. Lack of a clear career path and the lengthy state hiring process were also cited as obstacles by a large percentage of respondents. What s more, only a quarter of respondents say their states have adequately documented the required competencies for cybersecurity positions as part of job descriptions, which may further hinder their ability to attract the appropriate talent. Even when states are successful at recruiting top talent; however, the lure of the private sector often makes them difficult to retain. Nevertheless, CISOs are doing their best to both grow and strengthen their organizations. Nearly half of states now have cybersecurity staffs numbering 6 to 15 FTEs compared with less than two-fifths in 2012, while the number with smaller staffs of 1 to 5 FTEs has fallen significantly. Figure 17: Top Top five five challenges challenges in attracting and retaining attracting talent and retaining talent 89.9% Salary 71.4% Attrition to Private Sector 32.7% Intrastate attrition for higher salary positions 53.1% Lengthy hiring process CISOs say their states use a variety of strategies to attract cybersecurity employees, including promoting non-salary benefits, cross-training and developing other state IT employees, fostering relationships with state universities, and communicating such benefits as job stability compared with the private sector. Collaboration with state HR departments to develop better ways to attract and retain talent is a growing necessity. CISOs feel that their state HR departments need to establish cybersecurity career paths and improve job descriptions to attract employees whose skills are aligned with cybersecurity priorities. Number of dedicated cybersecurity professional in the states enterprise security office Figure 18: Number of dedicated cybersecurity professionals in the state s enterprise security office 1 to 5 full time equivalents 6 to 15 full time equivalents 16 to 25 full time equivalents 12.2% 10.0% 28.6% 26 to 50 full 10.2% 2014 time equivalents % States leading strategies to attract and retain cybersecurity talent Figure 19: Top four state strategies to retain cybersecurity talent Promote non-salary benefits Cross-train and develop IT workforce Relationship with state universities and faculty Highlight greater stability 39.0% 49.0% 49.0% 67.3% Lack of defined career path and opportunities 18
20 Training has become a priority CISOs are gaining more confidence in their staffs. Only one in ten said employees have large gaps in competencies versus nearly a quarter in 2012, and a greater percentage said their employees are up to the job compared with two years ago. CISOs are also becoming more proactive about closing competency gaps, and cybersecurity training is a priority. Almost all CISOs said they provide annual or more frequent training to employees and contractors, up significantly from Furthermore, CISOs say their departments have become much more self-sufficient in providing cybersecurity awareness to their employees States adoption based on job of the role and NICE function. framework Figure 20: States adoption of NICE framework Reviewing the framework 35.4% A majority of CISOs indicated that they are either reviewing or implementing portions of the NIST National Initiative for Cybersecurity Education (NICE) Framework to prepare, educate, recruit, train, develop, and retain a diverse cybersecurity workforce. 3 States have shown an increase in Figure 21: States providing have significantly required increased training training for their staff for their staff Executives People handling sensitive information IT application developers and programmers System administrators 27.7% 30.4% 34.0% 44.0% 52.3% 53.3% 67.4% 67.4% Continuing to use the existing state HR model 27.0% IT infrastructure 36.2% 56.5% Implementing portions of the NICE framework into the state s HR model 14.6% Business and program stakeholders N/A 51.1% No plan to adopt 12.5% General state workforce 38.3% 63.8%
21 Outsourcing has become more accepted Outsourcing is one way to compensate for talent gaps. For CISOs who are restricted in their ability to hire workers, or who are having trouble attracting employees with the required skill sets, outsourcing certain aspects of cybersecurity work is an option. The most frequently outsourced functions include forensic and legal support, risk assessment, and threat management and monitoring. About a third of CISOs said they do have knowledge of third-party cybersecurity capabilities and have identified Leading outsourced cybersecurity functions Figure 22: Leading outsourced cybersecurity functions controls and agency dependencies. However, only a minority review and test them regularly. The majority of states are managing third parties performances by requiring that they adhere to state cybersecurity policy and controls. Somewhat disturbingly, most CISOs said they are only somewhat confident in the cybersecurity practices of third parties, suggesting that more needs to be done to evaluate and maintain the adequacy of cybersecurity practices of third parties. CISOs confidence levels in cybersecurity practices of their third parties Figure 23: CISOs confidence levels in cybersecurity practices of third parties % 74.0% % 74.0% Threat management and monitoring services Forensics/ legal support Threat risk assessments Audit log analysis and reports Vulnerability management % 6.3% Not very confident Somewhat confident % 18.0% Security technology services (e.g. antivirus and firewalls) Moving forward State governments are in a difficult position when it comes to competing with the private sector for cybersecurity talent. CISOs need to look at more creative ways to build their teams and ensure that they enlist the support of people with cutting-edge skills in cybersecurity. 4 The scarcity of talent means that private sector partnership will likely need to be part of the talent mix. CISOs should provide training to their staff to effectively manage teams that may include members from third parties. Third-party partnerships may cover activities ranging from managing security functions to providing specialist augmentation. Millennials are likely to be an important source of talent in the cybersecurity arena. Attracting Millennials is a whole new ballgame; factors that motivate them are often different from what has appealed to previous generations. Rather than job stability and money, Millennials tend to look for work that makes a difference, a more entrepreneurial work environment, and job variety and flexibility. Cybersecurity work certainly fits the bill for making a difference, and CISOs need to make sure this message is adequately communicated. The skill sets required for cybersecurity work are unique. States need to do a better job of mapping these competencies and creating well-documented job descriptions. There is a need for dedicated HR professionals who can partner with CISOs to ensure the right talent is coming in the door. Knowledgeable HR professionals can also work with CISOs to redefine the cybersecurity career path and create strong learning programs that develop and grow the right talent from the start. 20
22 Emerging Trends Enterprise Identity and Access Management (IAM) Enterprise IAM solutions are important for states. They provide data access rights to the right individuals and help organizations comply with increasingly stringent compliance standards related to the management of digital identities. While about a third of states have some form of an enterprise IAM solution, over half have yet to implement one. For states that have not adopted an approach to IAM, results show the primary barriers to implementation are a decentralized environment, the complexity of integrating with legacy systems, and lack of governance. CISOs say their states are involved in a range of initiatives, including multi-factor authentication, federated IAM for agencies and third-party providers, and implementing privileged identity management solutions. Adoption of enterprise IAM solution Figure 24: Adoption of enterprise IAM solution Yes, all agencies under Governor s jurisdiction 12.2% Yes, limited agencies under Governor s jurisdiction No, but plan to implement 20.4% 22.4% Do not have an enterprise-wide solution 32.7% Other 12.2% States leading IAM initiatives Figure 25: Leading IAM initiatives in states Federal IAM for agencies and third parties Multi-factor authentication Privileged identity management 21
23 Leading privacy concerns Privacy The unprecedented growth of social media, paired with a series of high-profile stories on government accessing citizens personal information, has made privacy a hot-button issue. CISOs cite a wide range of privacy concerns, most prominently unauthorized access to personal information, compliance with privacy statutes, and managing information sharing with third parties. Both the federal government and most states have enacted privacy laws, and complying with them requires both resources and careful planning. Yet, only a third of states have programs for managing privacy compliance, and only two fifths have a formal process in place to handle complaints about information privacy. This may be one reason why states have decided to establish a separate position of CPO. The position now exists in nearly a third of states, up from two years ago. Figure 26: Leading privacy concerns Unauthorized access to personal information Web-enabled systems and services Align operational practices with policies Compliance with federal and state privacy statutes NASCIO Core Security Services Taxonomy Consistent with the 2012 Deloitte-NASCIO Cybersecurity Study, we asked the CISOs to perform a self-evaluation of maturity across a range of core security services. 5 The responses provided greater insight into the maturity of select cybersecurity program elements as highlighted in Figure 27. Information sharing with third parties Figure 27: Status of Core Security Services Taxonomy Established supporting policy/ standards Fully implemented solutions to enforce the policy/standard Partially implemented Currently piloting solutions Plan to fully deploy or pilot within the next 12 months Continuously monitor implementation and mitigate gaps Secure system engineering % 6.7% 31.1% 8.9% 4.4% 6.7% Cybersecurity compliance % 13.0% 37.0% 10.9% 6.5% 6.5% Continuous diagnostics and mitigation % 2.2% 24.4% 4.4% 17.8% 13.3% 5 0 Cybersecurity incident response and forensics % 21.3% 29.8% 4.3% 4.3% 8.5% 0 Deployment of mobile applications % 8.7% 30.4% 13.0% 17.4% 2.2% 5 0 Adoption of cloud computing technology % 13.0% 26.1% 21.7% 15.2% 4.3% 0 Cyber threat analytics % 7.1% 28.6% 14.3% 7.1% 4.8%
24 Collaboration with non-governmental entities State CISOs are collaborating with other state agencies and various outside entities, especially in the areas of cybersecurity awareness and providing supporting policies and standards. The vast majority of CISOs indicated that they collaborated with local governmental entities, state colleges and universities, and state judicial agencies as part of their security programs. States are also welcoming guidance from leading public sector leadership organizations, including NASCIO, the National Governors Association (NGA), and NIST. For example, more than twothirds of CISOs indicated that they are either reviewing or working on recommendations provided by NGA s Act and Adjust report. 6 Similarly, NIST-provided cybersecurity standards and the NIST Cybersecurity Framework 1.0 are the leading choices for CISOs when establishing their cybersecurity programs. Figure 28: States collaboration with non-governmental entities States collaboration with non-governmental entities 87.8% 83.7% Local government entities other than education State colleges and universities 79.6% State judicial agencies 75.5% State legistative agencies 71.4% Private sector organizations 57.1% K-12 schools and school districts 53.1% Community colleges 23
25 Moving forward It is clear that cybersecurity threats are increasing in sophistication, intensity, diversity, and volume and that they are not going away anytime soon. Consider the evolution of the environment, and threat and impact from 1990s to today and in the foreseeable future (Figure 29). While states have made incremental improvements, there is still more to do to mitigate the mounting threats and disruption to business when attacks succeed. Figure 29: Evolving technology and rapidly escalating cyber threats call for a deliberate approach to make commanding progress Cyber terrorism High Increasing Business Impact Citizen trust impact Cost to protect & remediate Legal/regulatory Critical infrastructure Low Mobile malware Foreign state sponsored cyber espionage Scareware Ransomware Cyber warfare Insecure code Advanced persistent threats Cyber crime Whaling Smarter targeted attacks Rogueware Heart Bleed Adware Critical infrastructure Hactivists Pharming attacks War driving Social media Smart device Identity Zero-day Spear phishing based attacks attacks theft Social engineering Malware Threat sophistication Botnets Virus Script kiddies Worms Phishing Spyware Organized hackers Hackers Data breach User Experience Driven; War dialing Web attacks Data Everywheree Physical Fraud Wearable Technology threat Spam Trojans 24*7 Access, Mobile, Internet-of-Things Network attacks Anywhere & Anytime Drones Integrated online eligibility Federated identity for access to Insider threat Internet Access and Highly systems government and Connected Systems Cloud computing non-governmental systems Web-enablement and online Mobile Artificial intelligence Data in Secure Business access to citizen data Big data Virtual currency (bit coins) System Silo Advances in internetworking Mobile Payment Mainframe systems Citizen self service Smart devices Siloed information systems Emergence of Open Systems Internetworking Escalating cyber threats Evolution of Technology 1990s 2000s 2010 Now Near Future The information environment for states is becoming more difficult to protect as they increase their use of on-line services, both to save money and in response to citizen demands. Agencies and citizens are also clamoring for more mobile services, increasing the complexity of security. Cloud computing is another way states are looking to capture cost efficiencies, but the move brings a host of security concerns. Finally, the rise of information sharing across state and federal networks, aimed at solving some of the problems that arise from silos, including poor communication, has the potential to create more vulnerabilities. The business need to adopt technology advances and the increasing sophistication of cyber threats are posing a daunting challenge. Cybersecurity must become an enterprise business imperative for states. All of this leads to the stark conclusion that the states must embrace cybersecurity as part of our business and technology culture. As the states move forward with a renewed emphasis, they also need to consider the approach to security. The traditional approach to managing security through preventive and risk-based protective measures, while important and necessary, is no longer enough. States today must add two other elements to the mix: vigilance continuous monitoring for threats that gives them early detection capabilities and resilience the ability to respond and recover. Achieving greater effectiveness with modest budgets depends on taking a threat-aware, risk-based approach. Additionally, states need to determine the right balance of secure, vigilant, and resilient capabilities needed to support the various programs, agencies and operational activities of state government. Making a secure, vigilant, and resilient approach a business imperative means every new technology project or system implementation must include funding to incorporate these elements. Implementing this approach will call for creative partnerships and collaboration with the private sector, other states and the federal government. Only by making cybersecurity a priority for business leaders, embarking on innovative collaborations with public and private sector entities and covering all three bases, will states be in a position to address the continuing onslaught of cybersecurity risks. 24
26 Sources 1 SC data security efforts, monitoring may cross $27M; Seanna Adcox Associated Press, April 20, 2014, 2 NIST released Version 1.0 of its Cybersecurity Framework; Framework for Improving Critical Infrastructure Cybersecurity (National Institute for Standards and Technology, Version 1.0, February 12, 2014, 3 National Initiative for Cybersecurity Education (NICE) Framework; National Cybersecurity Workforce Framework (National Initiative for Cybersecurity Education, 4 Talent Crisis Moving Forward section was derived from the following sources: Global Human Capital Trends 2014: Engaging the 21st-century workforce. (Deloitte University Press, Gen Y and technology in today s workplace: Talent and the Generations (Part 1). (Alexandra Levit, Dorie Clark, and John Hagel, March 3, 2013, Introduction: Government s talent factor (Deloitte University Press, William D. Eggers, February 20, 2014, The mobile government worker (Deloitte University Press, William D. Eggers and Joshua Jaffe, July 17, 2013, From invisible to visible... to measurable (Deloitte University Press, Eric Openshaw, John Hagel, and John Seely Brown, March 10, 2014, Predictions for 2014: Building a Strong Talent Pipeline for the Global Economic Recovery (Bersin by Deloitte, Josh Bersin, December 2013, 5 The Heart of the Matter: A Core Services Taxonomy for State IT Security Programs. NASCIO. October Act and Adjust: A Call to Action for Governors for Cybersecurity. (National Governors Association, September 26, 2013, page-hsps-publications/col2-content/main-content-list/act-and-adjust-a-call-to-action.html) 25
27 Appendix The 2014 Deloitte-NASCIO Cybersecurity Study uses survey responses from: U.S. state enterprise-level CISOs, with additional input from agency CISOs and security staff members within state governments. U.S. state (business) officials, using a survey designed to help characterize how the state government enterprise views, formulates, implements, and maintains its security programs. CISO Profile CISO participants answered 58 questions designed to characterize the enterprise-level strategy, governance, and operation of security programs. Participation was high responses were received from 49 states. Figures 30 to 32 illustrate the CISO participants demographic profile. Figure 30: CISO survey respondent designation 6% 6% 10% 78% State Official Profile One hundred eighty-six (186) state officials answered 14 questions, providing valuable insight into states business stakeholder perspectives. The participant affiliations included the following associations: National Association of State Auditors, Controllers and Treasures (NASACT) National Association of Attorneys General (NAAG) National Association of Secretaries of State (NASS) National Association of State Personnel Executives (NASPE) National Association of State Chief Administrators (NASCA) National Association of State Budget Officers (NASBO) National Association of State Procurement Officials (NASPO) American Association of Motor Vehicle Administrators (AAMVA) National Association of Medicaid Directors (NAMD) National Emergency Management Association (NEMA) Adjutant General Association of the United States (AGAUS) Governors Homeland Security Advisors Council (GHSAC) Federation of Tax Administrators (FTA) International Association of Chiefs of Police (IACP) Division of State and Provincial Police (S&P) The two surveys provided space for respondents comments when they wanted to explain N/A or other responses. A number of participant provided comments that offered further insight. Some of these comments may have been included in this report, but the respondents have not been cited for confidentiality reasons. Enterprise CISO Acting or Interim CISO Chief Information Officer Others Figure 31: Approximate annual budget of the respondent states ($USD) Figure 32: Number of employees in your state (excluding higher education employees) 1 billion - 10 billion 31.3% 5,000 to 15, % 11 billion - 25 billion 26 billion - 50 billion 20.8% 25.0% 15,001 to 25, % More than 50 billion 14.6% 25,001 to 75, % Not applicable 8.3% More than 75, % 0% 5% 10% 15% 20% 25% 30% 35% 0% 20% 40% 60% 26
28 Acknowledgements We thank the NASCIO and Deloitte professionals who helped to develop the survey, execute, analyze and create the report. NASCIO Doug Robinson, Executive Director Meredith Ward, Senior Policy Analyst Security and Privacy Committee Co-Chairs and Members State CISO Survey Review Team Brian Engle, State of Texas Chris Buse, State of Minnesota Dan Lohrmann, State of Michigan Elayne Starkey, State of Delaware Elliot Schlanger, State of Maryland Erik Avakian, Commonwealth of Pennsylvania Michele Robinson, State of California Deloitte subject matter specialist contributors Art Stephens, Deloitte Consulting LLP Ed Powers, Deloitte & Touche LLP Libby Bacon, Deloitte Consulting LLP Mike Wyatt, Deloitte & Touche LLP Srini Subramanian, Deloitte & Touche LLP Deloitte survey team, data analysis, and benchmarks Bharane Balasubramanian, Deloitte & Touche LLP Ruth Williams, Communications Consultant Marketing Annette Evans, Deloitte Services LP Beth Ruck, Deloitte Services LP Shawn Vaughn, NASCIO Suzanne Love Beck, Deloitte Services LP How Deloitte and NASCIO designed, implemented, and evaluated the survey Deloitte and NASCIO collaborated to produce the 2014 Deloitte-NASCIO Cybersecurity Study. Working with NASCIO and several senior state government security leaders, and Deloitte s security survey questionnaire used for other security surveys, Deloitte developed a questionnaire to probe key aspects of information security within state government. A CISO survey review team, consisting of the members of the NASCIO Security & Privacy Committee, reviewed the survey questions and assisted in further refining the survey questions. In most cases, respondents completed the surveys using a secure online tool. Respondents were asked to answer questions to the best of their knowledge and had the option to skip a question if they did not feel comfortable answering it. Each participant s response is confidential and demographic information of the survey content will be deleted after the preparation of the survey reports. The data collection and analysis process was conducted by DeloitteDEX, Deloitte s proprietary survey and benchmarking service. Results of the survey have been analyzed according to industryleading practices and reviewed by senior members of Deloitte s Cyber Risk Services and Human Capital specialists. In some cases, in order to identify trends or unique themes, data was also compared to prior surveys and additional research. Results on some charts may not total 100 percent based on the analysis of the comments related to answer choices such as Not applicable, Do not know, or Other. Due to the volume of questions and for better readability, this document reports only on the data points deemed to be most important at the aggregate level. A companion report including the questions and benchmarked responses has been provided individually to the state CISO survey respondents. 27
29 About Deloitte and NASCIO About Deloitte As used in this document, Deloitte means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. Deloitte s Cyber Risk Services help complex organizations more confidently leverage advanced technologies to achieve their strategic growth, innovation and performance objectives through proactive management of the associated cyber risks. Deloitte s practitioners provide advisory, implementation, and managed services to help transform legacy IT security programs into proactive Secure.Vigilant.Resilient. cyber risk programs that better align security investments with risk priorities, establish improved threat awareness and visibility, and strengthen the ability of organizations to thrive in the face of cyber incidents. For more information visit About NASCIO Founded in 1969, the National Association of State Chief Information Officers (NASCIO) represents state chief information officers and information technology (IT) executives and managers from the states, territories, and District of Columbia. NASCIO s mission is to foster government excellence through quality business practices, information management and technology policy. NASCIO provides state CIOs and state members with products and services designed to support the challenging role of the state CIO, stimulate the exchange of information and promote the adoption of IT best practices and innovations. From national conferences, peer networking, research, publications, briefings, and government affairs, NASCIO is the premier network and resource for state CIOs. For more information visit 28
30 Contacts NASCIO Doug Robinson Executive Director [email protected] Meredith Ward Senior Policy Analyst [email protected] Deloitte Jessica Blume US Public Sector Industry Leader Deloitte LLP [email protected] Ed Powers Cyber Risk Services National Leader Deloitte & Touche LLP [email protected] Srini Subramanian State Sector Risk Advisory Leader Deloitte & Touche LLP [email protected] Mike Wyatt State Sector Cyber Risk Program Services Leader Deloitte & Touche LLP [email protected] 29
31 30
32 About this publication This document contains general information only and Deloitte is not, by means of this document, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This document is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. In addition, this document contains the results of a survey conducted by Deloitte. The information obtained during the survey was taken as is and was not validated or confirmed by Deloitte. Deloitte shall not be responsible for any loss sustained by any person who relies on this document. Copyright 2014 Deloitte Development LLC. All rights reserved. Member of Deloitte Touche Tohmatsu Limited
States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent
SESSION ID: PNG-R04 States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent MODERATOR: Christopher Ipsen CIO Nevada Desert Research Institute PANELISTS: Tim Hastings Chief Information
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
State of South Carolina Initial Security Assessment
State of South Carolina Initial Security Assessment Deloitte & Touche LLP Date: May 1, 2013 Our services were performed in accordance with the Statement on Standards for Consulting Services that is issued
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
CYBERSECURITY IN HEALTHCARE: A TIME TO ACT
share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity
New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector
New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Managing the Ongoing Challenge of Insider Threats
CYBERSECURITY IN THE FEDERAL GOVERNMENT Managing the Ongoing Challenge of Insider Threats A WHITE PAPER PRESENTED BY: May 2015 PREPARED BY MARKET CONNECTIONS, INC. 11350 RANDOM HILLS ROAD, SUITE 800 FAIRFAX,
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
fs viewpoint www.pwc.com/fsi
fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS
PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS BEFORE THE COMMITTEE ON HOUSE SMALL BUSINESS SUBCOMMITTEE
Security and Privacy Trends 2014
2014 Agenda Today s cyber threats 3 You could be under cyber attack now! Improve 6 Awareness of cyber threats propels improvements Expand 11 Leading practices to combat cyber threats Innovate 20 To survive,
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
State of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
www.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
State of the States: IT Trends, Priorities and Issues
State of the States: IT Trends, Priorities and Issues OSC Financial Conference 2012 Doug Robinson, Executive Director National Association of State Chief Information Officers Fiscal recovery: budgets are
Advanced Cyber Threats in State and Local Government
RESEARCH SURVEY Advanced Cyber Threats in State and Local Government January 2014 SHUTTERSTOCK UNDERWRITTEN BY: Section 1: Executive Overview In the past, scattershot, broad-based attacks were often more
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
CDW-G Federal Cybersecurity Report: Danger on the Front Lines. November 2009. 2009 CDW Government, Inc.
CDW-G Federal Cybersecurity Report: Danger on the Front Lines November 2009 2009 CDW Government, Inc. 1 Table of Contents Introduction 3 Key Findings 4 The Threats 5 Frequent Threats 6 Persistence and
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
New York State Department of Financial Services. Report on Cyber Security in the Banking Sector
New York State Department of Financial Services Report on Cyber Security in the Banking Sector Governor Andrew M. Cuomo Superintendent Benjamin M. Lawsky May 2014 I. Introduction Cyber attacks against
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap
The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap AAMVA Region I Conference E-ID, DLDV, and Privacy Conducting Business Securely
2015 Global Megatrends in Cybersecurity
2015 Global Megatrends in Cybersecurity Sponsored by Raytheon Independently conducted by Ponemon Institute LLC Publication Date: February 2015 Ponemon Institute Research Report 2015 Global Megatrends in
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
Cyber security: everybody s imperative. A guide for the C-suite and boards on guarding against cyber risks
Cyber security: everybody s imperative A guide for the C-suite and boards on guarding against cyber risks Secure Enhance risk-prioritized controls to protect against known and emerging threats, and comply
Key Cyber Risks at the ERP Level
Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
I N T E L L I G E N C E A S S E S S M E N T
I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014
www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
The Computerworld Honors Program
The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel
Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel May 5th, 2015 10:00-11:30 a.m. Hyatt Regency, Indian Wells, CA Thank you all for welcoming me. It
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Solving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
The Path Ahead for Security Leaders
The Path Ahead for Security Leaders Executive Summary What You Will Learn If you asked security leaders five years ago what their primary focus was, you would likely get a resounding: securing our operations.
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Global IT Security Risks
Global IT Security Risks June 17, 2011 Kaspersky Lab leverages the leading expertise in IT security risks, malware and vulnerabilities to protect its customers in the best possible way. To ensure the most
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It
MANAGED SECURITY SERVICES (MSS)
MANAGED SECURITY SERVICES (MSS) The Cyber Security Initiative. Cybercrime is becoming an important factor for CIOs and IT professionals, but also for CFOs, compliance officers and business owners. The
